@@ -9,6 +9,58 @@ @article{Chen2019a
9
9
url = { https://pubs.aeaweb.org/doi/pdfplus/10.1257/aer.20171765} ,
10
10
}
11
11
12
+ @techreport {Ptacek1998a ,
13
+ author = { Thomas H. Ptacek and Timothy N. Newsham} ,
14
+ title = { Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection} ,
15
+ year = { 1998} ,
16
+ url = { https://www.icir.org/vern/Ptacek-Newsham-Evasion-98.pdf} ,
17
+ }
18
+
19
+ @inproceedings {Handley2001a ,
20
+ author = { Mark Handley and Vern Paxson and Christian Kreibich} ,
21
+ title = { Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics} ,
22
+ booktitle = { USENIX Security Symposium} ,
23
+ publisher = { USENIX} ,
24
+ year = { 2001} ,
25
+ url = { https://www.usenix.org/legacy/events/sec01/full_papers/handley/handley.pdf} ,
26
+ }
27
+
28
+ @inproceedings {Wu2025a ,
29
+ author = { Mingshi Wu and Ali Zohaib and Zakir Durumeric and Amir Houmansadr and Eric Wustrow} ,
30
+ title = { A Wall Behind A Wall: Emerging Regional Censorship in {China}} ,
31
+ booktitle = { Symposium on Security \& Privacy} ,
32
+ publisher = { IEEE} ,
33
+ year = { 2025} ,
34
+ url = { https://gfw.report/publications/sp25/data/paper/paper.pdf} ,
35
+ }
36
+
37
+ @inproceedings {Vafa2025a ,
38
+ author = { Elham Pourabbas Vafa and Mohit Singhal and Poojitha Thota and Sayak Saha Roy} ,
39
+ title = { Learning from Censored Experiences: Social Media Discussions around Censorship Circumvention Technologies} ,
40
+ booktitle = { Symposium on Security \& Privacy} ,
41
+ publisher = { IEEE} ,
42
+ year = { 2025} ,
43
+ url = { https://www.computer.org/csdl/pds/api/csdl/proceedings/download-article/21B7R7E8URG/pdf} ,
44
+ }
45
+
46
+ @inproceedings {Niere2025a ,
47
+ author = { Niklas Niere and Felix Lange and Robert Merget and Juraj Somorovsky} ,
48
+ title = { Transport Layer Obscurity: Circumventing {SNI} Censorship on the {TLS} Layer} ,
49
+ booktitle = { Symposium on Security \& Privacy} ,
50
+ publisher = { IEEE} ,
51
+ year = { 2025} ,
52
+ url = { https://www.computer.org/csdl/pds/api/csdl/proceedings/download-article/26hiUekZ19S/pdf} ,
53
+ }
54
+
55
+ @inproceedings {Nourin2025a ,
56
+ author = { Sadia Nourin and Erik Rye and Kevin Bock and Nguyen Phong Hoang and Dave Levin} ,
57
+ title = { Is Nobody There? Good! Globally Measuring Connection Tampering without Responsive Endhosts} ,
58
+ booktitle = { Symposium on Security \& Privacy} ,
59
+ publisher = { IEEE} ,
60
+ year = { 2025} ,
61
+ url = { https://www.computer.org/csdl/pds/api/csdl/proceedings/download-article/26hiUgw654A/pdf} ,
62
+ }
63
+
12
64
@inproceedings {Fan2025a ,
13
65
author = { Shencha Fan and Jackson Sippe and Sakamoto San and Jade Sheffey and David Fifield and Amir Houmansadr and Elson Wedwards and Eric Wustrow} ,
14
66
title = { {Wallbleed}: A Memory Disclosure Vulnerability in the {Great Firewall} of {China}} ,
0 commit comments