{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T10:03:35Z","timestamp":1766484215765,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":79,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,25]],"date-time":"2022-10-25T00:00:00Z","timestamp":1666656000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Science Foundation","award":["2141547, 2042795, 2007741, 2141512"],"award-info":[{"award-number":["2141547, 2042795, 2007741, 2141512"]}]},{"name":"DRL","award":["SLMAQM20GR2132"],"award-info":[{"award-number":["SLMAQM20GR2132"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,25]]},"DOI":"10.1145\/3517745.3561461","type":"proceedings-article","created":{"date-parts":[[2022,10,21]],"date-time":"2022-10-21T21:28:36Z","timestamp":1666387716000},"page":"179-194","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["TSPU"],"prefix":"10.1145","author":[{"given":"Diwen","family":"Xue","sequence":"first","affiliation":[{"name":"University of Michigan"}]},{"given":"Benjamin","family":"Mixon-Baca","sequence":"additional","affiliation":[{"name":"ASU\/Breakpointing Bad"}]},{"family":"ValdikSS","sequence":"additional","affiliation":[{"name":"Independent"}]},{"given":"Anna","family":"Ablove","sequence":"additional","affiliation":[{"name":"University of Michigan"}]},{"given":"Beau","family":"Kujath","sequence":"additional","affiliation":[{"name":"ASU\/Breakpointing Bad"}]},{"given":"Jedidiah R.","family":"Crandall","sequence":"additional","affiliation":[{"name":"ASU\/Breakpointing Bad"}]},{"given":"Roya","family":"Ensafi","sequence":"additional","affiliation":[{"name":"University of Michigan"}]}],"member":"320","published-online":{"date-parts":[[2022,10,25]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Academics: Russia deployed new technology to throttle twitter's traffic. https:\/\/therecord.media\/academics-russia-deployed-new-technology-to-throttle-twitters-traffic\/.  Academics: Russia deployed new technology to throttle twitter's traffic. https:\/\/therecord.media\/academics-russia-deployed-new-technology-to-throttle-twitters-traffic\/."},{"key":"e_1_3_2_2_2_1","unstructured":"Approved requirements for the procedure for passing traffic in data networks and in the public telephone network. https:\/\/d-russia.ru\/utverzhdeny-trebovanija-k-porjadku-propuska-trafika-v-setjah-peredachi-dannyh-i-v-telefonnoj-seti-svjazi-obshhego-polzovanija.html.  Approved requirements for the procedure for passing traffic in data networks and in the public telephone network. https:\/\/d-russia.ru\/utverzhdeny-trebovanija-k-porjadku-propuska-trafika-v-setjah-peredachi-dannyh-i-v-telefonnoj-seti-svjazi-obshhego-polzovanija.html."},{"key":"e_1_3_2_2_3_1","unstructured":"Bad traffic: Sandvine's packetlogic devices used to deploy government spyware in turkey and redirect egyptian users to affiliate ads? https:\/\/citizenlab.ca\/2018\/03\/bad-traffic-sandvines-packetlogic-devices-deploy-government-spyware-turkey-syria\/.  Bad traffic: Sandvine's packetlogic devices used to deploy government spyware in turkey and redirect egyptian users to affiliate ads? https:\/\/citizenlab.ca\/2018\/03\/bad-traffic-sandvines-packetlogic-devices-deploy-government-spyware-turkey-syria\/."},{"key":"e_1_3_2_2_4_1","unstructured":"brdgrd (bridge guard). https:\/\/github.com\/NullHypothesis\/brdgrd.  brdgrd (bridge guard). https:\/\/github.com\/NullHypothesis\/brdgrd."},{"key":"e_1_3_2_2_5_1","unstructured":"Cisco asa. https:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/ios-xml\/ios\/ipaddr_nat\/configuration\/15-mt\/nat-15-mt-book.pdf.  Cisco asa. https:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/ios-xml\/ios\/ipaddr_nat\/configuration\/15-mt\/nat-15-mt-book.pdf."},{"key":"e_1_3_2_2_6_1","unstructured":"Cisco asa series syslog messages. https:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/security\/asa\/syslog\/b_syslog\/syslog-messages-201002-to-219002.html.  Cisco asa series syslog messages. https:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/security\/asa\/syslog\/b_syslog\/syslog-messages-201002-to-219002.html."