Search results

    FOCI '19Artifice: A Deniable Steganographic File SystemAusten Barker, Staunton Sample, Yash Gupta, Anastasia McTaggart, Ethan L. Miller, Darrell D. E. Long
    FOCI '19SPINE: Surveillance Protection in the Network ElementsTrisha Datta, Nick Feamster, Jennifer Rexford, Liang Wang
    FOCI '19Entanglements and Exploits: Sociotechnical Security as an Analytic FrameworkMatt Goerzen, ​Elizabeth Anne Watkins, Gabrielle Lim
    FOCI '19An Efficient Method to Determine which Combination of Keywords Triggered Automatic Filtering of a MessageRuohan Xiong, Jeffrey Knockel
    FOCI '19Improving Meek With Adversarial TechniquesSteven Sheffey, Ferrol Aderholdt
    FOCI '19Measuring I2P Censorship at a Global ScaleNguyen Phong Hoang, Sadie Doreen, Michalis Polychronakis
    FOCI '19On the Importance of Encrypted-SNI (ESNI) to Censorship CircumventionZimo Chai, Amirhossein Ghafari, Amir Houmansadr
    FOCI '18Measuring the Political and Social Implications of Government-Initiated Cyber ShutdownsRyan Shandler
    FOCI '18A Cryptographic Airbag for Metadata: Protecting Business Records Against Unlimited Search and SeizureCharles V. Wright, Mayank Varia
    FOCI '18Measuring Privacy Threats in China-Wide Mobile NetworksMingming Zhang, Baojun Liu, Chaoyi Lu, Jia Zhang, Shuang Hao, Haixin Duan
    FOCI '18A Bestiary of Blocking: The Motivations and Modes behind Website UnavailabilityMichael Carl Tschantz, Sadia Afroz, Shaarif Sajid, Shoaib Asif Qazi, Mobin Javed, Vern Paxson
    FOCI '18MultiFlow: Cross-Connection Decoy Routing using TLS 1.3 Session ResumptionVictoria Manfredi, Pi Songkuntham
    FOCI '18An analysis of automatic image filtering on WeChat MomentsJeffrey Knockel, Lotus Ruan, Masashi Crete-Nishihata
    FOCI '18Automatically Generating a Large, Culture-Specific Blocklist for ChinaAustin Hounsel, Prateek Mittal, Nick Feamster
    FOCI '18From Russia With Crypto: A Political History of TelegramNathalie Marechal
    FOCI '18HSTS Supports Targeted SurveillancePaul Syverson, Matthew Traudt
    FOCI '18Exploring User Mental Models of End-to-End Encrypted Communication ToolsRuba Abu-Salma, Elissa M. Redmiles, Blase Ur, Miranda Wei
    FOCI '18Analyzing China's Blocking of Unpublished Tor BridgesArun Dunna, Ciarán O'Brien, Phillipa Gill
    FOCI '17Measuring Decentralization of Chinese Keyword Censorship via Mobile Games Jeffrey Knockel, Lotus Ruan, Masashi Crete-Nishihata
    FOCI '17The Decline of Social Media Censorship and the Rise of Self-Censorship after the 2016 Failed Turkish Coup Rima Tanash, Zhouhan Chen, Dan Wallach, Melissa Marschall
    FOCI '17Autosonda: Discovering Rules and Triggers of Censorship Devices Jill Jermyn, Nicholas Weaver
    FOCI '17Ambivalence in the (Private) Public Sphere: How Global Digital Activists Navigate Risk Sarah Myers West
    FOCI '17Creative and Set in Their Ways: Challenges of Security Sensemaking in Newsrooms Elizabeth Anne Watkins, Mahdi Nasrullah Al-Ameen, Franziska Roesner, Kelly Caine, Susan McGregor
    FOCI '17Measuring Offensive Speech in Online Political DiscourseRishab Nithyanand, Brian Schaffner, Phillipa Gill
    FOCI '17SecurePost: Verified Group-Anonymity on Social Media Michael Nekrasov, Daniel Iland, Miriam Metzger, Ben Zhao, Elizabeth Belding