{"id":"https://openalex.org/W2805984568","doi":"https://doi.org/10.1145/3196494.3196528","title":"To Intercept or Not to Intercept","display_name":"To Intercept or Not to Intercept","publication_year":2018,"publication_date":"2018-05-29","ids":{"openalex":"https://openalex.org/W2805984568","doi":"https://doi.org/10.1145/3196494.3196528","mag":"2805984568"},"language":"en","primary_location":{"id":"doi:10.1145/3196494.3196528","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3196494.3196528","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082348165","display_name":"Louis Waked","orcid":null},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Louis Waked","raw_affiliation_strings":["Concordia Universiy, Montreal, PQ, Canada"],"affiliations":[{"raw_affiliation_string":"Concordia Universiy, Montreal, PQ, Canada","institution_ids":["https://openalex.org/I60158472"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055898168","display_name":"Mohammad Mannan","orcid":"https://orcid.org/0000-0002-9630-5858"},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Mohammad Mannan","raw_affiliation_strings":["Concordia Universiy, Montreal, PQ, Canada"],"affiliations":[{"raw_affiliation_string":"Concordia Universiy, Montreal, PQ, Canada","institution_ids":["https://openalex.org/I60158472"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085765243","display_name":"Amr Youssef","orcid":"https://orcid.org/0000-0002-4284-8646"},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Amr Youssef","raw_affiliation_strings":["Concordia University, Montreal, PQ, Canada"],"affiliations":[{"raw_affiliation_string":"Concordia University, Montreal, PQ, Canada","institution_ids":["https://openalex.org/I60158472"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5082348165"],"corresponding_institution_ids":["https://openalex.org/I60158472"],"apc_list":null,"apc_paid":null,"fwci":2.6423,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.90996486,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"399","last_page":"412"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7801553606987},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6831288933753967},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.6609203815460205},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6051905751228333},{"id":"https://openalex.org/keywords/certificate","display_name":"Certificate","score":0.5934808850288391},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.44697627425193787},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.43609970808029175},{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.43551018834114075},{"id":"https://openalex.org/keywords/web-server","display_name":"Web server","score":0.4220816493034363},{"id":"https://openalex.org/keywords/proxy-server","display_name":"Proxy server","score":0.4121952950954437},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3076260983943939},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.2763766944408417},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.23123034834861755}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7801553606987},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6831288933753967},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.6609203815460205},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6051905751228333},{"id":"https://openalex.org/C96865113","wikidata":"https://www.wikidata.org/wiki/Q2946816","display_name":"Certificate","level":2,"score":0.5934808850288391},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.44697627425193787},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.43609970808029175},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.43551018834114075},{"id":"https://openalex.org/C11392498","wikidata":"https://www.wikidata.org/wiki/Q11288","display_name":"Web server","level":3,"score":0.4220816493034363},{"id":"https://openalex.org/C2779298391","wikidata":"https://www.wikidata.org/wiki/Q11189","display_name":"Proxy server","level":2,"score":0.4121952950954437},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3076260983943939},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2763766944408417},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.23123034834861755},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3196494.3196528","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3196494.3196528","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6700000166893005,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320307791","display_name":"Cisco