{"id":"https://openalex.org/W2532745482","doi":"https://doi.org/10.1145/2976749.2978312","title":"Slitheen","display_name":"Slitheen","publication_year":2016,"publication_date":"2016-10-24","ids":{"openalex":"https://openalex.org/W2532745482","doi":"https://doi.org/10.1145/2976749.2978312","mag":"2532745482"},"language":"en","primary_location":{"id":"doi:10.1145/2976749.2978312","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2978312","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022191380","display_name":"Cecylia Bocovich","orcid":null},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Cecylia Bocovich","raw_affiliation_strings":["University of Waterloo, Waterloo, ON, Canada"],"affiliations":[{"raw_affiliation_string":"University of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090953912","display_name":"Ian Goldberg","orcid":"https://orcid.org/0000-0002-1176-2882"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Ian Goldberg","raw_affiliation_strings":["University of Waterloo, Waterloo, ON, Canada"],"affiliations":[{"raw_affiliation_string":"University of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5022191380"],"corresponding_institution_ids":["https://openalex.org/I151746483"],"apc_list":null,"apc_paid":null,"fwci":6.626,"has_fulltext":false,"cited_by_count":40,"citation_normalized_percentile":{"value":0.96815187,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1702","last_page":"1714"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7315430045127869},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6669934988021851},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6653744578361511},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.578464686870575},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5612723231315613},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5553057193756104},{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep packet inspection","score":0.47591763734817505},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.4608430862426758},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.42842745780944824},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.3096993863582611},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10448965430259705}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7315430045127869},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6669934988021851},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6653744578361511},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.578464686870575},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5612723231315613},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5553057193756104},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.47591763734817505},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.4608430862426758},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.42842745780944824},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3096993863582611},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10448965430259705}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2976749.2978312","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2978312","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6600000262260437,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W139582188","https://openalex.org/W153048087","https://openalex.org/W1467762138","https://openalex.org/W1655958391","https://openalex.org/W2023276871","https://openalex.org/W2031211716","https://openalex.org/W2035688766","https://openalex.org/W2080100559","https://openalex.org/W2094522125","https://openalex.org/W2108217512","https://openalex.org/W2111695118","https://openalex.org/W2123243822","https://openalex.org/W2124423070","https://openalex.org/W2139674816","https://openalex.org/W2149280729","https://openalex.org/W2182238969","https://openalex.org/W2182467309","https://openalex.org/W2186594794","https://openalex.org/W2209711601","https://openalex.org/W2249146864","https://openalex.org/W2397223326","https://openalex.org/W2752929869","https://openalex.org/W2952230729","https://openalex.org/W2964168742","https://openalex.org/W6605692957","https://openalex.org/W6638652613","https://openalex.org/W6676556160","https://openalex.org/W6686019270","https://openalex.org/W6686565904","https://openalex.org/W6906355099"],"related_works":["https://openalex.org/W2388464034","https://openalex.org/W2140460949","https://openalex.org/W2105580438","https://openalex.org/W2533125852","https://openalex.org/W2594425278","https://openalex.org/W2381288267","https://openalex.org/W2155469080","https://openalex.org/W3160314615","https://openalex.org/W2299887038","https://openalex.org/W2782351397"],"abstract_inverted_index":{"As":[0],"the":[1,40,53,78,85,113,127,150],"capabilities":[2],"of":[3,55,75,103,112,129,147,153],"censors":[4],"increase":[5],"and":[6,28,94,107,136],"their":[7,97],"ability":[8],"to":[9,24,35,59,99,133],"perform":[10],"more":[11,17,114],"powerful":[12,18],"deep-packet":[13],"inspection":[14],"techniques":[15,67],"grows,":[16],"systems":[19,118],"are":[20],"needed":[21],"in":[22,91,177],"turn":[23],"disguise":[25],"user":[26],"traffic":[27,51,151],"allow":[29],"users":[30],"under":[31,52],"a":[32,45,56,60,72,100,142],"censor's":[33],"influence":[34],"access":[36,74],"blocked":[37],"content":[38,76],"on":[39,77,120],"Internet.":[41],"Decoy":[42],"routing":[43,117,144],"is":[44,158],"censorship":[46],"resistance":[47],"technique":[48],"that":[49],"hides":[50],"guise":[54],"HTTPS":[57],"connection":[58],"benign,":[61],"uncensored":[62],"overt":[63,79,154],"site.":[64],"However,":[65],"existing":[66],"far":[68],"from":[69],"perfectly":[70,148],"mimic":[71],"typical":[73],"server.":[80],"Artificial":[81],"latency":[82,108],"introduced":[83],"by":[84],"system,":[86],"as":[87,89,165,167],"well":[88,166],"differences":[90],"packet":[92,106],"sizes":[93],"timings":[95],"betray":[96],"use":[98],"censor":[101],"capable":[102,146],"performing":[104],"basic":[105],"analysis.":[109],"While":[110],"many":[111],"recent":[115,175],"decoy":[116,143],"focus":[119],"deployability":[121,184],"concerns,":[122],"they":[123],"do":[124],"so":[125],"at":[126],"cost":[128],"security,":[130],"adding":[131],"vulnerabilities":[132],"both":[134],"passive":[135,163],"active":[137,169],"attacks.":[138,170],"We":[139],"propose":[140],"Slitheen,":[141],"system":[145,157],"mimicking":[149],"patterns":[152],"sites.":[155],"Our":[156],"secure":[159],"against":[160],"previously":[161],"undefended":[162],"attacks,":[164],"known":[168],"Further,":[171],"we":[172],"show":[173],"how":[174],"innovations":[176],"traffic-shaping":[178],"technology":[179],"for":[180],"ISPs":[181],"mitigate":[182],"previous":[183],"challenges.":[185]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":5}],"updated_date":"2026-04-07T14:57:38.498316","created_date":"2016-10-28T00:00:00"}
