{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:19:13Z","timestamp":1775067553272,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":85,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T00:00:00Z","timestamp":1604016000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["SFRH\/BD\/136967\/2018,PTDC\/EEI-COM\/29271\/2017,UIDB\/50021\/2020"],"award-info":[{"award-number":["SFRH\/BD\/136967\/2018,PTDC\/EEI-COM\/29271\/2017,UIDB\/50021\/2020"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,30]]},"DOI":"10.1145\/3372297.3417874","type":"proceedings-article","created":{"date-parts":[[2021,3,4]],"date-time":"2021-03-04T16:20:06Z","timestamp":1614874806000},"page":"35-48","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":34,"title":["Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC"],"prefix":"10.1145","author":[{"given":"Diogo","family":"Barradas","sequence":"first","affiliation":[{"name":"INESC-ID, Instituto Superior T\u00e9cnico, Universidade de Lisboa, Lisboa, Portugal"}]},{"given":"Nuno","family":"Santos","sequence":"additional","affiliation":[{"name":"INESC-ID, Instituto Superior T\u00e9cnico, Universidade de Lisboa, Lisboa, Portugal"}]},{"given":"Lu\u00eds","family":"Rodrigues","sequence":"additional","affiliation":[{"name":"INESC-ID, Instituto Superior T\u00e9cnico, Universidade de Lisboa, Lisboa, Portugal"}]},{"given":"V\u00edtor","family":"Nunes","sequence":"additional","affiliation":[{"name":"INESC-ID, Instituto Superior T\u00e9cnico, Universidade de Lisboa, Lisboa, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2020,11,2]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Proceedings of the 3rd USENIX Workshop on Free and Open Communications on the Internet","author":"Aryan S.","year":"2013","unstructured":"Aryan , S. , Aryan , H. , and Halderman , J. A . Internet censorship in Iran : A first look . In Proceedings of the 3rd USENIX Workshop on Free and Open Communications on the Internet ( Washington, DC, USA , 2013 ). Aryan, S., Aryan, H., and Halderman, J. A. Internet censorship in Iran : A first look. In Proceedings of the 3rd USENIX Workshop on Free and Open Communications on the Internet (Washington, DC, USA, 2013)."},{"key":"e_1_3_2_2_2_1","volume-title":"Protozoa code repository. https:\/\/github.com\/dmbb\/Protozoa","author":"Barradas D.","year":"2020","unstructured":"Barradas , D. Protozoa code repository. https:\/\/github.com\/dmbb\/Protozoa , 2020 . Accessed : 2020-08--20. Barradas, D. Protozoa code repository. https:\/\/github.com\/dmbb\/Protozoa, 2020. Accessed: 2020-08--20."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0037"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277217"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3711"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363189"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978312"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0020"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08506-7_1"},{"key":"e_1_3_2_2_10_1","unstructured":"Cate Cadell - Reuters . Report says China internet firms censored coronavirus terms criticism early in outbreak. https:\/\/www.reuters.com\/article\/us-health-coronavirus-china-censorship\/report-says-china-internet-firms-censored-coronavirus-terms-criticism-early-in-outbreak-idUSKBN20Q1VS 2020. Accessed: 2020-08--20.  Cate Cadell - Reuters . Report says China internet firms censored coronavirus terms criticism early in outbreak. https:\/\/www.reuters.com\/article\/us-health-coronavirus-china-censorship\/report-says-china-internet-firms-censored-coronavirus-terms-criticism-early-in-outbreak-idUSKBN20Q1VS 2020. Accessed: 2020-08--20."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663720"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_3_2_2_13_1","volume-title":"Obfsproxy: the next step in the censorship arms race. https:\/\/blog.torproject.org\/blog\/obfsproxy-next-step-censorship-arms-race","author":"Dingledine R.","year":"2012","unstructured":"Dingledine , R. Obfsproxy: the next step in the censorship arms race. https:\/\/blog.torproject.org\/blog\/obfsproxy-next-step-censorship-arms-race , 2012 . Accessed : 2020-08--20. Dingledine, R. Obfsproxy: the next step in the censorship arms race. https:\/\/blog.torproject.org\/blog\/obfsproxy-next-step-censorship-arms-race, 2012. Accessed: 2020-08--20."