Search results

    FOCI '20Identifying Disinformation Websites Using Infrastructure FeaturesAustin Hounsel, Jordan Holland, Ben Kaiser, Kevin Borgolte, Nick Feamster, Jonathan Mayer
    FOCI '20A Comprehensive Study of DNS-over-HTTPS Downgrade AttackQing Huang, Deliang Chang, Zhou Li
    FOCI '20Detecting and Evading Censorship-in-Depth: A Case Study of Iran’s Protocol WhitelisterKevin Bock, Yair Fax, Kyle Reese, Jasraj Singh, Dave Levin
    FOCI '20MIMIQ: Masking IPs with Migration in QUICYashodhar Govil, Liang Wang, Jennifer Rexford
    FOCI '20Slitheen++: Stealth TLS-based Decoy RoutingBenedikt Birtel, Christian Rossow
    FOCI '20Padding Ain't Enough: Assessing the Privacy Guarantees of Encrypted DNSJonas Bushart, Christian Rossow
    FOCI '20Turbo Tunnel, a good way to design censorship circumvention protocolsDavid Fifield
    FOCI '20HTTPT: A Probe-Resistant ProxySergey Frolov, Eric Wustrow
    FOCI '20Opening Digital Borders Cautiously yet Decisively: Digital Filtering in Saudi ArabiaFatemah Alharbi, Michalis Faloutsos, Nael Abu-Ghazaleh
    FOCI '20Bystanders’ Privacy: The Perspectives of Nannies on Smart Home SurveillanceJulia Bernd, Ruba Abu-Salma, Alisa Frik
    FOCI '20Triplet Censors: Demystifying Great Firewall’s DNS Censorship BehaviorArian Akhavan Niaki, Nguyen Phong Hoang, Phillipa Gill, Amir Houmansadr
    FOCI '19Artifice: A Deniable Steganographic File SystemAusten Barker, Staunton Sample, Yash Gupta, Anastasia McTaggart, Ethan L. Miller, Darrell D. E. Long
    FOCI '19SPINE: Surveillance Protection in the Network ElementsTrisha Datta, Nick Feamster, Jennifer Rexford, Liang Wang
    FOCI '19Improving Meek With Adversarial TechniquesSteven Sheffey, Ferrol Aderholdt
    FOCI '19Entanglements and Exploits: Sociotechnical Security as an Analytic FrameworkMatt Goerzen, ​Elizabeth Anne Watkins, Gabrielle Lim
    FOCI '19Measuring I2P Censorship at a Global ScaleNguyen Phong Hoang, Sadie Doreen, Michalis Polychronakis
    FOCI '19An Efficient Method to Determine which Combination of Keywords Triggered Automatic Filtering of a MessageRuohan Xiong, Jeffrey Knockel
    FOCI '19On the Importance of Encrypted-SNI (ESNI) to Censorship CircumventionZimo Chai, Amirhossein Ghafari, Amir Houmansadr
    FOCI '18MultiFlow: Cross-Connection Decoy Routing using TLS 1.3 Session ResumptionVictoria Manfredi, Pi Songkuntham
    FOCI '18Measuring the Political and Social Implications of Government-Initiated Cyber ShutdownsRyan Shandler
    FOCI '18Analyzing China's Blocking of Unpublished Tor BridgesArun Dunna, Ciarán O'Brien, Phillipa Gill
    FOCI '18From Russia With Crypto: A Political History of TelegramNathalie Marechal
    FOCI '18An analysis of automatic image filtering on WeChat MomentsJeffrey Knockel, Lotus Ruan, Masashi Crete-Nishihata
    FOCI '18Automatically Generating a Large, Culture-Specific Blocklist for ChinaAustin Hounsel, Prateek Mittal, Nick Feamster
    FOCI '18Exploring User Mental Models of End-to-End Encrypted Communication ToolsRuba Abu-Salma, Elissa M. Redmiles, Blase Ur, Miranda Wei