Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3372297.3417883acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Open access

Censored Planet: An Internet-wide, Longitudinal Censorship Observatory

Published: 02 November 2020 Publication History

Abstract

Remote censorship measurement techniques offer capabilities for monitoring Internet reachability around the world. However, operating these techniques continuously is labor-intensive and requires specialized knowledge and synchronization, leading to limited adoption. In this paper, we introduce Censored Planet, an online censorship measurement platform that collects and analyzes measurements from ongoing deployments of four remote measurement techniques (Augur, Satellite/Iris, Quack, and Hyperquack). Censored Planet adopts a modular design that supports synchronized baseline measurements on six Internet protocols as well as customized measurements that target specific countries and websites. Censored Planet has already collected and published more than 21.8 billion data points of longitudinal network observations over 20 months of operation. Censored Planet complements existing censorship measurement platforms such as OONI and ICLab by offering increased scale, coverage, and continuity. We introduce a new representative censorship metric and show how time series analysis can be applied to Censored Planet's longitudinal measurements to detect 15 prominent censorship events, two-thirds of which have not been reported previously. Using trend analysis, we find increasing censorship activity in more than 100 countries, and we identify 11 categories of websites facing increasing censorship, including provocative attire, human rights issues, and news media. We hope that the continued publication of Censored Planet data helps counter the proliferation of growing restrictions to online freedom.

Supplementary Material

MOV File (Copy of CCS2020_fpc387_Ram Sundara Raman - Andrew Diehl.mov)
Presentation video

