{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T22:58:39Z","timestamp":1773269919392,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":28,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819562022","type":"print"},{"value":"9789819562039","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6203-9_19","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:24:56Z","timestamp":1767320696000},"page":"349-368","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["iSSH: Enabling In-Flight SSH Traffic Inspection Without Key Escrow"],"prefix":"10.1007","author":[{"given":"Xincheng","family":"Tang","sequence":"first","affiliation":[]},{"given":"Jiahao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jinrong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Rongmao","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Ahn, T., Kwak, J., Kim, S.: mdTLS: how to make middlebox-aware TLS more efficient? In: International Conference on Information Security and Cryptology, pp. 39\u201359. Springer (2023)","DOI":"10.1007\/978-981-97-1238-0_3"},{"key":"19_CR2","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/3-540-46035-7_6","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2002","author":"JH An","year":"2002","unstructured":"An, J.H., Dodis, Y., Rabin, T.: On the security of joint signature and encryption. In: Knudsen, L.R. (ed.) Advances in Cryptology \u2013 EUROCRYPT 2002, pp. 83\u2013107. Springer, Berlin Heidelberg, Berlin, Heidelberg (2002)"},{"key":"19_CR3","doi-asserted-by":"publisher","unstructured":"Baek, J., Kim, J., Susilo, W.: Inspecting TLS anytime anywhere: a new approach to TLS interception. In: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020, pp. 116\u2013126. ACM, New York, NY, USA (2020). https:\/\/doi.org\/10.1145\/3320269.3372199","DOI":"10.1145\/3320269.3372199"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Bhargavan, K., Boureanu, I., Delignat-Lavaud, A., Fouque, P.A., Onete, C.: A formal treatment of accountable proxying over TLS. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 799\u2013816. IEEE (2018)","DOI":"10.1109\/SP.2018.00021"},{"key":"19_CR5","unstructured":"Boneh, D., Shoup, V.: A graduate course in applied cryptography. draft 0.5 edn. (2020). https:\/\/crypto.stanford.edu\/~dabo\/cryptobook\/BonehShoup_0_5.pdf"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Canard, S., Diop, A., Kheir, N., Paindavoine, M., Sabt, M.: BlindIDS: market-compliant and privacy-friendly intrusion detection system over encrypted traffic. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 561\u2013574 (2017)","DOI":"10.1145\/3052973.3053013"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"de\u00a0Carn\u00e9\u00a0de Carnavalet, X., van Oorschot, P.C.: A survey and analysis of TLS interception mechanisms and motivations: exploring how end-to-end TLS is made \u201cend-to-me\u201d for web traffic. ACM Comput. Surv. 55(13s), 1\u201340 (2023)","DOI":"10.1145\/3580522"},{"issue":"6","key":"19_CR8","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"19_CR9","unstructured":"Fellicious, C., Sentanoe, S., Granitzer, M., Reiser, H.P.: SmartKex: machine learning assisted SSH keys extraction from the heap dump. arXiv preprint arXiv:2209.05243 (2022)"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Fellicious, C., Sentanoe, S., Mitrovi\u0107, J., Reiser, H.P., Granitzer, M.: PointerKex: a pointer-based ssh key extraction method. In: International Conference on Machine Learning, Optimization, and Data Science, pp. 272\u2013286. Springer (2024)","DOI":"10.1007\/978-3-031-82481-4_19"},{"key":"19_CR11","unstructured":"Jarmoc, J., Unit, D.: SSL\/TLS interception proxies and transitive trust. Black Hat Europe (2012)"},{"key":"19_CR12","unstructured":"Kaiser, M., B\u00f6hm, S.: SSH-MITM: a tool for SSH audits and man-in-the-middle attacks. github repository (2024). https:\/\/github.com\/ssh-mitm\/ssh-mitm, Accessed 16th May"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Kate, A., Goldberg, I.: Distributed private-key generators for identity-based cryptography. In: International Conference on Security and Cryptography for Networks, pp. 