A key challenge in censorship circumvention is being able to direct legitimate users to redirection proxies while preventing censors, posing as insiders, from discovering their addresses and blocking them. In this thesis, we study how to protect and/or design censorship circumvention systems to resist the insider attacks. Tor is one of the most popular censorship circumvention systems; it uses {\it bridges} run by volunteers as proxies to evade censorship. We propose {\it rBridge}--a user reputation system for bridge distribution; it assigns bridges according to the past history of users to limit corrupt users from repeatedly blocking bridges, and employs an introduction-based mechanism to invite new users while resisting Sybil attacks....
Anonymity networks like Tor greatly improve online privacy but are susceptible to correlation attack...
xiii, 139 pages : illustrations ; 30 cmPolyU Library Call No.: [THS] LG51 .H577P COMP 2014 ZhouIn to...
As the Internet has exploded over the past fifteen years, recently reaching over a billion users, do...
A key challenge in censorship circumvention is being able to direct legitimate users to redirection ...
Censoring nation-states deploy complex network infrastructure to regulate what content citizens can ...
Internet censorship of one form or another affects on the order of half of all internet users. Previ...
The increasing centralization of Internet infrastructure and web services, along with advancements i...
The Internet plays a crucial role in today\u27s social and political movements by facilitating the f...
Internet censorship resistance systems (CRSs) have so far been designed in an ad-hoc manner. The fun...
Repository for scripts for the WOOT 2021 paper: "Your Censor is My Censor: Weaponizing Censorship In...
The Internet has become an integral part of modern life. At the same time, as we spend increasingly ...
Baksidestext The Tor network was originally designed as low-latency anonymity network.However, as th...
Free and uncensored access to the Internet is an important right nowadays. Repressive regimes, howev...
Access to the open Internet, free from surveillance and censorship, is an important part of fulfilli...
Abstract. In countries such as China or Iran where Internet censorship is prevalent, users usually r...
Anonymity networks like Tor greatly improve online privacy but are susceptible to correlation attack...
xiii, 139 pages : illustrations ; 30 cmPolyU Library Call No.: [THS] LG51 .H577P COMP 2014 ZhouIn to...
As the Internet has exploded over the past fifteen years, recently reaching over a billion users, do...
A key challenge in censorship circumvention is being able to direct legitimate users to redirection ...
Censoring nation-states deploy complex network infrastructure to regulate what content citizens can ...
Internet censorship of one form or another affects on the order of half of all internet users. Previ...
The increasing centralization of Internet infrastructure and web services, along with advancements i...
The Internet plays a crucial role in today\u27s social and political movements by facilitating the f...
Internet censorship resistance systems (CRSs) have so far been designed in an ad-hoc manner. The fun...
Repository for scripts for the WOOT 2021 paper: "Your Censor is My Censor: Weaponizing Censorship In...
The Internet has become an integral part of modern life. At the same time, as we spend increasingly ...
Baksidestext The Tor network was originally designed as low-latency anonymity network.However, as th...
Free and uncensored access to the Internet is an important right nowadays. Repressive regimes, howev...
Access to the open Internet, free from surveillance and censorship, is an important part of fulfilli...
Abstract. In countries such as China or Iran where Internet censorship is prevalent, users usually r...
Anonymity networks like Tor greatly improve online privacy but are susceptible to correlation attack...
xiii, 139 pages : illustrations ; 30 cmPolyU Library Call No.: [THS] LG51 .H577P COMP 2014 ZhouIn to...
As the Internet has exploded over the past fifteen years, recently reaching over a billion users, do...