References

[1]
NS Ethics '15: Proceedings of the 2015 ACM SIGCOMM Workshop on Ethics in Networked Systems Research, 2015.
[2]
N. Aase, J. R. Crandall, A. Diaz, J. Knockel, J. O. Molinero, J. Saia, D. S. Wallach, and T. Zhu. Whiskey, weed, and wukan on the world wide web: On measuring censors' resources and motivations. In FOCI, 2012.
[3]
AccessNow. We defend and extend the digital rights of users at risk around the world. https://www.accessnow.org/.
[4]
G. Aceto, A. Botta, A. Pescapè, N. Feamster, M. F. Awan, T. Ahmad, and S. Qaisar. Monitoring Internet censorship with UBICA. In International Workshop on Traffic Monitoring and Analysis. Springer, 2015.
[5]
S. Afroz and D. Fifield. Timeline of Tor censorship, 2007. http://www1.icsi.berkeley.edu/ sadia/tor_timeline.pdf.
[6]
Y. Akdeniz. Internet content regulation: UK government and the control of Internet content. Computer Law & Security Review, 2001.
[7]
A. Akhavan Niaki, S. Cho, Z. Weinberg, N. P. Hoang, A. Razaghpanah, N. Christin, and P. Gill. ICLab: A Global, Longitudinal Internet Censorship Measurement Platform. In IEEE Symposium on Security and Privacy (SP), 2020.
[8]
Anonymous. Towards a comprehensive picture of the Great Firewalltextquoterights DNS censorship. In 4th USENIX Workshop on Free and Open Communications on the Internet (FOCI 14), 2014.
[9]
S. Aryan, H. Aryan, and J. A. Halderman. Internet censorship in Iran: A first look. In 3rd USENIX Workshop on Free and Open Communications on the Internet (FOCI 13), 2013.
[10]
A. Azpúrua. Wikipedia bloqueada en CANTV desde el 12 de Enero., 2019. https://vesinfiltro.com/noticias/wikipedia_2019-01/.
[11]
A. Azpúrua, M. Chirinos, A. Filastò, M. Xynou, S. Basso, and K. Karan. From the blocking of Wikipedia to Social Media: Venezuela's Political Crisis, 2019.
[12]
D. E. Bambauer. Filtering in Oz: Australia's foray into Internet censorship. U. Pa. J. Int'l L., 2009.
[13]
D. Bamman, B. O'Connor, and N. Smith. Censorship and deletion practices in chinese social media. First Monday, 2012.
[14]
BBC. Egypt: Protests and clashes enter second day, 2019. https://www.bbc.com/news/world-middle-east-49786367.
[15]
BBC. Omar al-Bashir: Sudan military coup topples ruler after protests, 2019. https://www.bbc.com/news/world-africa-47891470.
[16]
BBC. Sri Lanka attacks: More than 200 killed as churches and hotels targeted, 2019. https://www.bbc.com/news/world-asia-48001720.
[17]
BBC. Zimbabwe protests: Crackdown is just a 'taste of things to come', 2019. https://www.bbc.com/news/world-africa-46938679.
[18]
K. Bock, G. Hughey, X. Qiang, and D. Levin. Geneva: Evolving censorship evasion strategies. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019.
[19]
S. Burnett and N. Feamster. Making sense of Internet censorship: a new frontier for Internet measurement, 2013.
[20]
S. Burnett and N. Feamster. Encore: Lightweight measurement of web censorship with cross-origin requests. In ACM SIGCOMM Conference, 2015.
[21]
Businesswire. Japan Welcomes World Leaders to Its First-ever G20 Summit in Osaka, 2019. https://www.businesswire.com/news/home/20190630005053/en/Japan-Welcomes-World-Leaders-First-ever-G20-Summit.
[22]
CAIDA. Archipelago (Ark) Measurement Infrastructure. http://www.caida.org/projects/ark/.
[23]
CalvinAyre. Gambling operators scoff as Norway approves DNS-blocking, 2018. https://calvinayre.com/2018/05/10/business/norway-approves-gambling-restrictions/.
[24]
K. M. Carter and W. W. Streilein. Probabilistic reasoning for streaming anomaly detection. In 2012 IEEE Statistical Signal Processing Workshop (SSP). IEEE, 2012.
[25]
A. Chaabane, T. Chen, M. Cunche, E. D. Cristofaro, A. Friedman, and M. A. Kaafar. Censorship in the wild: Analyzing Internet filtering in Syria. In Internet Measurement Conference (IMC). ACM, 2014.
[26]
C. Chiu, C. Ip, and A. Silverman. Understanding social media in china. McKinsey Quarterly, 2012.
[27]
Citizen Lab. Block test list. https://github.com/citizenlab/test-lists.
[28]
Cloudflare. IP Ranges, 2019. https://www.cloudflare.com/ips/.
[29]
J. R. Crandall, M. Crete-Nishihata, and J. Knockel. Forgive us our syns: Technical and ethical considerations for measuring internet filtering. In NS Ethics@ SIGCOMM, 2015.
[30]
J. R. Crandall, D. Zinn, M. Byrd, E. T. Barr, and R. East. ConceptDoppler: A weather tracker for Internet censorship. In Proceedings of the 2007 ACM SIGSAC Conference on Computer and Communications Security, 2007.
[31]
A. L. Dahir. Internet shutdowns are costing African governments more than we thought. https://qz.com/1089749/internet-shutdowns-are-increasingly-taking-a-toll-on-africas-economies/, 2017.
[32]