},{"key":"e_1_3_2_2_7_1","unstructured":"Established facts of dissemination of false information in the media. https:\/\/rkn.gov.ru\/news\/rsoc\/news74112.htm.  Established facts of dissemination of false information in the media. https:\/\/rkn.gov.ru\/news\/rsoc\/news74112.htm."},{"key":"e_1_3_2_2_8_1","unstructured":"Evading sni filtering in india with geneva. https:\/\/geneva.cs.umd.edu\/posts\/india-sni-filtering\/.  Evading sni filtering in india with geneva. https:\/\/geneva.cs.umd.edu\/posts\/india-sni-filtering\/."},{"key":"e_1_3_2_2_9_1","unstructured":"Freebsd. https:\/\/github.com\/freebsd\/freebsd-src\/tree\/main\/sys\/netpfil.  Freebsd. https:\/\/github.com\/freebsd\/freebsd-src\/tree\/main\/sys\/netpfil."},{"key":"e_1_3_2_2_10_1","unstructured":"huawei. https:\/\/support.huawei.com\/enterprise\/en\/doc\/EDOC1100058384\/5072245d\/setting-the-aging-time-for-nat-session-entries.  huawei. https:\/\/support.huawei.com\/enterprise\/en\/doc\/EDOC1100058384\/5072245d\/setting-the-aging-time-for-nat-session-entries."},{"key":"e_1_3_2_2_11_1","unstructured":"Internet shutdowns in 2021 report: India is the world's largest offender. https:\/\/www.accessnow.org\/internet-shutdowns-india-keepiton-2021\/.  Internet shutdowns in 2021 report: India is the world's largest offender. https:\/\/www.accessnow.org\/internet-shutdowns-india-keepiton-2021\/."},{"key":"e_1_3_2_2_12_1","unstructured":"Internet shutdowns in 2021: the return of digital authoritarianism. https:\/\/www.accessnow.org\/internet-shutdowns-2021\/.  Internet shutdowns in 2021: the return of digital authoritarianism. https:\/\/www.accessnow.org\/internet-shutdowns-2021\/."},{"key":"e_1_3_2_2_13_1","unstructured":"Juniper. https:\/\/docs.128technology.com\/docs\/concepts_session_timer\/.  Juniper. https:\/\/docs.128technology.com\/docs\/concepts_session_timer\/."},{"key":"e_1_3_2_2_14_1","unstructured":"Juniper network - fragment-limit. https:\/\/www.juniper.net\/documentation\/us\/en\/software\/junos\/interfaces-adaptive-services\/topics\/ref\/statement\/fragment-limit-edit-interfaces.html.  Juniper network - fragment-limit. https:\/\/www.juniper.net\/documentation\/us\/en\/software\/junos\/interfaces-adaptive-services\/topics\/ref\/statement\/fragment-limit-edit-interfaces.html."},{"key":"e_1_3_2_2_15_1","unstructured":"The linux kernel archives. https:\/\/www.kernel.org\/doc\/Documentation\/networking\/ip-sysctl.txt.  The linux kernel archives. https:\/\/www.kernel.org\/doc\/Documentation\/networking\/ip-sysctl.txt."},{"key":"e_1_3_2_2_16_1","unstructured":"Linux nat timers. https:\/\/www.kernel.org\/doc\/Documentation\/networking\/nf_conntrack-sysctl.txt.  Linux nat timers. https:\/\/www.kernel.org\/doc\/Documentation\/networking\/nf_conntrack-sysctl.txt."},{"key":"e_1_3_2_2_17_1","unstructured":"On amendments to federal law on protecting children from information harmful to their health and the development and certain legislative acts of the russian federation. https:\/\/web.archive.org\/web\/20140208154037\/http:\/\/eng.kremlin.ru\/acts\/4246.  On amendments to federal law on protecting children from information harmful to their health and the development and certain legislative acts of the russian federation. https:\/\/web.archive.org\/web\/20140208154037\/http:\/\/eng.kremlin.ru\/acts\/4246."},{"key":"e_1_3_2_2_18_1","unstructured":"On recommendations of roskomnadzor to telecom operators on blocking illegal information on the internet. https:\/\/archive.fo\/LGszb;https:\/\/archive.fo\/XAgJk.  On recommendations of roskomnadzor to telecom operators on blocking illegal information on the internet. https:\/\/archive.fo\/LGszb;https:\/\/archive.fo\/XAgJk."},{"key":"e_1_3_2_2_19_1","unstructured":"Ooni measurement aggregation toolkit. https:\/\/explorer.ooni.org\/chart\/mat?probe_cc=RU&test_name=web_connectivity&domain=play.google.com&since=2022-03-01&until=2022-05-13&axis_x=measurement_start_day.  