[{"_id":"64566","user_id":"63563","ddc":["006"],"file_date_updated":"2026-02-21T10:20:16Z","language":[{"iso":"eng"}],"type":"conference","abstract":[{"lang":"eng","text":"Censorship is employed by many governments and ISPs worldwide, with an increasing trend in recent years. One of the most censored protocols is DNS: censors target unencrypted and encrypted DNS to prevent clients from resolving the domain name of unwanted websites. Despite much research on DNS censorship, only a few tools can circumvent it.To support users affected by DNS censorship, we present DPYProxy-DNS, a DNS resolver that automatically detects and employs a working DNS censorship circumvention. We demonstrate the effectiveness of DPYProxy-DNS by automatically circumventing DNS censorship in China and Iran and analyzing DNS censorship mechanisms in these countries. Our analyses re veal that DNS censorship in Iran is ineffective against encrypted DNS. In China, DPYProxy-DNS revealed two consistently working circumvention techniques for unencrypted DNS: TCP segmentation for DNS over TCP and ignoring DNS responses injected by the Great Firewall of China (GFW). Our findings reveal varying levels of DNS censorship across different countries, underscoring the importance of the automated circumvention approach we provide with DPYProxy-DNS."}],"status":"public","file":[{"date_created":"2026-02-20T14:34:05Z","creator":"nniklas","date_updated":"2026-02-21T10:20:16Z","access_level":"open_access","file_name":"foci-2026-0001.pdf","file_id":"64568","file_size":775133,"content_type":"application/pdf","relation":"main_file"}],"oa":"1","date_updated":"2026-02-21T10:20:16Z","author":[{"id":"67893","full_name":"Lange, Felix","last_name":"Lange","first_name":"Felix"},{"first_name":"Niklas","last_name":"Niere","id":"63563","full_name":"Niere, Niklas"},{"orcid":"0000-0002-3593-7720","last_name":"Somorovsky","id":"83504","full_name":"Somorovsky, Juraj","first_name":"Juraj"}],"date_created":"2026-02-20T14:35:34Z","title":"Towards Automated DNS Censorship Circumvention","conference":{"end_date":"2026-02-19","location":"Virtual","name":"Free and Open Communications on the Internet","start_date":"2026-02-19"},"main_file_link":[{"url":"https://www.petsymposium.org/foci/2026/foci-2026-0001.pdf","open_access":"1"}],"has_accepted_license":"1","year":"2026","citation":{"apa":"Lange, F., Niere, N., &#38; Somorovsky, J. (2026). <i>Towards Automated DNS Censorship Circumvention</i>. Free and Open Communications on the Internet, Virtual.","ama":"Lange F, Niere N, Somorovsky J. Towards Automated DNS Censorship Circumvention. In: ; 2026.","mla":"Lange, Felix, et al. <i>Towards Automated DNS Censorship Circumvention</i>. 2026.","short":"F. Lange, N. Niere, J. Somorovsky, in: 2026.","bibtex":"@inproceedings{Lange_Niere_Somorovsky_2026, title={Towards Automated DNS Censorship Circumvention}, author={Lange, Felix and Niere, Niklas and Somorovsky, Juraj}, year={2026} }","chicago":"Lange, Felix, Niklas Niere, and Juraj Somorovsky. “Towards Automated DNS Censorship Circumvention,” 2026.","ieee":"F. Lange, N. Niere, and J. Somorovsky, “Towards Automated DNS Censorship Circumvention,” presented at the Free and Open Communications on the Internet, Virtual, 2026."}},{"ddc":["006"],"language":[{"iso":"eng"}],"file_date_updated":"2025-02-24T08:07:59Z","_id":"58801","department":[{"_id":"632"}],"user_id":"63563","abstract":[{"text":"Iran employs one of the most prominent Internet censors in the world. An important part of Iran’s censorship apparatus is its analysis of unencrypted protocols such as HTTP and DNS. During routine evaluations of Iran’s HTTP and DNS censorship, we noticed several properties we believe to be unknown today. For instance, we found injections of correct static IPs for some domains such as google.com on the DNS level, unclear HTTP version parsing, and correlations between DNS and HTTP censorship. In this paper, we present our findings to the community and discuss possible takeaways for affected people and the censorship circumvention community. As some of our findings left us bewildered, we hope to ignite a discussion about Iran’s censorship behavior. We aim to use the discussion of our work to execute a thorough analysis and explanation of Iran’s censorship behavior in the future.","lang":"eng"}],"status":"public","file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2025-02-24T08:07:59Z","date_created":"2025-02-24T08:07:59Z","creator":"flange","file_size":535700,"file_id":"58802","access_level":"closed","file_name":"foci-2025-0002.pdf"}],"publication":"Proceedings