{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T02:24:27Z","timestamp":1769912667571,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,1]],"date-time":"2017-11-01T00:00:00Z","timestamp":1509494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1617728,CNS-1700657,CNS- 1350720"],"award-info":[{"award-number":["CNS-1617728,CNS-1700657,CNS- 1350720"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","award":["Google Research Award"],"award-info":[{"award-number":["Google Research Award"]}],"id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1145\/3131365.3131376","type":"proceedings-article","created":{"date-parts":[[2017,11,14]],"date-time":"2017-11-14T14:40:22Z","timestamp":1510670422000},"page":"128-141","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["lib\u2022erate, (n)"],"prefix":"10.1145","author":[{"given":"Fangfan","family":"Li","sequence":"first","affiliation":[{"name":"Northeastern University"}]},{"given":"Abbas","family":"Razaghpanah","sequence":"additional","affiliation":[{"name":"Stony Brook University"}]},{"given":"Arash Molavi","family":"Kakhki","sequence":"additional","affiliation":[{"name":"Northeastern University"}]},{"given":"Arian Akhavan","family":"Niaki","sequence":"additional","affiliation":[{"name":"Stony Brook University"}]},{"given":"David","family":"Choffnes","sequence":"additional","affiliation":[{"name":"Northeastern University"}]},{"given":"Phillipa","family":"Gill","sequence":"additional","affiliation":[{"name":"University of Massachusetts Amherst"}]},{"given":"Alan","family":"Mislove","sequence":"additional","affiliation":[{"name":"Northeastern University"}]}],"member":"320","published-online":{"date-parts":[[2017,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/www.att.com\/offers\/streamsaver.html. (April","author":"Saver T Stream","year":"2017","unstructured":"2017. AT& T Stream Saver . https:\/\/www.att.com\/offers\/streamsaver.html. (April 2017 ). 2017. AT&T Stream Saver. https:\/\/www.att.com\/offers\/streamsaver.html. (April 2017)."},{"key":"e_1_3_2_1_2_1","volume-title":"Censorship of cloudfront.net in China. https:\/\/en.greatfire.org\/search\/all\/cloudfront.net. (August","year":"2017","unstructured":"2017. Censorship of cloudfront.net in China. https:\/\/en.greatfire.org\/search\/all\/cloudfront.net. (August 2017 ). 2017. Censorship of cloudfront.net in China. https:\/\/en.greatfire.org\/search\/all\/cloudfront.net. (August 2017)."},{"key":"e_1_3_2_1_3_1","volume-title":"http:\/\/hola.org\/. (April","author":"Secure Browsing Hola-Free VPN","year":"2017","unstructured":"2017. Hola-Free VPN , Secure Browsing , Unrestricted Access . http:\/\/hola.org\/. (April 2017 ). 2017. Hola-Free VPN, Secure Browsing, Unrestricted Access. http:\/\/hola.org\/. (April 2017)."},{"key":"e_1_3_2_1_4_1","volume-title":"https:\/\/iclab.org\/. (April","year":"2017","unstructured":"2017. ICLab. https:\/\/iclab.org\/. (April 2017 ). 2017. ICLab. https:\/\/iclab.org\/. (April 2017)."},{"key":"e_1_3_2_1_5_1","volume-title":"Tor Pluggable Transports. https:\/\/www.torproject.org\/docs\/pluggable-transports.html.en. (April","year":"2017","unstructured":"2017. Tor Pluggable Transports. https:\/\/www.torproject.org\/docs\/pluggable-transports.html.en. (April 2017 ). 2017. Tor Pluggable Transports. https:\/\/www.torproject.org\/docs\/pluggable-transports.html.en. (April 2017)."},{"key":"e_1_3_2_1_6_1","volume-title":"https:\/\/trac.torproject.org\/projects\/tor\/wiki\/doc\/meek. (April","year":"2017","unstructured":"2017. WikiMeek. https:\/\/trac.torproject.org\/projects\/tor\/wiki\/doc\/meek. (April 2017 ). 2017. WikiMeek. https:\/\/trac.torproject.org\/projects\/tor\/wiki\/doc\/meek. (April 2017)."},{"key":"e_1_3_2_1_7_1","volume-title":"The Hidden Internet of Iran: Private Address Allocations on a National Network. CoRR abs\/1209.6398","author":"Anderson Collin","year":"2012","unstructured":"Collin Anderson . 2012. The Hidden Internet of Iran: Private Address Allocations on a National Network. CoRR abs\/1209.6398 ( 2012 ). http:\/\/arxiv.org\/abs\/1209.6398 Collin Anderson. 2012. The Hidden Internet of Iran: Private Address Allocations on a National Network. CoRR abs\/1209.6398 (2012). http:\/\/arxiv.org\/abs\/1209.6398"},{"key":"e_1_3_2_1_8_1","volume-title":"Dimming the Internet: Detecting Throttling as a Mechanism of Censorship in Iran. CoRR abs\/1306.4361","author":"Anderson Collin","year":"2013","unstructured":"Collin Anderson . 