{"id":"https://openalex.org/W2806482634","doi":"https://doi.org/10.1145/3196494.3196498","title":"No One In The Middle","display_name":"No One In The Middle","publication_year":2018,"publication_date":"2018-05-29","ids":{"openalex":"https://openalex.org/W2806482634","doi":"https://doi.org/10.1145/3196494.3196498","mag":"2806482634"},"language":"en","primary_location":{"id":"doi:10.1145/3196494.3196498","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3196494.3196498","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3196494.3196498","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3196494.3196498","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024289721","display_name":"Jeremy Lee Erickson","orcid":null},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jeremy Erickson","raw_affiliation_strings":["University of Michigan, Ann Arbor, MI, USA"],"affiliations":[{"raw_affiliation_string":"University of Michigan, Ann Arbor, MI, USA","institution_ids":["https://openalex.org/I27837315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063270515","display_name":"Qi Alfred Chen","orcid":"https://orcid.org/0000-0003-0316-9285"},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Qi Alfred Chen","raw_affiliation_strings":["University of Michigan, Ann Arbor, MI, USA"],"affiliations":[{"raw_affiliation_string":"University of Michigan, Ann Arbor, MI, USA","institution_ids":["https://openalex.org/I27837315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000712729","display_name":"Xiaochen Yu","orcid":null},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaochen Yu","raw_affiliation_strings":["University of Michigan, Ann Arbor, MI, USA"],"affiliations":[{"raw_affiliation_string":"University of Michigan, Ann Arbor, MI, USA","institution_ids":["https://openalex.org/I27837315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024526193","display_name":"Erinjen Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Erinjen Lin","raw_affiliation_strings":["University of Michigan, Ann Arbor, MI, USA"],"affiliations":[{"raw_affiliation_string":"University of Michigan, Ann Arbor, MI, USA","institution_ids":["https://openalex.org/I27837315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084690615","display_name":"Robert B. Levy","orcid":"https://orcid.org/0000-0003-3664-6578"},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Robert Levy","raw_affiliation_strings":["University of Michigan, Ann Arbor, MI, USA"],"affiliations":[{"raw_affiliation_string":"University of Michigan, Ann Arbor, MI, USA","institution_ids":["https://openalex.org/I27837315"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003217329","display_name":"Z. Morley Mao","orcid":"https://orcid.org/0000-0002-9844-2055"},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Z. Morley Mao","raw_affiliation_strings":["University of Michigan, Ann Arbor, MI, USA"],"affiliations":[{"raw_affiliation_string":"University of Michigan, Ann Arbor, MI, USA","institution_ids":["https://openalex.org/I27837315"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5024289721"],"corresponding_institution_ids":["https://openalex.org/I27837315"],"apc_list":null,"apc_paid":null,"fwci":0.4974,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.62927559,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"651","last_page":"658"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6723054647445679},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6611212491989136},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5428829193115234},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5384634733200073},{"id":"https://openalex.org/keywords/router","display_name":"Router","score":0.5277885794639587},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3951702117919922},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.21346506476402283}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6723054647445679},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6611212491989136},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5428829193115234},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5384634733200073},{"id":"https://openalex.org/C2775896111","wikidata":"https://www.wikidata.org/wiki/Q642560","display_name":"Router","level":2,"score":0.5277885794639587},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3951702117919922},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.21346506476402283}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3196494.3196498","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3196494.3196498","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3196494.3196498","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3196494.3196498","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3196494.3196498","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3196494.3196498","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.4399999976158142,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1751822525","display_name":null,"funder_award_id":"N00014-18-1-2020","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"},{"id":"https://openalex.org/G21361570","display_name":"TWC: