Overview
Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore a comprehensive analysis of Internet censorship circumvention techniques in this 17-minute IEEE conference talk. Delve into the empirical study of real-world censorship practices, examining measurement studies, field reports, and practitioner bug tickets. Evaluate both deployed and proposed circumvention methods against observed censor behaviors, identifying gaps in current research approaches. Gain insights into realigning censorship circumvention research with contemporary challenges, covering topics such as censorship scenarios, sensors, attack types, and evaluation criteria including activeness and robustness.
Syllabus
Introduction
Censorship Scenario
Sensors
Attack Types
Research
Evaluation
Analysis
Activeness
Robustness
Summary
Taught by
IEEE Symposium on Security and Privacy