J. Dalek, B. Haselton, H. Noman, A. Senft, M. Crete-Nishihata, P. Gill, and R. J. Deibert. A method for identifying and confirming the use of URL filtering products for censorship. In Internet Measurement Conference (IMC). ACM, 2013.
[33]
R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. Technical report, Naval Research Lab Washington DC, 2004.
[34]
D. Dittrich and E. Kenneally. The Menlo Report: Ethical principles guiding information and communication technology research. Technical report, U.S. Department of Homeland Security, 2012.
[35]
Z. Durumeric, D. Adrian, A. Mirian, M. Bailey, and J. A. Halderman. A search engine backed by Internet-wide scanning. In Proceedings of the 2015 ACM SIGSAC Conference on Computer and Communications Security, 2015.
[36]
Z. Durumeric, E. Wustrow, and J. A. Halderman. ZMap: Fast internet-wide scanning and its security applications. In 22nd USENIX Security Symposium, 2013.
[37]
R. Ensafi, J. Knockel, G. Alexander, and J. R. Crandall. Detecting intentional packet drops on the Internet via TCP/IP side channels. In International Conference on Passive and Active Network Measurement, 2014.
[38]
R. Ensafi, P. Winter, A. Mueen, and J. R. Crandall. Analyzing the Great Firewall of China over space and time. Proceedings on Privacy Enhancing Technologies, 2015.
[39]
M. Ester, H.-P. Kriegel, J. Sander, X. Xu, et al. A density-based algorithm for discovering clusters in large spatial databases with noise. In KDD, 1996.
[40]
R. Falkvinge. Norwegian politicians want to censor the Internet, because Rule 34 ('because all the pornography'), 2016. https://www.privateinternetaccess.com/blog/norwegian-politicians-want-censor-internet-rule-34-pornography/.
[41]
O. Farnan, A. Darer, and J. Wright. Poisoning the well: Exploring the great firewall's poisoned dns responses. In Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016.
[42]
D. Fifield, C. Lan, R. Hynes, P. Wegmann, and V. Paxson. Blocking-resistant communication through domain fronting. Proceedings on Privacy Enhancing Technologies, 2015.
[43]
A. Filastò and J. Appelbaum. OONI: Open Observatory of Network Interference. In 2nd USENIX Workshop on Free and Open Communications on the Internet (FOCI 12), 2012.
[44]
A. Filastò, M. Xynou, and N. Fatemi. Iran temporarily blocks the Farsi language edition of Wikipedia, 2019. https://ooni.org/post/2020-iran-blocks-farsi-wikipedia/.
[45]
FortiNet. Fortiguard labs web filter. https://fortiguard.com/webfilter.
[46]
Freedom House. Freedom on the net report 2019. https://freedomhouse.org/countries/freedom-world/scores, 2019.
[47]
G. Gebhart and T. Kohno. Internet censorship in Thailand: User practices and potential threats. In IEEE European Symposium on Security and Privacy (EuroS&P), 2017.
[48]
K. H. Hamed and A. R. Rao. A modified mann-kendall trend test for autocorrelated data. Journal of hydrology, 1998.
[49]
A. Houmansadr, G. T. Nguyen, M. Caesar, and N. Borisov. Cirripede: Circumvention infrastructure using router redirection with plausible deniability. In Proceedings of the 2011 ACM SIGSAC Conference on Computer and Communications Security, 2011.
[50]
M. Hussain and I. Mahmud. pymannkendall: a python package for non parametric mann kendall family of trend tests. Journal of Open Source Software, 2019.
[51]
ICLAB. ICLAB: Internet Censorship Lab. https://iclab.org.
[52]
Indonesia introduces new internet censorship system. https://www.arabnews.com/node/1218011/world.
[53]
Internet Outage Detection and Analysis. https://ioda.caida.org/ioda/dashboard.
[54]
A. Jazeera. India decriminalises gay sex in landmark verdict, 2018. https://www.aljazeera.com/news/2018/09/india-decriminalises-gay-sex-landmark-verdict-180906051219637.html.
[55]
A. Jazeera. Sri Lanka bombings, 2019. https://www.aljazeera.com/news/2019/04/sri-lanka-bombings-latest-updates-190421092621543.html.
[56]
B. Jones, R. Ensafi, N. Feamster, V. Paxson, and N. Weaver. Ethical concerns for censorship measurement. In ACM SIGCOMM Conference, 2015.
[57]
B. Jones, T.-W. Lee, N. Feamster, and P. Gill. Automated detection and fingerprinting of censorship block pages. In Internet Measurement Conference (IMC). ACM, 2014.
[58]
J. Lin, E. Keogh, S. Lonardi, and B. Chiu. A symbolic representation of time series, with implications for streaming algorithms. In Proceedings of the 8th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery, 2003.
[59]
LinkedIn. Luminol: Anomaly Detection and Correlation library. https://github.com/linkedin/luminol.
[60]
N. Macedo. Norway plots DNS blocking and further restrictions on payments, 2018. https://egr.global/intel/news/norway-plots-dns-blocking-and-further-restrictions-on-payments/.
[61]
R. MacKinnon. China's censorship 2.0: How companies censor bloggers. First Monday, 2009.
[62]
MaxMind. https://www.maxmind.com/.
[63]
