메뉴 건너뛰기




Volumn , Issue , 2013, Pages 65-79

The parrot is dead: Observing unobservable network communications

Author keywords

Censorship circumvention; Tor pluggable transports; unobservable communications

Indexed keywords

CENSORSHIP CIRCUMVENTION; CENSORSHIP RESISTANTS; MULTIPLE NETWORKS; NETWORK COMMUNICATIONS; TECHNICAL CAPABILITIES; TOR PLUGGABLE TRANSPORTS; TRAFFIC ANALYSIS; UNOBSERVABLE;

EID: 84881249442     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2013.14     Document Type: Conference Paper
Times cited : (121)

References (64)
  • 1
    • 84857641749 scopus 로고    scopus 로고
    • Skype-Hunter: A Real-Time System for the Detection and Classification of Skype Traffic
    • D. Adami, C. Callegari, S. Giordano, M. Pagano, and T. Pepe. Skype-Hunter: A Real-Time System for the Detection and Classification of Skype Traffic. Int. J. Communication Systems, 25(3):386-403, 2012.
    • (2012) Int. J. Communication Systems , vol.25 , Issue.3 , pp. 386-403
    • Adami, D.1    Callegari, C.2    Giordano, S.3    Pagano, M.4    Pepe, T.5
  • 5
    • 33750309882 scopus 로고    scopus 로고
    • An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol
    • S. Baset and H. Schulzrinne. An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol. In INFOCOM, 2006.
    • (2006) INFOCOM
    • Baset, S.1    Schulzrinne, H.2
  • 6
    • 51049105312 scopus 로고    scopus 로고
    • Skype Relay Calls: Measurements and Experiments
    • S. Baset and H. Schulzrinne. Skype Relay Calls: Measurements and Experiments. In INFOCOM, 2008.
    • (2008) INFOCOM
    • Baset, S.1    Schulzrinne, H.2
  • 7
    • 77954612255 scopus 로고    scopus 로고
    • Regular Expressions Considered Harmful in Client-side XSS Filters
    • D. Bates, A. Barth, and C. Jackson. Regular Expressions Considered Harmful in Client-side XSS Filters. In WWW, 2010.
    • (2010) WWW
    • Bates, D.1    Barth, A.2    Jackson, C.3
  • 9
  • 10
    • 36949009834 scopus 로고    scopus 로고
    • Revealing Skype Traffic: When Randomness Plays With You
    • D. Bonfiglio, M. Mellia, and M. Meo. Revealing Skype Traffic: When Randomness Plays With You. In SIGCOMM, 2007.
    • (2007) SIGCOMM
    • Bonfiglio, D.1    Mellia, M.2    Meo, M.3
  • 13
    • 84881243940 scopus 로고    scopus 로고
    • Tor BridgeDB. https://gitweb.torproject.org/bridgedb.git/tree.
    • Tor BridgeDB
  • 14
    • 84893208617 scopus 로고    scopus 로고
    • Chipping Away at Censorship Firewalls with User-Generated Content
    • S. Burnett, N. Feamster, and S. Vempala. Chipping Away at Censorship Firewalls with User-Generated Content. In USENIX Security, 2010.
    • (2010) USENIX Security
    • Burnett, S.1    Feamster, N.2    Vempala, S.3
  • 18
    • 56449109261 scopus 로고    scopus 로고
    • Tunnel Hunter: Detecting Application-layer Tunnels with Statistical Fingerprinting
    • M. Dusi, M. Crotti, F. Gringoli, and L. Salgarelli. Tunnel Hunter: Detecting Application-layer Tunnels with Statistical Fingerprinting. Computer Networks, 53(1):81-97, 2009.
    • (2009) Computer Networks , vol.53 , Issue.1 , pp. 81-97
    • Dusi, M.1    Crotti, M.2    Gringoli, F.3    Salgarelli, L.4
  • 23
    • 67650488595 scopus 로고    scopus 로고
    • On Metrics to Distinguish Skype Flows from HTTP Traffic
    • E. Freire, A. Ziviani, and R. Salles. On Metrics to Distinguish Skype Flows from HTTP Traffic. J. Netw. Sys. Management, 17(1-2):53-72, 2009.
    • (2009) J. Netw. Sys. Management , vol.17 , Issue.1-2 , pp. 53-72
    • Freire, E.1    Ziviani, A.2    Salles, R.3
  • 24
    • 77952331178 scopus 로고    scopus 로고
    • Detecting Covert Timing Channels: An Entropy-based Approach
    • S. Gianvecchio and H. Wang. Detecting Covert Timing Channels: An Entropy-based Approach. In CCS, 2007.
    • (2007) CCS
    • Gianvecchio, S.1    Wang, H.2
  • 25
    • 34748819854 scopus 로고    scopus 로고
    • An Experimental Study of the Skype Peer-to-Peer VoIP System
    • S. Guha, N. Daswani, and R. Jain. An Experimental Study of the Skype Peer-to-Peer VoIP System. In IPTPS, 2006.
    • (2006) IPTPS
    • Guha, S.1    Daswani, N.2    Jain, R.3
  • 26
    • 74049135858 scopus 로고    scopus 로고
    • Nonesuch: A Mix Network with Sender Unobservability
    • T. Heydt-Benjamin, A. Serjantov, and B. Defend. Nonesuch: a Mix Network with Sender Unobservability. In WPES, 2006.
    • (2006) WPES
    • Heydt-Benjamin, T.1    Serjantov, A.2    Defend, B.3
  • 27