on Privacy Enhancing Technologies","type":"conference","title":"I(ra)nconsistencies: Novel Insights into Iran’s Censorship","conference":{"location":"Virtual","end_date":"2025-02-20","start_date":"2025-02-20","name":"Free and Open Communications on the Internet"},"main_file_link":[{"url":"https://www.petsymposium.org/foci/2025/foci-2025-0002.pdf","open_access":"1"}],"date_updated":"2025-05-06T13:48:32Z","oa":"1","author":[{"last_name":"Lange","id":"67893","full_name":"Lange, Felix","first_name":"Felix"},{"last_name":"Niere","full_name":"Niere, Niklas","id":"63563","first_name":"Niklas"},{"first_name":"Jonathan","last_name":"von Niessen","full_name":"von Niessen, Jonathan"},{"last_name":"Suermann","full_name":"Suermann, Dennis","first_name":"Dennis"},{"first_name":"Nico","id":"74619","full_name":"Heitmann, Nico","orcid":"0009-0003-7687-7044","last_name":"Heitmann"},{"first_name":"Juraj","last_name":"Somorovsky","orcid":"0000-0002-3593-7720","full_name":"Somorovsky, Juraj","id":"83504"}],"date_created":"2025-02-24T08:09:56Z","year":"2025","citation":{"ama":"Lange F, Niere N, von Niessen J, Suermann D, Heitmann N, Somorovsky J. I(ra)nconsistencies: Novel Insights into Iran’s Censorship. In: <i>Proceedings on Privacy Enhancing Technologies</i>. ; 2025.","ieee":"F. Lange, N. Niere, J. von Niessen, D. Suermann, N. Heitmann, and J. Somorovsky, “I(ra)nconsistencies: Novel Insights into Iran’s Censorship,” presented at the Free and Open Communications on the Internet, Virtual, 2025.","chicago":"Lange, Felix, Niklas Niere, Jonathan von Niessen, Dennis Suermann, Nico Heitmann, and Juraj Somorovsky. “I(Ra)Nconsistencies: Novel Insights into Iran’s Censorship.” In <i>Proceedings on Privacy Enhancing Technologies</i>, 2025.","apa":"Lange, F., Niere, N., von Niessen, J., Suermann, D., Heitmann, N., &#38; Somorovsky, J. (2025). I(ra)nconsistencies: Novel Insights into Iran’s Censorship. <i>Proceedings on Privacy Enhancing Technologies</i>. Free and Open Communications on the Internet, Virtual.","bibtex":"@inproceedings{Lange_Niere_von Niessen_Suermann_Heitmann_Somorovsky_2025, title={I(ra)nconsistencies: Novel Insights into Iran’s Censorship}, booktitle={Proceedings on Privacy Enhancing Technologies}, author={Lange, Felix and Niere, Niklas and von Niessen, Jonathan and Suermann, Dennis and Heitmann, Nico and Somorovsky, Juraj}, year={2025} }","short":"F. Lange, N. Niere, J. von Niessen, D. Suermann, N. Heitmann, J. Somorovsky, in: Proceedings on Privacy Enhancing Technologies, 2025.","mla":"Lange, Felix, et al. “I(Ra)Nconsistencies: Novel Insights into Iran’s Censorship.” <i>Proceedings on Privacy Enhancing Technologies</i>, 2025."},"has_accepted_license":"1","quality_controlled":"1"},{"year":"2025","date_created":"2025-05-06T13:40:50Z","title":"Transport Layer Obscurity: Circumventing SNI Censorship on the TLS-Layer","publication":"2025 IEEE Symposium on Security and Privacy (SP)","abstract":[{"lang":"eng","text":"HTTPS composes large parts of today’s Internet traffic and has long been subject to censorship efforts in different countries. While censors analyze the Transport Layer Security (TLS) protocol to block encrypted HTTP traffic, censorship circumvention efforts have primarily focused on other protocols such as TCP. In this paper, we hypothesize that the TLS protocol offers previously unseen opportunities for censorship circumvention techniques. We tested our hypothesis by proposing possible censorship circumvention techniques that act on the TLS protocol. To validate the effectiveness of these techniques, we evaluate their acceptance by popular TLS servers and successfully demonstrate that these techniques can circumvent censors in China and Iran. In our evaluations, we discovered 38—partially standard-compliant—distinct censorship circumvention techniques, which we could group into 11 unique categories. Additionally, we provide novel insights into how China censors TLS traffic by presenting evidence of at least three distinct censorship appliances. We suspect that other parts of China’s censorship apparatus and other censors exhibit similar structures and advocate future censorship research to anticipate them. With this work, we hope to aid people affected by censorship and stimulate further\r\nresearch into censorship circumvention using cryptographic protocols."