Back to Results
First PageMeta Content
Videotelephony / Computer network security / Skype / Streaming / Skype protocol / Session Initiation Protocol / Network address translation / Transmission Control Protocol / Real-time Transport Protocol / Voice over IP / Software / Computing


The Parrot is Dead: Observing Unobservable Network Communications Amir Houmansadr Chad Brubaker Vitaly Shmatikov The University of Texas at Austin
Add to Reading List

Document Date: 2013-03-05 11:26:10


Open Document

File Size: 240,54 KB

Share Result on Facebook

Company

HTTP / Skype / Intel / Microsoft / Tor / /

Country

Egypt / Cuba / Australia / North Korea / China / Italy / Iran / Libya / Syria / /

Event

Product Issues / Force Majeure / /

Facility

Observing Unobservable Network Communications Amir Houmansadr Chad Brubaker Vitaly Shmatikov The University of Texas / TCP port / UDP port / /

IndustryTerm

Internet access / unobservable communications / congestion cause media applications / session control protocol / genuine protocol / application-layer protocol / parrot Web server / sub-protocols / given protocol / server software / wrong protocol / client software / httprecon tool / communication systems / hypothetical systems / similar tools / circumvention systems / media transmission / ample processing / hierarchical detection tool / genuine protocols / proposed parrot circumvention systems / unobservable communication systems / target protocol / media stream / systems / relay media / sequence number generation algorithms / Web server / analyzed parrot systems / login server / proposed parrot systems / consistent software fingerprint / media protocols / network protocols / communications indistinguishable from another protocol / anonymous communication systems / Apache server / parrot circumvention systems / uncensored target protocol / Web browsers / higher-level protocols / aggressive Internet censorship / censorship circumvention systems / parrot systems / censorship-resistant Web browsing / real-time detection / real-time deep-packet inspection / few network devices / compromised home routers / Internet entities / censorshipresistant communications / media transmission protocol / Web servers / address selection algorithm / location services / censorship-resistant communication systems / search engines / server fingerprinting tool / unpopular protocol / covert communications / inter-dependent sub-protocols / sister protocol / /

OperatingSystem

Unix / VMs / Windows 7 / Ubuntu / Mac OS X / Linux / /

Organization

University of Texas at Austin / /

Person

Twinkle / Amir Houmansadr Chad Brubaker Vitaly / /

Position

public Ekiga registrar / SIP registrar / registrar / /

Product

TCP / SQL injection / StegoTorus server / SkypeMorph+ / imitation / StegoTorus / /

ProgrammingLanguage

SQL / Python / /

ProvinceOrState

Texas / /

Technology

sequence number generation algorithms / RAM / media transmission protocol / higher-level protocols / Real-time Transport Protocol / imitated protocols / Linux / target protocol / instant messaging / secret key / operating system / Encryption / three protocols / compromised home routers / application-layer protocol / network address translation / ISP / VoIP protocols / given protocol / Session Initiation Protocol / sister protocol / unpopular protocol / Real-time Transport Control Protocol / address selection algorithm / genuine protocol / Unix / P2P / UDP / SSL / operating systems / uncensored target protocol / Wi-Fi / PDF / side protocol / Ethernet / mechanisms.2 Streaming media protocols / genuine protocols / public key / DNS / Firewall / session control protocol / HTTP / Voice-over-IP / VOIP / inter-dependent sub-protocols / Web server / network protocols / /

URL

http /

SocialTag