default search action
Kevin Bock 0001
Person information
- affiliation: University of Maryland, MD, USA
Other persons with the same name
- Kevin Bock 0002 (aka: Kevin R. Bock) — Northwell Health, New York, NY, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2020
- [j1]Kevin Bock, Dave Levin:
Automating the censorship arms race. XRDS 27(2): 30-35 (2020)
Conference and Workshop Papers
- 2023
- [c14]Abdulrahman Alaraj, Kevin Bock, Dave Levin, Eric Wustrow:
A Global Measurement of Routing Loops on the Internet. PAM 2023: 373-399 - [c13]Ram Sundara Raman, Louis-Henri Merino, Kevin Bock, Marwan Fayed, Dave Levin, Nick Sullivan, Luke Valenta:
Global, Passive Detection of Connection Tampering. SIGCOMM 2023: 622-636 - [c12]Mingshi Wu, Jackson Sippe, Danesh Sivakumar, Jack Burg, Peter Anderson, Xiaokang Wang, Kevin Bock, Amir Houmansadr, Dave Levin, Eric Wustrow:
How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic. USENIX Security Symposium 2023: 2653-2670 - [c11]Sadia Nourin, Van Hong Tran, Xi Jiang, Kevin Bock, Nick Feamster, Nguyen Phong Hoang, Dave Levin:
Measuring and Evading Turkmenistan's Internet Censorship: A Case Study in Large-Scale Measurements of a Low-Penetration Country. WWW 2023: 1969-1979 - 2022
- [c10]Michael Harrity, Kevin Bock, Frederick Sell, Dave Levin:
GET /out: Automated Discovery of Application-Layer Censorship Evasion Strategies. USENIX Security Symposium 2022: 465-483 - 2021
- [c9]Kevin Bock, Gabriel Naval, Kyle Reese, Dave Levin:
Even Censors Have a Backup: Examining China's Double HTTPS Censorship Middleboxes. FOCI@SIGCOMM 2021: 1-7 - [c8]Kevin Bock, Pranav Bharadwaj, Jasraj Singh, Dave Levin:
Your Censor is My Censor: Weaponizing Censorship Infrastructure for Availability Attacks. SP (Workshops) 2021: 398-409 - [c7]Kevin Bock, Abdulrahman Alaraj, Yair Fax, Kyle Hurley, Eric Wustrow, Dave Levin:
Weaponizing Middleboxes for TCP Reflected Amplification. USENIX Security Symposium 2021: 3345-3361 - 2020
- [c6]Kevin Bock, George Hughey, Louis-Henri Merino, Tania Arya, Daniel Liscinsky, Regina Pogosian, Dave Levin:
Come as You Are: Helping Unmodified Clients Bypass Censorship with Server-side Evasion. SIGCOMM 2020: 586-598 - [c5]Kevin Bock, Yair Fax, Kyle Reese, Jasraj Singh, Dave Levin:
Detecting and Evading Censorship-in-Depth: A Case Study of Iran's Protocol Whitelister. FOCI @ USENIX Security Symposium 2020 - 2019
- [c4]Kevin Bock, George Hughey, Xiao Qiang, Dave Levin:
Geneva: Evolving Censorship Evasion Strategies. CCS 2019: 2199-2214 - 2018
- [c3]Kevin Bock, George Hughey, Dave Levin:
King of the Hill: A Novel Cybersecurity Competition for Teaching Penetration Testing. ASE @ USENIX Security Symposium 2018 - 2017
- [c2]Kevin Bock, Sydnee Shannon, Yazdan Movahedi, Michel Cukier:
Application of Routine Activity Theory to Cyber Intrusion Location and Time. EDCC 2017: 139-146 - [c1]Kevin Bock, Daven Patel, George Hughey, Dave Levin:
unCaptcha: A Low-Resource Defeat of reCaptcha's Audio Challenge. WOOT 2017
Informal and Other Publications
- 2023
- [i1]Sadia Nourin, Van Hong Tran, Xi Jiang, Kevin Bock, Nick Feamster, Nguyen Phong Hoang, Dave Levin:
Measuring and Evading Turkmenistan's Internet Censorship: A Case Study in Large-Scale Measurements of a Low-Penetration Country. CoRR abs/2304.04835 (2023)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-14 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint