{unCaptcha}: A {Low-Resource} Defeat of {reCaptcha's} Audio Challenge K Bock, D Patel, G Hughey, D Levin 11th USENIX Workshop on Offensive Technologies (WOOT 17), 2017 | 66 | 2017 |
Geneva: Evolving censorship evasion strategies K Bock, G Hughey, X Qiang, D Levin Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 65 | 2019 |
Weaponizing Middleboxes for TCP Reflected Amplification K Bock, A Alaraj, Y Fax, K Hurley, E Wustrow, D Levin 30th USENIX Security Symposium (USENIX Security 21), 2021 | 39 | 2021 |
King of the hill: A novel cybersecurity competition for teaching penetration testing K Bock, G Hughey, D Levin 2018 USENIX Workshop on Advances in Security Education (ASE 18), 2018 | 36 | 2018 |
Come as you are: Helping unmodified clients bypass censorship with server-side evasion K Bock, G Hughey, LH Merino, T Arya, D Liscinsky, R Pogosian, D Levin Proceedings of the Annual conference of the ACM Special Interest Group on …, 2020 | 28 | 2020 |
Detecting and evading censorship-in-depth: A case study of Iran’s protocol filter K Bock, Y Fax, K Reese, J Singh, D Levin USENIX FOCI, 2020 | 28* | 2020 |
How the Great Firewall of China detects and blocks fully encrypted traffic M Wu, J Sippe, D Sivakumar, J Burg, P Anderson, X Wang, K Bock, ... 32nd USENIX Security Symposium (USENIX Security 23), 2653-2670, 2023 | 18 | 2023 |
Application of routine activity theory to cyber intrusion location and time K Bock, S Shannon, Y Movahedi, M Cukier 2017 13th European Dependable Computing Conference (EDCC), 139-146, 2017 | 18 | 2017 |
Exposing and Circumventing China’s Censorship of ESNI K Bock, iyouport, Anonymous, D Merino, Louis-Henri, Fifield, ... https://geneva.cs.umd.edu/posts/china-censors-esni/esni/, 2020 | 16* | 2020 |
Even censors have a backup: Examining china's double https censorship middleboxes K Bock, G Naval, K Reese, D Levin Proceedings of the ACM SIGCOMM 2021 Workshop on Free and Open Communications …, 2021 | 15 | 2021 |
{GET}/out: Automated discovery of {Application-Layer} censorship evasion strategies M Harrity, K Bock, F Sell, D Levin 31st USENIX Security Symposium (USENIX Security 22), 465-483, 2022 | 10 | 2022 |
Your censor is my censor: Weaponizing censorship infrastructure for availability attacks K Bock, P Bharadwaj, J Singh, D Levin 2021 IEEE Security and Privacy Workshops (SPW), 398-409, 2021 | 10 | 2021 |
iyouport, Anonymous, L K Bock H. Merino, D. Fifield, A. Houmansadr, and D. Levin,“Exposing and …, 2020 | 7 | 2020 |
Measuring and Evading Turkmenistan’s Internet Censorship S Nourin, XJ Van Tran, K Bock, N Feamster, NP Hoang, D Levin International World Wide Web Conference (WWW), 2023 | 6 | 2023 |
Measuring and evading turkmenistan’s internet censorship: A case study in large-scale measurements of a low-penetration country S Nourin, V Tran, X Jiang, K Bock, N Feamster, NP Hoang, D Levin Proceedings of the ACM Web Conference 2023, 1969-1979, 2023 | 4 | 2023 |
A Global Measurement of Routing Loops on the Internet A Alaraj, K Bock, D Levin, E Wustrow International Conference on Passive and Active Network Measurement, 373-399, 2023 | 2 | 2023 |
Global, Passive Detection of Connection Tampering R Sundara Raman, LH Merino, K Bock, M Fayed, D Levin, N Sullivan, ... Proceedings of the ACM SIGCOMM 2023 Conference, 622-636, 2023 | 1 | 2023 |
Towards a Comprehensive Understanding of Russian Transit Censorship A Ortwein, K Bock, D Levin Free and Open Communications on the Internet, 2023 | 1 | 2023 |
Detecting Network Interference Without Endpoint Participation S Nourin, K Bock, NP Hoang, D Levin Free and Open Communications on the Internet, 2023 | 1 | 2023 |
Automating the censorship arms race K Bock, D Levin XRDS: Crossroads, The ACM Magazine for Students 27 (2), 30-35, 2020 | 1 | 2020 |