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516657"},{"key":"e_1_3_2_2_16_1","first-page":"367","volume-title":"Proceedings of the 24th USENIX Conference on Security Symposium (Washington, D.C., USA","author":"Dyer K. P.","year":"2015","unstructured":"Dyer , K. P. , Coull , S. E. , and Shrimpton , T . Marionette: A programmable network-traffic obfuscation system . In Proceedings of the 24th USENIX Conference on Security Symposium (Washington, D.C., USA , 2015 ), pp. 367 -- 382 . Dyer, K. P., Coull, S. E., and Shrimpton, T. Marionette: A programmable network-traffic obfuscation system. In Proceedings of the 24th USENIX Conference on Security Symposium (Washington, D.C., USA, 2015), pp. 367--382."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2015.7366287"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815690"},{"key":"e_1_3_2_2_19_1","first-page":"1","article-title":"Notes and practical considerations for researchers","volume":"31","author":"Fawcett T.","unstructured":"Fawcett , T. Roc graphs : Notes and practical considerations for researchers . Machine Learning 31 (01 2004), 1 -- 38 . Fawcett, T. Roc graphs: Notes and practical considerations for researchers. Machine Learning 31 (01 2004), 1--38.","journal-title":"Machine Learning"},{"key":"e_1_3_2_2_20_1","volume-title":"https:\/\/ffmpeg.org","author":"Fmpeg","year":"2000","unstructured":"F Fmpeg . https:\/\/ffmpeg.org , 2000 . Accessed : 2020-08--20. FFmpeg. https:\/\/ffmpeg.org, 2000. Accessed: 2020-08--20."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31680-7_13"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0009"},{"key":"e_1_3_2_2_24_1","volume-title":"Proceedings of the 7th USENIX Workshop on Free and Open Communications on the Internet","author":"Frolov S.","year":"2017","unstructured":"Frolov , S. , Douglas , F. , Scott , W. , McDonald , A. , VanderSloot , B. , Hynes , R. , Kruger , A. , Kallitsis , M. , Robinson , D. G. , Schultze , S. , Borisov , N. , Halderman , A. , and Wustrow , E . An ISP-Scale Deployment of TapDance . In Proceedings of the 7th USENIX Workshop on Free and Open Communications on the Internet ( Vancouver, BC , 2017 ). Frolov, S., Douglas, F., Scott, W., McDonald, A., VanderSloot, B., Hynes, R., Kruger, A., Kallitsis, M., Robinson, D. G., Schultze, S., Borisov, N., Halderman, A., and Wustrow, E. An ISP-Scale Deployment of TapDance. In Proceedings of the 7th USENIX Workshop on Free and Open Communications on the Internet (Vancouver, BC, 2017)."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363218"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.50"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516742"},{"key":"e_1_3_2_2_28_1","volume-title":"Getting started with WebRTC. https:\/\/webrtc.org\/getting-started\/overview","author":"Google Developers RTC","year":"2019","unstructured":"Google Developers - Web RTC . Getting started with WebRTC. https:\/\/webrtc.org\/getting-started\/overview , 2019 . Accessed : 2020-08--20. Google Developers - WebRTC . Getting started with WebRTC. https:\/\/webrtc.org\/getting-started\/overview, 2019. Accessed: 2020-08--20."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.17"},{"key":"e_1_3_2_2_30_1","volume-title":"6th Linux and open source conference for Australia and New Zealand - textttsmall linux.conf.au","author":"Hemminger S.","year":"2005","unstructured":"Hemminger , S. Network emulation with netem . 6th Linux and open source conference for Australia and New Zealand - textttsmall linux.conf.au ( 2005 ). Hemminger, S. Network emulation with netem. 6th Linux and open source conference for Australia and New Zealand - textttsmall linux.conf.au (2005)."},{"key":"e_1_3_2_2_31_1","volume-title":"Journalists Fight Back. https:\/\/www.nytimes.com\/2020\/03\/14\/business\/media\/coronavirus-china-journalists.html","author":"Hern\u00e1ndez J. C.","year":"2020","unstructured":"Hern\u00e1ndez , J. C. As China Cracks Down on Coronavirus Coverage , Journalists Fight Back. https:\/\/www.nytimes.com\/2020\/03\/14\/business\/media\/coronavirus-china-journalists.html , 2020 . Accessed : 2020-08--20. Hern\u00e1ndez, J. C. As China Cracks Down on Coronavirus Coverage, Journalists Fight Back. https:\/\/www.nytimes.com\/2020\/03\/14\/business\/media\/coronavirus-china-journalists.html, 2020. Accessed: 2020-08--20."