{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:44:07Z","timestamp":1770227047061,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":104,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T00:00:00Z","timestamp":1698105600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Research Council KU Leuven","award":["C24\/18\/049"],"award-info":[{"award-number":["C24\/18\/049"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,24]]},"DOI":"10.1145\/3618257.3624817","type":"proceedings-article","created":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T00:19:52Z","timestamp":1698020392000},"page":"501-525","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["PTPerf: On the Performance Evaluation of Tor Pluggable Transports"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-4863-6636","authenticated-orcid":false,"given":"Zeya","family":"Umayya","sequence":"first","affiliation":[{"name":"IIIT Delhi, Delhi, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-9541-2184","authenticated-orcid":false,"given":"Dhruv","family":"Malik","sequence":"additional","affiliation":[{"name":"IIIT Delhi, Delhi, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-1026-8332","authenticated-orcid":false,"given":"Devashish","family":"Gosain","sequence":"additional","affiliation":[{"name":"KU Leuven &amp; BITS Pilani Goa, Leuven, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6365-252X","authenticated-orcid":false,"given":"Piyush","family":"Kumar Sharma","sequence":"additional","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2023,10,24]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380113"},{"key":"e_1_3_2_2_2_1","unstructured":"Yawning Angel. 2022. Obfs4. https:\/\/github.com\/Yawning\/obfs4. (2022)."},{"key":"e_1_3_2_2_3_1","unstructured":"Nima Fatemi Arlo Breault Chang Lan. 2014. Meek. https:\/\/github.com\/arlolra\/meek. (2014)."},{"key":"e_1_3_2_2_4_1","unstructured":"The Nation Articles. 2022. The Tightening Grip of Censorship in Russia. https:\/\/www.thenation.com\/article\/world\/russia-censorship-war-ukraine\/. (2022)."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417874"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0037"},{"key":"e_1_3_2_2_7_1","volume-title":"The belmont report. The Oxford textbook of clinical research ethics","author":"Beauchamp Tom L","year":"2008","unstructured":"Tom L Beauchamp. 2008. The belmont report. The Oxford textbook of clinical research ethics (2008), 149--155."},{"key":"e_1_3_2_2_8_1","unstructured":"Berkman Klein Center for Internet & Society. 2019. Berkman Website Inaccessibility Test Lists. https:\/\/github.com\/berkmancenter\/url-lists. (2019)."},{"key":"e_1_3_2_2_9_1","unstructured":"Browsertime. 2022. Browsertime. https:\/\/github.com\/sitespeedio\/browsertime. (2022)."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08506-7_1"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815701"},{"key":"e_1_3_2_2_12_1","unstructured":"Chrome. 2022. Speed Index. https:\/\/developer.chrome.com\/en\/docs\/lighthouse\/performance\/speed-index\/. (2022)."},{"key":"e_1_3_2_2_13_1","unstructured":"CircleID. 2019. A Look Into Tor Nodes' Locations and ISPs. https:\/\/circleid.com\/posts\/20201129-a-look-into-tor-nodes-locations-and-isps-with-ip-intelligence. (2019)."},{"key":"e_1_3_2_2_14_1","unstructured":"Cloak. 2022. Cloak. \"https:\/\/github.com\/cbeuw\/Cloak\". (2022)."