T. McIntyre. Internet censorship in the united kingdom: National schemes and european norms. Law, Policy and the Internet (Hart Publishing, 2018 Forthcoming), 2018.
[64]
Mozilla. Mozilla takes action to protect users in Kazakhstan. The Mozilla Blog, August 21, 2019. https://blog.mozilla.org/blog/2019/08/21/mozilla-takes-action-to-protect-users-in-kazakhstan/.
[65]
Z. Nabi. The Anatomy of Web Censorship in Pakistan. In 3rd USENIX Workshop on Free and Open Communications on the Internet (FOCI 13), 2013.
[66]
A. Narayanan and B. Zevenbergen. No encore for Encore? Ethical questions for web-based censorship measurement. Ethical Questions for Web-Based Censorship Measurement (September 24, 2015), 2015.
[67]
M. Nasr, H. Zolfaghar, A. Houmansadr, and A. Ghafari. Massbrowser: Unblocking the censored web for the masses, by the masses. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, 2020.
[68]
National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. The Belmont Report: Ethical Principles and Guidelines for the Protection of Human Subjects of Research. National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research, 1978.
[69]
N. Nazeri and C. Anderson. Citation filtered: Iran's censorship of wikipedia. CGCS Research, 2013.
[70]
NetBlocks. Social media blocked in Sri Lanka following church and hotel bombings, 2019. https://netblocks.org/reports/social-media-blocked-in-sri-lanka-following-church-and-hotel-bombings-XaAwlQBM.
[71]
A. Nisar, A. Kashaf, I. A. Qazi, and Z. A. Uzmi. Incentivizing censorship measurements via circumvention. In SIGCOMM. ACM, 2018.
[72]
NPR. Turkmenistan Has Banned Use Of The Word 'Coronavirus', 2020. https://www.npr.org/sections/coronavirus-live-updates/2020/03/31/824611607/turkmenistan-has-banned-use-of-the-word-coronavirus.
[73]
OpenNet Initiative. OpenNet Initiative. https://opennet.net/.
[74]
OpenNet Initiative. Jordan, August 2009. https://opennet.net/research/profiles/jordan.
[75]
OpenNet Initiative. South Korea, August 2012. https://opennet.net/research/profiles/south-korea.
[76]
C. Partridge and M. Allman. Addressing ethical considerations in network measurement papers. In Workshop on Ethics in Networked Systems Research (NS Ethics@ SIGCOMM), 2015.
[77]
P. Pearce, R. Ensafi, F. Li, N. Feamster, and V. Paxson. Augur: Internet-wide detection of connectivity disruptions. In IEEE Symposium on Security and Privacy, May 2017.
[78]
P. Pearce, B. Jones, F. Li, R. Ensafi, N. Feamster, N. Weaver, and V. Paxson. Global measurement of DNS manipulation. In 26th USENIX Security Symposium, 2017.
[79]
PeeringDB. Peeringdb, 2018. https://www.peeringdb.com/.
[80]
PlanetLab. https://www.planet-lab.org/.
[81]
Portuguese ISPs given 40 days to comply with EU net neutrality rules. https://edri.org/portuguese-isps-given-40-days-to-comply-with-eu-net-neutrality-rules/.
[82]
List of websites/domains blocked by ISP's in Portugal, 2019. https://tofran.github.io/PortugalWebBlocking/.
[83]
Psiphon. Psiphon: Beyond Borders, 2020. https://psiphon3.com/en/index.html.
[84]
R. Ramesh, L. Evdokimov, and R. Ensafi. Censorship in Russia, 2019. https://censoredplanet.org/russia.
[85]
R. Ramesh, R. Sundara Raman, M. Bernhard, V. Ongkowijaya, L. Evdokimov, A. Edmundson, S. Sprecher, M. Ikram, and R. Ensafi. Decentralized Control: A Case Study of Russia. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, 2020.
[86]
R. Raoof, M. El-Taher, M. Tita, A. Filastò, and M. Xynou. Egypt blocks BBC and Alhurra: Expanding media censorship amid political unrest, 2019. https://ooni.org/post/venezuela-blocking-wikipedia-and-social-media-2019/.
[87]
Reporters without Borders. Coronavirus off limits in Turkmenistan, 2020. https://rsf.org/en/news/coronavirus-limits-turkmenistan.
[88]
Reporters without Borders. Norway: Clouds in sight, 2020. https://rsf.org/en/norway.
[89]
Reporters without Borders. Turkmenistan: Ever-expanding news 'black hole', 2020. https://rsf.org/en/turkmenistan.
[90]
Reuters. Polish police detain 25 after attacks on equality march, 2019. https://www.reuters.com/article/us-poland-lgbt-idUSKCN1UG0GH.
[91]
University of Oregon Route Views Project. www.routeviews.org.
[92]
Q. Scheitle, O. Hohlfeld, J. Gamba, J. Jelten, T. Zimmermann, S. D. Strowes, and N. Vallina-Rodriguez. A long way to the top: Significance, structure, and stability of internet top lists. In Internet Measurement Conference (IMC). ACM, 2018.
[93]
W. Scott, T. Anderson, T. Kohno, and A. Krishnamurthy. Satellite: Joint analysis of CDNs and network-level interference. In USENIX Annual Technical Conference (ATC), 2016.
[94]
P. K. Sen. Estimates of the regression coefficient based on Kendall's tau. Journal of the American statistical association, 1968.
[95]