Ooni measurement aggregation toolkit. https:\/\/explorer.ooni.org\/chart\/mat?probe_cc=RU&test_name=web_connectivity&domain=play.google.com&since=2022-03-01&until=2022-05-13&axis_x=measurement_start_day."},{"key":"e_1_3_2_2_20_1","unstructured":"The president signed the law on sustainable runet. https:\/\/d-russia.ru\/prezident-podpisal-zakon-ob-ustojchivom-runete.html.  The president signed the law on sustainable runet. https:\/\/d-russia.ru\/prezident-podpisal-zakon-ob-ustojchivom-runete.html."},{"key":"e_1_3_2_2_21_1","unstructured":"Register of internet addresses filtered in russian federation resources (github). https:\/\/github.com\/zapret-info\/z-i.  Register of internet addresses filtered in russian federation resources (github). https:\/\/github.com\/zapret-info\/z-i."},{"key":"e_1_3_2_2_22_1","unstructured":"Registry of banned sites. https:\/\/blocklist.rkn.gov.ru.  Registry of banned sites. https:\/\/blocklist.rkn.gov.ru."},{"key":"e_1_3_2_2_23_1","unstructured":"Response measures taken to restrict access to russian media. https:\/\/rkn.gov.ru\/news\/rsoc\/news74156.htm.  Response measures taken to restrict access to russian media. https:\/\/rkn.gov.ru\/news\/rsoc\/news74156.htm."},{"key":"e_1_3_2_2_24_1","unstructured":"We chat they watch: How international users unwittingly build up wechat's chinese censorship apparatus. https:\/\/citizenlab.ca\/2020\/05\/we-chat-they-watch\/.  We chat they watch: How international users unwittingly build up wechat's chinese censorship apparatus. https:\/\/citizenlab.ca\/2020\/05\/we-chat-they-watch\/."},{"key":"e_1_3_2_2_25_1","unstructured":"Windows nat timers. https:\/\/docs.microsoft.com\/en-us\/azure\/virtual-network\/nat-gateway\/nat-gateway-resource.  Windows nat timers. https:\/\/docs.microsoft.com\/en-us\/azure\/virtual-network\/nat-gateway\/nat-gateway-resource."},{"key":"e_1_3_2_2_26_1","unstructured":"Internet Protocol. RFC 791 Sept. 1981. https:\/\/www.rfc-editor.org\/info\/rfc791.  Internet Protocol. RFC 791 Sept. 1981. https:\/\/www.rfc-editor.org\/info\/rfc791."},{"key":"e_1_3_2_2_27_1","volume-title":"Russian internet isolation and implications for russian cyber behavior","author":"Reassessing","year":"2021","unstructured":"Reassessing runet : Russian internet isolation and implications for russian cyber behavior , 2021 . https:\/\/www.atlanticcouncil.org\/in-depth-research-reports\/issue-brief\/reassessing-runet-russian-internet-isolation-and-implications-for-russian-cyber-behavior\/. Reassessing runet: Russian internet isolation and implications for russian cyber behavior, 2021. https:\/\/www.atlanticcouncil.org\/in-depth-research-reports\/issue-brief\/reassessing-runet-russian-internet-isolation-and-implications-for-russian-cyber-behavior\/."},{"key":"e_1_3_2_2_28_1","unstructured":"Russia tests way to disconnect from worldwide internet. 2021. https:\/\/learningenglish.voanews.com\/a\/russia-tests-way-to-disconnect-from-worldwide-internet\/5976331.html.  Russia tests way to disconnect from worldwide internet. 2021. https:\/\/learningenglish.voanews.com\/a\/russia-tests-way-to-disconnect-from-worldwide-internet\/5976331.html."},{"key":"e_1_3_2_2_29_1","unstructured":"Russia throttled twitter to censor content --- here's what happens next 2021. https:\/\/www.accessnow.org\/russia-throttled-twitter\/.  Russia throttled twitter to censor content --- here's what happens next 2021. https:\/\/www.accessnow.org\/russia-throttled-twitter\/."},{"key":"e_1_3_2_2_30_1","volume-title":"telecommunications and mass media of the russian federation dated","author":"Order","year":"2022","unstructured":"Order of the ministry of digital development , telecommunications and mass media of the russian federation dated January 26, 2022 no. 44 \"on approval of the requirements for the procedure for passing traffic in data networks\", 2022. http:\/\/publication.pravo.gov.ru\/Document\/View\/0001202203010002. Order of the ministry of digital development, telecommunications and mass media of the russian federation dated January 26, 2022 no. 44 \"on approval of the requirements for the procedure for passing traffic in data networks\", 2022. http:\/\/publication.pravo.gov.ru\/Document\/View\/0001202203010002."