Revealing Middlebox Interference with Tracebox

ACM IMC 2013 [Paper] Middleboxes in a network are deployed to perform a variety of functions like IP Translation, Packet Inspection, Caching etc. But, by definition, they violate the end-to-end principle of the internet since those functions need to be performed in the end-host and not intermediary boxes. While they're…

Read this article

Towards Illuminating a Censorship Monitor’s Model to Facilitate Evasion

USENIX - FOCI 2013 [Paper] In this paper, the authors analyze the censorship model of The Great Firewall (GFW) and how it is vulnerable to certain circumvention attacks. They find that GFW only performs analysis on the contents of a full HTTP request, letting through other packets and requests (even…

Read this article