-
1
-
-
84857641749
-
Skype-Hunter: A Real-Time System for the Detection and Classification of Skype Traffic
-
D. Adami, C. Callegari, S. Giordano, M. Pagano, and T. Pepe. Skype-Hunter: A Real-Time System for the Detection and Classification of Skype Traffic. Int. J. Communication Systems, 25(3):386-403, 2012.
-
(2012)
Int. J. Communication Systems
, vol.25
, Issue.3
, pp. 386-403
-
-
Adami, D.1
Callegari, C.2
Giordano, S.3
Pagano, M.4
Pepe, T.5
-
5
-
-
33750309882
-
An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol
-
S. Baset and H. Schulzrinne. An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol. In INFOCOM, 2006.
-
(2006)
INFOCOM
-
-
Baset, S.1
Schulzrinne, H.2
-
6
-
-
51049105312
-
Skype Relay Calls: Measurements and Experiments
-
S. Baset and H. Schulzrinne. Skype Relay Calls: Measurements and Experiments. In INFOCOM, 2008.
-
(2008)
INFOCOM
-
-
Baset, S.1
Schulzrinne, H.2
-
7
-
-
77954612255
-
Regular Expressions Considered Harmful in Client-side XSS Filters
-
D. Bates, A. Barth, and C. Jackson. Regular Expressions Considered Harmful in Client-side XSS Filters. In WWW, 2010.
-
(2010)
WWW
-
-
Bates, D.1
Barth, A.2
Jackson, C.3
-
10
-
-
36949009834
-
Revealing Skype Traffic: When Randomness Plays With You
-
D. Bonfiglio, M. Mellia, and M. Meo. Revealing Skype Traffic: When Randomness Plays With You. In SIGCOMM, 2007.
-
(2007)
SIGCOMM
-
-
Bonfiglio, D.1
Mellia, M.2
Meo, M.3
-
13
-
-
84881243940
-
-
Tor BridgeDB. https://gitweb.torproject.org/bridgedb.git/tree.
-
Tor BridgeDB
-
-
-
14
-
-
84893208617
-
Chipping Away at Censorship Firewalls with User-Generated Content
-
S. Burnett, N. Feamster, and S. Vempala. Chipping Away at Censorship Firewalls with User-Generated Content. In USENIX Security, 2010.
-
(2010)
USENIX Security
-
-
Burnett, S.1
Feamster, N.2
Vempala, S.3
-
15
-
-
0031362116
-
Secure Spread Spectrum Watermarking for Multimedia
-
I. Cox, J. Kilian, F. T. Leighton, and T. Shamoon. Secure Spread Spectrum Watermarking for Multimedia. IEEE Transactions on Image Processing, 6(12), 1997.
-
(1997)
IEEE Transactions on Image Processing
, vol.6
, Issue.12
-
-
Cox, I.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
18
-
-
56449109261
-
Tunnel Hunter: Detecting Application-layer Tunnels with Statistical Fingerprinting
-
M. Dusi, M. Crotti, F. Gringoli, and L. Salgarelli. Tunnel Hunter: Detecting Application-layer Tunnels with Statistical Fingerprinting. Computer Networks, 53(1):81-97, 2009.
-
(2009)
Computer Networks
, vol.53
, Issue.1
, pp. 81-97
-
-
Dusi, M.1
Crotti, M.2
Gringoli, F.3
Salgarelli, L.4
-
20
-
-
85084161295
-
Infranet: Circumventing Web Censorship and Surveillance
-
N. Feamster, M. Balazinska, G. Harfst, H. Balakrishnan, and D. Karger. Infranet: Circumventing Web Censorship and Surveillance. In USENIX Security, 2002.
-
(2002)
USENIX Security
-
-
Feamster, N.1
Balazinska, M.2
Harfst, G.3
Balakrishnan, H.4
Karger, D.5
-
21
-
-
0003415244
-
-
RFC 2616
-
R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, and T. Berners-Lee. Hypertext Transfer Protocol - HTTP/1.1. RFC 2616.