},{"key":"e_1_3_2_2_31_1","unstructured":"Voa condemns russian attempts to interfere in free flow of information 2022. https:\/\/www.newsweek.com\/voa-condemns-russian-attempts-interfere-free-flow-information-1684384.  Voa condemns russian attempts to interfere in free flow of information 2022. https:\/\/www.newsweek.com\/voa-condemns-russian-attempts-interfere-free-flow-information-1684384."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423644"},{"key":"e_1_3_2_2_33_1","volume-title":"Dimming the internet: Detecting throttling as a mechanism of censorship in iran","author":"Anderson C.","year":"2013","unstructured":"Anderson , C. Dimming the internet: Detecting throttling as a mechanism of censorship in iran , 2013 . https:\/\/arxiv.org\/abs\/1306.4361. Anderson, C. Dimming the internet: Detecting throttling as a mechanism of censorship in iran, 2013. https:\/\/arxiv.org\/abs\/1306.4361."},{"key":"e_1_3_2_2_34_1","volume-title":"FOCI","author":"Aryan S.","year":"2013","unstructured":"Aryan , S. , Aryan , H. , and Halderman , J. A . Internet censorship in iran: A first look . In FOCI ( 2013 ). Aryan, S., Aryan, H., and Halderman, J. A. Internet censorship in iran: A first look. In FOCI (2013)."},{"key":"e_1_3_2_2_35_1","volume":"200","author":"Blei D. M.","unstructured":"Blei , D. M. , Ng , A. Y. , Jordan , M. I. , and Lafferty , J. Latent dirichlet al location. Journal of Machine Learning Research ( 200 3). Blei, D. M., Ng, A. Y., Jordan, M. I., and Lafferty, J. Latent dirichlet allocation. Journal of Machine Learning Research (2003).","journal-title":"location. Journal of Machine Learning Research ("},{"key":"e_1_3_2_2_36_1","volume-title":"FOCI @ USENIX Security Symposium","author":"Bock K.","year":"2020","unstructured":"Bock , K. , Fax , Y. , Reese , K. , Singh , J. , and Levin , D . Detecting and evading censorship-in-depth: A case study of iran's protocol whitelister . In FOCI @ USENIX Security Symposium ( 2020 ). Bock, K., Fax, Y., Reese, K., Singh, J., and Levin, D. Detecting and evading censorship-in-depth: A case study of iran's protocol whitelister. In FOCI @ USENIX Security Symposium (2020)."},{"key":"e_1_3_2_2_37_1","first-page":"586","volume-title":"Come as you are: Helping unmodified clients bypass censorship with server-side evasion","author":"Bock K.","unstructured":"Bock , K. , Hughey , G. , Merino , L.-H. , Arya , T. , Liscinsky , D. , Pogosian , R. , and Levin , D . Come as you are: Helping unmodified clients bypass censorship with server-side evasion . pp. 586 -- 598 . Bock, K., Hughey, G., Merino, L.-H., Arya, T., Liscinsky, D., Pogosian, R., and Levin, D. Come as you are: Helping unmodified clients bypass censorship with server-side evasion. pp. 586--598."},{"key":"e_1_3_2_2_38_1","first-page":"2199","volume-title":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (New York, NY, USA, 2019), CCS '19, Association for Computing Machinery","author":"Bock K.","unstructured":"Bock , K. , Hughey , G. , Qiang , X. , and Levin , D . Geneva: Evolving censorship evasion strategies . In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (New York, NY, USA, 2019), CCS '19, Association for Computing Machinery , p. 2199 -- 2214 . Bock, K., Hughey, G., Qiang, X., and Levin, D. Geneva: Evolving censorship evasion strategies. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (New York, NY, USA, 2019), CCS '19, Association for Computing Machinery, p. 2199--2214."},{"key":"e_1_3_2_2_39_1","first-page":"1","volume-title":"Proceedings of the ACM SIGCOMM 2021 Workshop on Free and Open Communications on the Internet (New York, NY, USA, 2021), FOCI '21, Association for Computing Machinery","author":"Bock K.","unstructured":"Bock , K. , Naval , G. , Reese , K. , and Levin , D . Even censors have a backup: Examining china's double https censorship middleboxes . In Proceedings of the ACM SIGCOMM 2021 Workshop on Free and Open Communications on the Internet (New York, NY, USA, 2021), FOCI '21, Association for Computing Machinery , p. 1 -- 7 . Bock, K., Naval, G., Reese, K., and Levin, D. Even censors have a backup: Examining china's double https censorship middleboxes. In Proceedings of the ACM SIGCOMM 2021 Workshop on Free and Open Communications on the Internet (New York, NY, USA, 2021), FOCI '21, Association for Computing Machinery, p. 1--7."