}],"file":[{"file_name":"TLS_Obscurity.pdf","access_level":"open_access","file_id":"59826","file_size":463431,"creator":"nniklas","date_created":"2025-05-06T13:49:35Z","date_updated":"2025-05-06T13:51:45Z","relation":"main_file","content_type":"application/pdf"}],"ddc":["006"],"language":[{"iso":"eng"}],"has_accepted_license":"1","citation":{"mla":"Niere, Niklas, et al. “Transport Layer Obscurity: Circumventing SNI Censorship on the TLS-Layer.” <i>2025 IEEE Symposium on Security and Privacy (SP)</i>, 2025, doi:<a href=\"https://doi.org/10.1109/SP61157.2025.00151\">10.1109/SP61157.2025.00151</a>.","bibtex":"@inproceedings{Niere_Lange_Merget_Somorovsky_2025, title={Transport Layer Obscurity: Circumventing SNI Censorship on the TLS-Layer}, DOI={<a href=\"https://doi.org/10.1109/SP61157.2025.00151\">10.1109/SP61157.2025.00151</a>}, booktitle={2025 IEEE Symposium on Security and Privacy (SP)}, author={Niere, Niklas and Lange, Felix and Merget, Robert and Somorovsky, Juraj}, year={2025} }","short":"N. Niere, F. Lange, R. Merget, J. Somorovsky, in: 2025 IEEE Symposium on Security and Privacy (SP), 2025.","apa":"Niere, N., Lange, F., Merget, R., &#38; Somorovsky, J. (2025). Transport Layer Obscurity: Circumventing SNI Censorship on the TLS-Layer. <i>2025 IEEE Symposium on Security and Privacy (SP)</i>. 46th IEEE Symposium on Security and Privacy, San Francisco. <a href=\"https://doi.org/10.1109/SP61157.2025.00151\">https://doi.org/10.1109/SP61157.2025.00151</a>","ieee":"N. Niere, F. Lange, R. Merget, and J. Somorovsky, “Transport Layer Obscurity: Circumventing SNI Censorship on the TLS-Layer,” presented at the 46th IEEE Symposium on Security and Privacy, San Francisco, 2025, doi: <a href=\"https://doi.org/10.1109/SP61157.2025.00151\">10.1109/SP61157.2025.00151</a>.","chicago":"Niere, Niklas, Felix Lange, Robert Merget, and Juraj Somorovsky. “Transport Layer Obscurity: Circumventing SNI Censorship on the TLS-Layer.” In <i>2025 IEEE Symposium on Security and Privacy (SP)</i>, 2025. <a href=\"https://doi.org/10.1109/SP61157.2025.00151\">https://doi.org/10.1109/SP61157.2025.00151</a>.","ama":"Niere N, Lange F, Merget R, Somorovsky J. Transport Layer Obscurity: Circumventing SNI Censorship on the TLS-Layer. In: <i>2025 IEEE Symposium on Security and Privacy (SP)</i>. ; 2025. doi:<a href=\"https://doi.org/10.1109/SP61157.2025.00151\">10.1109/SP61157.2025.00151</a>"},"date_updated":"2025-06-02T12:03:51Z","oa":"1","author":[{"first_name":"Niklas","last_name":"Niere","id":"63563","full_name":"Niere, Niklas"},{"last_name":"Lange","id":"67893","full_name":"Lange, Felix","first_name":"Felix"},{"full_name":"Merget, Robert","last_name":"Merget","first_name":"Robert"},{"id":"83504","full_name":"Somorovsky, Juraj","orcid":"0000-0002-3593-7720","last_name":"Somorovsky","first_name":"Juraj"}],"conference":{"location":"San Francisco","end_date":"2025-05-14","start_date":"2025-05-12","name":"46th IEEE Symposium on Security and Privacy"},"doi":"10.1109/SP61157.2025.00151","type":"conference","status":"public","_id":"59824","department":[{"_id":"632"}],"user_id":"63563","file_date_updated":"2025-05-06T13:51:45Z"},{"abstract":[{"lang":"eng","text":"Censors have long censored Transport Layer Security (TLS) traffic by inspecting the domain name in the unencrypted Server Name Indication (SNI) extension. By encrypting the SNI extension, the Encrypted ClientHello (ECH) prevents censors from blocking TLS traffic to certain domains. Despite this promising outlook, ECH’s current capability to contest TLS censorship is unclear; for instance, Russia has started censoring ECH connections successfully. This paper clarifies ECH’s current role for TLS censorship. To this end, we evaluate servers’ support for ECH and its analysis and subsequent blocking by censors. We determine Cloudflare as the only major provider supporting ECH. Additionally, we affirm previously known ECH censorship in Russia and uncover indirect censorship of ECH through encrypted DNS censorship in China and Iran. Our findings suggest that ECH’s contribution to censorship circumvention is currently limited: we consider ECH’s dependence on encrypted DNS especially challenging for ECH’s capability to circumvent censorship. We stress the importance of censorship-resistant ECH to solve the long-known problem of SNI-based TLS censorship."