-
Hypertext Transfer Protocol - HTTP/1.1
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Masinter, L.5
Leach, P.6
Berners-Lee, T.7
-
22
-
-
84881247396
-
Evading Censorship with Browser-Based Proxies
-
D. Fifield, N. Hardison, J. Ellithrope, E. Stark, R. Dingledine, D. Boneh, and P. Porras. Evading Censorship with Browser-Based Proxies. In PETS, 2012.
-
(2012)
PETS
-
-
Fifield, D.1
Hardison, N.2
Ellithrope, J.3
Stark, E.4
Dingledine, R.5
Boneh, D.6
Porras, P.7
-
23
-
-
67650488595
-
On Metrics to Distinguish Skype Flows from HTTP Traffic
-
E. Freire, A. Ziviani, and R. Salles. On Metrics to Distinguish Skype Flows from HTTP Traffic. J. Netw. Sys. Management, 17(1-2):53-72, 2009.
-
(2009)
J. Netw. Sys. Management
, vol.17
, Issue.1-2
, pp. 53-72
-
-
Freire, E.1
Ziviani, A.2
Salles, R.3
-
24
-
-
77952331178
-
Detecting Covert Timing Channels: An Entropy-based Approach
-
S. Gianvecchio and H. Wang. Detecting Covert Timing Channels: An Entropy-based Approach. In CCS, 2007.
-
(2007)
CCS
-
-
Gianvecchio, S.1
Wang, H.2
-
25
-
-
34748819854
-
An Experimental Study of the Skype Peer-to-Peer VoIP System
-
S. Guha, N. Daswani, and R. Jain. An Experimental Study of the Skype Peer-to-Peer VoIP System. In IPTPS, 2006.
-
(2006)
IPTPS
-
-
Guha, S.1
Daswani, N.2
Jain, R.3
-
27
-
-
80755169503
-
Cirripede: Circumvention Infrastructure Using Router Redirection with Plausible Deniability
-
A. Houmansadr, G. Nguyen, M. Caesar, and N. Borisov. Cirripede : Circumvention Infrastructure Using Router Redirection with Plausible Deniability. In CCS, 2011.
-
(2011)
CCS
-
-
Houmansadr, A.1
Nguyen, G.2
Caesar, M.3
Borisov, N.4
-
28
-
-
84881222210
-
I Want My Voice to Be Heard: IP over Voice-over-IP for Unobservable Censorship Circumvention
-
A. Houmansadr, T. Riedl, N. Borisov, and A. Singer. I Want My Voice to Be Heard: IP over Voice-over-IP for Unobservable Censorship Circumvention. In NDSS, 2013.
-
(2013)
NDSS
-
-
Houmansadr, A.1
Riedl, T.2
Borisov, N.3
Singer, A.4
-
29
-
-
84881225820
-
SWEET: Serving the Web by Exploiting Email Tunnels
-
abs/1211.3191
-
A. Houmansadr, W. Zhou, M. Caesar, and N. Borisov. SWEET: Serving the Web by Exploiting Email Tunnels. CoRR, abs/1211.3191, 2012.
-
(2012)
CoRR
-
-
Houmansadr, A.1
Zhou, W.2
Caesar, M.3
Borisov, N.4
-
30
-
-
84881226071
-
-
The httprecon Project
-
The httprecon Project. http://www.computec.ch/projekte/httprecon/.
-
-
-
-
34
-
-
85084163803
-
Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance
-
J. Knockel, J. Crandall, and J. Saia. Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance. In FOCI, 2011.
-
(2011)
FOCI
-
-
Knockel, J.1
Crandall, J.2
Saia, J.3
-
36
-
-
84876950829
-
Abusing File Processing in Malware Detectors for Fun and Profit
-
S. Jana and V. Shmatikov. Abusing File Processing in Malware Detectors for Fun and Profit. In S&P, 2012.
-
(2012)
S&P
-
-
Jana, S.1
Shmatikov, V.2
-
37
-
-
84881233771
-
Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an Alternative to the MIX based Approach?
