Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
Understanding Routing-Induced Censorship Changes Globally
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 437–451https://doi.org/10.1145/3658644.3670336Internet censorship is pervasive, with significant effort dedicated to understanding what is censored, and where. Prior censorship measurements however have identified significant inconsistencies in their results; experiments show unexplained non-...
Destination Unreachable: Characterizing Internet Outages and Shutdowns
- Zachary S. Bischof,
- Kennedy Pitcher,
- Esteban Carisimo,
- Amanda Meng,
- Rafael Bezerra Nunes,
- Ramakrishna Padmanabhan,
- Margaret E. Roberts,
- Alex C. Snoeren,
- Alberto Dainotti
ACM SIGCOMM '23: Proceedings of the ACM SIGCOMM 2023 ConferencePages 608–621https://doi.org/10.1145/3603269.3604883In this paper, we provide the first comprehensive longitudinal analysis of government-ordered Internet shutdowns and spontaneous outages (i.e., disruptions not ordered by the government). We describe the available tools, data sources and methods to ...
- research-articleJanuary 2023
Understanding the formation mechanism of mobile social media usage intention during public health emergencies: a social media dependency perspective
International Journal of Mobile Communications (IJMC), Volume 22, Issue 3Pages 340–366https://doi.org/10.1504/ijmc.2023.133105The outbreak of the COVID-19 pandemic and the widespread application of mobile social media have made mobile social media play a crucial role in crisis communication. Understanding how the formation mechanism of mobile social media acceptance during ...
- research-articleOctober 2017
The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks
CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications SecurityPages 2037–2052https://doi.org/10.1145/3133956.3134075Decoy routing is an emerging approach for censorship circumvention in which circumvention is implemented with help from a number of volunteer Internet autonomous systems, called decoy ASes. Recent studies on decoy routing consider all decoy routing ...
- research-articleNovember 2016
Popup Networks: Creating Decentralized Social Media on Top of Commodity Wireless Routers
GROUP '16: Proceedings of the 2016 ACM International Conference on Supporting Group WorkPages 149–158https://doi.org/10.1145/2957276.2957285Recent news has made social media notorious for both abusing user data and allowing governments to scrutinize personal information. Nevertheless, people still enjoy connecting with friends and families through social media but fail to use it to connect ...
- research-articleOctober 2016
GAME OF DECOYS: Optimal Decoy Routing Through Game Theory
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityPages 1727–1738https://doi.org/10.1145/2976749.2978367Decoy routing is a promising new approach for censorship circumvention that relies on traffic re-direction by volunteer autonomous systems. Decoy routing is subject to a fundamental censorship attack, called routing around decoy (RAD), in which the ...
- research-articleJanuary 2016
The communication design of WeChat: ideological as well as technical aspects of social media
Communication Design Quarterly (SIGDOC-CDQ), Volume 4, Issue 1Pages 23–35https://doi.org/10.1145/2875501.2875503In this paper, the authors discuss how the technical and ideological design of WeChat, a social media platform, enables the free flow of information within the context of heavy Internet policing and surveillance in the People's Republic of China. ...
- posterOctober 2013
Objectionable content filtering by click-through data
CIKM '13: Proceedings of the 22nd ACM international conference on Information & Knowledge ManagementPages 1581–1584https://doi.org/10.1145/2505515.2507849This paper explores users' browsing intents to predict the category of a user's next access during web surfing, and applies the results to objectionable content filtering. A user's access trail represented as a sequence of URLs reveals the contextual ...
- research-articleJune 2012
The collateral damage of internet censorship by DNS injection
ACM SIGCOMM Computer Communication Review (SIGCOMM-CCR), Volume 42, Issue 3Pages 21–27https://doi.org/10.1145/2317307.2317311Some ISPs and governments (most notably the Great Firewall of China) use DNS injection to block access to "unwanted" websites. The censorship tools inspect DNS queries near the ISP's boundary routers for sensitive domain keywords and inject forged DNS ...
- research-articleMay 2011
Online contribution practices in countries that engage in internet blocking and censorship
CHI '11: Proceedings of the SIGCHI Conference on Human Factors in Computing SystemsPages 1109–1118https://doi.org/10.1145/1978942.1979108In this article we describe people's online contribution practices in contexts in which the government actively blocks access to or censors the Internet. We argue that people experience blocking as confusing, as a motivation for self-censorship online, ...