},{"key":"e_1_3_2_2_32_1","volume-title":"Proceedings of the 9th International Conference on Web and Social Media","author":"Hiruncharoenvate C.","year":"2015","unstructured":"Hiruncharoenvate , C. , Lin , Z. , and Gilbert , E . Algorithmically bypassing censorship on Sina Weibo with nondeterministic homophone substitutions . In Proceedings of the 9th International Conference on Web and Social Media ( Oxford, UK , 2015 ), AAAI. Hiruncharoenvate, C., Lin, Z., and Gilbert, E. Algorithmically bypassing censorship on Sina Weibo with nondeterministic homophone substitutions. In Proceedings of the 9th International Conference on Web and Social Media (Oxford, UK, 2015), AAAI."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813696"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.14"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046730"},{"key":"e_1_3_2_2_36_1","volume-title":"Proceedings of the 20th Annual Network & Distributed System Security Symposium","author":"Houmansadr A.","year":"2013","unstructured":"Houmansadr , A. , Riedl , T. J. , Borisov , N. , and Singer , A. C . I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention . In Proceedings of the 20th Annual Network & Distributed System Security Symposium ( San Diego, CA, USA , 2013 ). Houmansadr, A., Riedl, T. J., Borisov, N., and Singer, A. C. I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention. In Proceedings of the 20th Annual Network & Distributed System Security Symposium (San Diego, CA, USA, 2013)."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3199524.3199534"},{"key":"e_1_3_2_2_38_1","volume-title":"Proceedings of the USENIX Workshop on Free and Open Communications on the Internet","author":"Karlin J.","year":"2011","unstructured":"Karlin , J. , Ellard , D. , Jackson , A. , Jones , C. , Lauer , G. , Mankins , D. , and Strayer , T . Decoy routing: Toward unblockable Internet communication . In Proceedings of the USENIX Workshop on Free and Open Communications on the Internet ( San Francisco, CA, USA , 2011 ). Karlin, J., Ellard, D., Jackson, A., Jones, C., Lauer, G., Mankins, D., and Strayer, T. Decoy routing: Toward unblockable Internet communication. In Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (San Francisco, CA, USA, 2011)."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0028"},{"key":"e_1_3_2_2_40_1","volume-title":"Proceedings of the 3rd USENIX Workshop on Free and Open Communications on the Internet (Washington, D.C., USA","author":"Khattak S.","year":"2013","unstructured":"Khattak , S. , Javed , M. , Anderson , P. D. , and Paxson , V . Towards illuminating a censorship monitor's model to facilitate evasion . In Proceedings of the 3rd USENIX Workshop on Free and Open Communications on the Internet (Washington, D.C., USA , 2013 ). Khattak, S., Javed, M., Anderson, P. D., and Paxson, V. Towards illuminating a censorship monitor's model to facilitate evasion. In Proceedings of the 3rd USENIX Workshop on Free and Open Communications on the Internet (Washington, D.C., USA, 2013)."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1251722"},{"key":"e_1_3_2_2_42_1","volume-title":"Proceedings of the 5th USENIX Workshop on Free and Open Communications on the Internet (Washington, D.C., USA","author":"Knockel J.","year":"2015","unstructured":"Knockel , J. , Crete-Nishihata , M. , Ng , J. Q. , Senft , A. , and Crandall , J. R . Every rose has its thorn: Censorship and surveillance on social video platforms in China . In Proceedings of the 5th USENIX Workshop on Free and Open Communications on the Internet (Washington, D.C., USA , 2015 ). Knockel, J., Crete-Nishihata, M., Ng, J. Q., Senft, A., and Crandall, J. R. Every rose has its thorn: Censorship and surveillance on social video platforms in China. In Proceedings of the 5th USENIX Workshop on Free and Open Communications on the Internet (Washington, D.C., USA, 2015)."