}],"status":"public","file":[{"content_type":"application/pdf","relation":"main_file","date_updated":"2025-10-23T14:26:38Z","date_created":"2025-07-03T07:11:14Z","creator":"nniklas","file_size":755171,"access_level":"open_access","file_id":"60505","file_name":"foci-2025-0016.pdf"}],"type":"conference","keyword":["censorship","circumvention","ECH","TLS"],"ddc":["006"],"file_date_updated":"2025-10-23T14:26:38Z","language":[{"iso":"eng"}],"_id":"60503","user_id":"63563","year":"2025","citation":{"apa":"Niere, N., Lange, F., Heitmann, N., &#38; Somorovsky, J. (2025). <i>Encrypted Client Hello (ECH) in Censorship Circumvention</i>. Free and Open Communications on the Internet, Washington, D.C.","mla":"Niere, Niklas, et al. <i>Encrypted Client Hello (ECH) in Censorship Circumvention</i>. 2025.","short":"N. Niere, F. Lange, N. Heitmann, J. Somorovsky, in: 2025.","bibtex":"@inproceedings{Niere_Lange_Heitmann_Somorovsky_2025, title={Encrypted Client Hello (ECH) in Censorship Circumvention}, author={Niere, Niklas and Lange, Felix and Heitmann, Nico and Somorovsky, Juraj}, year={2025} }","ama":"Niere N, Lange F, Heitmann N, Somorovsky J. Encrypted Client Hello (ECH) in Censorship Circumvention. In: ; 2025.","ieee":"N. Niere, F. Lange, N. Heitmann, and J. Somorovsky, “Encrypted Client Hello (ECH) in Censorship Circumvention,” presented at the Free and Open Communications on the Internet, Washington, D.C., 2025.","chicago":"Niere, Niklas, Felix Lange, Nico Heitmann, and Juraj Somorovsky. “Encrypted Client Hello (ECH) in Censorship Circumvention,” 2025."},"has_accepted_license":"1","title":"Encrypted Client Hello (ECH) in Censorship Circumvention","conference":{"end_date":"2025-07-14","location":"Washington, D.C.","name":"Free and Open Communications on the Internet","start_date":"2025-07-14"},"main_file_link":[{"open_access":"1","url":"https://www.petsymposium.org/foci/2025/foci-2025-0016.pdf"}],"oa":"1","date_updated":"2025-10-23T14:26:38Z","date_created":"2025-07-03T07:14:00Z","author":[{"id":"63563","full_name":"Niere, Niklas","last_name":"Niere","first_name":"Niklas"},{"full_name":"Lange, Felix","id":"67893","last_name":"Lange","first_name":"Felix"},{"first_name":"Nico","full_name":"Heitmann, Nico","id":"74619","last_name":"Heitmann","orcid":"0009-0003-7687-7044"},{"first_name":"Juraj","id":"83504","full_name":"Somorovsky, Juraj","orcid":"0000-0002-3593-7720","last_name":"Somorovsky"}]},{"ddc":["006"],"keyword":["censorship","censorship circumvention","http","http request smuggling"],"language":[{"iso":"eng"}],"publication":"Proceedings on Privacy Enhancing Technologies","abstract":[{"lang":"eng","text":"Many countries limit their residents' access to various websites. As a substantial number of these websites do not support TLS encryption, censorship of unencrypted HTTP requests remains prevalent. Accordingly, circumvention techniques can and have been found for the HTTP protocol. In this paper, we infer novel circumvention techniques on the HTTP layer from a web security vulnerability by utilizing HTTP request smuggling (HRS). To demonstrate the viability of our techniques, we collected various test vectors from previous work about HRS and evaluated them on popular web servers and censors in China, Russia, and Iran. Our findings show that HRS can be successfully employed as a censorship circumvention technique against multiple censors and web servers. We also discover a standard-compliant circumvention technique in Russia, unusually inconsistent censorship in China, and an implementation bug in Iran. The results of this work imply that censorship circumvention techniques can successfully be constructed from existing vulnerabilities. We conjecture that this implication provides insights to the censorship circumvention community beyond the viability of specific techniques presented in this work."}],"file":[{"date_created":"2024-07-09T07:42:54Z","creator":"flange","date_updated":"2024-07-09T07:42:54Z","file_id":"55139","file_name":"Turning Attacks into Advantages_ Evading HTTP Censorship with HTTP Request Smuggling - foci-2024-0012.pdf","access_level":"open_access","file_size":189676,"content_type":"application/pdf","relation":"main_file"}],"date_created":"2024-07-09T07:49:37Z","title":"Turning Attacks into Advantages: Evading HTTP Censorship with HTTP Request