The use of TLS in Censorship Circumvention S Frolov, E Wustrow Network and Distributed System Security Symposium (NDSS 2019), 2019 | 20 | 2019 |
An ISP-scale deployment of TapDance S Frolov, F Douglas, W Scott, A McDonald, B VanderSloot, R Hynes, ... 7th USENIX Workshop on Free and Open Communications on the Internet (FOCI 17), 2017 | 17 | 2017 |
Conjure: Summoning Proxies from Unused Address Space S Frolov, J Wampler, SC Tan, JA Halderman, N Borisov, E Wustrow The 26th ACM Conference on Computer and Communications Security (CCS'19), 2019 | 6 | 2019 |
Running refraction networking for real B VanderSloot, S Frolov, J Wampler, SC Tan, I Simpson, M Kallitsis, ... Proceedings on Privacy Enhancing Technologies 2020 (4), 321-335, 2020 | 4 | 2020 |
Detecting Probe-resistant Proxies S Frolov, J Wampler, E Wustrow Network and Distributed System Security Symposium (NDSS 2020), 2020 | 4 | 2020 |
HTTPT: A Probe-Resistant Proxy S Frolov, E Wustrow 10th USENIX Workshop on Free and Open Communications on the Internet (FOCI 20), 2020 | 1 | 2020 |
Practical Countermeasures against Network Censorship S Frolov PQDT-Global, 2020 | | 2020 |