Systems","ror":"https://ror.org/03yt1ez60"},{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1439967542","https://openalex.org/W1495444061","https://openalex.org/W1517949462","https://openalex.org/W1708992266","https://openalex.org/W1969343610","https://openalex.org/W1976919795","https://openalex.org/W2042923641","https://openalex.org/W2056494114","https://openalex.org/W2103239853","https://openalex.org/W2103370348","https://openalex.org/W2122440889","https://openalex.org/W2145994642","https://openalex.org/W2247093032","https://openalex.org/W2307188943","https://openalex.org/W2350778671","https://openalex.org/W2536707834","https://openalex.org/W2612070316","https://openalex.org/W2612544399","https://openalex.org/W2621197184","https://openalex.org/W2650293344","https://openalex.org/W2672575173","https://openalex.org/W2964271480","https://openalex.org/W4285719527","https://openalex.org/W6738677350"],"related_works":["https://openalex.org/W2376400759","https://openalex.org/W2186473821","https://openalex.org/W2049015391","https://openalex.org/W137484949","https://openalex.org/W2019615787","https://openalex.org/W3003217113","https://openalex.org/W2183444119","https://openalex.org/W1987163834","https://openalex.org/W2404177611","https://openalex.org/W168944357"],"abstract_inverted_index":{"Many":[0],"enterprise-grade":[1],"network":[2,103,133],"appliances":[3,162,178,205],"host":[4],"a":[5,68,107],"TLS":[6,29,39,64,86,111,141,212,220,225,247],"proxy":[7,30,54],"to":[8,60,89,172],"facilitate":[9],"interception":[10],"of":[11,44,71,96,245],"TLS-protected":[12],"traffic":[13],"for":[14,37,109],"various":[15],"purposes,":[16],"including":[17],"malware":[18],"scanning,":[19],"phishing":[20],"detection,":[21],"and":[22,83,115,123,135,143,152,190,229,243,257,265],"preventing":[23],"data":[24],"exfiltration.":[25],"When":[26],"deployed,":[27],"the":[28,33,45,50,53,57,61,76,93,98,102,203,207,218,224,241],"acts":[31,55],"as":[32,56,79,223],"security":[34,138],"validating":[35],"client":[36],"external":[38],"web":[40,58,81],"servers,":[41],"on":[42,49,121,240],"behalf":[43],"original":[46],"requesting":[47,208],"client;":[48],"other":[51],"hand,":[52],"server":[59],"client.":[62],"Consequently,":[63],"proxies":[65,248],"must":[66],"maintain":[67],"reliable":[69],"level":[70,78],"security,":[72],"at":[73,75,167],"least,":[74],"same":[77],"modern":[80],"browsers":[82],"properly":[84],"configured":[85],"servers.":[87],"Failure":[88],"do":[90,184],"so":[91],"increases":[92],"attack":[94],"surface":[95],"all":[97,202,262],"proxied":[99],"clients":[100],"served":[101],"appliance.":[104],"We":[105,198,233],"develop":[106],"framework":[108],"testing":[110],"inspecting":[112],"appliances,":[113,134],"combining":[114],"extending":[116],"tests":[117],"from":[118,217],"existing":[119],"work":[120,237],"client-end":[122],"network-based":[124],"interception.":[125],"Utilizing":[126],"this":[127,236],"framework,":[128],"we":[129,158],"analyze":[130],"six":[131],"representative":[132],"uncover":[136],"several":[137],"issues":[139],"regarding":[140],"version":[142],"certificate":[144,153,165,181],"parameters":[145,213],"mapping,":[146],"CA":[147],"trusted":[148],"stores,":[149],"private":[150],"keys,":[151],"validation":[154,166],"tests.":[155],"For":[156],"instance,":[157],"found":[159,200],"that":[160,179,201,214,235,249],"two":[161],"perform":[163,180],"no":[164],"all,":[168],"exposing":[169],"their":[170,263],"end-clients":[171],"trivial":[173],"Man-in-the-Middle":[174],"attacks.":[175,197],"The":[176],"remaining":[177],"validation,":[182],"still":[183],"not":[185],"follow":[186],"current":[187],"best":[188],"practices,":[189],"thus":[191],"making":[192],"them":[193],"vulnerable":[194],"against":[195],"certain":[196],"also":[199],"tested":[204],"deceive":[206],"clients,":[209],"by":[210],"offering":[211],"are":[215,250],"different":[216],"proxy-to-server":[219],"parameters,":[221],"such":[222],"versions,":[226],"hashing":[227],"algorithms,":[228],"RSA":[230],"key":[231],"sizes.":[232],"hope":[234],"bring":[238],"focus":[239],"risks":[242],"vulnerabilities":[244],"using":[246],"being":[251],"widely":[252],"deployed":[253],"in":[254],"many":[255],"enterprise":[256],"government":[258],"environments,":[259],"potentially":[260],"affecting":[261],"users":[264],"systems.":[266]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