Smuggling","quality_controlled":"1","year":"2024","_id":"55137","user_id":"67893","department":[{"_id":"632"}],"file_date_updated":"2024-07-09T07:42:54Z","type":"conference","status":"public","oa":"1","date_updated":"2024-07-09T07:49:59Z","author":[{"first_name":"Philipp","full_name":"Müller, Philipp","last_name":"Müller"},{"first_name":"Niklas","id":"63563","full_name":"Niere, Niklas","last_name":"Niere"},{"first_name":"Felix","last_name":"Lange","full_name":"Lange, Felix","id":"67893"},{"full_name":"Somorovsky, Juraj","id":"83504","last_name":"Somorovsky","orcid":"0000-0002-3593-7720","first_name":"Juraj"}],"main_file_link":[{"url":"https://www.petsymposium.org/foci/2024/foci-2024-0012.pdf","open_access":"1"}],"conference":{"end_date":"2024-07-15","location":"Bristol","name":"Free and Open Communications on the Internet 2024 ","start_date":"2024-07-15"},"publication_status":"published","has_accepted_license":"1","place":"Bristol","citation":{"apa":"Müller, P., Niere, N., Lange, F., &#38; Somorovsky, J. (2024). Turning Attacks into Advantages: Evading HTTP Censorship with HTTP Request Smuggling. <i>Proceedings on Privacy Enhancing Technologies</i>. Free and Open Communications on the Internet 2024 , Bristol.","bibtex":"@inproceedings{Müller_Niere_Lange_Somorovsky_2024, place={Bristol}, title={Turning Attacks into Advantages: Evading HTTP Censorship with HTTP Request Smuggling}, booktitle={Proceedings on Privacy Enhancing Technologies}, author={Müller, Philipp and Niere, Niklas and Lange, Felix and Somorovsky, Juraj}, year={2024} }","short":"P. Müller, N. Niere, F. Lange, J. Somorovsky, in: Proceedings on Privacy Enhancing Technologies, Bristol, 2024.","mla":"Müller, Philipp, et al. “Turning Attacks into Advantages: Evading HTTP Censorship with HTTP Request Smuggling.” <i>Proceedings on Privacy Enhancing Technologies</i>, 2024.","chicago":"Müller, Philipp, Niklas Niere, Felix Lange, and Juraj Somorovsky. “Turning Attacks into Advantages: Evading HTTP Censorship with HTTP Request Smuggling.” In <i>Proceedings on Privacy Enhancing Technologies</i>. Bristol, 2024.","ieee":"P. Müller, N. Niere, F. Lange, and J. Somorovsky, “Turning Attacks into Advantages: Evading HTTP Censorship with HTTP Request Smuggling,” presented at the Free and Open Communications on the Internet 2024 , Bristol, 2024.","ama":"Müller P, Niere N, Lange F, Somorovsky J. Turning Attacks into Advantages: Evading HTTP Censorship with HTTP Request Smuggling. In: <i>Proceedings on Privacy Enhancing Technologies</i>. ; 2024."}},{"quality_controlled":"1","citation":{"ama":"Alshomary M, Lange F, Booshehri M, Sengupta M, Cimiano P, Wachsmuth H. Modeling the Quality of Dialogical Explanations. In: Calzolari N, Kan M-Y, Hoste V, Lenci A, Sakti S, Xue N, eds. <i>Proceedings of the 2024 Joint International Conference on Computational Linguistics, Language Resources and Evaluation (LREC-COLING 2024)</i>. ELRA and ICCL; 2024:11523–11536.","apa":"Alshomary, M., Lange, F., Booshehri, M., Sengupta, M., Cimiano, P., &#38; Wachsmuth, H. (2024). Modeling the Quality of Dialogical Explanations. In N. Calzolari, M.-Y. Kan, V. Hoste, A. Lenci, S. Sakti, &#38; N. Xue (Eds.), <i>Proceedings of the 2024 Joint International Conference on Computational Linguistics, Language Resources and Evaluation (LREC-COLING 2024)</i> (pp. 11523–11536). ELRA and ICCL.","bibtex":"@inproceedings{Alshomary_Lange_Booshehri_Sengupta_Cimiano_Wachsmuth_2024, place={Torino, Italia}, title={Modeling the Quality of Dialogical Explanations}, booktitle={Proceedings of the 2024 Joint International Conference on Computational Linguistics, Language Resources and Evaluation (LREC-COLING 2024)}, publisher={ELRA and ICCL}, author={Alshomary, Milad and Lange, Felix and Booshehri, Meisam and Sengupta, Meghdut and Cimiano, Philipp and Wachsmuth, Henning}, editor={Calzolari, Nicoletta and Kan, Min-Yen and Hoste, Veronique and Lenci, Alessandro and Sakti, Sakriani and Xue, Nianwen}, year={2024}, pages={11523–11536} }","short":"M. Alshomary, F. Lange, M. Booshehri, M. Sengupta, P. Cimiano, H. Wachsmuth, in: N. Calzolari, M.