FOCI '18 | A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability | Michael Carl Tschantz, Sadia Afroz, Shaarif Sajid, Shoaib Asif Qazi, Mobin Javed, Vern Paxson |
FOCI '18 | HSTS Supports Targeted Surveillance | Paul Syverson, Matthew Traudt |
FOCI '18 | A Cryptographic Airbag for Metadata: Protecting Business Records Against Unlimited Search and Seizure | Charles V. Wright, Mayank Varia |
FOCI '18 | Measuring Privacy Threats in China-Wide Mobile Networks | Mingming Zhang, Baojun Liu, Chaoyi Lu, Jia Zhang, Shuang Hao, Haixin Duan |
FOCI '17 | Measuring Decentralization of Chinese Keyword Censorship via Mobile Games | Jeffrey Knockel, Lotus Ruan, Masashi Crete-Nishihata |
FOCI '17 | The Decline of Social Media Censorship and the Rise of Self-Censorship after the 2016 Failed Turkish Coup | Rima Tanash, Zhouhan Chen, Dan Wallach, Melissa Marschall |
FOCI '17 | Autosonda: Discovering Rules and Triggers of Censorship Devices | Jill Jermyn, Nicholas Weaver |
FOCI '17 | Ambivalence in the (Private) Public Sphere: How Global Digital Activists Navigate Risk | Sarah Myers West |
FOCI '17 | Creative and Set in Their Ways: Challenges of Security Sensemaking in Newsrooms | Elizabeth Anne Watkins, Mahdi Nasrullah Al-Ameen, Franziska Roesner, Kelly Caine, Susan McGregor |
FOCI '17 | Measuring Offensive Speech in Online Political Discourse | Rishab Nithyanand, Brian Schaffner, Phillipa Gill |
FOCI '17 | SecurePost: Verified Group-Anonymity on Social Media | Michael Nekrasov, Daniel Iland, Miriam Metzger, Ben Zhao, Elizabeth Belding |
FOCI '17 | An ISP-Scale Deployment of TapDance | Sergey Frolov, Fred Douglas, Will Scott, Allison McDonald, Benjamin VanderSloot, Rod Hynes, Adam Kruger, Michalis Kallitsis, David G. Robinson, Steve Schultze, Nikita Borisov, Alex Halderman, Eric Wustrow |
FOCI '17 | Alice and Bob, who the FOCI are they?: Analysis of end-to-end encryption in the LINE messaging application | Antonio M. Espinoza, William J. Tolley, Jedidiah R. Crandall, Masashi Crete-Nishihata, Andrew Hilts |
FOCI '17 | Best We Forget: Expressive Freedom and the Right to be Forgotten | Maryna Polataiko |
FOCI '16 | DNS-sly: Avoiding Censorship through Network Complexity | Qurat-Ul-Ann Danyal Akbar, Marcel Flores, Aleksandar Kuzmanovic |
FOCI '16 | Censors’ Delay in Blocking Circumvention Proxies | David Fifield, Lynn Tsai |
FOCI '16 | GhostPost: Seamless Restoration of Censored Social Media Posts | Frederick Douglas, Matthew Caesar |
FOCI '16 | Adblocking and Counter Blocking: A Slice of the Arms Race | Rishab Nithyanand, Sheharbano Khattak, Mobin Javed, Narseo Vallina-Rodriguez, Marjan Falahrastegar, Julia E. Powles, Emiliano De Cristofaro, Hamed Haddadi, Steven J. Murdoch |
FOCI '16 | Privacy and Security Issues in BAT Web Browsers | Jeffrey Knockel, Adam Senft, Ronald Deibert |
FOCI '16 | Matryoshka: Hiding Secret Communication in Plain Sight | Iris Safaka, Christina Fragouli, Katerina Argyraki |
FOCI '16 | The Politics of Routing: Investigating the Relationship between AS Connectivity and Internet Freedom | Rachee Singh, Hyungjoon Koo, Najmehalsadat Miramirkhani, Fahimeh Mirhaj, Phillipa Gill, Leman Akoglu |
FOCI '15 | An Analysis of China’s “Great Cannon” | Bill Marczak, Nicholas Weaver, Jakub Dalek, Roya Ensafi, David Fifield, Sarah McKune, Arn Rey, John Scott-Railton, Ron Deibert, Vern Paxson |
FOCI '15 | Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in China | Jeffrey Knockel, Masashi Crete-Nishihata, Jason Q. Ng, Adam Senft, Jedidiah R. Crandall |
FOCI '15 | Understanding Internet Censorship Policy: The Case of Greece | Vasilis Ververis, George Kargiotakis, Arturo Filastò, Benjamin Fabian, Afentoulis Alexandros |
FOCI '15 | Half Baked: The Opportunity to Secure Cookie-based Identifiers from Passive Surveillance | Andrew Hilts, Christopher Parsons |