{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T16:56:12Z","timestamp":1776099372457,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1553301"],"award-info":[{"award-number":["1553301"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3134075","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"2037-2052","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["The Waterfall of Liberty"],"prefix":"10.1145","author":[{"given":"Milad","family":"Nasr","sequence":"first","affiliation":[{"name":"University of Massachusetts Amherst, Amherst, MA, USA"}]},{"given":"Hadi","family":"Zolfaghari","sequence":"additional","affiliation":[{"name":"University of Massachusetts Amherst, Amherst, MA, USA"}]},{"given":"Amir","family":"Houmansadr","sequence":"additional","affiliation":[{"name":"University of Massachusetts Amherst, Amherst, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Proc. Workshop on Multimedia Security at ACM Multimedia","volume":"2","author":"Ahsan Kamran","year":"2002","unstructured":"Kamran Ahsan and Deepa Kundur. 2002. Practical data hiding in TCP\/IP. In Proc. Workshop on Multimedia Security at ACM Multimedia, Vol. 2."},{"key":"e_1_3_2_2_2_1","unstructured":"Alexa Top 1 Million Websites February 2017. http:\/\/s3.amazonaws.com\/alexa-static\/top-1m.csv.zip."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282411"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978312"},{"key":"e_1_3_2_2_5_1","first-page":"9","article-title":"The Anonymizer: Protecting User Privacy on the Web","volume":"4","author":"Boyan Justin","year":"1997","unstructured":"Justin Boyan. 1997. The Anonymizer: Protecting User Privacy on the Web. Computer-Mediated Communication Magazine 4, 9 (Sept. 1997).","journal-title":"Computer-Mediated Communication Magazine"},{"key":"e_1_3_2_2_6_1","unstructured":"Bridge Easily Detected by GFW. https:\/\/trac.torproject.org\/projects\/tor\/ticket\/4185."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2009.2034031"},{"key":"e_1_3_2_2_8_1","unstructured":"The CAIDA UCSD [AS Relationships] - [Jan 2016]. http:\/\/www.caida.org\/data\/as-relationships\/."},{"key":"e_1_3_2_2_9_1","unstructured":"CAIDA AS Ranks. http:\/\/as-rank.caida.org."},{"key":"e_1_3_2_2_11_1","unstructured":"China blocks VPN services that let Internet users get around censorship. http:\/\/www.scmp.com\/news\/china\/article\/1689961\/china-blocks-vpn-services-let-internet-users-get-\\around-censorship. Online Article."},{"key":"e_1_3_2_2_12_1","unstructured":"Roger Dingledine and Nick Mathewson. Design of a Blocking-Resistant Anonymity System. https:\/\/svn.torproject.org\/svn\/projects\/design-paper\/blocking.html."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"crossref","unstructured":"Kevin P Dyer Scott E Coull Thomas Ristenpart and Thomas Shrimpton. 2013. Protocol misidentification made easy with format-transforming encryption. In ACM CCS. ACM 61--72.","DOI":"10.1145\/2508859.2516657"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2015.7366287"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0005"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","unstructured":"David Fifield Chang Lan Rod Hynes Percy Wegmann and Vern Paxson. 2015. Blocking-resistant Communication through Domain Fronting. In PETS. 10.1515\/popets-2015-0009","DOI":"10.1515\/popets-2015-0009"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","unstructured":"John Geddes Max Schuchard and Nicholas Hopper. 2013. Cover your ACKs: Pitfalls of covert channel censorship circumvention. In ACM CCS. ACM 361--372. 10.1145\/2508859.2516742","DOI":"10.1145\/2508859.2516742"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"crossref","unstructured":"John Holowczak and Amir Houmansadr. 2015. CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content. In ACM CCS.","DOI":"10.1145\/2810103.2813696"},{"key":"e_1_3_2_2_20_1","volume-title":"The Parrot is Dead: Observing Unobservable Network Communications","author":"Houmansadr Amir","unstructured":"Amir Houmansadr, Chad Brubaker, and Vitaly Shmatikov. 