| {unCaptcha}: A {Low-Resource} Defeat of {reCaptcha's} Audio Challenge K Bock, D Patel, G Hughey, D Levin 11th USENIX Workshop on Offensive Technologies (WOOT 17), 2017 | 59 | 2017 |
| Geneva: Evolving censorship evasion strategies K Bock, G Hughey, X Qiang, D Levin Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 43 | 2019 |
| King of the hill: A novel cybersecurity competition for teaching penetration testing K Bock, G Hughey, D Levin 2018 USENIX Workshop on Advances in Security Education (ASE 18), 2018 | 30 | 2018 |
| Come as you are: Helping unmodified clients bypass censorship with server-side evasion K Bock, G Hughey, LH Merino, T Arya, D Liscinsky, R Pogosian, D Levin Proceedings of the Annual conference of the ACM Special Interest Group on …, 2020 | 18 | 2020 |
| Detecting and evading censorship-in-depth: A case study of Iran’s protocol filter K Bock, Y Fax, K Reese, J Singh, D Levin Free and Open Communications on the Internet, 2020 | 13* | 2020 |
| Application of routine activity theory to cyber intrusion location and time K Bock, S Shannon, Y Movahedi, M Cukier 2017 13th European Dependable Computing Conference (EDCC), 139-146, 2017 | 13 | 2017 |
| Weaponizing Middleboxes for TCP Reflected Amplification K Bock, A Alaraj, Y Fax, K Hurley, E Wustrow, D Levin 30th USENIX Security Symposium (USENIX Security 21), 2021 | 8 | 2021 |
| Exposing and Circumventing China’s Censorship of ESNI K Bock, iyouport, Anonymous, D Merino, Louis-Henri, Fifield, ... https://geneva.cs.umd.edu/posts/china-censors-esni/esni/, 2020 | 8* | 2020 |
| Even Censors Have a Backup: Examining China's Double HTTPS Censorship Middleboxes K Bock, G Naval, K Reese, D Levin Proceedings of the ACM SIGCOMM 2021 Workshop on Free and Open Communications …, 2021 | 6 | 2021 |
| {GET}/out: Automated Discovery of {Application-Layer} Censorship Evasion Strategies M Harrity, K Bock, F Sell, D Levin 31st USENIX Security Symposium (USENIX Security 22), 465-483, 2022 | 2 | 2022 |
| Your Censor is My Censor: Weaponizing Censorship Infrastructure for Availability Attacks K Bock, P Bharadwaj, J Singh, D Levin 2021 IEEE Security and Privacy Workshops (SPW), 398-409, 2021 | 2 | 2021 |
| Automating the censorship arms race K Bock, D Levin XRDS: Crossroads, The ACM Magazine for Students 27 (2), 30-35, 2020 | | 2020 |
| Automating the Discovery of Censorship Evasion Strategies K Bock Georgia Institute of Technology, 2020 | | 2020 |
| Revocation Checking-why is this still so hard? K Bock | | |
| Detecting and Evading Censorship-in-Depth: A Case Study of Iran’s Protocol Filter K Bock, Y Fax, K Reese, J Singh, D Levin | | |