Encrypted Traffic Justine Sherry Chang Lan Raluca Ada Popa Sylvia Ratnasamy University of California / University Network / University of SIGCOMM / OT Extension library / BlindBox library / /
IndustryTerm
naïve algorithm / clever tokenization algorithm / client software / probable cause protocol / middlebox systems / botnet software / target applications / naïve tokenization protocol / rule preparation algorithm / intrusion detection protocol / client software uses / using either protocol / on this protocol / tokenization algorithm / probable cause privacy protocol / search tree / computing / detection algorithm / criminal law / from_server / encryption algorithm / detection protocol / supported using protocol / /
NaturalFeature
SSL channel / /
OperatingSystem
DoS / /
Organization
Encrypted Traffic Justine Sherry Chang Lan Raluca Ada Popa Sylvia Ratnasamy University / Co. IDS / ISP Service / University of California / Berkeley / U.S. Securities and Exchange Commission / University of SIGCOMM / Electronic Filtering Foundation / /
Person
HTTP IDS / Bob / Alice / /
Position
model for traffic privacy called probable cause privacy / system administrator / General / administrator / /
Product
BlindBox Detect / DPIEnc / Sec. / /
ProvinceOrState
Manitoba / California / /
Technology
LAN / three algorithms / 3.4 Protocol / php / probable cause privacy protocol / rule encryption / encryption algorithm / naïve tokenization protocol / API / block cipher / 2.1 Protocol / obfuscated rule encryption / detection protocol / two protocols / secret key / html / SSL / obfuscated algorithm / clever tokenization algorithm / intrusion detection protocol / IDS Security guarantee Our protocols / probable cause protocol / encryption / BlindBox HTTPS protocol / cryptography / same encryption / tokenization algorithm / public key / three protocols / client software uses Protocol / previous two protocols / naïve algorithm / SSL protocol / HTTP / 8 6 Protocol / ISP / completely supported using protocol / third protocol / digital signature / client/server / traffic Protocol / detection algorithm / DPIEnc Match algorithm / rule preparation algorithm / 2 Protocol / /