2013. The Parrot is Dead: Observing Unobservable Network Communications. In IEEE S&P."},{"key":"e_1_3_2_2_21_1","volume-title":"Matthew Caesar, and Nikita Borisov.","author":"Houmansadr Amir","year":"2011","unstructured":"Amir Houmansadr, Giang TK Nguyen, Matthew Caesar, and Nikita Borisov. 2011. Cirripede: Circumvention Infrastructure Using Router Redirection with Plausible Deniability. In ACM CCS."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"crossref","unstructured":"Amir Houmansadr Edmund L Wong and Vitaly Shmatikov. 2014. No Direction Home: The True Cost of Routing Around Decoys. In NDSS.","DOI":"10.14722\/ndss.2014.23292"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2640238"},{"key":"e_1_3_2_2_24_1","unstructured":"Jeffrey Jia and Patrick Smith. Psiphon: Analysis and Estimation. http:\/\/www.cdf.toronto.edu\/~csc494h\/reports\/2004-fall\/psiphon_ae.html."},{"key":"e_1_3_2_2_25_1","unstructured":"Josh Karlin Daniel Ellard Alden W Jackson Christine E Jones Greg Lauer David P Mankins and W Timothy Strayer. 2011. Decoy routing: Toward unblockable internet communication. In USENIX FOCI."},{"key":"e_1_3_2_2_26_1","first-page":"219","article-title":"Reverse traceroute","volume":"10","author":"Katz-Bassett Ethan","year":"2010","unstructured":"Ethan Katz-Bassett, Harsha V Madhyastha, Vijay Kumar Adhikari, Colin Scott, Justine Sherry, Peter Van Wesep, Thomas E Anderson, and Arvind Krishnamurthy. 2010. Reverse traceroute. In NSDI, Vol. 10. 219--234.","journal-title":"NSDI"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2377677.2377756"},{"key":"e_1_3_2_2_28_1","volume-title":"Systemization of Pluggable Transports for Censorship Resistance. arXiv preprint arXiv:1412.7448","author":"Khattak Sheharbano","year":"2014","unstructured":"Sheharbano Khattak, Laurent Simon, and Steven J Murdoch. 2014. Systemization of Pluggable Transports for Censorship Resistance. arXiv preprint arXiv:1412.7448 (2014)."},{"key":"e_1_3_2_2_29_1","volume-title":"Hyung Jae Chang, and Alade O Tokuta","author":"Kim Donghyun","year":"2013","unstructured":"Donghyun Kim, Glenn R Frye, Sung-Sik Kwon, Hyung Jae Chang, and Alade O Tokuta. 2013. On combinatoric approach to circumvent internet censorship using decoy routers. In MILCOM."},{"key":"e_1_3_2_2_30_1","unstructured":"Lantern. https:\/\/getlantern.org\/."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.4018\/jep.2012100102"},{"key":"e_1_3_2_2_32_1","unstructured":"Colin Lecher. How Iran Censors The Internet. http:\/\/www.popsci.com\/technology\/article\/2013-03\/how-iran-censors-internet-infographic. Online Article."},{"key":"e_1_3_2_2_33_1","unstructured":"Colin Lecher. Internet censorship reaching dangerous levels in Turkey. http:\/\/www.todayszaman.com\/national_internet-censorship-reaching-dangerous-levels-in-turkey_393727.html. Online Article."},{"key":"e_1_3_2_2_34_1","unstructured":"Matthew Lepinski. 2015. BGPSEC protocol specification. (2015)."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195627"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1951.10500769"},{"key":"e_1_3_2_2_37_1","unstructured":"MaxMind GeoIP Databases & Services: Industry Leading IP Intelligence. http:\/\/www.maxmind.com."},{"key":"e_1_3_2_2_38_1","unstructured":"meek Pluggable Transport. https:\/\/trac.torproject.org\/projects\/tor\/wiki\/doc\/meek."},{"key":"e_1_3_2_2_39_1","unstructured":"Summary of meek's costs July 2016. https:\/\/lists.torproject.org\/pipermail\/tor-project\/2016-August\/000690.html."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/11558859_19"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978367"},{"key":"e_1_3_2_2_42_1","unstructured":"Daiyuu Nobori and Yasushi Shinjo. 2014. VPN Gate: A Volunteer-Organized Public VPN Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls.. In NSDI. 229--241."