    • 80755169503 scopus 로고    scopus 로고
    • Cirripede: Circumvention Infrastructure Using Router Redirection with Plausible Deniability
    • A. Houmansadr, G. Nguyen, M. Caesar, and N. Borisov. Cirripede : Circumvention Infrastructure Using Router Redirection with Plausible Deniability. In CCS, 2011.
    • (2011) CCS
    • Houmansadr, A.1    Nguyen, G.2    Caesar, M.3    Borisov, N.4
  • 28
    • 84881222210 scopus 로고    scopus 로고
    • I Want My Voice to Be Heard: IP over Voice-over-IP for Unobservable Censorship Circumvention
    • A. Houmansadr, T. Riedl, N. Borisov, and A. Singer. I Want My Voice to Be Heard: IP over Voice-over-IP for Unobservable Censorship Circumvention. In NDSS, 2013.
    • (2013) NDSS
    • Houmansadr, A.1    Riedl, T.2    Borisov, N.3    Singer, A.4
  • 29
    • 84881225820 scopus 로고    scopus 로고
    • SWEET: Serving the Web by Exploiting Email Tunnels
    • abs/1211.3191
    • A. Houmansadr, W. Zhou, M. Caesar, and N. Borisov. SWEET: Serving the Web by Exploiting Email Tunnels. CoRR, abs/1211.3191, 2012.
    • (2012) CoRR
    • Houmansadr, A.1    Zhou, W.2    Caesar, M.3    Borisov, N.4
  • 30
    • 84881226071 scopus 로고    scopus 로고
    • The httprecon Project
    • The httprecon Project. http://www.computec.ch/projekte/httprecon/.
  • 34
    • 85084163803 scopus 로고    scopus 로고
    • Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance
    • J. Knockel, J. Crandall, and J. Saia. Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance. In FOCI, 2011.
    • (2011) FOCI
    • Knockel, J.1    Crandall, J.2    Saia, J.3
  • 36
    • 84876950829 scopus 로고    scopus 로고
    • Abusing File Processing in Malware Detectors for Fun and Profit
    • S. Jana and V. Shmatikov. Abusing File Processing in Malware Detectors for Fun and Profit. In S&P, 2012.
    • (2012) S&P
    • Jana, S.1    Shmatikov, V.2
  • 37
    • 84881233771 scopus 로고    scopus 로고
    • Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an Alternative to the MIX based Approach?
    • D. Kesdogan, M. Borning, and M. Schmeink. Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an Alternative to the MIX based Approach? In PET, 2002.
    • (2002) PET
    • Kesdogan, D.1    Borning, M.2    Schmeink, M.3
  • 39
    • 80755188465 scopus 로고    scopus 로고
    • Proximax: A Measurement Based System for Proxies Dissemination
    • D. McCoy, J. Morales, and K. Levchenko. Proximax: A Measurement Based System for Proxies Dissemination. In FC, 2011.
    • (2011) FC
    • McCoy, D.1    Morales, J.2    Levchenko, K.3
  • 40
    • 84881230620 scopus 로고    scopus 로고
    • On the Risks of Serving Whenever You Surf: Vulnerabilities in Tor's Blocking Resistance Design
    • J. McLachlan and N. Hopper. On the Risks of Serving Whenever You Surf: Vulnerabilities in Tor's Blocking Resistance Design. In WPES, 2009.
    • (2009) WPES
    • McLachlan, J.1    Hopper, N.2
  • 42
    • 27544454707 scopus 로고    scopus 로고
    • Low-Cost Traffic Analysis of Tor
    • S. Murdoch and G. Danezis. Low-Cost Traffic Analysis of Tor. In S&P, 2005.
    • (2005) S&P
    • Murdoch, S.1    Danezis, G.2
  • 45
  • 46
    • 84881245962 scopus 로고    scopus 로고
    • Tor: Pluggable transports. https://www.torproject.org/docs/pluggable- transports.html.en.
    • Tor: Pluggable Transports
  • 54
    • 84881242615 scopus 로고    scopus 로고
    • Method and Apparatus for Server-side NAT Detection
    • US Patent US 2006/0187912 A1
    • D. Schwartz and B. Sterman. Method and Apparatus for Server-side NAT Detection. US Patent US 2006/0187912 A1.
    • Schwartz, D.1    Sterman, B.2
  • 55
  • 57
    • 84881236874 scopus 로고    scopus 로고
    • Ultrasurf. http://www.ultrareach.com.
  • 59
    • 84869448200 scopus 로고    scopus 로고
    • CensorSpoofer: Asymmetric Communication Using IP Spoofing for Censorship-Resistant Web Browsing
    • Q. Wang, X. Gong, G. Nguyen, A. Houmansadr, and N. Borisov. CensorSpoofer: Asymmetric Communication Using IP Spoofing for Censorship-Resistant Web Browsing. In CCS, 2012.
    • (2012) CCS
    • Wang, Q.1    Gong, X.2    Nguyen, G.3    Houmansadr, A.4    Borisov, N.5
  • 63
    • 85084161332 scopus 로고    scopus 로고
    • How the Great Firewall of China Is Blocking Tor
    • P. Winter and S. Lindskog. How the Great Firewall of China Is Blocking Tor. In FOCI, 2012.
    • (2012) FOCI
    • Winter, P.1    Lindskog, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.