{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:46:46Z","timestamp":1772041606268,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,30]],"date-time":"2023-04-30T00:00:00Z","timestamp":1682812800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DARPA","award":["HR00112190126"],"award-info":[{"award-number":["HR00112190126"]}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-1943240"],"award-info":[{"award-number":["CNS-1943240"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,30]]},"DOI":"10.1145\/3543507.3583189","type":"proceedings-article","created":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T23:30:51Z","timestamp":1682551851000},"page":"1969-1979","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Measuring and Evading Turkmenistan\u2019s Internet Censorship"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4572-4200","authenticated-orcid":false,"given":"Sadia","family":"Nourin","sequence":"first","affiliation":[{"name":"University of Maryland, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0835-8598","authenticated-orcid":false,"given":"Van","family":"Tran","sequence":"additional","affiliation":[{"name":"University of Chicago, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1652-8419","authenticated-orcid":false,"given":"Xi","family":"Jiang","sequence":"additional","affiliation":[{"name":"University of Chicago, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4415-6026","authenticated-orcid":false,"given":"Kevin","family":"Bock","sequence":"additional","affiliation":[{"name":"University of Maryland, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9315-5201","authenticated-orcid":false,"given":"Nick","family":"Feamster","sequence":"additional","affiliation":[{"name":"University of Chicago, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9868-3318","authenticated-orcid":false,"given":"Nguyen Phong","family":"Hoang","sequence":"additional","affiliation":[{"name":"University of Chicago, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4957-5131","authenticated-orcid":false,"given":"Dave","family":"Levin","sequence":"additional","affiliation":[{"name":"University of Maryland, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,4,30]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"https:\/\/metrics.torproject.org\/userstats-relay-country.html?start=2021-01-01&end=2022-09-28&country=tm&events=off Accessed","author":"Metrics Tor","year":"2022","unstructured":"2010. Tor Metrics. https:\/\/metrics.torproject.org\/userstats-relay-country.html?start=2021-01-01&end=2022-09-28&country=tm&events=off Accessed September 2022."},{"key":"e_1_3_2_2_2_1","unstructured":"2019. Turkmenistan Blocks DNS-over-HTTPS Resolvers. https:\/\/ntc.party\/t\/turkmenistan-blocks-dns-over-https-resolvers\/244"},{"key":"e_1_3_2_2_3_1","unstructured":"2021. Bidirectional DNS HTTPS HTTP injection in Turkmenistan. https:\/\/github.com\/net4people\/bbs\/issues\/80"},{"key":"e_1_3_2_2_4_1","unstructured":"2022. CAIDA AS Rank. https:\/\/asrank.caida.org\/"},{"key":"e_1_3_2_2_5_1","unstructured":"2022. Citizen Lab Lists. https:\/\/github.com\/citizenlab\/test-lists"},{"key":"e_1_3_2_2_6_1","unstructured":"2022. ICANN Centralized Zone Data Service. https:\/\/czds.icann.org"},{"key":"e_1_3_2_2_7_1","unstructured":"2022. Shodan: The search engine for Security. https:\/\/shodan.io\/"},{"key":"e_1_3_2_2_8_1","unstructured":"2022. The Common Crawl Project. https:\/\/commoncrawl.org"},{"key":"e_1_3_2_2_9_1","unstructured":"2022. Virus Total. https:\/\/www.virustotal.com\/gui\/home\/url"},{"key":"e_1_3_2_2_10_1","unstructured":"Collin Anderson. 2013. Dimming the Internet: Detecting Throttling as a Mechanism of Censorship in Iran. (2013). arxiv:1306.4361\u00a0[cs.NI]"},{"key":"e_1_3_2_2_11_1","volume-title":"Triplet Censors: Demystifying Great Firewall\u2019s DNS Censorship Behavior. In USENIX FOCI.","author":"Anonymous","year":"2020","unstructured":"Anonymous, Arian\u00a0Akhavan Niaki, Nguyen\u00a0Phong Hoang, Phillipa Gill, and Amir Houmansadr. 2020. Triplet Censors: Demystifying Great Firewall\u2019s DNS Censorship Behavior. In USENIX FOCI."