},{"key":"e_1_3_2_2_40_1","volume-title":"USENIX Workshop on Free and Open Communications on the Internet (FOCI)","author":"Chai Z.","year":"2019","unstructured":"Chai , Z. , Ghafari , A. , and Houmansadr , A . On the importance of encrypted-SNI (ESNI) to censorship circumvention . In USENIX Workshop on Free and Open Communications on the Internet (FOCI) ( 2019 ). Chai, Z., Ghafari, A., and Houmansadr, A. On the importance of encrypted-SNI (ESNI) to censorship circumvention. In USENIX Workshop on Free and Open Communications on the Internet (FOCI) (2019)."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_2"},{"key":"e_1_3_2_2_42_1","first-page":"352","volume-title":"Conceptdoppler: A weather tracker for internet censorship","author":"Crandall J.","unstructured":"Crandall , J. , Zinn , D. , Byrd , M. , Barr , E. , and East , R . Conceptdoppler: A weather tracker for internet censorship . pp. 352 -- 365 . Crandall, J., Zinn, D., Byrd, M., Barr, E., and East, R. Conceptdoppler: A weather tracker for internet censorship. pp. 352--365."},{"key":"e_1_3_2_2_43_1","first-page":"23","volume-title":"Proceedings of the 2013 Conference on Internet Measurement Conference (New York, NY, USA, 2013), IMC '13, Association for Computing Machinery","author":"Dalek J.","unstructured":"Dalek , J. , Haselton , B. , Noman , H. , Senft , A. , Crete-Nishihata , M. , Gill , P. , and Deibert , R. J . A method for identifying and confirming the use of url filtering products for censorship . In Proceedings of the 2013 Conference on Internet Measurement Conference (New York, NY, USA, 2013), IMC '13, Association for Computing Machinery , p. 23 -- 30 . Dalek, J., Haselton, B., Noman, H., Senft, A., Crete-Nishihata, M., Gill, P., and Deibert, R. J. A method for identifying and confirming the use of url filtering products for censorship. In Proceedings of the 2013 Conference on Internet Measurement Conference (New York, NY, USA, 2013), IMC '13, Association for Computing Machinery, p. 23--30."},{"key":"e_1_3_2_2_44_1","volume-title":"Department of Homeland Security","author":"Dittrich D.","year":"2012","unstructured":"Dittrich , D. , Kenneally , E. , The Menlo Report: Ethical principles guiding information and communication technology research. Tech. rep., U.S . Department of Homeland Security , 2012 . Dittrich, D., Kenneally, E., et al. The Menlo Report: Ethical principles guiding information and communication technology research. Tech. rep., U.S. Department of Homeland Security, 2012."},{"key":"e_1_3_2_2_45_1","volume-title":"ACM Conference on Computer and Communications Security (CCS)","author":"Durumeric Z.","year":"2015","unstructured":"Durumeric , Z. , Adrian , D. , Mirian , A. , Bailey , M. , and Halderman , J. A . Censys: A search engine backed by Internet-wide scanning . In ACM Conference on Computer and Communications Security (CCS) ( 2015 ). Durumeric, Z., Adrian, D., Mirian, A., Bailey, M., and Halderman, J. A. Censys: A search engine backed by Internet-wide scanning. In ACM Conference on Computer and Communications Security (CCS) (2015)."},{"key":"e_1_3_2_2_46_1","volume-title":"USENIX Security Symposium","author":"Durumeric Z.","year":"2013","unstructured":"Durumeric , Z. , Wustrow , E. , and Halderman , J. A . ZMap: Fast internet-wide scanning and its security applications . In USENIX Security Symposium ( 2013 ). Durumeric, Z., Wustrow, E., and Halderman, J. A. ZMap: Fast internet-wide scanning and its security applications. In USENIX Security Symposium (2013)."