},{"key":"e_1_3_2_2_43_1","volume-title":"Proceedings of the 8th USENIX Workshop on Free and Open Communications on the Internet","author":"Knockel J.","year":"2018","unstructured":"Knockel , J. , Ruan , L. , and Crete-Nishihata , M . An analysis of automatic image filtering on wechat moments . In Proceedings of the 8th USENIX Workshop on Free and Open Communications on the Internet ( Baltimore, MD, USA , 2018 ). Knockel, J., Ruan, L., and Crete-Nishihata, M. An analysis of automatic image filtering on wechat moments. In Proceedings of the 8th USENIX Workshop on Free and Open Communications on the Internet (Baltimore, MD, USA, 2018)."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897913"},{"key":"e_1_3_2_2_45_1","first-page":"128","volume-title":"Proceedings of the Internet Measurement Conference","author":"Li F.","year":"2017","unstructured":"Li , F. , Razaghpanah , A. , Kakhki , A. M. , Niaki , A. A. , Choffnes , D. , Gill , P. , and Mislove , A . lib? erate,(n) a library for exposing (traffic-classification) rules and avoiding them efficiently . In Proceedings of the Internet Measurement Conference ( London, UK , 2017 ), pp. 128 -- 141 . Li, F., Razaghpanah, A., Kakhki, A. M., Niaki, A. A., Choffnes, D., Gill, P., and Mislove, A. lib? erate,(n) a library for exposing (traffic-classification) rules and avoiding them efficiently. In Proceedings of the Internet Measurement Conference (London, UK, 2017), pp. 128--141."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665944"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2012.115"},{"key":"e_1_3_2_2_48_1","volume-title":"Datagram transport layer security (dtls) extension to establish keys for the secure real-time transport protocol (srtp). RFC","author":"McGrew D.","year":"2010","unstructured":"McGrew , D. , and Rescorla , E . Datagram transport layer security (dtls) extension to establish keys for the secure real-time transport protocol (srtp). RFC 5764, May 2010 . McGrew, D., and Rescorla, E. Datagram transport layer security (dtls) extension to establish keys for the secure real-time transport protocol (srtp). RFC 5764, May 2010."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3371934.3371957"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0024"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382210"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998237"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978367"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134075"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24340"},{"key":"e_1_3_2_2_56_1","volume-title":"http:\/\/www.netfilter.org\/","author":"Netfilter Framework","year":"1998","unstructured":"Netfilter Framework . http:\/\/www.netfilter.org\/ , 1998 . Accessed : 2020-08--20. Netfilter Framework. http:\/\/www.netfilter.org\/, 1998. Accessed: 2020-08--20."},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00014"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1842733.1842736"},{"key":"e_1_3_2_2_59_1","volume-title":"Here are all the major US tech companies blocked behind China's 'Great Firewall'. https:\/\/www.businessinsider.com\/major-us-tech-companies-blocked-from-operating-in-china-2019--5","author":"Paige Leskin","year":"2019","unstructured":"Paige Leskin - Business Insider. Here are all the major US tech companies blocked behind China's 'Great Firewall'. https:\/\/www.businessinsider.com\/major-us-tech-companies-blocked-from-operating-in-china-2019--5 , 2019 . Accessed : 2020-08--20. Paige Leskin - Business Insider. Here are all the major US tech companies blocked behind China's 'Great Firewall'. https:\/\/www.businessinsider.com\/major-us-tech-companies-blocked-from-operating-in-china-2019--5, 2019. Accessed: 2020-08--20."},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.23098"},{"key":"e_1_3_2_2_61_1","unstructured":"RFC 1928 - SOCKS Protocol Version 5. https:\/\/tools.ietf.org\/html\/rfc1928. Last Accessed: 2020-08--20.  RFC 1928 - SOCKS Protocol Version 5. https:\/\/tools.ietf.org\/html\/rfc1928. Last Accessed: 2020-08--20."},{"key":"e_1_3_2_2_62_1","volume-title":"https:\/\/github.com\/rofl0r\/proxychains-ng","author":"GitHub","year":"2011","unstructured":"rofl0r - GitHub . Proxychains-ng. https:\/\/github.com\/rofl0r\/proxychains-ng , 2011 . Accessed : 2020-08--20. rofl0r - GitHub. Proxychains-ng. https:\/\/github.com\/rofl0r\/proxychains-ng, 2011. Accessed: 2020-08--20."