Award Abstract # 2145783
CAREER: Combating Censorship from within the Network

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: THE REGENTS OF THE UNIVERSITY OF COLORADO
Initial Amendment Date: March 17, 2022
Latest Amendment Date: May 16, 2025
Award Number: 2145783
Award Instrument: Continuing Grant
Program Manager: Xiaogang (Cliff) Wang
xiawang@nsf.gov
 (703)292-2812
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: May 1, 2022
End Date: April 18, 2025 (Estimated)
Total Intended Award Amount: $569,911.00
Total Awarded Amount to Date: $458,019.00
Funds Obligated to Date: FY 2022 = $100,737.00
FY 2023 = $103,407.00

FY 2024 = $253,875.00
History of Investigator:
  • Eric Wustrow (Principal Investigator)
    ewust@colorado.edu
Recipient Sponsored Research Office: University of Colorado at Boulder
3100 MARINE ST
Boulder
CO  US  80309-0001
(303)492-6221
Sponsor Congressional District: 02
Primary Place of Performance: University of Colorado at Boulder
3100 Marine Street, Room 481
Boulder
CO  US  80303-1058
Primary Place of Performance
Congressional District:
02
Unique Entity Identifier (UEI): SPVKK1RC2MZ3
Parent UEI:
NSF Program(s): Secure &Trustworthy Cyberspace
Primary Program Source: 01002223DB NSF RESEARCH & RELATED ACTIVIT
01002526DB NSF RESEARCH & RELATED ACTIVIT

01002324DB NSF RESEARCH & RELATED ACTIVIT

01002627DB NSF RESEARCH & RELATED ACTIVIT

01002425DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 1045, 025Z
Program Element Code(s): 806000
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

Over half of the world?s Internet population live in countries that censor political, social, or religious content online, and authoritarian governments continue to design and deploy increasingly sophisticated censorship systems. Internet censorship is thus a significant and growing threat, making research into circumvention technologies an important priority. While in the past proxies and (Virtual Private Networks) VPNs could be used to circumvent censorship, today, censors use complex techniques to find and block existing circumvention resources. This project proposes new ways to study and combat Internet censorship around the world by adopting a perspective similar to the censor?s themselves, and leveraging Internet infrastructure in non-censoring countries. First, this infrastructure will be used to measure ?normal? Internet traffic, so that circumvention proxies can learn what to mimic in order to camouflage their activity and evade detection. Second, this project will use those findings and the network infrastructure itself to create new kinds of proxies that are harder for censors to block. Studying and combatting censorship from the network perspective will help level the playing field between censors and circumvention tool developers, ultimately supporting Internet users? autonomy and access to information globally, including the billions of people worldwide living in repressively censored regions.

This work will use network taps deployed at (Internet Service Providers) ISPs and Internet Exchange Points (IXPs) in non-censoring countries to measure popular Internet protocols and how they are used in practice, develop novel ways to detect new and emerging forms of censorship, and explore how existing proxies and circumvention strategies can be improved using ISP data. Building on the growing Refraction Networking deployment, this work also investigates new ways that the ISP perspective can be used to combat censorship directly, such as improvements in Refraction transports to better resist active probing attacks from censors, implementing peer-to-peer proxy protocols that are harder for censors to detect and block, and finding ways to directly make censorship more expensive for governments in practice.

This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

, Gaukas Wang and , Anonymous and , Jackson Sippe and , Hai Chi and , Eric Wustrow "Chasing Shadows: A security analysis of the ShadowTLS proxy" Free and Open Communications on the Internet , 2023 Citation Details
, George Arnold Sullivan and , Jackson Sippe and , Nadia Heninger and , Eric Wustrow "Open to a fault: On the passive compromise of TLS keys via transient errors" Proceedings of the USENIX Security Symposium , 2022 Citation Details
, Mingshi Wu and , Jackson Sippe and , Danesh Sivakumar and , Jack Burg and , Peter Anderson and , Xiaokang Wang and , Kevin Bock and , Amir Houmansadr and , Dave Levin and , Eric Wustrow "How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic" Proceedings of the USENIX Security Symposium , 2023 Citation Details

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page