{"id":"https://openalex.org/W1996430944","doi":"https://doi.org/10.1145/2810103.2813607","title":"Security by Any Other Name","display_name":"Security by Any Other Name","publication_year":2015,"publication_date":"2015-10-06","ids":{"openalex":"https://openalex.org/W1996430944","doi":"https://doi.org/10.1145/2810103.2813607","mag":"1996430944"},"language":"en","primary_location":{"id":"doi:10.1145/2810103.2813607","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2810103.2813607","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102971677","display_name":"Ian Foster","orcid":"https://orcid.org/0009-0001-7540-1218"},"institutions":[{"id":"https://openalex.org/I36258959","display_name":"University of California, San Diego","ror":"https://ror.org/0168r3w48","country_code":"US","type":"education","lineage":["https://openalex.org/I36258959"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ian D. Foster","raw_affiliation_strings":["University of California, San Diego, San Diego, CA, USA"],"affiliations":[{"raw_affiliation_string":"University of California, San Diego, San Diego, CA, USA","institution_ids":["https://openalex.org/I36258959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112128503","display_name":"Jon Larson","orcid":null},"institutions":[{"id":"https://openalex.org/I36258959","display_name":"University of California, San Diego","ror":"https://ror.org/0168r3w48","country_code":"US","type":"education","lineage":["https://openalex.org/I36258959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jon Larson","raw_affiliation_strings":["University of California, San Diego, San Diego, CA, USA"],"affiliations":[{"raw_affiliation_string":"University of California, San Diego, San Diego, CA, USA","institution_ids":["https://openalex.org/I36258959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088549329","display_name":"Max Masich","orcid":null},"institutions":[{"id":"https://openalex.org/I36258959","display_name":"University of California, San Diego","ror":"https://ror.org/0168r3w48","country_code":"US","type":"education","lineage":["https://openalex.org/I36258959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Max Masich","raw_affiliation_strings":["University of California, San Diego, San Diego, CA, Samoa","University of California, San Diego, San Diego, CA, Samoa#TAB#"],"affiliations":[{"raw_affiliation_string":"University of California, San Diego, San Diego, CA, Samoa","institution_ids":["https://openalex.org/I36258959"]},{"raw_affiliation_string":"University of California, San Diego, San Diego, CA, Samoa#TAB#","institution_ids":["https://openalex.org/I36258959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029890607","display_name":"Alex C. Snoeren","orcid":"https://orcid.org/0000-0001-5679-3888"},"institutions":[{"id":"https://openalex.org/I36258959","display_name":"University of California, San Diego","ror":"https://ror.org/0168r3w48","country_code":"US","type":"education","lineage":["https://openalex.org/I36258959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alex C. Snoeren","raw_affiliation_strings":["University of California, San Diego, San Diego, CA, USA"],"affiliations":[{"raw_affiliation_string":"University of California, San Diego, San Diego, CA, USA","institution_ids":["https://openalex.org/I36258959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048394730","display_name":"Stefan Savage","orcid":"https://orcid.org/0000-0001-6617-8029"},"institutions":[{"id":"https://openalex.org/I36258959","display_name":"University of California, San Diego","ror":"https://ror.org/0168r3w48","country_code":"US","type":"education","lineage":["https://openalex.org/I36258959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Stefan Savage","raw_affiliation_strings":["University of California, San Diego, San Diego, CA, USA"],"affiliations":[{"raw_affiliation_string":"University of California, San Diego, San Diego, CA, USA","institution_ids":["https://openalex.org/I36258959"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024587249","display_name":"Kirill Levchenko","orcid":"https://orcid.org/0000-0003-4527-9749"},"institutions":[{"id":"https://openalex.org/I36258959","display_name":"University of California, San Diego","ror":"https://ror.org/0168r3w48","country_code":"US","type":"education","lineage":["https://openalex.org/I36258959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kirill Levchenko","raw_affiliation_strings":["University of California, San Diego, San Diego, CA, USA"],"affiliations":[{"raw_affiliation_string":"University of California, San Diego, San