SoK: Making Sense of Censorship Resistance Systems
نویسندگان
چکیده
An increasing number of countries implement Internet censorship at different scales and for a variety of reasons. Several censorship resistance systems (CRSs) have emerged to help bypass such blocks. The diversity of the censor’s attack landscape has led to an arms race, leading to a dramatic speed of evolution of CRSs. The inherent complexity of CRSs and the breadth of work in this area makes it hard to contextualize the censor’s capabilities and censorship resistance strategies. To address these challenges, we conducted a comprehensive survey of CRSs—deployed tools as well as those discussed in academic literature—to systematize censorship resistance systems by their threat model and corresponding defenses. To this end, we first sketch a comprehensive attack model to set out the censor’s capabilities, coupled with discussion on the scope of censorship, and the dynamics that influence the censor’s decision. Next, we present an evaluation framework to systematize censorship resistance systems by their security, privacy, performance and deployability properties, and show how these systems map to the attack model. We do this for each of the functional phases that we identify for censorship resistance systems: communication establishment, which involves distribution and retrieval of information necessary for a client to join the censorship resistance system; and conversation, where actual exchange of information takes place. Our evaluation leads us to identify gaps in the literature, question the assumptions at play, and explore possible mitigations. DOI 10.1515/popets-2016-0028 Received 2015-08-31; revised 2016-06-02; accepted 2016-06-02.
منابع مشابه
Systemization of Pluggable Transports for Censorship Resistance
An increasing number of countries implement Internet censorship at different scales and for a variety of reasons. In particular, the link between the censored client and entry point to the uncensored network is a frequent target of censorship due to the ease with which a nation-state censor can control it. A number of censorship resistance systems have been developed thus far to help circumvent...
متن کاملCORDON—A Taxonomy of Internet Censorship Resistance Strategies
We present a taxonomy of Internet censorship resistance strategies and techniques extracted from analyzing proposed and implemented systems. We categorize the strategies into the following six types to form the CORDON taxonomy: Collateral damage, where the damage caused by censorship would outweigh its benefits; Outside scope of influence, where the censor is powerless to act due to it having n...
متن کاملComparing uncertainty data in epistemic and ontic sense used to decision making problem
In the paper aspect of comparability alternatives in decision making problem by imprecise or incomplete information isexamined. In particular, new definitions of transitivity based on the measure of the intensity preference between pairsof alternatives in epistemic and ontic case is presented and its application to solve decision making problem is proposed.
متن کاملCommunications Disruption & Censorship under International Law: History Lessons
With Internet censorship on the rise around the world, a variety of tools have proliferated to assist Internet users to circumvent such censorship. However, there are few studies examining the implications of censorship circumvention under international law, and its related politics. This paper aims to help fill some of that void, with an examination of case studies wherein global communication...
متن کاملSecure asymmetry and deployability for decoy routing systems
Censorship circumvention is often characterized as a cat-and-mouse game between a nation-state censor and the developers of censorship resistance systems. Decoy routing systems offer a solution to censorship resistance that has the potential to tilt this race in the favour of the censorship resistor by using real connections to unblocked, overt sites to deliver censored content to users. This i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- PoPETs
دوره 2016 شماره
صفحات -
تاریخ انتشار 2016