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0006"},{"key":"e_1_3_2_2_44_1","unstructured":"PhantomJS scripted headless browser.http:\/\/phantomjs.org\/."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2005.1541716"},{"key":"e_1_3_2_2_46_1","unstructured":"Phil Sands. Syria Tightens Control over Internet. http:\/\/www.thenational.ae\/news\/world\/middle-east\/syria-tightens-control-over-internet. Online Article."},{"key":"e_1_3_2_2_47_1","unstructured":"Scapy Python Packet Manipulation Library. https:\/\/github.com\/secdev\/scapy."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","unstructured":"Max Schuchard John Geddes Christopher Thompson and Nicholas Hopper. 2012. Routing around decoys. In ACM CCS. 10.1145\/2382196.2382209","DOI":"10.1145\/2382196.2382209"},{"key":"e_1_3_2_2_49_1","unstructured":"Selenium browser automator. http:\/\/www.seleniumhq.org\/."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"crossref","unstructured":"Michael Carl Tschantz Sadia Afroz Vern Paxson et al. 2016. SoK: Towards Grounding Censorship Circumvention in Empiricism. In IEEE S&P. 914--933.","DOI":"10.1109\/SP.2016.59"},{"key":"e_1_3_2_2_51_1","volume-title":"Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) Heartbeat Extension. Transport","author":"Tuexen Michael","year":"2012","unstructured":"Michael Tuexen, Robin Seggelmann, and Michael Williams. 2012. Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) Heartbeat Extension. Transport (2012)."},{"key":"e_1_3_2_2_52_1","unstructured":"Twisted Python Networking Framework. https:\/\/twistedmatrix.com\/trac\/."},{"key":"e_1_3_2_2_53_1","volume-title":"Analysis of BGP prefix origins during Google's","author":"Wan Tao","year":"2005","unstructured":"Tao Wan and Paul C Van Oorschot. 2006. Analysis of BGP prefix origins during Google's May 2005 outage. In IPDPS. IEEE, 8--pp."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"crossref","unstructured":"Liang Wang Kevin P Dyer Aditya Akella Thomas Ristenpart and Thomas Shrimpton. 2015. Seeing through network-protocol obfuscation. In ACM CCS. 57--69.","DOI":"10.1145\/2810103.2813715"},{"key":"e_1_3_2_2_55_1","unstructured":"Waterfall's Implementation. https:\/\/github.com\/ha-D\/waterfall."},{"key":"e_1_3_2_2_56_1","unstructured":"Tim Wilde. Knock Knock Knockin' on Bridges' Doors. https:\/\/blog.torproject.org\/blog\/knock-knock-knockin-bridges-doors."},{"key":"e_1_3_2_2_57_1","unstructured":"Philipp Winter and Stefan Lindskog. 2012. How the Great Firewall of China Is Blocking Tor. In FOCI."},{"key":"e_1_3_2_2_58_1","unstructured":"Eric Wustrow Colleen M Swanson and J Alex Halderman. 2014. TapDance: End-to-middle anticensorship without flow blocking. In USENIX Security."},{"key":"e_1_3_2_2_59_1","volume-title":"Telex: Anticensorship in the Network Infrastructure.. In USENIX Security.","author":"Wustrow Eric","year":"2011","unstructured":"Eric Wustrow, Scott Wolchok, Ian Goldberg, and J Alex Halderman. 2011. Telex: Anticensorship in the Network Infrastructure.. In USENIX Security."},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1364654.1364658"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","unstructured":"Hadi Zolfaghari and Amir Houmansadr. 2016. Practical Censorship Evasion Leveraging Content Delivery Networks. In ACM CCS. 10.1145\/2976749.2978365","DOI":"10.1145\/2976749.2978365"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134075","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134075","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134075","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:03Z","timestamp":1750212663000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134075"}},"subtitle":["Decoy Routing Circumvention that Resists Routing Attacks"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":60,"alternative-id":["10.1145\/3133956.3134075","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3134075","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}