{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:38:21Z","timestamp":1730299101535,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1109\/spw.2019.00046","type":"proceedings-article","created":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T00:07:22Z","timestamp":1568938042000},"page":"205-211","source":"Crossref","is-referenced-by-count":5,"title":["Analysing Censorship Circumvention with VPNs Via DNS Cache Snooping"],"prefix":"10.1109","author":[{"given":"Oliver","family":"Farnan","sequence":"first","affiliation":[]},{"given":"Joss","family":"Wright","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Darer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"TorGuard DNS Leak Test","year":"2018","key":"ref33"},{"journal-title":"Tor Relay Guide","year":"2018","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278574"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3103\/S0146411615080155"},{"journal-title":"Openvpn","year":"2001","author":"yonan","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08506-7_16"},{"journal-title":"DNS Leaks","year":"2018","author":"townsend","key":"ref34"},{"journal-title":"DNS Google Public DNS","year":"2018","key":"ref10"},{"key":"ref11","first-page":"95","article-title":"Poi-soning the well: Exploring the great firewall's poisoned dns responses","author":"oliver","year":"0","journal-title":"Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society"},{"journal-title":"How To Bypass Censorship in Russia","year":"2018","author":"golden","key":"ref12"},{"journal-title":"DNS Cache Snooping Or Snooping the Cache for Fun and Profit","year":"2004","author":"luis","key":"ref13"},{"key":"ref14"},{"journal-title":"China moves to block internet VPNs from 2018","year":"2017","author":"benjamin","key":"ref15"},{"journal-title":"Bypass Censorship","year":"2018","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2793013.2793015"},{"key":"ref18","first-page":"10","article-title":"DNS prefetching and its privacy implications: when good things go bad","author":"srinivas","year":"0","journal-title":"Proceedings of the 3rd USENIX conference on Large-scale exploits and emergent threats botnets spyware worms and more USENIX Association"},{"journal-title":"Apple removes apps that bypass China's censors","year":"2017","author":"hannah","key":"ref19"},{"journal-title":"ropensci\/cld3","year":"2018","author":"jason","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7626"},{"journal-title":"Reuters Russia designates Radio Free Europe and Voice of America as foreign agents","year":"2017","key":"ref27"},{"key":"ref3","first-page":"2","article-title":"Scanning the Internet for Liveness","volume":"48 2","author":"shehar","year":"2018","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.27"},{"journal-title":"BYPASS INTERNET CENSORSHIP WITH VPN\/PROXIES","year":"2018","author":"charles","key":"ref29"},{"journal-title":"Psiphon","year":"2018","key":"ref5"},{"key":"ref8","first-page":"1","article-title":"Fil-teredWeb: A framework for the automated search-based discovery of blocked URLs","author":"alexander","year":"0","journal-title":"2017 Network Traffic Measurement and Analysis Conference (TMA) TMA"},{"key":"ref7"},{"key":"ref2","article-title":"Internet Censorship in Iran: A First Look","author":"simurgh","year":"2013","journal-title":"FOCI"},{"journal-title":"Tor The second-generation onion router Technical report","year":"2004","author":"roger","key":"ref9"},{"key":"ref1","article-title":"vpwns: Virtual pwned networks","author":"appelbaum","year":"0","journal-title":"2nd USENIX Workshop on Free and Open Communications on the Internet USENIX Association"},{"journal-title":"Welcome to Majestic Million","year":"2018","author":"majestic","key":"ref20"},{"key":"ref22","article-title":"The Anatomy of Web Censorship in Pakistan","author":"zubair","year":"2013","journal-title":"FOCI"},{"journal-title":"Advanced cryptographic ratcheting","year":"2013","author":"moxie","key":"ref21"},{"key":"ref24","article-title":"Exclusive: How the (synced) Cookie Monster breached my encrypted VPN session","author":"panagiotis","year":"0","journal-title":"Proceedings of the 11th European Workshop on Systems Security"},{"journal-title":"NordVPN - DNS Leak Test","year":"2018","key":"ref23"},{"key":"ref26","article-title":"Anonymity, privacy, and security online","volume":"5","author":"lee","year":"2013","journal-title":"Pew Research Center"},{"key":"ref25","first-page":"77","article-title":"A glance through the VPN looking glass: IPv6 leakage and DNS hijacking in commercial VPN clients","volume":"1","author":"vasile","year":"0","journal-title":"Proceedings on Privacy Enhancing Technologies 2015"}],"event":{"name":"2019 IEEE Security and Privacy Workshops (SPW)","start":{"date-parts":[[2019,5,19]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2019,5,23]]}},"container-title":["2019 IEEE Security and Privacy Workshops (SPW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8834415\/8844588\/08844606.pdf?arnumber=8844606","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T20:21:06Z","timestamp":1658262066000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8844606\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/spw.2019.00046","relation":{},"subject":[],"published":{"date-parts":[[2019,5]]}}}
  NODES
Association 2
INTERN 5