A. Sfakianakis, E. Athanasopoulos, and S. Ioannidis. Censmon: A web censorship monitor. In USENIX Workshop on Free and Open Communications on the Internet (FOCI 11), 2011.
[96]
R. Shandler. Measuring the Political and Social Implications of Government-Initiated Cyber Shutdowns. In 8th USENIX Workshop on Free and Open Communications on the Internet (FOCI 18), 2018.
[97]
S. Song, A. Zhang, J. Wang, and P. S. Yu. Screen: Stream data cleaning under speed constraints. In Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, 2015.
[98]
R. Sundara Raman, L. Evdokimov, E. Wustrow, A. Halderman, and R. Ensafi. Kazakhstan's HTTPS Interception, 2019. https://censoredplanet.org/kazakhstan.
[99]
R. Sundara Raman, L. Evdokimov, E. Wustrow, A. Halderman, and R. Ensafi. Investigating Large Scale HTTPS Interception in Kazakhstan. In Internet Measurement Conference (IMC). ACM, 2020.
[100]
R. Sundara Raman, A. Stoll, J. Dalek, A. Sarabi, R. Ramesh, W. Scott, and R. Ensafi. Measuring the Deployment of Network Censorship Filters at Global Scale. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, 2020.
[101]
B. Taye. Sri Lanka: shutting down social media to fight rumors hurts victims, 2019. https://www.accessnow.org/sri-lanka-shutting-down-social-media-to-fight-rumors-hurts-victims/.
[102]
The Guardian. Army deployed in Ecuador as protests descend into violence, 2019. https://www.theguardian.com/world/2019/oct/13/army-deployed-in-ecuador-as-protests-descend-into-violence.
[103]
The Guardian. Venezuela protests: thousands march as military faces call to abandon Maduro, 2019. https://www.theguardian.com/world/2019/jan/23/venezuela-protests-thousands-march-against-maduro-as-opposition-sees-chance-for-change.
[104]
The Tor Project. OONI: Open observatory of network interference. https://ooni.torproject.org/.
[105]
Tor. Tor Browser's default bridges, 2020. https://trac.torproject.org/projects/tor/wiki/doc/TorBrowser/DefaultBridges.
[106]
B. VanderSloot, A. McDonald, W. Scott, J. A. Halderman, and R. Ensafi. Quack: Scalable remote measurement of application-layer censorship. In 27th USENIX Security Symposium, 2018.
[107]
Z. Wang, S. Zhu, Y. Cao, Z. Qian, C. Song, S. V. Krishnamurthy, K. S. Chan, and T. D. Braun. SYMTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, 2020.
[108]
V. Weber. The worldwide web of Chinese and Russian information controls, 2019.
[109]
L. Wei, N. Kumar, V. N. Lolla, E. J. Keogh, S. Lonardi, and C. A. Ratanamahatana. Assumption-free anomaly detection in time series. In SSDBM, 2005.
[110]
Z. Weinberg, M. Sharif, J. Szurdi, and N. Christin. Topics of controversy: An empirical analysis of web censorship lists. Proceedings on Privacy Enhancing Technologies, 2017.
[111]
Wikipedia. Gaza--Israel clashes (May 2019), 2019. https://en.wikipedia.org/wiki/Gaza%E2%80%93Israel_clashes_(May_2019).
[112]
C. Williams. How Egypt shut down the internet. https://www.telegraph.co.uk/news/worldnews/africaandindianocean/egypt/8288163/How-Egypt-shut-down-the-internet.html, 2011.
[113]
P. Winter and S. Lindskog. How the Great Firewall of China is blocking Tor. In 2nd USENIX Workshop on Free and Open Communications on the Internet (FOCI 12), 2012.
[114]
E. Wustrow, C. M. Swanson, and J. A. Halderman. Tapdance: End-to-middle anticensorship without flow blocking. In 23rd USENIX Security Symposium, 2014.
[115]
E. Wustrow, S. Wolchok, I. Goldberg, and J. A. Halderman. Telex: Anticensorship in the network infrastructure. In 20th USENIX Security Symposium, 2011.
[116]
Xu, Xueyang and Mao, Z. Morley and Halderman, J. Alex. Internet censorship in china: Where does the filtering occur? In International Conference on Passive and Active Network Measurement, 2011.
[117]
M. Xynou, F. Arturo, M. Tawanda, and M. Natasha. Zimbabwe protests: Social media blocking and internet blackouts, 2019. https://ooni.org/post/zimbabwe-protests-social-media-blocking-2019/.
[118]
T. K. Yadav, A. Sinha, D. Gosain, P. K. Sharma, and S. Chakravarty. Where The Light Gets In: Analyzing Web Censorship Mechanisms in India. In Internet Measurement Conference (IMC). ACM, 2018.
[119]
B. Zevenbergen, B. Mittelstadt, C. Véliz, C. Detweiler, C. Cath, J. Savulescu, and M. Whittaker. Philosophy meets Internet engineering: Ethics in networked systems research. In (GTC Workshop Outcomes Paper) (September 29, 2015), 2015.
[120]
A. Zhang, S. Song, and J. Wang. Sequential data cleaning: a statistical approach. In Proceedings of the 2016 International Conference on Management of Data, 2016.
[121]
J. Zittrain and B. Edelman. Internet filtering in China. IEEE Internet Computing, 2003.
[122]
ZwNews. BREAKING: Internet shut down illegal?Zimbabwe High Court rules, 2019. https://zwnews.com/breaking-internet-shut-down-illegal-zimbabwe-high-court-rules/.