},{"key":"e_1_3_2_2_12_1","unstructured":"Simurgh Aryan Homa Aryan and J.\u00a0Alex Halderman. 2013. Internet Censorship in Iran: A First Look. In USENIX FOCI."},{"key":"e_1_3_2_2_13_1","unstructured":"Simonetta Basso. 2021. Measuring DoT\/DoH Blocking Using OONI Probe: a Preliminary Study."},{"key":"e_1_3_2_2_14_1","volume-title":"Weaponizing Middleboxes for TCP Reflected Amplification. In USENIX Security Symposium.","author":"Bock Kevin","year":"2021","unstructured":"Kevin Bock, Abdulrahman Alaraj, Yair Fax, K.\u00a0S. Hurley, Eric Wustrow, and Dave Levin. 2021. Weaponizing Middleboxes for TCP Reflected Amplification. In USENIX Security Symposium."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00059"},{"key":"e_1_3_2_2_16_1","unstructured":"Kevin Bock Yair Fax Kyle Reese Jasraj Singh and Dave Levin. 2020. Detecting and Evading Censorship-in-Depth: A Case Study of Iran\u2019s Protocol Filter. In USENIX FOCI."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"crossref","unstructured":"Kevin Bock George Hughey Louis-Henri Merino Tania Arya Daniel Liscinsky Regina Pogosian and Dave Levin. 2020. Come as You Are: Helping Unmodified Clients Bypass Censorship with Server-side Evasion. In ACM SIGCOMM.","DOI":"10.1145\/3387514.3405889"},{"key":"e_1_3_2_2_18_1","volume-title":"Geneva: Evolving Censorship Evasion Strategies. In ACM CCS.","author":"Bock Kevin","year":"2019","unstructured":"Kevin Bock, George Hughey, Xiao Qiang, and Dave Levin. 2019. Geneva: Evolving Censorship Evasion Strategies. In ACM CCS."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3473604.3474559"},{"key":"e_1_3_2_2_20_1","unstructured":"CAIDA. 2022. Routeviews Prefix to AS mappings Dataset for IPv4 and IPv6. https:\/\/www.caida.org\/data\/routing\/routeviews-prefix2as.xml"},{"key":"e_1_3_2_2_21_1","unstructured":"Zimo Chai Amirhossein Ghafari and Amir Houmansadr. 2019. On the Importance of Encrypted-SNI (ESNI) to Censorship Circumvention. In USENIX FOCI."},{"key":"e_1_3_2_2_22_1","volume-title":"Proceedings of the 13th USENIX Security Symposium. 303\u2013319","author":"Dingledine R.","unstructured":"R. Dingledine, N. Mathewson, and P. Syverson. 2004. Tor: The Second-Generation Onion Router. In Proceedings of the 13th USENIX Security Symposium. 303\u2013319."},{"key":"e_1_3_2_2_23_1","unstructured":"DNS over HTTPS Public Resolvers. 2020. DOH. https:\/\/github.com\/curl\/curl\/wiki\/DNS-over-HTTPS"},{"key":"e_1_3_2_2_24_1","unstructured":"Z. Durumeric E. Wustrow and J.\u00a0A. Halderman. [n. d.]. ZMap: Fast Internet-wide Scanning and Its Security Applications. In USENIX Security \u201913."},{"key":"e_1_3_2_2_25_1","volume-title":"OONI: Open Observatory of Network Interference. In FOCI.","author":"Filasto Arturo","year":"2012","unstructured":"Arturo Filasto and Jacob Appelbaum. 2012. OONI: Open Observatory of Network Interference. In FOCI."},{"key":"e_1_3_2_2_26_1","volume-title":"Global Freedom Scores","author":"House Freedom","year":"2022","unstructured":"Freedom House. 2022. Global Freedom Scores 2022. https:\/\/freedomhouse.org\/countries\/freedom-world\/scores"},{"key":"e_1_3_2_2_27_1","volume-title":"Turkmenistan Freedom Score","author":"House Freedom","year":"2022","unstructured":"Freedom House. 2022. Turkmenistan Freedom Score 2022. https:\/\/freedomhouse.org\/country\/turkmenistan\/freedom-world\/2022"},{"key":"e_1_3_2_2_28_1","first-page":"09","volume":"202","unstructured":"Geoff Huston. 2022-09-02. DoH, DoT, and plain old DNS. APNIC. https:\/\/blog.apnic.net\/2022\/09\/02\/doh-dot-and-plain-old-dns\/","journal-title":"Geoff Huston."},{"key":"e_1_3_2_2_29_1","volume-title":"Barme And Sang Ye","author":"Geremie","year":"1997","unstructured":"Geremie R. Barme And Sang Ye. 1997. The Great Firewall of China. https:\/\/www.wired.com\/1997\/06\/china-3\/ Accessed May 2022."},{"key":"e_1_3_2_2_30_1","volume-title":"USENIX Security Symposium.","author":"Harrity Michael","year":"2022","unstructured":"Michael Harrity, Kevin Bock, Frederick Sell, and Dave Levin. 2022. GET \/out: Automated Discovery of Application-Layer Censorship Evasion Strategies. In USENIX Security Symposium."