Follow
Kevin Bock
Kevin Bock
Verified email at terpmail.umd.edu
Title
Cited by
Cited by
Year
{unCaptcha}: A {Low-Resource} Defeat of {reCaptcha's} Audio Challenge
K Bock, D Patel, G Hughey, D Levin
11th USENIX Workshop on Offensive Technologies (WOOT 17), 2017
592017
Geneva: Evolving censorship evasion strategies
K Bock, G Hughey, X Qiang, D Levin
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
432019
King of the hill: A novel cybersecurity competition for teaching penetration testing
K Bock, G Hughey, D Levin
2018 USENIX Workshop on Advances in Security Education (ASE 18), 2018
302018
Come as you are: Helping unmodified clients bypass censorship with server-side evasion
K Bock, G Hughey, LH Merino, T Arya, D Liscinsky, R Pogosian, D Levin
Proceedings of the Annual conference of the ACM Special Interest Group on …, 2020
182020
Detecting and evading censorship-in-depth: A case study of Iran’s protocol filter
K Bock, Y Fax, K Reese, J Singh, D Levin
Free and Open Communications on the Internet, 2020
13*2020
Application of routine activity theory to cyber intrusion location and time
K Bock, S Shannon, Y Movahedi, M Cukier
2017 13th European Dependable Computing Conference (EDCC), 139-146, 2017
132017
Weaponizing Middleboxes for TCP Reflected Amplification
K Bock, A Alaraj, Y Fax, K Hurley, E Wustrow, D Levin
30th USENIX Security Symposium (USENIX Security 21), 2021
82021
Exposing and Circumventing China’s Censorship of ESNI
K Bock, iyouport, Anonymous, D Merino, Louis-Henri, Fifield, ...
https://geneva.cs.umd.edu/posts/china-censors-esni/esni/, 2020
8*2020
Even Censors Have a Backup: Examining China's Double HTTPS Censorship Middleboxes
K Bock, G Naval, K Reese, D Levin
Proceedings of the ACM SIGCOMM 2021 Workshop on Free and Open Communications …, 2021
62021
{GET}/out: Automated Discovery of {Application-Layer} Censorship Evasion Strategies
M Harrity, K Bock, F Sell, D Levin
31st USENIX Security Symposium (USENIX Security 22), 465-483, 2022
22022
Your Censor is My Censor: Weaponizing Censorship Infrastructure for Availability Attacks
K Bock, P Bharadwaj, J Singh, D Levin
2021 IEEE Security and Privacy Workshops (SPW), 398-409, 2021
22021
Automating the censorship arms race
K Bock, D Levin
XRDS: Crossroads, The ACM Magazine for Students 27 (2), 30-35, 2020
2020
Automating the Discovery of Censorship Evasion Strategies
K Bock
Georgia Institute of Technology, 2020
2020
Revocation Checking-why is this still so hard?
K Bock
Detecting and Evading Censorship-in-Depth: A Case Study of Iran’s Protocol Filter
K Bock, Y Fax, K Reese, J Singh, D Levin
The system can't perform the operation now. Try again later.
Articles 1–15