},{"key":"e_1_3_2_2_15_1","unstructured":"Curl. 2023. Linux Curl Utility. https:\/\/man7.org\/linux\/man-pages\/man1\/curl.1.html. (2023)."},{"key":"e_1_3_2_2_16_1","unstructured":"Claudia Diaz Harry Halpin and Aggelos Kiayias. 2021. The Nym Network: The Next Generation of Privacy Infrastructure. (2021). White Paper version 1.0."},{"key":"e_1_3_2_2_17_1","volume-title":"28th Chaos Communication Congress.","author":"Dingledine Roger","year":"2012","unstructured":"Roger Dingledine and Jacob Appelbaum. 2012. How governments have tried to block Tor. In 28th Chaos Communication Congress."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"e_1_3_2_2_19_1","volume-title":"8th USENIX Workshop on Free and Open Communications on the Internet (FOCI 18)","author":"Dunna Arun","year":"2018","unstructured":"Arun Dunna, Ciar\u00e1n O'Brien, and Phillipa Gill. 2018. Analyzing China's blocking of unpublished tor bridges. In 8th USENIX Workshop on Free and Open Communications on the Internet (FOCI 18)."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516657"},{"key":"e_1_3_2_2_21_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Dyer Kevin P","year":"2015","unstructured":"Kevin P Dyer, Scott E Coull, and Thomas Shrimpton. 2015. Marionette: A programmable network traffic obfuscation system. In 24th USENIX Security Symposium (USENIX Security 15). 367--382."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815690"},{"key":"e_1_3_2_2_23_1","unstructured":"Facet. 2014. Facet. https:\/\/github.com\/magicle\/Facet. (2014)."},{"key":"e_1_3_2_2_24_1","unstructured":"David Fifield. 2022a. Dnstt. https:\/\/www.bamsoftware.com\/software\/dnstt\/. (2022)."},{"key":"e_1_3_2_2_25_1","unstructured":"David Fifield. 2022b. Snowflake. https:\/\/github.com\/keroserene\/snowflake. (2022)."},{"key":"e_1_3_2_2_26_1","unstructured":"David Fifield. 2022c. Snowflake servers not reachable. https:\/\/gitlab.torproject.org\/tpo\/anti-censorship\/pluggable-transports\/snowflake\/-\/issues\/40207. (2022)."},{"key":"e_1_3_2_2_27_1","volume-title":"2023 a. Calibrating Tor Metrics user estimates. URL: https:\/\/www.bamsoftware.com\/talks\/pets-2023-metrics\/","author":"Fifield David","year":"2023","unstructured":"David Fifield. 2023 a. Calibrating Tor Metrics user estimates. URL: https:\/\/www.bamsoftware.com\/talks\/pets-2023-metrics\/ (2023)."},{"key":"e_1_3_2_2_28_1","unstructured":"David Fifield. 2023 b. Meek. https:\/\/www.bamsoftware.com\/papers\/thesis\/#sec:meek-history. (2023)."},{"key":"e_1_3_2_2_29_1","unstructured":"David Fifield. 2023 c. Snowflake graphs. https:\/\/gitlab.torproject.org\/dcf\/snowflake-graphs. (2023)."},{"key":"e_1_3_2_2_30_1","unstructured":"David Fifield. 2023 d. Snowflake performance over time. https:\/\/github.com\/turfed\/snowflake-paper\/blob\/c8fc80b5fdb47d1970fec10b3a83e8a0dc3b46c8\/figures\/users\/users-global.pdf. (2023)."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0009"},{"key":"e_1_3_2_2_32_1","unstructured":"David Fifield and Linus Nordberg. 2023. Running a high-performance pluggable transports Tor bridge. (2023)."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3517419"},{"key":"e_1_3_2_2_34_1","unstructured":"Forbes. 2022. Iran Blocks Nearly All Internet Access As Anti-Government Protests Intensify. https:\/\/www.forbes.com\/sites\/siladityaray\/2022\/09\/22\/iran-blocks-nearly-all-internet-access-as-anti-government-protests-intensify\/. (2022)."},{"key":"e_1_3_2_2_35_1","unstructured":"Nuno Santos Francisco Silva Diogo Barradas. 