},{"key":"e_1_3_2_2_31_1","unstructured":"NP. Hoang AA. Niaki J. Dalek J. Knockel P. Lin B. Marczak M. Crete-Nishihata P. Gill and M. Polychronakis. 2021. How Great is the Great Firewall? Measuring China\u2019s DNS Censorship. In USENIX Security \u201921."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"crossref","unstructured":"NP. Hoang M. Polychronakis and P. Gill. 2022. Measuring the Accessibility of Domain Name Encryption and Its Impact on Internet Filtering. In PAM.","DOI":"10.1007\/978-3-030-98785-5_23"},{"key":"e_1_3_2_2_33_1","volume-title":"Proceedings of the 9th USENIX Workshop on Free and Open Communications on the Internet.","author":"Hoang Nguyen\u00a0Phong","year":"2019","unstructured":"Nguyen\u00a0Phong Hoang, Sadie Doreen, and Michalis Polychronakis. 2019. Measuring I2P Censorship at a Global Scale. In Proceedings of the 9th USENIX Workshop on Free and Open Communications on the Internet."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278565"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.14722\/madweb.2020.23009"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384728"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0078"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"crossref","unstructured":"P. Hoffman and P. McManus. 2018. DNS Queries over HTTPS (DoH). RFC 8484. IETF. https:\/\/tools.ietf.org\/html\/rfc8484","DOI":"10.17487\/RFC8484"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"crossref","unstructured":"Z. Hu L. Zhu J. Heidemann A. Mankin D. Wessels and P. Hoffman. 2016. Specification for DNS over Transport Layer Security (TLS). RFC 7858. IETF.","DOI":"10.17487\/RFC7858"},{"key":"e_1_3_2_2_40_1","volume-title":"Turkmenistan Events of","author":"Watch Human Right","year":"2021","unstructured":"Human Right Watch. 2022. Turkmenistan Events of 2021. https:\/\/www.hrw.org\/world-report\/2022\/country-chapters\/turkmenistan"},{"key":"e_1_3_2_2_41_1","unstructured":"S. Khattak M. Javed PD. Anderson and V. Paxson. 2013. Towards Illuminating a Censorship Monitor\u2019s Model to Facilitate Evasion. In USENIX FOCI."},{"key":"e_1_3_2_2_42_1","volume-title":"Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation. In NDSS.","author":"Le\u00a0Pochat Victor","year":"2019","unstructured":"Victor Le\u00a0Pochat, Tom Van\u00a0Goethem, Samaneh Tajalizadehkhoob, Maciej Korczy\u0144ski, and Wouter Joosen. 2019. Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation. In NDSS."},{"key":"e_1_3_2_2_43_1","unstructured":"M. Xynou and A. Filast\u00f2. 2022. New Blocks Emerge In Russia Amid War In Ukraine: An OONI Network Measurement Analysis. Open Observatory of Network Interference. https:\/\/ooni.org\/post\/2022-russia-blocks-amid-ru-ua-conflict\/"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"crossref","unstructured":"P. Mockapetris. 1987. Domain Names - Concepts And Facilities. RFC 1034. IETF. https:\/\/datatracker.ietf.org\/doc\/html\/rfc1034","DOI":"10.17487\/rfc1034"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"crossref","unstructured":"AA. Niaki S. Cho Z. Weinberg NP. Hoang A. Razaghpanah N. Christin and P. Gill. 2020. ICLab: A Global Longitudinal Internet Censorship Measurement Platform. In IEEE S&P \u201920.","DOI":"10.1109\/SP40000.2020.00014"},{"key":"e_1_3_2_2_46_1","volume-title":"I2P Metrics Portal. https:\/\/i2p-metrics.np-tokumei.net\/router-distribution Accessed","author":"Hoang NP.","year":"2022","unstructured":"NP. Hoang. 2018. I2P Metrics Portal. https:\/\/i2p-metrics.np-tokumei.net\/router-distribution Accessed July 2022."},{"key":"e_1_3_2_2_47_1","unstructured":"OpenNet Initiative. 2010. Turkmenistan Report. https:\/\/opennet.net\/research\/profiles\/turkmenistan"},{"key":"e_1_3_2_2_48_1","unstructured":"Qurium. 2019. Turkmenistan And Their Golden DPI. https:\/\/www.qurium.org\/alerts\/turkmenistan-and-their-golden-dpi\/"},{"key":"e_1_3_2_2_49_1","volume-title":"Censored Planet: An Internet-wide, Longitudinal Censorship Observatory. In ACM CCS.","author":"Raman RS.","year":"2020","unstructured":"RS. Raman, P. Shenoy, K. Kohls, and R. Ensafi. 