-Y. Kan, V. Hoste, A. Lenci, S. Sakti, N. Xue (Eds.), Proceedings of the 2024 Joint International Conference on Computational Linguistics, Language Resources and Evaluation (LREC-COLING 2024), ELRA and ICCL, Torino, Italia, 2024, pp. 11523–11536.","mla":"Alshomary, Milad, et al. “Modeling the Quality of Dialogical Explanations.” <i>Proceedings of the 2024 Joint International Conference on Computational Linguistics, Language Resources and Evaluation (LREC-COLING 2024)</i>, edited by Nicoletta Calzolari et al., ELRA and ICCL, 2024, pp. 11523–11536.","ieee":"M. Alshomary, F. Lange, M. Booshehri, M. Sengupta, P. Cimiano, and H. Wachsmuth, “Modeling the Quality of Dialogical Explanations,” in <i>Proceedings of the 2024 Joint International Conference on Computational Linguistics, Language Resources and Evaluation (LREC-COLING 2024)</i>, 2024, pp. 11523–11536.","chicago":"Alshomary, Milad, Felix Lange, Meisam Booshehri, Meghdut Sengupta, Philipp Cimiano, and Henning Wachsmuth. “Modeling the Quality of Dialogical Explanations.” In <i>Proceedings of the 2024 Joint International Conference on Computational Linguistics, Language Resources and Evaluation (LREC-COLING 2024)</i>, edited by Nicoletta Calzolari, Min-Yen Kan, Veronique Hoste, Alessandro Lenci, Sakriani Sakti, and Nianwen Xue, 11523–11536. Torino, Italia: ELRA and ICCL, 2024."},"page":"11523–11536","place":"Torino, Italia","year":"2024","author":[{"id":"73059","full_name":"Alshomary, Milad","last_name":"Alshomary","first_name":"Milad"},{"last_name":"Lange","full_name":"Lange, Felix","id":"67893","first_name":"Felix"},{"first_name":"Meisam","full_name":"Booshehri, Meisam","last_name":"Booshehri"},{"last_name":"Sengupta","full_name":"Sengupta, Meghdut","id":"99459","first_name":"Meghdut"},{"first_name":"Philipp","last_name":"Cimiano","full_name":"Cimiano, Philipp"},{"first_name":"Henning","full_name":"Wachsmuth, Henning","id":"3900","last_name":"Wachsmuth"}],"date_created":"2024-07-26T13:04:25Z","publisher":"ELRA and ICCL","date_updated":"2024-12-17T11:30:25Z","title":"Modeling the Quality of Dialogical Explanations","type":"conference","publication":"Proceedings of the 2024 Joint International Conference on Computational Linguistics, Language Resources and Evaluation (LREC-COLING 2024)","status":"public","editor":[{"first_name":"Nicoletta","last_name":"Calzolari","full_name":"Calzolari, Nicoletta"},{"full_name":"Kan, Min-Yen","last_name":"Kan","first_name":"Min-Yen"},{"first_name":"Veronique","full_name":"Hoste, Veronique","last_name":"Hoste"},{"full_name":"Lenci, Alessandro","last_name":"Lenci","first_name":"Alessandro"},{"first_name":"Sakriani","full_name":"Sakti, Sakriani","last_name":"Sakti"},{"first_name":"Nianwen","full_name":"Xue, Nianwen","last_name":"Xue"}],"abstract":[{"lang":"eng","text":"Explanations are pervasive in our lives. Mostly, they occur in dialogical form where an explainer discusses a concept or phenomenon of interest with an explainee. Leaving the explainee with a clear understanding is not straightforward due to the knowledge gap between the two participants. Previous research looked at the interaction of explanation moves, dialogue acts, and topics in successful dialogues with expert explainers. However, daily-life explanations often fail, raising the question of what makes a dialogue successful. In this work, we study explanation dialogues in terms of the interactions between the explainer and explainee and how they correlate with the quality of explanations in terms of a successful understanding on the explainee{’}s side. In particular, we first construct a corpus of 399 dialogues from the Reddit forum {Explain Like I am Five} and annotate it for interaction flows and explanation quality. We then analyze the interaction flows, comparing them to those appearing in expert dialogues. Finally, we encode the interaction flows using two language models that can handle long inputs, and we provide empirical evidence for the effectiveness boost gained through the encoding in predicting the success of explanation dialogues."}],"user_id":"67893","department":[{"_id":"600"},{"_id":"660"}],"project":[{"_id":"118","name":"TRR 318 - INF: TRR 318 - Project Area INF"}],"_id":"55404","language":[{"iso":"eng"}]},{"date_updated":"2025-02-27T08:02:30Z","date_created":"2024-12-17T11:25:14Z","author":[{"first_name":"Fabian","full_name":"Bäumer, Fabian","last_name":"Bäumer"},{"first_name":"Marcus","full_name":"Brinkmann, Marcus","last_name":"Brinkmann"},{"first_name":"Nurullah","last_name":"Erinola","full_name":"Erinola, Nurullah"},{"id":"55616","full_name":"Hebrok, Sven Niclas","orcid":"0009-0006-1172-1665","last_name":"Hebrok","first_name":"Sven Niclas"},{"full_name":"Heitmann, Nico","id":"74619","orcid":"0009-0003-7687-7044","last_name":"Heitmann","first_name":"Nico"},{"first_name":"Felix","last_name":"Lange","id":"67893","full_name":"Lange, Felix"},{"first_name":"Marcel","last_name":"Maehren","full_name":"Maehren, Marcel"},{"full_name":"Merget, Robert","last_name":"Merget","first_name":"Robert"},{"first_name":"Niklas","full_name":"Niere, Niklas","id":"63563","last_name":"Niere"},{"first_name":"Maximilian