File tree Expand file tree Collapse file tree 1 file changed +19
-0
lines changed Expand file tree Collapse file tree 1 file changed +19
-0
lines changed Original file line number Diff line number Diff line change
1
+ @inproceedings {Fan2025a ,
2
+ author = { Shencha Fan and Jackson Sippe and Sakamoto San and Jade Sheffey and David Fifield and Amir Houmansadr and Elson Wedwards and Eric Wustrow} ,
3
+ title = { {Wallbleed}: A Memory Disclosure Vulnerability in the {Great Firewall} of {China}} ,
4
+ booktitle = { Network and Distributed System Security} ,
5
+ publisher = { The Internet Society} ,
6
+ year = { 2025} ,
7
+ url = { https://gfw.report/publications/ndss25/data/paper/wallbleed.pdf} ,
8
+ discussion_url = { https://github.com/net4people/bbs/issues/456} ,
9
+ }
10
+
11
+ @inproceedings {Xue2025a ,
12
+ author = { Diwen Xue and Robert Stanley and Piyush Kumar and Roya Ensafi} ,
13
+ title = { The Discriminative Power of Cross-layer {RTT}s in Fingerprinting Proxy Traffic} ,
14
+ booktitle = { Network and Distributed System Security} ,
15
+ publisher = { The Internet Society} ,
16
+ year = { 2025} ,
17
+ url = { https://www.ndss-symposium.org/wp-content/uploads/2025-966-paper.pdf} ,
18
+ }
19
+
1
20
@inproceedings {Wang2025a ,
2
21
author = { Wayne Wang and Diwen Xue and Piyush Kumar and Ayush Mishra and Anonymous and Roya Ensafi} ,
3
22
title = { Is Custom Congestion Control a Bad Idea for Circumvention Tools?} ,
You can’t perform that action at this time.
0 commit comments