},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781351023900"},{"key":"e_1_3_2_2_64_1","volume-title":"M","author":"Ruan L.","year":"2020","unstructured":"Ruan , L. , Knockel , J. , and Crete-Nishihata , M . Censored Contagion : How Information on the Coronavirus is Managed on Chinese Social Media . https:\/\/citizenlab.ca\/ 2020 \/03\/censored-contagion-how-information-on-the-coronavirus-is-managed-on-chinese-social-media\/, 2020. Accessed: 2020-08--20. Ruan, L., Knockel, J., and Crete-Nishihata, M. Censored Contagion: How Information on the Coronavirus is Managed on Chinese Social Media. https:\/\/citizenlab.ca\/2020\/03\/censored-contagion-how-information-on-the-coronavirus-is-managed-on-chinese-social-media\/, 2020. Accessed: 2020-08--20."},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382209"},{"key":"e_1_3_2_2_66_1","volume-title":"Proceedings of the 9th USENIX Workshop on Free and Open Communications on the Internet","author":"Sheffey S. R.","year":"2019","unstructured":"Sheffey , S. R. , and Aderholdt , F . Improving meek with adversarial techniques . In Proceedings of the 9th USENIX Workshop on Free and Open Communications on the Internet ( Santa Clara, CA, USA , 2019 ). Sheffey, S. R., and Aderholdt, F. Improving meek with adversarial techniques. In Proceedings of the 9th USENIX Workshop on Free and Open Communications on the Internet (Santa Clara, CA, USA, 2019)."},{"key":"e_1_3_2_2_67_1","volume-title":"End-to-End QoS Network Design: Quality of Service in LANs, WANs, and VPNs","author":"Szigeti T.","year":"2004","unstructured":"Szigeti , T. , and Hattingh , C . End-to-End QoS Network Design: Quality of Service in LANs, WANs, and VPNs . Cisco Press , 2004 . Szigeti, T., and Hattingh, C. End-to-End QoS Network Design: Quality of Service in LANs, WANs, and VPNs. Cisco Press, 2004."},{"key":"e_1_3_2_2_68_1","volume-title":"https:\/\/github.com\/tarun14110\/Analyzing-Web-Censorship-Mechanisms-in-India\/blob\/master\/possibly_blocked_websites.txt","author":"Tarun Kumar Yadav","year":"2018","unstructured":"Tarun Kumar Yadav - GitHub. Analyzing-Web-Censorship-Mechanisms-in-India. https:\/\/github.com\/tarun14110\/Analyzing-Web-Censorship-Mechanisms-in-India\/blob\/master\/possibly_blocked_websites.txt , 2018 . Accessed : 2020-08--20. Tarun Kumar Yadav - GitHub. Analyzing-Web-Censorship-Mechanisms-in-India. https:\/\/github.com\/tarun14110\/Analyzing-Web-Censorship-Mechanisms-in-India\/blob\/master\/possibly_blocked_websites.txt, 2018. Accessed: 2020-08--20."},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.59"},{"key":"e_1_3_2_2_70_1","volume-title":"https:\/\/github.com\/umlaeute\/v4l2loopback","year":"2005","unstructured":"v4l2loopback. https:\/\/github.com\/umlaeute\/v4l2loopback , 2005 . Last Accessed : 2020-08--20. v4l2loopback. https:\/\/github.com\/umlaeute\/v4l2loopback, 2005. Last Accessed: 2020-08--20."},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2003.1250586"},{"key":"e_1_3_2_2_72_1","volume-title":"IP Latency Statistics. https:\/\/enterprise.verizon.com\/terms\/latency\/","author":"Verizon Business","year":"2015","unstructured":"Verizon Business . IP Latency Statistics. https:\/\/enterprise.verizon.com\/terms\/latency\/ , 2015 . Accessed : 2020-08--20. Verizon Business . IP Latency Statistics. https:\/\/enterprise.verizon.com\/terms\/latency\/, 2015. Accessed: 2020-08--20."},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813715"},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382212"},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131374"},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382211"},{"key":"e_1_3_2_2_77_1","first-page":"237","volume-title":"Proceedings of the 16th Network and Distributed Security Symposium","author":"Wright C. V.","year":"2009","unstructured":"Wright , C. V. , Coull , S. E. , and Monrose , F . Traffic morphing: An efficient defense against statistical traffic analysis . In Proceedings of the 16th Network and Distributed Security Symposium ( San Diego, CA, USA , 2009 ), pp. 237 -- 250 . Wright, C. V., Coull, S. E., and Monrose, F. Traffic morphing: An efficient defense against statistical traffic analysis. In Proceedings of the 16th Network and Distributed Security Symposium (San Diego, CA, USA, 2009), pp. 237--250."