},{"key":"e_1_3_2_2_47_1","first-page":"445","volume-title":"IMC '15","author":"Ensafi R.","unstructured":"Ensafi , R. , Fifield , D. , Winder , P. , Feamster , N. , Weaver , N. , and Paxson , V . Examining how the great firewall discovers hidden circumvention servers . IMC '15 , Association for Computing Machinery , p. 445 -- 458 . Ensafi, R., Fifield, D., Winder, P., Feamster, N., Weaver, N., and Paxson, V. Examining how the great firewall discovers hidden circumvention servers. IMC '15, Association for Computing Machinery, p. 445--458."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0005"},{"key":"e_1_3_2_2_49_1","volume-title":"NAT Behavioral Requirements for TCP. RFC","author":"Ford B.","year":"2008","unstructured":"Ford , B. , Guha , S. , Biswas , K. , Sivakumar , S. , and Srisuresh , P . NAT Behavioral Requirements for TCP. RFC 5382, Oct. 2008 . https:\/\/www.rfc-editor.org\/info\/rfc5382. Ford, B., Guha, S., Biswas, K., Sivakumar, S., and Srisuresh, P. NAT Behavioral Requirements for TCP. RFC 5382, Oct. 2008. https:\/\/www.rfc-editor.org\/info\/rfc5382."},{"key":"e_1_3_2_2_50_1","unstructured":"FortiNet. Fortiguard labs web filter. https:\/\/fortiguard.com\/webfilter.  FortiNet. Fortiguard labs web filter. https:\/\/fortiguard.com\/webfilter."},{"key":"e_1_3_2_2_51_1","unstructured":"Google. inet fragments management. https:\/\/android.googlesource.com\/kernel\/msm\/+\/refs\/heads\/android-msm-redbull-4.19-android11-qpr3\/net\/ipv4\/inet_fragment.c.  Google. inet fragments management. https:\/\/android.googlesource.com\/kernel\/msm\/+\/refs\/heads\/android-msm-redbull-4.19-android11-qpr3\/net\/ipv4\/inet_fragment.c."},{"key":"e_1_3_2_2_52_1","volume-title":"USENIX Security Symposium","author":"Hoang N. P.","year":"2021","unstructured":"Hoang , N. P. , Niaki , A. A. , Dalek , J. , Knockel , J. , Lin , P. , Marczak , B. , Crete-Nishihata , M. , Gill , P. , and Polychronakis , M . How great is the great firewall? measuring china's dns censorship . In USENIX Security Symposium ( 2021 ). Hoang, N. P., Niaki, A. A., Dalek, J., Knockel, J., Lin, P., Marczak, B., Crete-Nishihata, M., Gill, P., and Polychronakis, M. How great is the great firewall? measuring china's dns censorship. In USENIX Security Symposium (2021)."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663722"},{"key":"e_1_3_2_2_54_1","unstructured":"kelmenhorst\/qic censorship. Broad blocking of http\/3 traffic in russia (as31213 as12389). https:\/\/github.com\/kelmenhorst\/quic-censorship\/issues\/4.  kelmenhorst\/qic censorship. Broad blocking of http\/3 traffic in russia (as31213 as12389). https:\/\/github.com\/kelmenhorst\/quic-censorship\/issues\/4."},{"key":"e_1_3_2_2_55_1","first-page":"8","volume-title":"Proceedings of the ACM SIGCOMM 2021 Workshop on Free and Open Communications on the Internet (New York, NY, USA, 2021), FOCI '21, Association for Computing Machinery","author":"Knockel J.","unstructured":"Knockel , J. , and Ruan , L . Measuring qqmail's automated email censorship in china . In Proceedings of the ACM SIGCOMM 2021 Workshop on Free and Open Communications on the Internet (New York, NY, USA, 2021), FOCI '21, Association for Computing Machinery , p. 8 -- 15 . Knockel, J., and Ruan, L. Measuring qqmail's automated email censorship in china. In Proceedings of the ACM SIGCOMM 2021 Workshop on Free and Open Communications on the Internet (New York, NY, USA, 2021), FOCI '21, Association for Computing Machinery, p. 8--15."},{"key":"e_1_3_2_2_56_1","volume-title":"Handling of Overlapping IPv6 Fragments. RFC","author":"Krishnan S.","year":"2009","unstructured":"Krishnan , S. Handling of Overlapping IPv6 Fragments. RFC 5722, Dec. 2009 . https:\/\/www.rfc-editor.org\/info\/rfc5722. Krishnan, S. Handling of Overlapping IPv6 Fragments. RFC 5722, Dec. 2009. https:\/\/www.rfc-editor.org\/info\/rfc5722."},{"key":"e_1_3_2_2_57_1","volume-title":"Url testing lists intended for discovering website censorship","author":"Lab C.","year":"2014","unstructured":"Lab , C. , and Others . Url testing lists intended for discovering website censorship , 2014 . https:\/\/github.com\/citizenlab\/test-lists. Lab, C., and Others. Url testing lists intended for discovering website censorship, 2014. https:\/\/github.com\/citizenlab\/test-lists."