TTP Option: Small: Differential Introspective Side Channels --- Discovery, Analysis, and Defense","funder_award_id":"1526455","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G2637195115","display_name":null,"funder_award_id":"4-18-1-","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"},{"id":"https://openalex.org/G3290369418","display_name":null,"funder_award_id":"N00014-14-1-0440","funder_id":"https://openalex.org/F4320338298","funder_display_name":"Office of Naval Research Global"},{"id":"https://openalex.org/G4723566837","display_name":null,"funder_award_id":"CNS-1318306","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5643251411","display_name":null,"funder_award_id":"and N00","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"},{"id":"https://openalex.org/G5858834086","display_name":null,"funder_award_id":"N00014-14-1-0440","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"},{"id":"https://openalex.org/G8876996369","display_name":null,"funder_award_id":"N00014","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320337345","display_name":"Office of Naval Research","ror":"https://ror.org/00rk2pe57"},{"id":"https://openalex.org/F4320338298","display_name":"Office of Naval Research Global","ror":"https://ror.org/00rk2pe57"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2806482634.pdf","grobid_xml":"https://content.openalex.org/works/W2806482634.grobid-xml"},"referenced_works_count":13,"referenced_works":["https://openalex.org/W794140516","https://openalex.org/W1993035107","https://openalex.org/W2009033060","https://openalex.org/W2018501701","https://openalex.org/W2046245985","https://openalex.org/W2146749986","https://openalex.org/W2151554935","https://openalex.org/W2515052910","https://openalex.org/W2588760077","https://openalex.org/W2686848947","https://openalex.org/W2735029465","https://openalex.org/W2951084996","https://openalex.org/W4232950056"],"related_works":["https://openalex.org/W4386482731","https://openalex.org/W2765763546","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W3026018975","https://openalex.org/W4377970398","https://openalex.org/W2185673024","https://openalex.org/W1484565796","https://openalex.org/W4230824443","https://openalex.org/W2142794587"],"abstract_inverted_index":{"Commodity":[0],"small":[1,41],"networks":[2],"typically":[3],"rely":[4],"on":[5,140],"NAT":[6],"as":[7,22],"a":[8,15,56],"perimeter":[9],"defense,":[10],"but":[11],"are":[12],"susceptible":[13],"to":[14,65,89,116,130],"variety":[16],"of":[17,29,104],"well-known":[18],"intra-network":[19],"attacks,":[20],"such":[21],"ARP":[23],"spoofing.":[24],"With":[25],"the":[26,43,80,102],"increased":[27],"prevalence":[28,103],"oft-compromised":[30],"Internet-of-Things":[31],"(IoT)":[32],"devices":[33,94,126],"now":[34],"taking":[35],"up":[36],"residence":[37],"in":[38],"homes":[39],"and":[40,82,86,91,127,145,151],"businesses,":[42],"potential":[44],"for":[45,59],"abuse":[46],"has":[47],"never":[48],"been":[49,114],"higher.":[50],"In":[51],"this":[52],"work,":[53],"we":[54],"present":[55],"novel":[57],"mechanism":[58],"strongly":[60],"attributing":[61],"local":[62],"network":[63,125],"traffic":[64],"its":[66],"originating":[67],"principal,":[68],"fully-compatible":[69],"with":[70,107,123,149],"existing":[71,124],"legacy":[72,152],"devices.":[73,153],"We":[74],"eliminate":[75],"Man-in-the-Middle":[76],"attacks":[77,97],"at":[78],"both":[79],"link":[81],"service":[83],"discovery":[84],"layers,":[85],"enable":[87],"users":[88],"identify":[90],"block":[92],"malicious":[93],"from":[95],"direct":[96],"against":[98],"other":[99],"endpoints.":[100],"Despite":[101],"prior":[105],"work":[106],"similar":[108],"goals,":[109],"previous":[110],"solutions":[111],"have":[112,120],"either":[113],"unsuited":[115],"non-Enterprise":[117],"environments":[118],"or":[119],"broken":[121],"compatibility":[122,148],"therefore":[128],"failed":[129],"be":[131],"adopted.":[132],"Our":[133],"prototype":[134],"imposes":[135],"negligible":[136],"performance":[137],"overhead,":[138],"runs":[139],"an":[141],"inexpensive":[142],"commodity":[143],"router,":[144],"retains":[146],"full":[147],"modern":[150]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
