Skip to content

Latest commit

 

History

History
46 lines (32 loc) · 3.63 KB

README.md

File metadata and controls

46 lines (32 loc) · 3.63 KB

List of papers related to shadowsocks

2014

  • GoHop: Personal VPN to defend from censorship. [ICACT'14] PDF

2015

  • Multipath TCP with real Smartphone applications. PDF
  • Poster: Evaluating Android Applications with Multipath TCP. [MobiCom '15] PDF

2016

  • Observing real smartphone applications over multipath TCP. PDF
  • An in-depth understanding of multipath TCP on mobile devices: measurement and system design. [MobiCom'16] PDF
  • A First Analysis of Multipath TCP on Smartphones. [PAM'16] PDF

2017

  • The Random Forest based Detection of Shadowsock's Traffic. [IHMSC '17] PDF
  • Accessing google scholar under extreme internet censorship: a legal avenue. [Middleware '17] PDF
  • Multipath cloud federation. [CloudNet'17] PDF
  • Multipath TCP in Smartphones: Impact on Performance, Energy, and CPU Utilization. [MobiWac '17] PDF
  • Threat modeling and circumvention of Internet censorship. PDF

2018

  • Revisiting Website Fingerprinting Attacks in Real-World Scenarios: A Case Study of Shadowsocks. [NSS'18] PDF
  • Poster: Design of SOCKS Version 6. [SIGCOMM '18] PDF
  • Adversarial Attacks Against Profile HMM Website Fingerprinting Detection Model. [CogSys '18] PDF
  • Website Fingerprinting Attack on Anonymity Networks Based on Profile Hidden Markov Model. [TIFS '18] PDF
  • AME Blockchain: An Architecture Design for Closed-Loop Fluid Economy Token System. PDF
  • Pinpoint: fast and precise sparse value flow analysis for million lines of code. [PLDI '18] PDF

2019

  • Flow Context and Host Behavior Based ShadowSocks's Traffic Identification. [IEEE Access] PDF
  • Mobile Encrypted Traffic Classification Using Deep Learning: Experimental Evaluation, Lessons Learned, and Challenges. [IEEE Transactions on Network and Service Management] Abstract

2020

  • Detecting Probe-resistant Proxies. [NDSS'20] Abstract
  • ACER: detecting Shadowsocks server based on active probe technology. [J Comput Virol Hack Tech 16, 217–227 (2020)] Abstract
  • HTTPT: A Probe-Resistant Proxy. [FOCI'20] Abstract
  • How China Detects and Blocks Shadowsocks. [IMC'20] Abstract
  • Partitioning Oracle Attacks. [USENIX Security'21] Abstract