@inproceedings{55137,
  abstract     = {{Many countries limit their residents' access to various websites. As a substantial number of these websites do not support TLS encryption, censorship of unencrypted HTTP requests remains prevalent. Accordingly, circumvention techniques can and have been found for the HTTP protocol. In this paper, we infer novel circumvention techniques on the HTTP layer from a web security vulnerability by utilizing HTTP request smuggling (HRS). To demonstrate the viability of our techniques, we collected various test vectors from previous work about HRS and evaluated them on popular web servers and censors in China, Russia, and Iran. Our findings show that HRS can be successfully employed as a censorship circumvention technique against multiple censors and web servers. We also discover a standard-compliant circumvention technique in Russia, unusually inconsistent censorship in China, and an implementation bug in Iran. The results of this work imply that censorship circumvention techniques can successfully be constructed from existing vulnerabilities. We conjecture that this implication provides insights to the censorship circumvention community beyond the viability of specific techniques presented in this work.}},
  author       = {{Müller, Philipp and Niere, Niklas and Lange, Felix and Somorovsky, Juraj}},
  booktitle    = {{Proceedings on Privacy Enhancing Technologies}},
  keywords     = {{censorship, censorship circumvention, http, http request smuggling}},
  location     = {{Bristol}},
  title        = {{{Turning Attacks into Advantages: Evading HTTP Censorship with HTTP Request Smuggling}}},
  year         = {{2024}},
}