},{"key":"e_1_3_2_2_78_1","first-page":"159","volume-title":"Proceedings of the 23rd USENIX Security Symposium","author":"Wustrow E.","year":"2014","unstructured":"Wustrow , E. , Swanson , C. M. , and Halderman , J. A . Tapdance: End-to-middle anticensorship without flow blocking . In Proceedings of the 23rd USENIX Security Symposium ( San Diego, CA , 2014 ), pp. 159 -- 174 . Wustrow, E., Swanson, C. M., and Halderman, J. A. Tapdance: End-to-middle anticensorship without flow blocking. In Proceedings of the 23rd USENIX Security Symposium (San Diego, CA, 2014), pp. 159--174."},{"key":"e_1_3_2_2_79_1","volume-title":"Proceedings of the 20th USENIX Security Symposium","author":"Wustrow E.","year":"2011","unstructured":"Wustrow , E. , Wolchok , S. , Goldberg , I. , and Halderman , J. A . Telex: Anticensorship in the network infrastructure . In Proceedings of the 20th USENIX Security Symposium ( San Francisco, CA, USA , 2011 ). Wustrow, E., Wolchok, S., Goldberg, I., and Halderman, J. A. Telex: Anticensorship in the network infrastructure. In Proceedings of the 20th USENIX Security Symposium (San Francisco, CA, USA, 2011)."},{"key":"e_1_3_2_2_80_1","volume-title":"Proceedings of the 9th USENIX Workshop on Free and Open Communications on the Internet","author":"Xiong R.","year":"2019","unstructured":"Xiong , R. , and Knockel , J . An efficient method to determine which combination of keywords triggered automatic filtering of a message . In Proceedings of the 9th USENIX Workshop on Free and Open Communications on the Internet ( Santa Clara, CA, USA , 2019 ). Xiong, R., and Knockel, J. An efficient method to determine which combination of keywords triggered automatic filtering of a message. In Proceedings of the 9th USENIX Workshop on Free and Open Communications on the Internet (Santa Clara, CA, USA, 2019)."},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19260-9_14"},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278555"},{"key":"e_1_3_2_2_83_1","volume-title":"A Study of WebRTC Security. https:\/\/webrtc-security.github.io\/","author":"Yoshimasa Iwase NTT","year":"2015","unstructured":"Yoshimasa Iwase - NTT Communications . A Study of WebRTC Security. https:\/\/webrtc-security.github.io\/ , 2015 . Accessed : 2020-08--20. Yoshimasa Iwase - NTT Communications . A Study of WebRTC Security. https:\/\/webrtc-security.github.io\/, 2015. Accessed: 2020-08--20."},{"key":"e_1_3_2_2_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2007.4317620"},{"key":"e_1_3_2_2_85_1","volume-title":"Register of Internet Addresses filtered in Russian Federation. https:\/\/github.com\/zapret-info\/z-i","year":"2020","unstructured":"zapret-info . Register of Internet Addresses filtered in Russian Federation. https:\/\/github.com\/zapret-info\/z-i , 2020 . Accessed : 2020-08--20. zapret-info . Register of Internet Addresses filtered in Russian Federation. https:\/\/github.com\/zapret-info\/z-i, 2020. Accessed: 2020-08--20."},{"key":"e_1_3_2_2_86_1","volume-title":"Proceedings of the 6th Workshop on Hot Topics in Privacy Enhancing Technologies","author":"Zhou W.","year":"2013","unstructured":"Zhou , W. , Houmansadr , A. , Caesar , M. , and Borisov , N . Sweet: Serving the web by exploiting email tunnels . In Proceedings of the 6th Workshop on Hot Topics in Privacy Enhancing Technologies ( Bloomington, IN, USA , 2013 ). Zhou, W., Houmansadr, A., Caesar, M., and Borisov, N. Sweet: Serving the web by exploiting email tunnels. In Proceedings of the 6th Workshop on Hot Topics in Privacy Enhancing Technologies (Bloomington, IN, USA, 2013)."},{"key":"e_1_3_2_2_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978365"}],"event":{"name":"CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event USA","acronym":"CCS '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372297.3417874","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372297.3417874","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:31Z","timestamp":1750197691000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372297.3417874"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,30]]},"references-count":85,"alternative-id":["10.1145\/3372297.3417874","10.1145\/3372297"],"URL":"https:\/\/doi.org\/10.1145\/3372297.3417874","relation":{},"subject":[],"published":{"date-parts":[[2020,10,30]]},"assertion":[{"value":"2020-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}