2013. Dimming the Internet: Detecting Throttling as a Mechanism of Censorship in Iran. CoRR abs\/1306.4361 ( 2013 ). http:\/\/arxiv.org\/abs\/1306.4361 Collin Anderson. 2013. Dimming the Internet: Detecting Throttling as a Mechanism of Censorship in Iran. CoRR abs\/1306.4361 (2013). http:\/\/arxiv.org\/abs\/1306.4361"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2390756.2405036"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2317307.2317311"},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. of USENIX FOCI. https:\/\/www.usenix.org\/conference\/foci14\/workshop-program\/presentation\/anonymous","author":"Anonymous","year":"2014","unstructured":"Anonymous . 2014 . Towards a Comprehensive Picture of the Great Firewall's DNS Censorship . In Proc. of USENIX FOCI. https:\/\/www.usenix.org\/conference\/foci14\/workshop-program\/presentation\/anonymous Anonymous. 2014. Towards a Comprehensive Picture of the Great Firewall's DNS Censorship. In Proc. of USENIX FOCI. https:\/\/www.usenix.org\/conference\/foci14\/workshop-program\/presentation\/anonymous"},{"key":"e_1_3_2_1_12_1","volume-title":"Proc. of USENIX FOCI.","author":"Aryan Simurgh","unstructured":"Simurgh Aryan , Homa Aryan , and J. Alex Halderman . 2013. Internet Censorship in Iran: A First Look . In Proc. of USENIX FOCI. Simurgh Aryan, Homa Aryan, and J. Alex Halderman. 2013. Internet Censorship in Iran: A First Look. In Proc. of USENIX FOCI."},{"key":"e_1_3_2_1_13_1","volume-title":"IFIP\/IEEE International Symposium on Integrated Network Management (IM2013)","author":"Bashko V.","unstructured":"V. Bashko , N. Melnikov , A. Sehgal , and J. Schonwalder . 2013. BonaFide: A traffic shaping detection tool for mobile networks . In IFIP\/IEEE International Symposium on Integrated Network Management (IM2013) . V. Bashko, N. Melnikov, A. Sehgal, and J. Schonwalder. 2013. BonaFide: A traffic shaping detection tool for mobile networks. In IFIP\/IEEE International Symposium on Integrated Network Management (IM2013)."},{"key":"e_1_3_2_1_14_1","unstructured":"Jon Brodkin. 2017. Verizon accused of throttling Netflix and Youtube admits to 'video optimization'. urlhttps:\/\/arstechnica.com\/information-technology\/2017\/07\/verizon-wireless-apparently-throttles-streaming-video-to-10mbps\/. (July 2017).  Jon Brodkin. 2017. Verizon accused of throttling Netflix and Youtube admits to 'video optimization'. urlhttps:\/\/arstechnica.com\/information-technology\/2017\/07\/verizon-wireless-apparently-throttles-streaming-video-to-10mbps\/. (July 2017)."},{"key":"e_1_3_2_1_15_1","volume-title":"Proc. of TPRC.","author":"Choffnes David","year":"2017","unstructured":"David Choffnes , Phillipa Gill , and Alan Mislove . 2017 . An Empirical Evaluation of Deployed DPI Middleboxes and Their Implications for Policymakers . In Proc. of TPRC. David Choffnes, Phillipa Gill, and Alan Mislove. 2017. An Empirical Evaluation of Deployed DPI Middleboxes and Their Implications for Policymakers. In Proc. of TPRC."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_2"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315290"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504757"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_20_1","volume-title":"Proc. of USENIX NSDI.","author":"Dischinger Marcel","year":"2010","unstructured":"Marcel Dischinger , Massimiliano Marcon , Saikat Guha , Krishna P. Gummadi , Ratul Mahajan , and Stefan Saroiu . 2010 . Glasnost: Enabling End Users to Detect Traffic Differentiation . In Proc. of USENIX NSDI. Marcel Dischinger, Massimiliano Marcon, Saikat Guha, Krishna P. Gummadi, Ratul Mahajan, and Stefan Saroiu. 2010. Glasnost: Enabling End Users to Detect Traffic Differentiation. In Proc. of USENIX NSDI."},{"key":"e_1_3_2_1_21_1","volume-title":"Hold-On: Protecting Against On-Path DNS Poisoning. In SATIN'12","author":"Duan Haixin","year":"2012","unstructured":"Haixin Duan , Nicholas Weaver , Zongxu Zhao , Meng Hu , Jinjin Liang , Jian Jiang , Kang Liz , and Vern Paxson . 2012 . Hold-On: Protecting Against On-Path DNS Poisoning. In SATIN'12 . Haixin Duan, Nicholas Weaver, Zongxu Zhao, Meng Hu, Jinjin Liang, Jian Jiang, Kang Liz, and Vern Paxson. 2012. Hold-On: Protecting Against On-Path DNS Poisoning. In SATIN'12."