-
D. Kesdogan, M. Borning, and M. Schmeink. Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an Alternative to the MIX based Approach? In PET, 2002.
-
(2002)
PET
-
-
Kesdogan, D.1
Borning, M.2
Schmeink, M.3
-
39
-
-
80755188465
-
Proximax: A Measurement Based System for Proxies Dissemination
-
D. McCoy, J. Morales, and K. Levchenko. Proximax: A Measurement Based System for Proxies Dissemination. In FC, 2011.
-
(2011)
FC
-
-
McCoy, D.1
Morales, J.2
Levchenko, K.3
-
40
-
-
84881230620
-
On the Risks of Serving Whenever You Surf: Vulnerabilities in Tor's Blocking Resistance Design
-
J. McLachlan and N. Hopper. On the Risks of Serving Whenever You Surf: Vulnerabilities in Tor's Blocking Resistance Design. In WPES, 2009.
-
(2009)
WPES
-
-
McLachlan, J.1
Hopper, N.2
-
42
-
-
27544454707
-
Low-Cost Traffic Analysis of Tor
-
S. Murdoch and G. Danezis. Low-Cost Traffic Analysis of Tor. In S&P, 2005.
-
(2005)
S&P
-
-
Murdoch, S.1
Danezis, G.2
-
46
-
-
84881245962
-
-
Tor: Pluggable transports. https://www.torproject.org/docs/pluggable- transports.html.en.
-
Tor: Pluggable Transports
-
-
-
51
-
-
0037984544
-
-
RFC 3261
-
J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, and E. Schooler. SIP: Session Initiation Protocol. RFC 3261.
-
SIP: Session Initiation Protocol
-
-
Rosenberg, J.1
Schulzrinne, H.2
Camarillo, G.3
Johnston, A.4
Peterson, J.5
Sparks, R.6
Handley, M.7
Schooler, E.8
-
54
-
-
84881242615
-
Method and Apparatus for Server-side NAT Detection
-
US Patent US 2006/0187912 A1
-
D. Schwartz and B. Sterman. Method and Apparatus for Server-side NAT Detection. US Patent US 2006/0187912 A1.
-
-
-
Schwartz, D.1
Sterman, B.2
-
55
-
-
84870628783
-
-
Ten ways to discover tor bridges. https://blog.torproject.org/blog/ research-problems-ten-ways-discover-tor-bridges.
-
Ten Ways to Discover Tor Bridges
-
-
-
57
-
-
84881236874
-
-
Ultrasurf. http://www.ultrareach.com.
-
-
-
-
59
-
-
84869448200
-
CensorSpoofer: Asymmetric Communication Using IP Spoofing for Censorship-Resistant Web Browsing
-
Q. Wang, X. Gong, G. Nguyen, A. Houmansadr, and N. Borisov. CensorSpoofer: Asymmetric Communication Using IP Spoofing for Censorship-Resistant Web Browsing. In CCS, 2012.
-
(2012)
CCS
-
-
Wang, Q.1
Gong, X.2
Nguyen, G.3
Houmansadr, A.4
Borisov, N.5
-
60
-
-
84869462325
-
StegoTorus: A Camouflage Proxy for the Tor Anonymity System
-
Z. Weinberg, J. Wang, V. Yegneswaran, L. Briesemeister, S. Cheung, F. Wang, and D. Boneh. StegoTorus : A Camouflage Proxy for the Tor Anonymity System. In CCS, 2012.
-
(2012)
CCS
-
-
Weinberg, Z.1
Wang, J.2
Yegneswaran, V.3
Briesemeister, L.4
Cheung, S.5
Wang, F.6
Boneh, D.7
-
63
-
-
85084161332
-
How the Great Firewall of China Is Blocking Tor
-
P. Winter and S. Lindskog. How the Great Firewall of China Is Blocking Tor. In FOCI, 2012.
-
(2012)
FOCI
-
-
Winter, P.1
Lindskog, S.2
|