{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T15:55:22Z","timestamp":1763740522949,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,28]]},"DOI":"10.1145\/3730567.3768592","type":"proceedings-article","created":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T15:22:38Z","timestamp":1763738558000},"page":"1070-1071","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Poster: Unveiling the Nexus - Harnessing IoT Ecosystems for Internet Censorship Evasion"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-3784-6947","authenticated-orcid":false,"given":"Yining","family":"Shi","sequence":"first","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3651-5612","authenticated-orcid":false,"given":"Wyatt","family":"Ashley","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4944-8706","authenticated-orcid":false,"given":"Patrick Tser Jern","family":"Kon","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.14"},{"key":"e_1_3_2_1_2_1","first-page":"4","article-title":"Paxos Made Simple","volume":"32","author":"Lamport Leslie","year":"2001","unstructured":"Leslie Lamport. 2001. Paxos Made Simple. ACM SIGACT News (Distributed Computing Column) 32, 4 (Whole Number 121, December 2001) (December 2001), 51-58. https:\/\/www.microsoft.com\/en-us\/research\/publication\/paxos-made-simple\/","journal-title":"ACM SIGACT News (Distributed Computing Column)"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2024.3398778"},{"key":"e_1_3_2_1_4_1","volume-title":"2020 IEEE European Symposium on Security and Privacy (EuroS&P)","author":"Perdisci R.","unstructured":"R. Perdisci, T. Papastergiou, O. Alrawi, and M. Antonakakis. 2020. IoTFinder: Efficient Large-Scale Identification of IoT Devices via Passive DNS Traffic Analysis. In 2020 IEEE European Symposium on Security and Privacy (EuroS&P). Genoa, Italy."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.23394"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450076"},{"key":"e_1_3_2_1_7_1","first-page":"2653","volume-title":"How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic. In 32nd USENIX Security Symposium (USENIX Security 23)","author":"Wu Mingshi","year":"2023","unstructured":"Mingshi Wu, Jackson Sippe, Danesh Sivakumar, Jack Burg, Peter Anderson, Xiaokang Wang, Kevin Bock, Amir Houmansadr, Dave Levin, and Eric Wustrow. 2023. How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Anaheim, CA, 2653-2670. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/wu-mingshi"},{"key":"e_1_3_2_1_8_1","volume-title":"Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes. In 33st USENIX Security Symposium (USENIX Security 24)","author":"Xue Diwen","year":"2024","unstructured":"Diwen Xue, Michalis Kallitsis, Amir Houmansadr, and Roya Ensafi. 2024. Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes. In 33st USENIX Security Symposium (USENIX Security 24). USENIX Association, Philadelphia, PA."}],"event":{"name":"IMC '25:ACM Internet Measurement Conference","location":"Madison WI USA","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 2025 ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3730567.3768592","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T15:28:19Z","timestamp":1763738899000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3730567.3768592"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,28]]},"references-count":8,"alternative-id":["10.1145\/3730567.3768592","10.1145\/3730567"],"URL":"https:\/\/doi.org\/10.1145\/3730567.3768592","relation":{},"subject":[],"published":{"date-parts":[[2025,10,28]]},"assertion":[{"value":"2025-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}