Manfred","full_name":"Radoy, Maximilian Manfred","id":"68826","orcid":"0009-0005-3059-6823","last_name":"Radoy"},{"first_name":"Conrad","full_name":"Schmidt, Conrad","last_name":"Schmidt"},{"full_name":"Schwenk, Jörg","last_name":"Schwenk","first_name":"Jörg"},{"first_name":"Juraj","full_name":"Somorovsky, Juraj","id":"83504","orcid":"0000-0002-3593-7720","last_name":"Somorovsky"}],"title":"TLS-Attacker: A Dynamic Framework for Analyzing TLS Implementations","conference":{"start_date":"2024-12-09","name":"Annual Computer Security Applications Conference","location":"Hawaii","end_date":"2024-12-13"},"quality_controlled":"1","year":"2024","citation":{"ieee":"F. Bäumer <i>et al.</i>, “TLS-Attacker: A Dynamic Framework for Analyzing TLS Implementations,” presented at the Annual Computer Security Applications Conference, Hawaii, 2024.","chicago":"Bäumer, Fabian, Marcus Brinkmann, Nurullah Erinola, Sven Niclas Hebrok, Nico Heitmann, Felix Lange, Marcel Maehren, et al. “TLS-Attacker: A Dynamic Framework for Analyzing TLS Implementations.” In <i>Proceedings of Cybersecurity Artifacts Competition and Impact Award (ACSAC ’24)</i>, 2024.","ama":"Bäumer F, Brinkmann M, Erinola N, et al. TLS-Attacker: A Dynamic Framework for Analyzing TLS Implementations. In: <i>Proceedings of Cybersecurity Artifacts Competition and Impact Award (ACSAC ’24)</i>. ; 2024.","bibtex":"@inproceedings{Bäumer_Brinkmann_Erinola_Hebrok_Heitmann_Lange_Maehren_Merget_Niere_Radoy_et al._2024, title={TLS-Attacker: A Dynamic Framework for Analyzing TLS Implementations}, booktitle={Proceedings of Cybersecurity Artifacts Competition and Impact Award (ACSAC ’24)}, author={Bäumer, Fabian and Brinkmann, Marcus and Erinola, Nurullah and Hebrok, Sven Niclas and Heitmann, Nico and Lange, Felix and Maehren, Marcel and Merget, Robert and Niere, Niklas and Radoy, Maximilian Manfred and et al.}, year={2024} }","short":"F. Bäumer, M. Brinkmann, N. Erinola, S.N. Hebrok, N. Heitmann, F. Lange, M. Maehren, R. Merget, N. Niere, M.M. Radoy, C. Schmidt, J. Schwenk, J. Somorovsky, in: Proceedings of Cybersecurity Artifacts Competition and Impact Award (ACSAC ’24), 2024.","mla":"Bäumer, Fabian, et al. “TLS-Attacker: A Dynamic Framework for Analyzing TLS Implementations.” <i>Proceedings of Cybersecurity Artifacts Competition and Impact Award (ACSAC ’24)</i>, 2024.","apa":"Bäumer, F., Brinkmann, M., Erinola, N., Hebrok, S. N., Heitmann, N., Lange, F., Maehren, M., Merget, R., Niere, N., Radoy, M. M., Schmidt, C., Schwenk, J., &#38; Somorovsky, J. (2024). TLS-Attacker: A Dynamic Framework for Analyzing TLS Implementations. <i>Proceedings of Cybersecurity Artifacts Competition and Impact Award (ACSAC ’24)</i>. Annual Computer Security Applications Conference, Hawaii."},"_id":"57816","user_id":"67893","department":[{"_id":"632"}],"keyword":["SSL","TLS","DTLS","Protocol State Fuzzing","Planning Based"],"language":[{"iso":"eng"}],"type":"conference","publication":"Proceedings of Cybersecurity Artifacts Competition and Impact Award (ACSAC ’24)","abstract":[{"lang":"eng","text":"TLS-Attacker is an open-source framework for analyzing Transport\r\nLayer Security (TLS) implementations. The framework allows users\r\nto specify custom protocol flows and provides modification hooks to\r\nmanipulate message contents. Since its initial publication in 2016 by\r\nJuraj Somorovsky, TLS-Attacker has been used in numerous studies\r\npublished at well-established conferences and helped to identify\r\nvulnerabilities in well-known open-source TLS libraries. To enable\r\nautomated analyses, TLS-Attacker has grown into a suite of projects,\r\neach designed as a building block that can be applied to facilitate\r\nvarious analysis methodologies. The framework still undergoes\r\ncontinuous improvements with feature extensions, such as DTLS\r\n1.3 or the addition of new dialects such as QUIC, to continue its\r\neffectiveness and relevancy as a security analysis framework."