├── LICENSE └── README.md /LICENSE: -------------------------------------------------------------------------------- 1 | MIT License 2 | 3 | Copyright (c) 2018 shadowsocks 4 | 5 | Permission is hereby granted, free of charge, to any person obtaining a copy 6 | of this software and associated documentation files (the "Software"), to deal 7 | in the Software without restriction, including without limitation the rights 8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 9 | copies of the Software, and to permit persons to whom the Software is 10 | furnished to do so, subject to the following conditions: 11 | 12 | The above copyright notice and this permission notice shall be included in all 13 | copies or substantial portions of the Software. 14 | 15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 21 | SOFTWARE. 22 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # List of papers related to shadowsocks 2 | 3 | ## 2014 4 | 5 | * GoHop: Personal VPN to defend from censorship. [ICACT'14] [PDF](http://icact.org/upload/2014/0096/20140096_finalpaper.pdf) 6 | 7 | ## 2015 8 | 9 | * Multipath TCP with real Smartphone applications. [PDF](https://dial.uclouvain.be/memoire/ucl/en/object/thesis:366/datastream/PDF_01/view) 10 | * Poster: Evaluating Android Applications with Multipath TCP. [MobiCom '15] [PDF](https://inl.info.ucl.ac.be/system/files/mobicom2015.pdf) 11 | 12 | ## 2016 13 | 14 | * Observing real smartphone applications over multipath TCP. [PDF](https://inl.info.ucl.ac.be/system/files/ieee_communications2016.pdf) 15 | * An in-depth understanding of multipath TCP on mobile devices: measurement and system design. [MobiCom'16] [PDF](https://dl.acm.org/citation.cfm?id=2973769) 16 | * A First Analysis of Multipath TCP on Smartphones. [PAM'16] [PDF](https://dial.uclouvain.be/downloader/downloader.php?pid=boreal:171195&datastream=PDF_01) 17 | 18 | ## 2017 19 | 20 | * The Random Forest based Detection of Shadowsock's Traffic. [IHMSC '17] [PDF](https://www.directory-root.com/wp-content/uploads/2018/02/Shadowsocks-Sniffing.pdf) 21 | * Accessing google scholar under extreme internet censorship: a legal avenue. [Middleware '17] [PDF](http://www.greenorbs.org/people/lzh/papers/[Middleware'17]%20ScholarCloud.pdf) 22 | * Multipath cloud federation. [CloudNet'17] [PDF](https://research.aalto.fi/files/17110121/EuCNC_extension.pdf) 23 | * Multipath TCP in Smartphones: Impact on Performance, Energy, and CPU Utilization. [MobiWac '17] [PDF](https://cse.buffalo.edu/faculty/dimitrio/publications/mobiwac17.pdf) 24 | * Threat modeling and circumvention of Internet censorship. [PDF](https://cloudfront.escholarship.org/dist/prd/content/qt0bh5c50p/qt0bh5c50p.pdf) 25 | 26 | ## 2018 27 | 28 | * Revisiting Website Fingerprinting Attacks in Real-World Scenarios: A Case Study of Shadowsocks. [NSS'18] [PDF](https://link.springer.com/chapter/10.1007/978-3-030-02744-5_24) 29 | * Poster: Design of SOCKS Version 6. [SIGCOMM '18] [PDF](https://dl.acm.org/citation.cfm?id=3234212) 30 | * Adversarial Attacks Against Profile HMM Website Fingerprinting Detection Model. [CogSys '18] [PDF](https://www.sciencedirect.com/science/article/pii/S1389041718309446) 31 | * Website Fingerprinting Attack on Anonymity Networks Based on Profile Hidden Markov Model. [TIFS '18] [PDF](https://ieeexplore.ieee.org/abstract/document/8067534) 32 | * AME Blockchain: An Architecture Design for Closed-Loop Fluid Economy Token System. [PDF](https://arxiv.org/pdf/1812.08017) 33 | * Pinpoint: fast and precise sparse value flow analysis for million lines of code. [PLDI '18] [PDF](http://www.cs.ust.hk/~charlesz/pinpoint.pdf) 34 | 35 | ## 2019 36 | 37 | * Flow Context and Host Behavior Based ShadowSocks's Traffic Identification. [IEEE Access] [PDF](https://ieeexplore.ieee.org/iel7/6287639/6514899/08676111.pdf) 38 | * Mobile Encrypted Traffic Classification Using Deep Learning: Experimental Evaluation, Lessons Learned, and Challenges. [IEEE Transactions on Network and Service Management] [Abstract](https://ieeexplore.ieee.org/abstract/document/8640262) 39 | 40 | ## 2020 41 | 42 | * Detecting Probe-resistant Proxies. [NDSS'20] [Abstract](https://www.ndss-symposium.org/ndss-paper/detecting-probe-resistant-proxies/) 43 | * ACER: detecting Shadowsocks server based on active probe technology. [J Comput Virol Hack Tech 16, 217–227 (2020)] [Abstract](https://link.springer.com/article/10.1007/s11416-020-00353-z) 44 | * HTTPT: A Probe-Resistant Proxy. [FOCI'20] [Abstract](https://www.usenix.org/conference/foci20/presentation/frolov) 45 | * How China Detects and Blocks Shadowsocks. [IMC'20] [Abstract](https://dl.acm.org/doi/abs/10.1145/3419394.3423644) 46 | * Partitioning Oracle Attacks. [USENIX Security'21] [Abstract](https://www.usenix.org/conference/usenixsecurity21/presentation/len) 47 | --------------------------------------------------------------------------------