2022. TorCloak Infrastructure Draft. https:\/\/lists.torproject.org\/pipermail\/anti-censorship-team\/attachments\/20220826\/2c55f0ca\/attachment-0001.pdf. (2022)."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363218"},{"key":"e_1_3_2_2_37_1","volume-title":"10th USENIX Workshop on Free and Open Communications on the Internet (FOCI 20)","author":"Frolov Sergey","year":"2020","unstructured":"Sergey Frolov and Eric Wustrow. 2020. {HTTPT}: A {Probe-Resistant} Proxy. In 10th USENIX Workshop on Free and Open Communications on the Internet (FOCI 20)."},{"key":"e_1_3_2_2_38_1","unstructured":"Raymond Hill (gorhill). 2022. uBlock Origin. https:\/\/chrome.google.com\/webstore\/detail\/ublock-origin\/cjpalhdlnbpafiamejdnhcphjbkeiagm?hl=en. (2022)."},{"key":"e_1_3_2_2_39_1","volume-title":"Iran: UN condemns violent crackdown against hijab protests. https:\/\/www.government.nl\/latest\/news\/2022\/12\/16\/iran-questions-and-answers-about-the-situation-and-sanctions.","author":"Netherlands Government","year":"2022","unstructured":"Government of Netherlands. 2022. Iran: UN condemns violent crackdown against hijab protests. https:\/\/www.government.nl\/latest\/news\/2022\/12\/16\/iran-questions-and-answers-about-the-situation-and-sanctions. (2022)."},{"key":"e_1_3_2_2_40_1","unstructured":"Guardian. 2022. Iran blocks capital's internet access as Amini protests grow. https:\/\/www.theguardian.com\/world\/2022\/sep\/22\/iran-blocks-capitals-internet-access-as-amini-protests-grow. (2022)."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIS.2019.00036"},{"key":"e_1_3_2_2_42_1","unstructured":"Amir Houmansadr Thomas J Riedl Nikita Borisov and Andrew C Singer. 2013. I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention.. In NDSS."},{"key":"e_1_3_2_2_43_1","volume-title":"Paired t test","author":"Hsu Henry","year":"2014","unstructured":"Henry Hsu and Peter A Lachenbruch. 2014. Paired t test. Wiley StatsRef: statistics reference online (2014)."},{"key":"e_1_3_2_2_44_1","unstructured":"Damian Johnson. 2022. Stem Library. https:\/\/stem.torproject.org\/. (2022)."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0028"},{"key":"e_1_3_2_2_46_1","volume-title":"Systemization of pluggable transports for censorship resistance. arXiv preprint arXiv:1412.7448","author":"Khattak Sheharbano","year":"2014","unstructured":"Sheharbano Khattak, Laurent Simon, and Steven J Murdoch. 2014. Systemization of pluggable transports for censorship resistance. arXiv preprint arXiv:1412.7448 (2014)."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3473604.3474563"},{"key":"e_1_3_2_2_48_1","unstructured":"Citizen Lab. 2022. URL testing lists intended for discovering website censorship. https:\/\/github.com\/citizenlab\/test-lists. (2022)."},{"key":"e_1_3_2_2_49_1","unstructured":"Lampshade. 2019. Lantern Lampshade. https:\/\/github.com\/getlantern\/lampshade. (2019)."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"crossref","unstructured":"A Lewman. 2012. Tor partially blocked in China. (2012).","DOI":"10.5422\/fordham\/9780823244560.003.0005"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPICS50287.2020.9202018"},{"key":"e_1_3_2_2_52_1","unstructured":"Mailet. 2016. Mailet. https:\/\/github.com\/magicle\/Mailet. (2016)."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0024"},{"key":"e_1_3_2_2_54_1","unstructured":"Meejah. 2022. Carml-Command-line utility to control Tor. https:\/\/github.com\/meejah\/carml. (2022)."