Diego, CA, USA","institution_ids":["https://openalex.org/I36258959"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5102971677"],"corresponding_institution_ids":["https://openalex.org/I36258959"],"apc_list":null,"apc_paid":null,"fwci":9.0603,"has_fulltext":false,"cited_by_count":76,"citation_normalized_percentile":{"value":0.97751081,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"450","last_page":"464"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9887999892234802,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.9236303567886353},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7863316535949707},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7643868327140808},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5469130277633667},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.4934498369693756},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.48557135462760925},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4727942645549774},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4614189565181732},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4366990029811859},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.43548205494880676},{"id":"https://openalex.org/keywords/ipsec","display_name":"IPsec","score":0.43470853567123413},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.159714013338089}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.9236303567886353},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7863316535949707},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7643868327140808},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5469130277633667},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.4934498369693756},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.48557135462760925},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4727942645549774},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4614189565181732},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4366990029811859},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.43548205494880676},{"id":"https://openalex.org/C67396069","wikidata":"https://www.wikidata.org/wiki/Q210214","display_name":"IPsec","level":3,"score":0.43470853567123413},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.159714013338089},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2810103.2813607","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2810103.2813607","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.8100000023841858,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1220500775","display_name":null,"funder_award_id":"CNS-1237264","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W1988292309","https://openalex.org/W2021327598","https://openalex.org/W3137303952"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2935909890","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W2368710903"],"abstract_inverted_index":{"Email":[0],"as":[1,57],"we":[2,89,109,190],"use":[3,177],"it":[4],"today":[5],"makes":[6],"no":[7,223],"guarantees":[8],"about":[9],"message":[10,21,34,82,122,220],"integrity,":[11],"authenticity,":[12],"or":[13,37],"confidentiality.":[14],"Users":[15],"must":[16],"explicitly":[17],"encrypt":[18],"and":[19,77,84,100,124,129,133,151,194,222],"sign":[20],"contents":[22],"using":[23,239],"tools":[24],"like":[25],"PGP":[26],"if":[27],"they":[28,126],"wish":[29],"to":[30,49,59,168],"protect":[31,79],"themselves":[32],"against":[33,68,80,212,217,225,234],"tampering,":[35],"forgery,":[36,221],"eavesdropping.":[38],"However,":[39],"few":[40,186],"do,":[41],"leaving":[42],"the":[43,73,91,144,163,173,188,205,235],"vast":[44],"majority":[45],"of":[46,66,106,143,178,187],"users":[47],"open":[48],"such":[50],"attacks.":[51,71,171,228],"Fortunately,":[52],"transport-layer":[53],"security":[54,92],"mechanisms":[55],"(available":[56],"extensions":[58],"SMTP,":[60],"IMAP,":[61],"POP3)":[62],"provide":[63],"some":[64,210],"degree":[65],"protection":[67,211,216,224,232],"network-based":[69,81,227],"eavesdropping":[70,170],"At":[72,172],"same":[74,174],"time,":[75,175],"DKIM":[76,130,199],"SPF":[78,128,179],"forgery":[83],"tampering.":[85],"In":[86],"this":[87],"work":[88],"evaluate":[90],"provided":[93],"by":[94],"these":[95],"protocols,":[96],"both":[97],"in":[98,101,119],"theory":[99],"practice.":[102],"Using":[103],"a":[104],"combination":[105],"measurement":[107],"techniques,":[108],"determine":[110],"whether":[111,125],"major":[112],"providers":[113],"supports":[114],"TLS":[115,154],"at":[116],"each":[117],"point":[118],"their":[120],"email":[121,165,207],"path,":[123],"support":[127,152],"on":[131],"incoming":[132],"outgoing":[134],"mail.":[135],"We":[136,229],"found":[137],"that":[138,204,231],"while":[139,176],"more":[140],"than":[141],"half":[142],"top":[145],"20,000":[146],"receiving":[147],"MTAs":[148],"supported":[149],"TLS,":[150],"for":[153],"is":[155,180,183,237],"increasing,":[156],"servers":[157],"do":[158],"not":[159],"check":[160],"certificates,":[161],"opening":[162],"Internet":[164],"system":[166,208],"up":[167],"man-in-the-middle":[169],"common,":[181],"enforcement":[182],"limited.":[184],"Moreover,":[185],"senders":[189],"examined":[191],"used":[192],"DKIM,":[193],"fewer":[195],"still":[196],"rejected":[197],"invalid":[198],"signatures.":[200],"Our":[201],"findings":[202],"show":[203],"global":[206],"provides":[209],"passive":[213],"eavesdropping,":[214],"limited":[215],"unprivileged":[218],"peer":[219],"active":[226],"observe":[230],"even":[233],"latter":[236],"possible":[238],"existing":[240],"protocols":[241],"with":[242],"proper":[243],"enforcement.":[244]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":13},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":9},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":8},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
