|
| 1 | +@techreport{Ptacek1998a, |
| 2 | + author={Thomas H. Ptacek and Timothy N. Newsham}, |
| 3 | + title={Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection}, |
| 4 | + year={1998}, |
| 5 | + url={https://www.icir.org/vern/Ptacek-Newsham-Evasion-98.pdf}, |
| 6 | +} |
| 7 | + |
| 8 | +@inproceedings{Handley2001a, |
| 9 | + author={Mark Handley and Vern Paxson and Christian Kreibich}, |
| 10 | + title={Network Intrusion Detection: Evasion, Traffic Normalization, and {End-to-End} Protocol Semantics}, |
| 11 | + booktitle = {USENIX Security Symposium}, |
| 12 | + publisher = {USENIX}, |
| 13 | + year = {2001}, |
| 14 | + url = {https://www.usenix.org/legacy/events/sec01/full_papers/handley/handley.pdf}, |
| 15 | +} |
| 16 | + |
| 17 | +@inproceedings{Wu2025a, |
| 18 | + author = {Mingshi Wu and Ali Zohaib and Zakir Durumeric and Amir Houmansadr and Eric Wustrow}, |
| 19 | + title = {A Wall Behind A Wall: Emerging Regional Censorship in {China}}, |
| 20 | + booktitle = {Symposium on Security \& Privacy}, |
| 21 | + publisher = {IEEE}, |
| 22 | + year = {2025}, |
| 23 | + url = {https://gfw.report/publications/sp25/data/paper/paper.pdf}, |
| 24 | +} |
| 25 | + |
| 26 | +@inproceedings{Vafa2025a, |
| 27 | + author = {Elham Pourabbas Vafa and Mohit Singhal and Poojitha Thota and Sayak Saha Roy}, |
| 28 | + title = {Learning from Censored Experiences: Social Media Discussions around Censorship Circumvention Technologies}, |
| 29 | + booktitle = {Symposium on Security \& Privacy}, |
| 30 | + publisher = {IEEE}, |
| 31 | + year = {2025}, |
| 32 | + url = {https://www.computer.org/csdl/pds/api/csdl/proceedings/download-article/21B7R7E8URG/pdf}, |
| 33 | +} |
| 34 | + |
| 35 | +@inproceedings{Niere2025a, |
| 36 | + author = {Niklas Niere and Felix Lange and Robert Merget and Juraj Somorovsky}, |
| 37 | + title = {Transport Layer Obscurity: Circumventing {SNI} Censorship on the {TLS} Layer}, |
| 38 | + booktitle = {Symposium on Security \& Privacy}, |
| 39 | + publisher = {IEEE}, |
| 40 | + year = {2025}, |
| 41 | + url = {https://www.computer.org/csdl/pds/api/csdl/proceedings/download-article/26hiUekZ19S/pdf}, |
| 42 | +} |
| 43 | + |
| 44 | +@inproceedings{Nourin2025a, |
| 45 | + author = {Sadia Nourin and Erik Rye and Kevin Bock and Nguyen Phong Hoang and Dave Levin}, |
| 46 | + title = {Is Nobody There? Good! Globally Measuring Connection Tampering without Responsive Endhosts}, |
| 47 | + booktitle = {Symposium on Security \& Privacy}, |
| 48 | + publisher = {IEEE}, |
| 49 | + year = {2025}, |
| 50 | + url = {https://www.computer.org/csdl/pds/api/csdl/proceedings/download-article/26hiUgw654A/pdf}, |
| 51 | +} |
| 52 | + |
1 | 53 | @inproceedings{Fan2025a,
|
2 | 54 | author = {Shencha Fan and Jackson Sippe and Sakamoto San and Jade Sheffey and David Fifield and Amir Houmansadr and Elson Wedwards and Eric Wustrow},
|
3 | 55 | title = {{Wallbleed}: A Memory Disclosure Vulnerability in the {Great Firewall} of {China}},
|
|
0 commit comments