Version 716 has been released for Linux (64 and 32-bit) and Mac. In this version Xdisp Qt becomes the default frame display program.
Meet our award-winning researchers >
See our full researcher index >
However, if you get a research summary template that stipulates otherwise from your professor, you have to follow it. Name your partners and give information about the makeup of the lab, or field.
Houmansadr et al. evaluate “parrot” systems that imitate another protocol and conclude that unobservability by imitation is fundamentally flawed. To fully mimic a complex and sometimes proprietary protocol like Skype is difficult, because the system must imitate not only the normal operation of the protocol, but also its reaction to errors, its typical traffic patterns, and quirks of implementations. Geddes et al. demonstrate that even non-parrot systems may be vulnerable to attacks that disrupt circumvention while having little effect on ordinary traffic. Their examination includes VoIP protocols, in which packet loss and duplication are acceptable. The censor may, for example, strategically drop certain packets in order to disrupt a covert channel, without much harming ordinary calls.