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815690"},{"key":"e_1_3_2_1_23_1","unstructured":"FCC. 2015. Protecting and Promoting the Open Internet. https:\/\/www.federalregister.gov\/articles\/2015\/04\/13\/2015-07841\/protecting-and-promoting-the-open-internet. (April2015).  FCC. 2015. Protecting and Promoting the Open Internet. https:\/\/www.federalregister.gov\/articles\/2015\/04\/13\/2015-07841\/protecting-and-promoting-the-open-internet. (April2015)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0009"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516742"},{"key":"e_1_3_2_1_26_1","volume-title":"Frontiers: Investigating Video Games as a Covert Channel. In Proc. of IEEE Euro S&P.","author":"Hahn B.","year":"2016","unstructured":"B. Hahn , R. Nithyanand , P. Gill , and R. Johnson . 2016 . Games without Frontiers: Investigating Video Games as a Covert Channel. In Proc. of IEEE Euro S&P. B. Hahn, R. Nithyanand, P. Gill, and R. Johnson. 2016. Games without Frontiers: Investigating Video Games as a Covert Channel. In Proc. of IEEE Euro S&P."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068834"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.14"},{"key":"e_1_3_2_1_29_1","volume-title":"Proc. of NDSS.","author":"Houmansadr Amir","year":"2013","unstructured":"Amir Houmansadr , Thomas Riedl , Nikita Borisov , and Andrew Singer . 2013 . I Want my Voice to be Heard: IP over Voice-over-IP for Unobservable Censorship Circumvention . In Proc. of NDSS. Amir Houmansadr, Thomas Riedl, Nikita Borisov, and Andrew Singer. 2013. I Want my Voice to be Heard: IP over Voice-over-IP for Unobservable Censorship Circumvention. In Proc. of NDSS."},{"key":"e_1_3_2_1_30_1","volume-title":"Autosonda: Discovering Rules and Triggers of Censorship Devices. In 7th USENIX Workshop on Free and Open Communications on the Internet (FOCI 17)","author":"Jermyn Jill","year":"2017","unstructured":"Jill Jermyn and Nicholas Weaver . 2017 . Autosonda: Discovering Rules and Triggers of Censorship Devices. In 7th USENIX Workshop on Free and Open Communications on the Internet (FOCI 17) . USENIX Association, Vancouver, BC. https:\/\/www.usenix.org\/conference\/foci17\/workshop-program\/presentation\/jermyn Jill Jermyn and Nicholas Weaver. 2017. Autosonda: Discovering Rules and Triggers of Censorship Devices. In 7th USENIX Workshop on Free and Open Communications on the Internet (FOCI 17). USENIX Association, Vancouver, BC. https:\/\/www.usenix.org\/conference\/foci17\/workshop-program\/presentation\/jermyn"},{"key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815691"},{"key":"e_1_3_2_1_33_1","unstructured":"Sheharbano Khattak Mobin Javed Philip D Anderson and Vern Paxson. 2013. Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion.. In FOCI.  Sheharbano Khattak Mobin Javed Philip D Anderson and Vern Paxson. 2013. Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion.. In FOCI."},{"key":"e_1_3_2_1_34_1","volume-title":"Proc. USENIX Security Symposium","volume":"2001","author":"Kreibich Christian","year":"2001","unstructured":"Christian Kreibich , Mark Handley , and V Paxson . 2001 . Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics . In Proc. USENIX Security Symposium , Vol. 2001 . Christian Kreibich, Mark Handley, and V Paxson. 2001. Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In Proc. USENIX Security Symposium, Vol. 2001."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987464"},{"key":"e_1_3_2_1_36_1","volume-title":"stickers, and censorship circumvention for Signal Android. https:\/\/whispersystems.org\/blog\/doodles-stickers-censorship\/. (December","author":"Marlinspike Moxie","year":"2016","unstructured":"Moxie Marlinspike . 2016. Doodles , stickers, and censorship circumvention for Signal Android. https:\/\/whispersystems.org\/blog\/doodles-stickers-censorship\/. (December 2016 ). Moxie Marlinspike. 2016. Doodles, stickers, and censorship circumvention for Signal Android. https:\/\/whispersystems.org\/blog\/doodles-stickers-censorship\/. (December 2016)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382210"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2010.46"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITAIC.2011.6030291"},{"key":"e_1_3_2_1_42_1","volume-title":"Exploring the Design Space of Longitudinal Censorship Measurement Platforms. CoRR abs\/1606.01979","author":"Razaghpanah Abbas","year":"2016","unstructured":"Abbas Razaghpanah , Anke Li , Arturo Filast\u00f2 , Rishab Nithyanand , Vasilis Ververis , Will Scott , and Phillipa Gill . 2016. Exploring the Design Space of Longitudinal Censorship Measurement Platforms. CoRR abs\/1606.01979 ( 2016 ). http:\/\/arxiv.org\/abs\/1606.01979 Abbas Razaghpanah, Anke Li, Arturo Filast\u00f2, Rishab Nithyanand, Vasilis Ververis, Will Scott, and Phillipa Gill. 2016. Exploring the Design Space of Longitudinal Censorship Measurement Platforms. CoRR abs\/1606.01979 (2016). http:\/\/arxiv.org\/abs\/1606.01979"},{"key":"e_1_3_2_1_43_1","unstructured":"Peter Svensson. 2007. Comcast Blocks Some Internet Traffic. http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2007\/10\/19\/AR2007101900842.html. (October 2007).  Peter Svensson. 2007. Comcast Blocks Some Internet Traffic. http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2007\/10\/19\/AR2007101900842.html. (October 2007)."},{"key":"e_1_3_2_1_44_1","unstructured":"Mukarram Bin Tariq Murtaza Motiwala Nick Feamster and Mostafa Ammar. 2009. Detecting Network Neutrality Violations with Causal Inference. In CoNEXT.  Mukarram Bin Tariq Murtaza Motiwala Nick Feamster and Mostafa Ammar. 2009. Detecting Network Neutrality Violations with Causal Inference. In CoNEXT."},{"key":"e_1_3_2_1_45_1","unstructured":"View DNS.info. 2011. DNS Cache Poisoning in the People's Republic of China. (2011). http:\/\/viewdns.info\/research\/dns-cache-poisoning-in-the-peoples-republic-of-china\/.  View DNS.info. 2011. DNS Cache Poisoning in the People's Republic of China. (2011). http:\/\/viewdns.info\/research\/dns-cache-poisoning-in-the-peoples-republic-of-china\/."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131374"},{"key":"e_1_3_2_1_47_1","volume-title":"Proc. of NDSS.","author":"Weaver N.","unstructured":"N. Weaver , R. Sommer , and V. Paxson . 2009. Detecting forged TCP reset packets . In Proc. of NDSS. N. Weaver, R. Sommer, and V. Paxson. 2009. Detecting forged TCP reset packets. In Proc. of NDSS."},{"key":"e_1_3_2_1_48_1","volume-title":"obfs4 (the obfourscator). https:\/\/gitweb.torproject.org\/pluggable-transports\/obfs4.git\/tree\/doc\/obfs4-spec.txt. (May","author":"Winter Philipp","year":"2014","unstructured":"Philipp Winter and Yawning Angel . 2014. obfs4 (the obfourscator). https:\/\/gitweb.torproject.org\/pluggable-transports\/obfs4.git\/tree\/doc\/obfs4-spec.txt. (May 2014 ). Philipp Winter and Yawning Angel. 2014. obfs4 (the obfourscator). https:\/\/gitweb.torproject.org\/pluggable-transports\/obfs4.git\/tree\/doc\/obfs4-spec.txt. (May 2014)."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517856"},{"key":"e_1_3_2_1_50_1","volume-title":"China: Where does the filtering occur?. In Passive and Active Measurement.","author":"Xu X.","year":"2011","unstructured":"X. Xu , Z. Mao , and J. Halderman . 2011 . Internet censorship in China: Where does the filtering occur?. In Passive and Active Measurement. X. Xu, Z. Mao, and J. Halderman. 2011. Internet censorship in China: Where does the filtering occur?. In Passive and Active Measurement."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644905"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2003.1189191"}],"event":{"name":"IMC '17: Internet Measurement Conference","location":"London United Kingdom","acronym":"IMC '17","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","USENIX Assoc USENIX Assoc"]},"container-title":["Proceedings of the 2017 Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3131365.3131376","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3131365.3131376","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3131365.3131376","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:40Z","timestamp":1750212820000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3131365.3131376"}},"subtitle":["a library for exposing (traffic-classification) rules and avoiding them efficiently"],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":51,"alternative-id":["10.1145\/3131365.3131376","10.1145\/3131365"],"URL":"https:\/\/doi.org\/10.1145\/3131365.3131376","relation":{},"subject":[],"published":{"date-parts":[[2017,11]]},"assertion":[{"value":"2017-11-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}