436\u2013453. Springer (2010)","DOI":"10.1007\/978-3-642-15317-4_27"},{"key":"19_CR14","doi-asserted-by":"publisher","unstructured":"Langley, A., Hamburg, M., Turner, S.: Elliptic curves for security. RFC 7748, January 2016. https:\/\/doi.org\/10.17487\/RFC7748","DOI":"10.17487\/RFC7748"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Lee, H., et al.: maTLS: how to make TLS middlebox-aware? In: NDSS (2019)","DOI":"10.14722\/ndss.2019.23547"},{"issue":"2","key":"19_CR16","doi-asserted-by":"publisher","first-page":"1216","DOI":"10.1109\/JIOT.2019.2953715","volume":"7","author":"J Li","year":"2019","unstructured":"Li, J., Chen, R., Su, J., Huang, X., Wang, X.: ME-TLS: middlebox-enhanced TLS for internet-of-things devices. IEEE Internet Things J. 7(2), 1216\u20131229 (2019)","journal-title":"IEEE Internet Things J."},{"key":"19_CR17","doi-asserted-by":"publisher","unstructured":"Lonvick, C.M., Ylonen, T.: The Secure Shell (SSH) Transport Layer Protocol. RFC 4253, January 2006. https:\/\/doi.org\/10.17487\/RFC4253","DOI":"10.17487\/RFC4253"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Morrissey, P., Smart, N.P., Warinschi, B.: A modular security analysis of the TLS handshake protocol. In: Advances in Cryptology-ASIACRYPT 2008: 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, 7\u201311 December 2008, Proceedings 14, pp. 55\u201373. Springer (2008)","DOI":"10.1007\/978-3-540-89255-7_5"},{"key":"19_CR19","doi-asserted-by":"publisher","unstructured":"Namprempre, C., Kohno, T., Bellare, M.: The secure shell (SSH) transport layer encryption modes. RFC 4344, January 2006. https:\/\/doi.org\/10.17487\/RFC4344","DOI":"10.17487\/RFC4344"},{"issue":"4","key":"19_CR20","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1145\/2829988.2787482","volume":"45","author":"D Naylor","year":"2015","unstructured":"Naylor, D., et al.: Multi-context TLS (mcTLS): enabling secure in-network functionality in TLS. Comput. Commun. Rev. 45(4), 199\u2013212 (2015)","journal-title":"Comput. Commun. Rev."},{"key":"19_CR21","unstructured":"OpenSSH: https:\/\/www.openssh.com\/, Accessed 11 June 2025"},{"key":"19_CR22","unstructured":"Paramiko: https:\/\/www.paramiko.org\/, Accessed 11 June 2025"},{"key":"19_CR23","unstructured":"Python: https:\/\/www.python.org\/, Accessed 11 June 2025"},{"key":"19_CR24","doi-asserted-by":"publisher","unstructured":"Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446, August 2018. https:\/\/doi.org\/10.17487\/RFC8446","DOI":"10.17487\/RFC8446"},{"key":"19_CR25","first-page":"301337","volume":"40","author":"S Sentanoe","year":"2022","unstructured":"Sentanoe, S., Reiser, H.P.: SSHkex: leveraging virtual machine introspection for extracting SSH keys and decrypting SSH network traffic. Forensic Sci. Int. Digit. Invest. 40, 301337 (2022)","journal-title":"Forensic Sci. Int. Digit. Invest."},{"key":"19_CR26","doi-asserted-by":"crossref","unstructured":"Sherry, J., Lan, C., Popa, R.A., Ratnasamy, S.: Blindbox: deep packet inspection over encrypted traffic. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, pp. 213\u2013226 (2015)","DOI":"10.1145\/2785956.2787502"},{"key":"19_CR27","unstructured":"Standards for Efficient Cryptography Group (SECG): SEC 2: Recommended elliptic curve domain parameters. Standard, Certicom Research, February 2010. https:\/\/www.secg.org\/sec2-v2.pdf"},{"key":"19_CR28","unstructured":"Vergeer, J.: Decrypting openssh sessions for fun and profit, https:\/\/blog.fox-it.com\/2020\/11\/11\/decrypting-openssh-sessions-for-fun-and-profit\/, Accessed 11 June 2025"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6203-9_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T07:37:17Z","timestamp":1773214637000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6203-9_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819562022","9789819562039"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6203-9_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Inscrypt","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisc22025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/inscrypt2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}