},{"key":"e_1_3_2_2_58_1","volume-title":"5th USENIX Workshop on Free and Open Communications on the Internet (FOCI 15)","author":"Marczak B.","year":"2015","unstructured":"Marczak , B. , Weaver , N. , Dalek , J. , Ensafi , R. , Fifield , D. , McKune , S. , Rey , A. , Scott-Railton , J. , Deibert , R. , and Paxson , V . An analysis of China's \"Great Cannon \". In 5th USENIX Workshop on Free and Open Communications on the Internet (FOCI 15) (Washington, D.C., Aug. 2015 ), USENIX Association. Marczak, B., Weaver, N., Dalek, J., Ensafi, R., Fifield, D., McKune, S., Rey, A., Scott-Railton, J., Deibert, R., and Paxson, V. An analysis of China's \"Great Cannon\". In 5th USENIX Workshop on Free and Open Communications on the Internet (FOCI 15) (Washington, D.C., Aug. 2015), USENIX Association."},{"key":"e_1_3_2_2_59_1","unstructured":"meduza. The day the news died here are all russia's independent media outlets banned blocked or shuttered in just the past few days. https:\/\/meduza.io\/en\/short\/2022\/03\/05\/the-day-the-news-died.  meduza. The day the news died here are all russia's independent media outlets banned blocked or shuttered in just the past few days. https:\/\/meduza.io\/en\/short\/2022\/03\/05\/the-day-the-news-died."},{"key":"e_1_3_2_2_60_1","unstructured":"net4people. Blocking of http\/3 (quic) in russia. https:\/\/github.com\/net4people\/bbs\/issues\/108.  net4people. Blocking of http\/3 (quic) in russia. https:\/\/github.com\/net4people\/bbs\/issues\/108."},{"key":"e_1_3_2_2_61_1","unstructured":"net4people. Blocking of news websites in russia. https:\/\/github.com\/net4people\/bbs\/issues\/107.  net4people. Blocking of news websites in russia. https:\/\/github.com\/net4people\/bbs\/issues\/107."},{"key":"e_1_3_2_2_62_1","unstructured":"net4people. Partial blocking or throttling of social media in russia. https:\/\/github.com\/net4people\/bbs\/issues\/106.  net4people. Partial blocking or throttling of social media in russia. https:\/\/github.com\/net4people\/bbs\/issues\/106."},{"key":"e_1_3_2_2_63_1","volume-title":"Iclab: A global, longitudinal internet censorship measurement platform","author":"Niaki A. A.","year":"2019","unstructured":"Niaki , A. A. , Cho , S. , Weinberg , Z. , Hoang , N. P. , Razaghfanah , A. , Christin , N. , and Gill , P . Iclab: A global, longitudinal internet censorship measurement platform , 2019 . https:\/\/arxiv.org\/abs\/1907.04245. Niaki, A. A., Cho, S., Weinberg, Z., Hoang, N. P., Razaghfanah, A., Christin, N., and Gill, P. Iclab: A global, longitudinal internet censorship measurement platform, 2019. https:\/\/arxiv.org\/abs\/1907.04245."},{"key":"e_1_3_2_2_64_1","unstructured":"ntc.party. Blocking static content youtube yt3.ggpht.com on tspu. https:\/\/ntc.party\/t\/youtube-yt3-ggpht-com\/1784\/13.  ntc.party. Blocking static content youtube yt3.ggpht.com on tspu. https:\/\/ntc.party\/t\/youtube-yt3-ggpht-com\/1784\/13."},{"key":"e_1_3_2_2_65_1","unstructured":"ntc.party. Blocking torguard. https:\/\/ntc.party\/t\/torguard\/2154.  ntc.party. Blocking torguard. https:\/\/ntc.party\/t\/torguard\/2154."},{"key":"e_1_3_2_2_66_1","unstructured":"ntc.party. Blocking\/slowing down twitter. https:\/\/ntc.party\/t\/twitter-26-02-2022\/1724\/30.  ntc.party. Blocking\/slowing down twitter. https:\/\/ntc.party\/t\/twitter-26-02-2022\/1724\/30."},{"key":"e_1_3_2_2_67_1","unstructured":"ntc.party. Facebook limit. https:\/\/ntc.party\/t\/facebook\/1722.  ntc.party. Facebook limit. https:\/\/ntc.party\/t\/facebook\/1722."},{"key":"e_1_3_2_2_68_1","unstructured":"ntc.party. Http\/3 (quic) restriction. https:\/\/ntc.party\/t\/http-3-quic\/1823\/10.  ntc.party. Http\/3 (quic) restriction. https:\/\/ntc.party\/t\/http-3-quic\/1823\/10."},{"key":"e_1_3_2_2_69_1","unstructured":"ntc.party. news.google.com blocked and play.google.com unavailable. https:\/\/ntc.party\/t\/news-google-com-play-google-com\/2071\/7.  