Follow
Kevin Bock
Kevin Bock
Verified email at terpmail.umd.edu
Title
Cited by
Cited by
Year
Geneva: Evolving censorship evasion strategies
K Bock, G Hughey, X Qiang, D Levin
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
652019
{unCaptcha}: A {Low-Resource} Defeat of {reCaptcha's} Audio Challenge
K Bock, D Patel, G Hughey, D Levin
11th USENIX Workshop on Offensive Technologies (WOOT 17), 2017
652017
Weaponizing Middleboxes for TCP Reflected Amplification
K Bock, A Alaraj, Y Fax, K Hurley, E Wustrow, D Levin
30th USENIX Security Symposium (USENIX Security 21), 2021
372021
King of the hill: A novel cybersecurity competition for teaching penetration testing
K Bock, G Hughey, D Levin
2018 USENIX Workshop on Advances in Security Education (ASE 18), 2018
352018
Come as you are: Helping unmodified clients bypass censorship with server-side evasion
K Bock, G Hughey, LH Merino, T Arya, D Liscinsky, R Pogosian, D Levin
Proceedings of the Annual conference of the ACM Special Interest Group on …, 2020
282020
Detecting and evading censorship-in-depth: A case study of Iran’s protocol filter
K Bock, Y Fax, K Reese, J Singh, D Levin
USENIX FOCI, 2020
28*2020
Application of routine activity theory to cyber intrusion location and time
K Bock, S Shannon, Y Movahedi, M Cukier
2017 13th European Dependable Computing Conference (EDCC), 139-146, 2017
182017
Exposing and Circumventing China’s Censorship of ESNI
K Bock, iyouport, Anonymous, D Merino, Louis-Henri, Fifield, ...
https://geneva.cs.umd.edu/posts/china-censors-esni/esni/, 2020
16*2020
How the Great Firewall of China detects and blocks fully encrypted traffic
M Wu, J Sippe, D Sivakumar, J Burg, P Anderson, X Wang, K Bock, ...
32nd USENIX Security Symposium (USENIX Security 23), 2653-2670, 2023
152023
Even censors have a backup: Examining china's double https censorship middleboxes
K Bock, G Naval, K Reese, D Levin
Proceedings of the ACM SIGCOMM 2021 Workshop on Free and Open Communications …, 2021
152021
{GET}/out: Automated discovery of {Application-Layer} censorship evasion strategies
M Harrity, K Bock, F Sell, D Levin
31st USENIX Security Symposium (USENIX Security 22), 465-483, 2022
102022
Your censor is my censor: Weaponizing censorship infrastructure for availability attacks
K Bock, P Bharadwaj, J Singh, D Levin
2021 IEEE Security and Privacy Workshops (SPW), 398-409, 2021
102021
Measuring and Evading Turkmenistan’s Internet Censorship
S Nourin, XJ Van Tran, K Bock, N Feamster, NP Hoang, D Levin
International World Wide Web Conference (WWW), 2023
62023
Measuring and evading turkmenistan’s internet censorship: A case study in large-scale measurements of a low-penetration country
S Nourin, V Tran, X Jiang, K Bock, N Feamster, NP Hoang, D Levin
Proceedings of the ACM Web Conference 2023, 1969-1979, 2023
32023
A Global Measurement of Routing Loops on the Internet
A Alaraj, K Bock, D Levin, E Wustrow
International Conference on Passive and Active Network Measurement, 373-399, 2023
22023
Global, Passive Detection of Connection Tampering
R Sundara Raman, LH Merino, K Bock, M Fayed, D Levin, N Sullivan, ...
Proceedings of the ACM SIGCOMM 2023 Conference, 622-636, 2023
12023
Detecting Network Interference Without Endpoint Participation
S Nourin, K Bock, NP Hoang, D Levin
Free and Open Communications on the Internet, 2023
12023
Automating the censorship arms race
K Bock, D Levin
XRDS: Crossroads, The ACM Magazine for Students 27 (2), 30-35, 2020
12020
Towards a Comprehensive Understanding of Russian Transit Censorship
A Ortwein, K Bock, D Levin
Free and Open Communications on the Internet, 2023
2023
Crowdsourcing the Discovery of Server-side Censorship Evasion Strategies
N Tran, K Bock, D Levin
Free and Open Communications on the Internet, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20