Authors: Alice, Bob, Carol, Jan Beznazwy, Amir Houmansadr
Internet Measurement Conference (IMC) 2020
The open dataset contains code and datasets for the paper: How China Detects and Blocks Shadowsocks.
We introduce the major components of the dataset below.
paper directory includes:
code/pp.sh Parallelly Parses all pcap files in a specified directory;
then it sorts packets by the timestamps and prints to stdin.
pp.sh path/to/pcap/dir > experiment_name.csv
The script requires
apt install tshark parallel # Debian-based dnf install tshark parallel # Fedora-based
code/triggering_client_server includes the source code of the clients and sink/responding servers used in Section 4.1.
code/prober_simulator includes the source code of the prober simulators introduced in Section 5.1.
It can simulate both random and replay-based probes.
One can use it to check if other Shadowsocks implementations (or other circumvention tools) have similar vulnerabilities introduced in the paper.