},{"key":"e_1_3_2_2_55_1","unstructured":"Tor Metrics. 2022. Tor Mterics Users. https:\/\/metrics.torproject.org\/userstats-bridge-combined.html'start=2022-10-01&end=2022-12-30&country=ir. (2022)."},{"key":"e_1_3_2_2_56_1","unstructured":"MinecruftPT. 2023 a. Minecruft-PT Issues. https:\/\/github.com\/doudoulong\/Minecruft-PT\/issues. (2023)."},{"key":"e_1_3_2_2_57_1","unstructured":"MinecruftPT. 2023 b. MinecruftPT. https:\/\/github.com\/doudoulong\/Minecruft-PT. (2023)."},{"key":"e_1_3_2_2_58_1","unstructured":"Namecheap. 2023. Namecheap Hosting service. https:\/\/www.namecheap.com\/hosting\/. (2023)."},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"crossref","unstructured":"Milad Nasr Hadi Zolfaghari Amir Houmansadr and Amirhossein Ghafari. 2020. MassBrowser: Unblocking the Censored Web for the Masses by the Masses.. In NDSS.","DOI":"10.14722\/ndss.2020.24340"},{"key":"e_1_3_2_2_60_1","volume-title":"Iran: UN condemns violent crackdown against hijab protests. https:\/\/news.un.org\/en\/story\/2022\/09\/1128111.","author":"United Nations.","year":"2022","unstructured":"United Nations. 2022. Iran: UN condemns violent crackdown against hijab protests. https:\/\/news.un.org\/en\/story\/2022\/09\/1128111. (2022)."},{"key":"e_1_3_2_2_61_1","unstructured":"BBC News. 2022a. Russia-Ukraine: Is internet on verge of break-up? https:\/\/www.bbc.com\/news\/technology-60661987. (2022)."},{"key":"e_1_3_2_2_62_1","unstructured":"CNBC News. 2022b. Russia tightens censorship during Ukraine war. https:\/\/www.cnbc.com\/2022\/03\/17\/russia-ukraine-war-internet-censorship-china-great-firewall.html. (2022)."},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00014"},{"key":"e_1_3_2_2_64_1","unstructured":"Nica Osorio. 2022a. Anonymous Offers To Help Get Iranians Back Online After Internet Shutdown. https:\/\/www.ibtimes.com\/anonymous-offers-help-get-iranians-back-online-after-governments-internet-shutdown-3617489. (2022)."},{"key":"e_1_3_2_2_65_1","unstructured":"Nica Osorio. 2022b. Iran's Internet Shutdown Hides a Deadly Crackdown. https:\/\/www.wired.com\/story\/iran-protests-2022-internet-shutdown-whatsapp\/. (2022)."},{"key":"e_1_3_2_2_66_1","unstructured":"Nym. 2022. Nym roadmap. https:\/\/blog.nymtech.net\/nym-roadmap-update-67a8da65b8b2. (2022)."},{"key":"e_1_3_2_2_67_1","unstructured":"OONI. 2022. Iran is blocking Tor. https:\/\/ooni.org\/post\/2022-iran-blocks-social-media-mahsa-amini-protests\/#circumvention. (2022)."},{"key":"e_1_3_2_2_68_1","unstructured":"OpenDNS. 2023. Using DNS over HTTPS (DoH) with OpenDNS. https:\/\/support.opendns.com\/hc\/en-us\/articles\/360038086532-Using-DNS-over-HTTPS-DoH-with-OpenDNS. (2023)."},{"key":"e_1_3_2_2_69_1","unstructured":"DNS over HTTPS. 2022. DoH Resolvers. https:\/\/github.com\/curl\/curl\/wiki\/DNS-over-HTTPS#publicly-available-servers. (2022)."},{"key":"e_1_3_2_2_70_1","unstructured":"John Palfrey Harold Roberts and Ethan Zuckerman. 2007. 2007 circumvention landscape report: Methods uses and tools. https:\/\/cyber.harvard.edu\/sites\/cyber.law.harvard.edu\/files\/2007_Circumvention_Landscape.pdf. (2007)."},{"key":"e_1_3_2_2_71_1","volume-title":"Samaneh Tajalizadehkhoob, Maciej Korczy\u0144ski, and Wouter Joosen.","author":"Pochat Victor Le","year":"2018","unstructured":"Victor Le Pochat, Tom Van Goethem, Samaneh Tajalizadehkhoob, Maciej Korczy\u0144ski, and Wouter Joosen. 2018. Tranco: A research-oriented top sites ranking hardened against manipulation. arXiv preprint arXiv:1806.01156 (2018)."},{"key":"e_1_3_2_2_72_1","unstructured":"DNS Privacy Project. 2022DoT Resolvers. https:\/\/dnsprivacy.org\/public_resolvers\/. (2022)."},{"key":"e_1_3_2_2_73_1","unstructured":"Tor Project. 2021. Tor Guard Specification. https:\/\/github.com\/torproject\/torspec\/blob\/main\/guard-spec.txt. (2021)."},{"key":"e_1_3_2_2_74_1","unstructured":"Psiphon. 2022a. Psiphon. https:\/\/www.psiphon.ca\/. (2022)."},{"key":"e_1_3_2_2_75_1","unstructured":"Psiphon. 2022b. Psiphon Tunnel Core Github. https:\/\/github.com\/Psiphon-Labs\/psiphon-tunnel-core. (2022)."},{"key":"e_1_3_2_2_76_1","unstructured":"PTPerf. 2023 a. Code Repository. https:\/\/github.com\/zeya2u9\/PTPerf\/. (2023)."},{"key":"e_1_3_2_2_77_1","unstructured":"PTPerf. 2023 b. DOI of PTPerf. https:\/\/zenodo.org\/record\/8352813. (2023)."},{"key":"e_1_3_2_2_78_1","volume-title":"Matthew Bernhard, Victor Ongkowijaya, Leonid Evdokimov, Anne Edmundson, Steven Sprecher, Muhammad Ikram, and Roya Ensafi.","author":"Ramesh Reethika","year":"2020","unstructured":"Reethika Ramesh, Ram Sundara Raman, Matthew Bernhard, Victor Ongkowijaya, Leonid Evdokimov, Anne Edmundson, Steven Sprecher, Muhammad Ikram, and Roya Ensafi. 2020. Decentralized control: A case study of russia. In NDSS."},{"key":"e_1_3_2_2_79_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Rosen Marc B","year":"2021","unstructured":"Marc B Rosen, James Parker, and Alex J Malozemoff. 2021. Balboa: Bobbing and Weaving around Network Censorship. In 30th USENIX Security Symposium (USENIX Security 21). 3399--3413."},{"key":"e_1_3_2_2_80_1","unstructured":"Selenium. 2022. Selenium WebDriver. https:\/\/www.selenium.dev\/. (2022)."},{"key":"e_1_3_2_2_81_1","unstructured":"Shadowsocks. 2023. Shadowsocks A fast tunnel proxy that helps you bypass firewalls. https:\/\/shadowsocks.org\/. (2023)."},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2017.8280829"},{"key":"e_1_3_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453080"},{"key":"e_1_3_2_2_84_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0051"},{"key":"e_1_3_2_2_85_1","unstructured":"Francisco Silva. 2022. TorCloak Pluggable Transport Draft. https:\/\/lists.torproject.org\/pipermail\/anti-censorship-team\/2022-August\/000239.html. (2022)."},{"key":"e_1_3_2_2_86_1","article-title":"Real-time identification of three Tor pluggable transports using machine learning techniques","volume":"74","author":"Mojtahed Soleimani Mohammad Hassan","year":"2018","unstructured":"Mohammad Hassan Mojtahed Soleimani, Muharram Mansoorizadeh, and Mohammad Nassiri. 2018. Real-time identification of three Tor pluggable transports using machine learning techniques. The Journal of Supercomputing, Vol. 74, 10 (2018).","journal-title":"The Journal of Supercomputing"},{"key":"e_1_3_2_2_87_1","volume-title":"Proceedings of the 2020 ACM SIGSAC CCS. 49--66","author":"Raman Ram Sundara","year":"2020","unstructured":"Ram Sundara Raman, Prerana Shenoy, Katharina Kohls, and Roya Ensafi. 2020. Censored Planet: An Internet-wide, Longitudinal Censorship Observatory. In Proceedings of the 2020 ACM SIGSAC CCS. 49--66."},{"key":"e_1_3_2_2_88_1","unstructured":"Tor. 2023. Pluggable Transports. https:\/\/gitlab.torproject.org\/tpo\/anti-censorship\/pluggable-transports. (2023)."},{"key":"e_1_3_2_2_89_1","unstructured":"Tor Blog. 2022. The ongoing DDoS attack on Tor. https:\/\/status.torproject.org\/issues\/2022-06-09-network-ddos\/. (2022)."