David Fifield

According to our database1, David Fifield authored at least 19 papers between 2012 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Comments on certain past cryptographic flaws affecting fully encrypted censorship circumvention protocols.
IACR Cryptol. ePrint Arch., 2023

SEDES: Metrical Position in Greek Hexameter.
Digit. Humanit. Q., 2023

Network Responses to Russia's Invasion of Ukraine in 2022: A Cautionary Tale for Internet Freedom.
Proceedings of the 32nd USENIX Security Symposium, 2023

2020
Turbo Tunnel, a good way to design censorship circumvention protocols.
Proceedings of the 10th USENIX Workshop on Free and Open Communications on the Internet, 2020

2019
A better zip bomb.
Proceedings of the 13th USENIX Workshop on Offensive Technologies, 2019

2017
Threat modeling and circumvention of Internet censorship.
PhD thesis, 2017

A Usability Evaluation of Tor Launcher.
Proc. Priv. Enhancing Technol., 2017

Detecting Censor Detection.
CoRR, 2017

2016
Proxy Blocking Latency.
CoRR, 2016

Fingerprintability of WebRTC.
CoRR, 2016

Censors' Delay in Blocking Circumvention Proxies.
Proceedings of the 6th USENIX Workshop on Free and Open Communications on the Internet, 2016

Do You See What I See? Differential Treatment of Anonymous Users.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
Blocking-resistant communication through domain fronting.
Proc. Priv. Enhancing Technol., 2015

Unsupervised authorship attribution.
CoRR, 2015

Examining How the Great Firewall Discovers Hidden Circumvention Servers.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

Fingerprinting Web Users Through Font Metrics.
Proceedings of the Financial Cryptography and Data Security, 2015

Remote Operating System Classification over IPv6.
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, 2015

2013
OSS: Using Online Scanning Services for Censorship Circumvention.
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013

2012
Evading Censorship with Browser-Based Proxies.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012


  Loading...