FOCI '20 | Identifying Disinformation Websites Using Infrastructure Features | Austin Hounsel, Jordan Holland, Ben Kaiser, Kevin Borgolte, Nick Feamster, Jonathan Mayer |
FOCI '20 | A Comprehensive Study of DNS-over-HTTPS Downgrade Attack | Qing Huang, Deliang Chang, Zhou Li |
FOCI '20 | Detecting and Evading Censorship-in-Depth: A Case Study of Iran’s Protocol Whitelister | Kevin Bock, Yair Fax, Kyle Reese, Jasraj Singh, Dave Levin |
FOCI '20 | MIMIQ: Masking IPs with Migration in QUIC | Yashodhar Govil, Liang Wang, Jennifer Rexford |
FOCI '20 | Slitheen++: Stealth TLS-based Decoy Routing | Benedikt Birtel, Christian Rossow |
FOCI '20 | Padding Ain't Enough: Assessing the Privacy Guarantees of Encrypted DNS | Jonas Bushart, Christian Rossow |
FOCI '20 | Turbo Tunnel, a good way to design censorship circumvention protocols | David Fifield |
FOCI '20 | HTTPT: A Probe-Resistant Proxy | Sergey Frolov, Eric Wustrow |
FOCI '20 | Opening Digital Borders Cautiously yet Decisively: Digital Filtering in Saudi Arabia | Fatemah Alharbi, Michalis Faloutsos, Nael Abu-Ghazaleh |
FOCI '20 | Bystanders’ Privacy: The Perspectives of Nannies on Smart Home Surveillance | Julia Bernd, Ruba Abu-Salma, Alisa Frik |
FOCI '20 | Triplet Censors: Demystifying Great Firewall’s DNS Censorship Behavior | Arian Akhavan Niaki, Nguyen Phong Hoang, Phillipa Gill, Amir Houmansadr |
FOCI '19 | Artifice: A Deniable Steganographic File System | Austen Barker, Staunton Sample, Yash Gupta, Anastasia McTaggart, Ethan L. Miller, Darrell D. E. Long |
FOCI '19 | SPINE: Surveillance Protection in the Network Elements | Trisha Datta, Nick Feamster, Jennifer Rexford, Liang Wang |
FOCI '19 | Improving Meek With Adversarial Techniques | Steven Sheffey, Ferrol Aderholdt |
FOCI '19 | Entanglements and Exploits: Sociotechnical Security as an Analytic Framework | Matt Goerzen, Elizabeth Anne Watkins, Gabrielle Lim |
FOCI '19 | Measuring I2P Censorship at a Global Scale | Nguyen Phong Hoang, Sadie Doreen, Michalis Polychronakis |
FOCI '19 | An Efficient Method to Determine which Combination of Keywords Triggered Automatic Filtering of a Message | Ruohan Xiong, Jeffrey Knockel |
FOCI '19 | On the Importance of Encrypted-SNI (ESNI) to Censorship Circumvention | Zimo Chai, Amirhossein Ghafari, Amir Houmansadr |
FOCI '18 | Measuring Privacy Threats in China-Wide Mobile Networks | Mingming Zhang, Baojun Liu, Chaoyi Lu, Jia Zhang, Shuang Hao, Haixin Duan |
FOCI '18 | MultiFlow: Cross-Connection Decoy Routing using TLS 1.3 Session Resumption | Victoria Manfredi, Pi Songkuntham |
FOCI '18 | Measuring the Political and Social Implications of Government-Initiated Cyber Shutdowns | Ryan Shandler |
FOCI '18 | Analyzing China's Blocking of Unpublished Tor Bridges | Arun Dunna, Ciarán O'Brien, Phillipa Gill |
FOCI '18 | From Russia With Crypto: A Political History of Telegram | Nathalie Marechal |
FOCI '18 | An analysis of automatic image filtering on WeChat Moments | Jeffrey Knockel, Lotus Ruan, Masashi Crete-Nishihata |
FOCI '18 | Automatically Generating a Large, Culture-Specific Blocklist for China | Austin Hounsel, Prateek Mittal, Nick Feamster |