}],"status":"public"},{"year":"2023","quality_controlled":"1","title":"Modeling Appropriate Language in Argumentation","date_created":"2023-12-19T14:02:20Z","file":[{"date_updated":"2023-12-19T13:58:33Z","date_created":"2023-12-19T13:58:33Z","creator":"flange","file_size":1061941,"access_level":"open_access","file_name":"2023.acl-long.238.pdf","file_id":"49883","content_type":"application/pdf","relation":"main_file"}],"abstract":[{"lang":"eng","text":"Online discussion moderators must make ad-hoc decisions about whether the contributions of discussion participants are appropriate or should be removed to maintain civility. Existing research on offensive language and the resulting tools cover only one aspect among many involved in such decisions. The question of what is considered appropriate in a controversial discussion has not yet been systematically addressed. In this paper, we operationalize appropriate language in argumentation for the first time. In particular, we model appropriateness through the absence of flaws, grounded in research on argument quality assessment, especially in aspects from rhetoric. From these, we derive a new taxonomy of 14 dimensions that determine inappropriate language in online discussions. Building on three argument quality corpora, we then create a corpus of 2191 arguments annotated for the 14 dimensions. Empirical analyses support that the taxonomy covers the concept of appropriateness comprehensively, showing several plausible correlations with argument quality dimensions. Moreover, results of baseline approaches to assessing appropriateness suggest that all dimensions can be modeled computationally on the corpus."}],"publication":"Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics","language":[{"iso":"eng"}],"ddc":["004"],"page":"4344-4363","citation":{"chicago":"Ziegenbein, Timon, Shahbaz Syed, Felix Lange, Martin Potthast, and Henning Wachsmuth. “Modeling Appropriate Language in Argumentation.” In <i>Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics</i>, 4344–63, 2023. <a href=\"https://doi.org/10.18653/v1/2023.acl-long.238\">https://doi.org/10.18653/v1/2023.acl-long.238</a>.","ieee":"T. Ziegenbein, S. Syed, F. Lange, M. Potthast, and H. Wachsmuth, “Modeling Appropriate Language in Argumentation,” in <i>Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics</i>, Toronto, 2023, pp. 4344–4363, doi: <a href=\"https://doi.org/10.18653/v1/2023.acl-long.238\">https://doi.org/10.18653/v1/2023.acl-long.238</a>.","ama":"Ziegenbein T, Syed S, Lange F, Potthast M, Wachsmuth H. Modeling Appropriate Language in Argumentation. In: <i>Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics</i>. ; 2023:4344-4363. doi:<a href=\"https://doi.org/10.18653/v1/2023.acl-long.238\">https://doi.org/10.18653/v1/2023.acl-long.238</a>","short":"T. Ziegenbein, S. Syed, F. Lange, M. Potthast, H. Wachsmuth, in: Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics, 2023, pp. 4344–4363.","bibtex":"@inproceedings{Ziegenbein_Syed_Lange_Potthast_Wachsmuth_2023, title={Modeling Appropriate Language in Argumentation}, DOI={<a href=\"https://doi.org/10.18653/v1/2023.acl-long.238\">https://doi.org/10.18653/v1/2023.acl-long.238</a>}, booktitle={Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics}, author={Ziegenbein, Timon and Syed, Shahbaz and Lange, Felix and Potthast, Martin and Wachsmuth, Henning}, year={2023}, pages={4344–4363} }","mla":"Ziegenbein, Timon, et al. “Modeling Appropriate Language in Argumentation.” <i>Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics</i>, 2023, pp. 4344–63, doi:<a href=\"https://doi.org/10.18653/v1/2023.acl-long.238\">https://doi.org/10.18653/v1/2023.acl-long.238</a>.","apa":"Ziegenbein, T., Syed, S., Lange, F., Potthast, M., &#38; Wachsmuth, H. (2023). Modeling Appropriate Language in Argumentation. <i>Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics</i>, 4344–4363. <a href=\"https://doi.org/10.18653/v1/2023.acl-long.238\">https://doi.org/10.18653/v1/2023.acl-long.238</a>"},"has_accepted_license":"1","publication_status":"published","conference":{"location":"Toronto","end_date":"2023-07-14","start_date":"2023-07-09","name":"61st Annual Meeting of the Association for Computational Linguistics"},"doi":"https://doi.org/10.18653/v1/2023.acl-long.238","author":[{"last_name":"Ziegenbein","full_name":"Ziegenbein, Timon","first_name":"Timon"},{"first_name":"Shahbaz","full_name":"Syed, Shahbaz","last_name":"Syed"},{"first_name":"Felix","last_name":"Lange","full_name":"Lange, Felix","id":"67893"},{"first_name":"Martin","full_name":"Potthast, Martin","last_name":"Potthast"},{"first_name":"Henning","full_name":"Wachsmuth, Henning","last_name":"Wachsmuth"}],"oa":"1","date_updated":"2024-05-21T17:03:05Z","status":"public","type":"conference","file_date_updated":"2023-12-19T13:58:33Z","user_id":"67893","_id":"49882"}]
