CS858 - Internet Censorship and Surveillance - Winter 2023
Schedule & Reading List
Introduction | ||
---|---|---|
Week 1 Introduction to the course |
Jan 10 | Jan 12 |
No class | Introduction to the course | |
Week 2 No classes |
Jan 17 | Jan 19 |
Select papers to present in class and a project team. | No class | No class |
Censorship and Surveillance | ||
Week 3 Overview |
Jan 24 | Jan 26 |
The Dangers of Surveillance N. M. Richards [Harvard Law Review'13] |
Tor: The second-generation onion router R. Dingledine, N. Mathewson, P. Syverson [Sec'04] |
|
Inferring Mechanics of Web Censorship Around the World J. Verkamp, M. Gupta [FOCI'12] |
Dissecting Tor Bridges: a Security Evaluation of Their Private and Public Infrastructures S. Matic, C. Troncoso, J. Caballero [NDSS'17] |
|
Censorship Circumvention | ||
Week 4 Obfuscation |
Jan 31 | Feb 2 |
StegoTorus: a camouflage proxy for the Tor anonymity system Z. Weinberg, J. Wang, V. Yegneswaran, L. Briesemeister, S. Cheung, F. Wang, D. Boneh [CCS'12] |
Games Without Frontiers: Investigating Video Games as a Covert Channel B. Hahn, R. Nithyanand, P. Gill, R. Johnson [EuroS&P'16] |
|
ScrambleSuit: A Polymorph Network Protocol to Circumvent Censorship P. Winter, T. Pulls, J. Fuss [WPES'13] |
Matryoshka: Hiding Secret Communication in Plain Sight I. Safaka, C. Fragouli, K. Argyraki [FOCI'16] |
|
Week 5 Obfuscation (multimedia) |
Feb 7 | Feb 9 |
Project proposal due Feb 10. | SkypeMorph: Protocol Obfuscation for Tor Bridges H. Mohajeri Moghaddam, B. Li, M. Derakhshani, I. Goldberg [CCS'12] |
DeltaShaper: Enabling Unobservable Censorship-resistant TCP Tunneling over Videoconferencing Streams D. Barradas, N. Santos, L. Rodrigues [PoPETs'17] |
The Parrot is Dead: Observing Unobservable Network Communications A. Houmansadr, C. Brubaker, V. Shmatikov [S&P'13] |
Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC D. Barradas, N. Santos, L. Rodrigues, V. Nunes [CCS'20] |
|
Week 6 Decoy Routing |
Feb 14 | Feb 16 |
Telex: Anticensorship in the network infrastructure E. Wustrow, S. Wolchok, I. Goldberg, J. A. Halderman [Sec'11] |
Routing Around Decoys M. Schuchard, J. Geddes, C. Thompson, N. Hopper [CCS'12] |
|
Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement C. Bocovich, I. Goldberg [CCS'16] |
No Direction Home: The True Cost of Routing Around Decoys A. Houmansadr, E. L. Wong, V. Shmatikov [NDSS'14] |
|
Week 7 No classes - Reading Week |
Feb 21 | Feb 23 |
Week 8 Clever Tools |
Feb 28 | Mar 2 |
Blocking-resistant communication through domain fronting D. Fifield, C. Lan, R. Hynes, P. Wegmann, V. Paxson [PoPETs'15] |
Evading Censorship with Browser-Based Proxies D. Fifield, N. Hardison, J. Ellithorpe, E. Stark, R. Dingledine, P. Porras, D. Boneh [PoPETs'12] |
|
Camoufler: Accessing The Censored Web By Utilizing Instant Messaging Channels P. Kumar Sharma, D. Gosain, S. Chakravarty [Asia CCS'21] |
Geneva: Evolving Censorship Evasion Strategies K. Bock, G. Hughey, X. Qiang, D. Levin [CCS'19] |
|
Internet Blackouts | ||
Week 9 Blackouts |
Mar 7 | Mar 9 |
Intermediate project report due Mar 10. | Analysis of Country-wide Internet Outages Caused by Censorship A. Dainotti, C. Squarcella, E. Aben, K. C. Claffy, M. Chiesa, M. Russo, A. Pescapé [IMC'11] |
Rangzen: Anonymously Getting The Word Out In a Blackout A. Lerner, G. Fanti, Y. Ben-David, J. Garcia, P. Schmitt, B. Raghavan [arXiv'16] |
Dolphin: A Cellular Voice Based Internet Shutdown Resistance System P. Kumar Sharma, R. Sharma, K. Singh, M. Maity, S. Chakravarty [PoPETs'23] |
Moby: A Blackout-Resistant Anonymity Network for Mobile Devices A. Pradeep, H. Javaid, R. Williams, A. Rault, D. Choffnes, S. Le Blond, B. Ford [PoPETs'22] |
|
Censorship Measurements | ||
Week 10 Ethics and Measurements |
Mar 14 | Mar 16 |
Can Censorship Measurements Be Safe(r)? B. Jones, N. Feamster [HotNets'15] |
Augur: Internet-Wide Detection of Connectivity Disruptions P. Pearce, R. Ensafi, F. Li, N. Feamster, V. Paxson [S&P'17] |
|
Forgive Us our SYNs: Technical and Ethical Considerations for Measuring
Internet Filtering J. R. Crandall, M. Crete-Nishihata, J. Knockel [NSEthics'15] |
Quack: Scalable Remote Measurement of Application-Layer Censorship B. VanderSloot, A. McDonald, W. Scott, J. A. Halderman, R. Ensafi [Sec'18] |
|
Week 11 Planet-scale Measurements |
Mar 21 | Mar 23 |
ICLab: A Global, Longitudinal Internet Censorship Measurement Platform A. A. Niaki, S. Cho, Z. Weinberg, N. P. Hoang, A. Razaghpanah, N. Christin, P. Gill [S&P'20] |
How to Catch when Proxies Lie: Verifying the Physical Locations of Network Proxies with Active Geolocation Z. Weinberg, S. Cho, N. Cristin, V. Sekar, P. Gill [IMC'18] |
|
Censored Planet: An Internet-wide, Longitudinal Censorship Observatory R. S. Raman, P. Shenoy, K. Kohls, R. Ensafi [CCS'20] |
Network Measurement Methods for Locating and Examining Censorship Devices R. Sundara Raman, M. Wang, J. Dalek, J. Mayer, R. Ensafi [CoNEXT'22] |
|
Censored Topics | ||
Week 12 Censored Topics & Disinformation |
Mar 28 | Mar 30 |
Tweeting Under Pressure: Analyzing Trending Topics and
Evolving Word Choice on Sina Weibo L. Chen, C. Zhang, C. Wilson [COSN'13] |
Identifying Disinformation Websites Using Infrastructure Features A. Hounsel, J. Holland, B. Kaiser, K. Borgolte, N. Feamster, J. Mayer [FOCI'20] |
|
Topics of Controversy: An Empirical Analysis of Web Censorship Lists Z. Weinberg, M. Sharif, J. Szurdi, N. Christin [PoPETs'17] |
On the Infrastructure Providers That Support Misinformation Websites C. Han, D. Kumar, Z. Durumeric [ICWSM'22] |
|
Project Presentations | ||
Week 13 |
Apr 4 | Apr 6 |
Project presentations | Project presentations | |
Week 14 No classes |
Apr 11 | Apr 13 |
Final project report due April 14. | Work on project | Work on project |