ntc.party. news.google.com blocked and play.google.com unavailable. https:\/\/ntc.party\/t\/news-google-com-play-google-com\/2071\/7."},{"key":"e_1_3_2_2_70_1","unstructured":"ntc.party. Nordvpn is not available. https:\/\/ntc.party\/t\/nordvpn\/1936.  ntc.party. Nordvpn is not available. https:\/\/ntc.party\/t\/nordvpn\/1936."},{"key":"e_1_3_2_2_71_1","unstructured":"ntc.party. Ooni reports of tor blocking in certain isps since 2021-12-01. https:\/\/ntc.party\/t\/ooni-reports-of-tor-blocking-in-certain-isps-since-2021-12-01\/1477\/145.  ntc.party. Ooni reports of tor blocking in certain isps since 2021-12-01. https:\/\/ntc.party\/t\/ooni-reports-of-tor-blocking-in-certain-isps-since-2021-12-01\/1477\/145."},{"key":"e_1_3_2_2_72_1","unstructured":"OONI. New blocks emerge in russia amid war in ukraine: An ooni network measurement analysis. https:\/\/ooni.org\/post\/2022-russia-blocks-amid-ru-ua-conflict\/.  OONI. New blocks emerge in russia amid war in ukraine: An ooni network measurement analysis. https:\/\/ooni.org\/post\/2022-russia-blocks-amid-ru-ua-conflict\/."},{"key":"e_1_3_2_2_73_1","first-page":"27","volume-title":"FOCI '21","author":"Padmanabhan R.","unstructured":"Padmanabhan , R. , Filast\u00f2 , A. , Xynou , M. , Raman , R. S. , Middleton , K. , Zhang , M. , Madory , D. , Roberts , M. , and Dainotti , A . A multi-perspective view of internet censorship in myanmar . FOCI '21 , Association for Computing Machinery , p. 27 -- 36 . Padmanabhan, R., Filast\u00f2, A., Xynou, M., Raman, R. S., Middleton, K., Zhang, M., Madory, D., Roberts, M., and Dainotti, A. A multi-perspective view of internet censorship in myanmar. FOCI '21, Association for Computing Machinery, p. 27--36."},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2010.46"},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.55"},{"key":"e_1_3_2_2_76_1","volume-title":"USENIX Security Symposium","author":"Pearce P.","year":"2017","unstructured":"Pearce , P. , Jones , B. , Li , F. , Ensafi , R. , Feamster , N. , Weaver , N. , and Paxson , V . Global measurement of DNS censorship . In USENIX Security Symposium ( 2017 ). Pearce, P., Jones, B., Li, F., Ensafi, R., Feamster, N., Weaver, N., and Paxson, V. Global measurement of DNS censorship. In USENIX Security Symposium (2017)."},{"key":"e_1_3_2_2_77_1","first-page":"307","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Pearce P.","year":"2017","unstructured":"Pearce , P. , Jones , B. , Li , F. , Ensafi , R. , Feamster , N. , Weaver , N. , and Paxson , V . Global measurement of DNS manipulation . In 26th USENIX Security Symposium (USENIX Security 17) (Vancouver, BC, Aug. 2017 ), USENIX Association , pp. 307 -- 323 . Pearce, P., Jones, B., Li, F., Ensafi, R., Feamster, N., Weaver, N., and Paxson, V. Global measurement of DNS manipulation. In 26th USENIX Security Symposium (USENIX Security 17) (Vancouver, BC, Aug. 2017), USENIX Association, pp. 307--323."},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7857"},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23386"}],"event":{"name":"IMC '22: ACM Internet Measurement Conference","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","USENIX Assoc USENIX Assoc"],"location":"Nice France","acronym":"IMC '22"},"container-title":["Proceedings of the 22nd ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3517745.3561461","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3517745.3561461","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3517745.3561461","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:17Z","timestamp":1750182557000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3517745.3561461"}},"subtitle":["Russia's decentralized censorship system"],"short-title":[],"issued":{"date-parts":[[2022,10,25]]},"references-count":79,"alternative-id":["10.1145\/3517745.3561461","10.1145\/3517745"],"URL":"https:\/\/doi.org\/10.1145\/3517745.3561461","relation":{},"subject":[],"published":{"date-parts":[[2022,10,25]]},"assertion":[{"value":"2022-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}