Awesome
List of papers related to shadowsocks
2014
- GoHop: Personal VPN to defend from censorship. [ICACT'14] PDF
2015
- Multipath TCP with real Smartphone applications. PDF
- Poster: Evaluating Android Applications with Multipath TCP. [MobiCom '15] PDF
2016
- Observing real smartphone applications over multipath TCP. PDF
- An in-depth understanding of multipath TCP on mobile devices: measurement and system design. [MobiCom'16] PDF
- A First Analysis of Multipath TCP on Smartphones. [PAM'16] PDF
2017
- The Random Forest based Detection of Shadowsock's Traffic. [IHMSC '17] PDF
- Accessing google scholar under extreme internet censorship: a legal avenue. [Middleware '17] PDF
- Multipath cloud federation. [CloudNet'17] PDF
- Multipath TCP in Smartphones: Impact on Performance, Energy, and CPU Utilization. [MobiWac '17] PDF
- Threat modeling and circumvention of Internet censorship. PDF
2018
- Revisiting Website Fingerprinting Attacks in Real-World Scenarios: A Case Study of Shadowsocks. [NSS'18] PDF
- Poster: Design of SOCKS Version 6. [SIGCOMM '18] PDF
- Adversarial Attacks Against Profile HMM Website Fingerprinting Detection Model. [CogSys '18] PDF
- Website Fingerprinting Attack on Anonymity Networks Based on Profile Hidden Markov Model. [TIFS '18] PDF
- AME Blockchain: An Architecture Design for Closed-Loop Fluid Economy Token System. PDF
- Pinpoint: fast and precise sparse value flow analysis for million lines of code. [PLDI '18] PDF
2019
- Flow Context and Host Behavior Based ShadowSocks's Traffic Identification. [IEEE Access] PDF
- Mobile Encrypted Traffic Classification Using Deep Learning: Experimental Evaluation, Lessons Learned, and Challenges. [IEEE Transactions on Network and Service Management] Abstract
2020
- Detecting Probe-resistant Proxies. [NDSS'20] Abstract
- ACER: detecting Shadowsocks server based on active probe technology. [J Comput Virol Hack Tech 16, 217–227 (2020)] Abstract
- HTTPT: A Probe-Resistant Proxy. [FOCI'20] Abstract
- How China Detects and Blocks Shadowsocks. [IMC'20] Abstract
- Partitioning Oracle Attacks. [USENIX Security'21] Abstract