Cited By

View all
  • (2024)Selection of Landmarks for Efficient Active Geolocation2024 8th Network Traffic Measurement and Analysis Conference (TMA)10.23919/TMA62044.2024.10559002(1-9)Online publication date: 21-May-2024
  • (2024)Content removal: the government-Google partnershipOnline Media and Global Communication10.1515/omgc-2024-00203:3(370-394)Online publication date: 16-Sep-2024
  • (2024)Net Loss: An econometric method to measure the impact of Internet shutdownsACM Journal on Computing and Sustainable Societies10.1145/36594662:2(1-22)Online publication date: 20-Jun-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security
October 2020
2180 pages
ISBN:9781450370899
DOI:10.1145/3372297
This work is licensed under a Creative Commons Attribution International 4.0 License.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 November 2020

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. availability
  2. censorship
  3. empirical security
  4. measurement

Qualifiers

  • Research-article

Funding Sources

  • National Science Foundation

Conference

CCS '20
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1,217
  • Downloads (Last 6 weeks)200
Reflects downloads up to 23 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Selection of Landmarks for Efficient Active Geolocation2024 8th Network Traffic Measurement and Analysis Conference (TMA)10.23919/TMA62044.2024.10559002(1-9)Online publication date: 21-May-2024
  • (2024)Content removal: the government-Google partnershipOnline Media and Global Communication10.1515/omgc-2024-00203:3(370-394)Online publication date: 16-Sep-2024
  • (2024)Net Loss: An econometric method to measure the impact of Internet shutdownsACM Journal on Computing and Sustainable Societies10.1145/36594662:2(1-22)Online publication date: 20-Jun-2024
  • (2024)Yesterday Once More: Global Measurement of Internet Traffic Shadowing BehaviorsProceedings of the 2024 ACM on Internet Measurement Conference10.1145/3646547.3689023(230-240)Online publication date: 4-Nov-2024
  • (2024)Exploring Unobservable Blockchain-Based Covert Channel for Censorship-Resistant SystemsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.336121219(3380-3394)Online publication date: 1-Jan-2024
  • (2024)NetShuffle: Circumventing Censorship with Shuffle Proxies at the Edge2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00036(3497-3514)Online publication date: 19-May-2024
  • (2024)Explaining variation in national cryptocurrency regulation: implications for the global political economyReview of International Political Economy10.1080/09692290.2024.232540331:5(1472-1495)Online publication date: 15-Mar-2024
  • (2023)Detecting IP-tracking proof interfaces by looking for NATs2023 7th Network Traffic Measurement and Analysis Conference (TMA)10.23919/TMA58422.2023.10198950(1-4)Online publication date: 26-Jun-2023
  • (2023)Wolf in Sheep's Clothing: Evaluating Security Risks of the Undelegated Record on DNS Hosting ServicesProceedings of the 2023 ACM on Internet Measurement Conference10.1145/3618257.3624839(188-197)Online publication date: 24-Oct-2023
  • (2023)Taboo and Collaborative Knowledge Production: Evidence from WikipediaProceedings of the ACM on Human-Computer Interaction10.1145/36100907:CSCW2(1-25)Online publication date: 4-Oct-2023
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media