{"id":"https://openalex.org/W2981660771","doi":"https://doi.org/10.1145/3341301.3359648","title":"Yodel","display_name":"Yodel","publication_year":2019,"publication_date":"2019-10-21","ids":{"openalex":"https://openalex.org/W2981660771","doi":"https://doi.org/10.1145/3341301.3359648","mag":"2981660771"},"language":"en","primary_location":{"id":"doi:10.1145/3341301.3359648","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3341301.3359648","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3341301.3359648","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 27th ACM Symposium on Operating Systems Principles","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3341301.3359648","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087670807","display_name":"David Lazar","orcid":"https://orcid.org/0000-0002-7816-457X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"David Lazar","raw_affiliation_strings":["MIT CSAIL"],"affiliations":[{"raw_affiliation_string":"MIT CSAIL","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056985040","display_name":"Yossi Gilad","orcid":"https://orcid.org/0000-0003-3475-8322"},"institutions":[{"id":"https://openalex.org/I197251160","display_name":"Hebrew University of Jerusalem","ror":"https://ror.org/03qxff017","country_code":"IL","type":"education","lineage":["https://openalex.org/I197251160"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Yossi Gilad","raw_affiliation_strings":["Hebrew University of Jerusalem"],"affiliations":[{"raw_affiliation_string":"Hebrew University of Jerusalem","institution_ids":["https://openalex.org/I197251160"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082808262","display_name":"Nickolai Zeldovich","orcid":"https://orcid.org/0000-0003-0238-2703"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nickolai Zeldovich","raw_affiliation_strings":["MIT CSAIL"],"affiliations":[{"raw_affiliation_string":"MIT CSAIL","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5087670807"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.1561,"has_fulltext":true,"cited_by_count":25,"citation_normalized_percentile":{"value":0.84671908,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"211","last_page":"224"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8149845600128174},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6579875349998474},{"id":"https://openalex.org/keywords/backup","display_name":"Backup","score":0.6174986362457275},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.5992788076400757},{"id":"https://openalex.org/keywords/metadata","display_name":"Metadata","score":0.5943967700004578},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5929741263389587},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5153304934501648},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5053768754005432},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.485387921333313},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.46489375829696655},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.41928568482398987},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.201640784740448},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1779261827468872},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14243072271347046}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8149845600128174},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6579875349998474},{"id":"https://openalex.org/C2780945871","wikidata":"https://www.wikidata.org/wiki/Q194274","display_name":"Backup","level":2,"score":0.6174986362457275},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.5992788076400757},{"id":"https://openalex.org/C93518851","wikidata":"https://www.wikidata.org/wiki/Q180160","display_name":"Metadata","level":2,"score":0.5943967700004578},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5929741263389587},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5153304934501648},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5053768754005432},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.485387921333313},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.46489375829696655},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.41928568482398987},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.201640784740448},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1779261827468872},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14243072271347046}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3341301.3359648","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3341301.3359648","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3341301.3359648","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 27th ACM Symposium on Operating Systems Principles","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3341301.3359648","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3341301.3359648","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3341301.3359648","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 27th ACM Symposium on Operating Systems Principles","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1650813891","display_name":null,"funder_award_id":"1414119","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G2493648025","display_name":null,"funder_award_id":"CNS-1413920","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5104704674","display_name":null,"funder_award_id":"CNS-1413920 and CNS-1414119","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6260487398","display_name":"TWC: TTP Option: Frontier: Collaborative: MACS: A Modular Approach to Cloud Security","funder_award_id":"1413920","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6573464313","display_name":null,"funder_award_id":"CNS-1414119","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2981660771.pdf","grobid_xml":"https://content.openalex.org/works/W2981660771.grobid-xml"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W186684821","https://openalex.org/W1820393415","https://openalex.org/W1885680957","https://openalex.org/W1992157848","https://openalex.org/W2014239329","https://openalex.org/W2021732467","https://openalex.org/W2064354762","https://openalex.org/W2099858845","https://openalex.org/W2106887953","https://openalex.org/W2121895216","https://openalex.org/W2127295197","https://openalex.org/W2211872228","https://openalex.org/W2384634156","https://openalex.org/W2508766026","https://openalex.org/W2525359697","https://openalex.org/W2534639771","https://openalex.org/W2537192083","https://openalex.org/W2605360748","https://openalex.org/W2763648389","https://openalex.org/W2763748542","https://openalex.org/W2898961439","https://openalex.org/W2908783118","https://openalex.org/W2949823048","https://openalex.org/W2972519044","https://openalex.org/W3010284814","https://openalex.org/W3211846114","https://openalex.org/W4245516300","https://openalex.org/W6639363673","https://openalex.org/W7024355122"],"related_works":["https://openalex.org/W2077440085","https://openalex.org/W2039087888","https://openalex.org/W2276385951","https://openalex.org/W2079854310","https://openalex.org/W3026488991","https://openalex.org/W2085896007","https://openalex.org/W2382301179","https://openalex.org/W1481299995","https://openalex.org/W2107384724","https://openalex.org/W3021120154"],"abstract_inverted_index":{"Yodel":[0,61,110,136],"is":[1,13,106],"the":[2,23,59,66,113,138],"first":[3],"system":[4],"for":[5,151],"voice":[6,144],"calls":[7,29],"that":[8,21,77,109],"hides":[9],"metadata":[10,105],"(e.g.,":[11],"who":[12],"communicating":[14],"with":[15,65,112,131,146],"whom)":[16],"from":[17,94],"a":[18,74,123],"powerful":[19],"adversary":[20],"controls":[22],"network":[24,76],"and":[25,91,98,140],"compromises":[26],"servers.":[27],"Voice":[28],"require":[30],"sub-second":[31],"message":[32,48],"latency,":[33],"but":[34],"low":[35],"latency":[36,150],"has":[37],"been":[38],"difficult":[39],"to":[40,89,100],"achieve":[41],"in":[42,58,126],"prior":[43],"work":[44],"where":[45,119],"processing":[46],"each":[47,56,120],"requires":[49],"an":[50,128],"expensive":[51],"public":[52],"key":[53],"operation":[54],"at":[55],"hop":[57],"network.":[60],"avoids":[62],"this":[63],"expense":[64],"idea":[67,114],"of":[68,115,149],"self-healing":[69],"circuits,":[70],"reusable":[71],"paths":[72],"through":[73],"mix":[75],"use":[78],"only":[79],"fast":[80],"symmetric":[81],"cryptography.":[82],"Once":[83],"created,":[84],"these":[85,101],"circuits":[86,102],"are":[87],"resilient":[88],"passive":[90],"active":[92],"attacks":[93],"global":[95],"adversaries.":[96],"Creating":[97],"connecting":[99],"without":[103],"leaking":[104],"another":[107],"challenge":[108],"addresses":[111],"guarded":[116],"circuit":[117,125],"exchange,":[118],"user":[121],"creates":[122],"backup":[124],"case":[127],"attacker":[129],"tampers":[130],"their":[132],"traffic.":[133],"We":[134],"evaluate":[135],"across":[137],"internet":[139],"it":[141],"achieves":[142],"acceptable":[143],"quality":[145],"990":[147],"ms":[148],"5":[152],"million":[153],"simulated":[154],"users.":[155]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2019-11-01T00:00:00"}