},{"key":"e_1_3_2_2_90_1","unstructured":"Tor-metrics. 2022. Snowflake users in Iran. https:\/\/metrics.torproject.org\/userstats-bridge-transport.html'start=2022-08-01&end=2023-01-10&transport=snowflake. (2022)."},{"key":"e_1_3_2_2_91_1","unstructured":"Tor project. 2023. Tor is slow right now. Here is what is happening. https:\/\/blog.torproject.org\/tor-network-ddos-attack\/. (2023)."},{"key":"e_1_3_2_2_92_1","unstructured":"Tor Pluggable Transports. 2022a. Conjure. https:\/\/gitlab.torproject.org\/tpo\/anti-censorship\/pluggable-transports\/conjure. (2022)."},{"key":"e_1_3_2_2_93_1","unstructured":"Tor Pluggable Transports. 2022b. WebTunnel. https:\/\/gitlab.torproject.org\/tpo\/anti-censorship\/pluggable-transports\/webtunnel. (2022)."},{"key":"e_1_3_2_2_94_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0075"},{"key":"e_1_3_2_2_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808138.2808141"},{"key":"e_1_3_2_2_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131374"},{"key":"e_1_3_2_2_97_1","volume-title":"Domain Shadowing: Leveraging Content Delivery Networks for Robust Blocking-Resistant Communications. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Wei Mingkui","year":"2021","unstructured":"Mingkui Wei. 2021. Domain Shadowing: Leveraging Content Delivery Networks for Robust Blocking-Resistant Communications. In 30th USENIX Security Symposium (USENIX Security 21). 3327--3343."},{"key":"e_1_3_2_2_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382211"},{"key":"e_1_3_2_2_99_1","unstructured":"Philip Winter. 2016. ScrambleSuit A Polymorphic Network Protocol to Circumvent Censorship. https:\/\/www.cs.kau.se\/philwint\/scramblesuit\/. (2016)."},{"key":"e_1_3_2_2_100_1","volume-title":"How the great firewall of china is blocking tor","author":"Winter Philipp","unstructured":"Philipp Winter and Stefan Lindskog. 2012. How the great firewall of china is blocking tor. USENIX-The Advanced Computing Systems Association."},{"key":"e_1_3_2_2_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517856"},{"key":"e_1_3_2_2_102_1","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5587837"},{"key":"e_1_3_2_2_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278555"},{"key":"e_1_3_2_2_104_1","volume-title":"Sweet: Serving the web by exploiting email tunnels. arXiv preprint arXiv:1211.3191","author":"Zhou Wenxuan","year":"2012","unstructured":"Wenxuan Zhou, Amir Houmansadr, Matthew Caesar, and Nikita Borisov. 2012. Sweet: Serving the web by exploiting email tunnels. arXiv preprint arXiv:1211.3191, Vol. 13 (2012). io"}],"event":{"name":"IMC '23: ACM Internet Measurement Conference","location":"Montreal QC Canada","acronym":"IMC '23","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 2023 ACM on Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3618257.3624817","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3618257.3624817","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T13:17:01Z","timestamp":1755868621000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3618257.3624817"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,24]]},"references-count":104,"alternative-id":["10.1145\/3618257.3624817","10.1145\/3618257"],"URL":"https:\/\/doi.org\/10.1145\/3618257.3624817","relation":{},"subject":[],"published":{"date-parts":[[2023,10,24]]},"assertion":[{"value":"2023-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}