{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T05:21:07Z","timestamp":1775107267987,"version":"3.50.1"},"reference-count":0,"publisher":"Privacy Enhancing Technologies Symposium Advisory Board","issue":"4","license":[{"start":{"date-parts":[[2016,7,14]],"date-time":"2016-07-14T00:00:00Z","timestamp":1468454400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10,1]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p> An increasing number of countries implement Internet censorship at different scales and for a variety of reasons. Several censorship resistance systems (CRSs) have emerged to help bypass such blocks. The diversity of the censor\u2019s attack landscape has led to an arms race, leading to a dramatic speed of evolution of CRSs. The inherent complexity of CRSs and the breadth of work in this area makes it hard to contextualize the censor\u2019s capabilities and censorship resistance strategies. To address these challenges, we conducted a comprehensive survey of CRSs-deployed tools as well as those discussed in academic literature-to systematize censorship resistance systems by their threat model and corresponding defenses. To this end, we first sketch a comprehensive attack model to set out the censor\u2019s capabilities, coupled with discussion on the scope of censorship, and the dynamics that influence the censor\u2019s decision. Next, we present an evaluation framework to systematize censorship resistance systems by their security, privacy, performance and deployability properties, and show how these systems map to the attack model. We do this for each of the functional phases that we identify for censorship resistance systems: communication establishment, which involves distribution and retrieval of information necessary for a client to join the censorship resistance system; and conversation, where actual exchange of information takes place. Our evaluation leads us to identify gaps in the literature, question the assumptions at play, and explore possible mitigations.<\/jats:p>","DOI":"10.1515\/popets-2016-0028","type":"journal-article","created":{"date-parts":[[2016,7,18]],"date-time":"2016-07-18T08:14:59Z","timestamp":1468829699000},"page":"37-61","source":"Crossref","is-referenced-by-count":31,"title":["SoK: Making Sense of Censorship Resistance Systems"],"prefix":"10.56553","volume":"2016","author":[{"given":"Sheharbano","family":"Khattak","sequence":"first","affiliation":[{"name":"University of Cambridge"}]},{"given":"Tariq","family":"Elahi","sequence":"additional","affiliation":[{"name":"KU Leuven"}]},{"given":"Laurent","family":"Simon","sequence":"additional","affiliation":[{"name":"University of Cambridge"}]},{"given":"Colleen M.","family":"Swanson","sequence":"additional","affiliation":[{"name":"University of California, Davis"}]},{"given":"Steven J.","family":"Murdoch","sequence":"additional","affiliation":[{"name":"University College London"}]},{"given":"Ian","family":"Goldberg","sequence":"additional","affiliation":[{"name":"University of Waterloo"}]}],"member":"35752","published-online":{"date-parts":[[2016,7,14]]},"container-title":["Proceedings on Privacy Enhancing Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/content.sciendo.com\/view\/journals\/popets\/2016\/4\/article-p37.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.sciendo.com\/article\/10.1515\/popets-2016-0028","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T16:29:25Z","timestamp":1658334565000},"score":1,"resource":{"primary":{"URL":"https:\/\/petsymposium.org\/popets\/2016\/popets-2016-0028.php"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,14]]},"references-count":0,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2016,7,14]]},"published-print":{"date-parts":[[2016,10,1]]}},"alternative-id":["10.1515\/popets-2016-0028"],"URL":"https:\/\/doi.org\/10.1515\/popets-2016-0028","relation":{},"ISSN":["2299-0984"],"issn-type":[{"value":"2299-0984","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7,14]]}}}