2020. Censored Planet: An Internet-wide, Longitudinal Censorship Observatory. In ACM CCS."},{"key":"e_1_3_2_2_50_1","first-page":"08","volume":"202","unstructured":"RFE\/RL\u2019S Turkmen Service. 2021-08-10. VPNs Are Not A-OK: Turkmen Internet Users Forced To Swear On Koran They Won\u2019t Use Them. https:\/\/www.rferl.org\/a\/turkmenistan-vpn-koran-ban\/31402718.html","journal-title":"Turkmen Service."},{"key":"e_1_3_2_2_51_1","first-page":"01","volume":"202","unstructured":"RFE\/RL\u2019S Turkmen Service. 2022-01-13. Internet In Turkmenistan, Already The World\u2019s Slowest, Faces Further Restrictions. https:\/\/rferl.org\/a\/turkmenistan-internet-slowest-restrictions\/31652467.html","journal-title":"Turkmen Service."},{"key":"e_1_3_2_2_52_1","volume-title":"Satellite: Joint Analysis of CDNs and Network-Level Interference. In USENIX ATC.","author":"Scott W.","year":"2016","unstructured":"W. Scott, T. Anderson, T. Kohno, and A. Krishnamurthy. 2016. Satellite: Joint Analysis of CDNs and Network-Level Interference. In USENIX ATC."},{"key":"e_1_3_2_2_53_1","unstructured":"SecDev. 2012. Neither Here Nor There: Turkmenistan\u2019s Digital Doldrums. https:\/\/www.opensocietyfoundations.org\/publications\/neither-here-nor-there-turkmenistan-s-digital-doldrums"},{"key":"e_1_3_2_2_54_1","unstructured":"Simone Basso and Maria Xynou and Arturo Filast\u00f2. 2022-09-25. Iran Blocks Social Media App Stores And Encrypted DNS Amid Mahsa Amini Protests. Open Observatory of Network Interference. https:\/\/ooni.org\/post\/2022-iran-blocks-social-media-mahsa-amini-protests\/"},{"key":"e_1_3_2_2_55_1","unstructured":"Sparks Neo Tank Smith and Dozer. 2012. The Collateral Damage of Internet Censorship by DNS Injection. In ACM CCR."},{"key":"e_1_3_2_2_56_1","first-page":"05","volume":"201","unstructured":"Thomas Erdbrink. 2018-05-01. Iran, Like Russia Before It, Tries to Block Telegram App. The New York Times. https:\/\/www.nytimes.com\/2018\/05\/01\/world\/middleeast\/iran-telegram-app-russia.html","journal-title":"Thomas Erdbrink."},{"key":"e_1_3_2_2_57_1","volume-title":"Turkmenistan AGTS reachability test","author":"SS.","year":"2021","unstructured":"ValdikSS. 2021. Turkmenistan AGTS reachability test 18 Dec 2021. https:\/\/ntc.party\/t\/turkmenistan-agts-reachability-test-18-dec-2021"},{"key":"e_1_3_2_2_58_1","volume-title":"Quack: Scalable Remote Measurement of Application-Layer Censorship. In USENIX Security Symposium.","author":"VanderSloot B.","unstructured":"B. VanderSloot, A. McDonald, W. Scott, J.\u00a0Alex Halderman, and R. Ensafi. 2018. Quack: Scalable Remote Measurement of Application-Layer Censorship. In USENIX Security Symposium."},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131374"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"crossref","unstructured":"Z. Wang S. Zhu Y. Cao Z. Qian C. Song S.\u00a0V. Krishnamurthy K.\u00a0S. Chan and T.\u00a0D. Braun. 2020. SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery. In NDSS.","DOI":"10.14722\/ndss.2020.24083"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278555"}],"event":{"name":"WWW '23: The ACM Web Conference 2023","location":"Austin TX USA","acronym":"WWW '23","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM Web Conference 2023"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543507.3583189","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3543507.3583189","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3543507.3583189","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3543507.3583189","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:18Z","timestamp":1750183758000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543507.3583189"}},"subtitle":["A Case Study in Large-Scale Measurements of a Low-Penetration Country"],"short-title":[],"issued":{"date-parts":[[2023,4,30]]},"references-count":61,"alternative-id":["10.1145\/3543507.3583189","10.1145\/3543507"],"URL":"https:\/\/doi.org\/10.1145\/3543507.3583189","relation":{},"subject":[],"published":{"date-parts":[[2023,4,30]]},"assertion":[{"value":"2023-04-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}