{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T18:49:45Z","timestamp":1775760585858,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,8,17]],"date-time":"2015-08-17T00:00:00Z","timestamp":1439769600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Intel Research"},{"name":"National Science Foundation","award":["DGE-1106400"],"award-info":[{"award-number":["DGE-1106400"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,8,17]]},"DOI":"10.1145\/2785956.2787502","type":"proceedings-article","created":{"date-parts":[[2015,8,24]],"date-time":"2015-08-24T10:09:20Z","timestamp":1440410960000},"page":"213-226","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":203,"title":["BlindBox"],"prefix":"10.1145","author":[{"given":"Justine","family":"Sherry","sequence":"first","affiliation":[{"name":"UC Berkeley, Berkeley, CA, USA"}]},{"given":"Chang","family":"Lan","sequence":"additional","affiliation":[{"name":"UC Berkeley, Berkeley, CA, USA"}]},{"given":"Raluca Ada","family":"Popa","sequence":"additional","affiliation":[{"name":"UC Berkeley and ETH Z\u00fcrich, Berkeley, CA, USA"}]},{"given":"Sylvia","family":"Ratnasamy","sequence":"additional","affiliation":[{"name":"UC Berkeley, Berkeley, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,8,17]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Alexa Top Sites. http:\/\/www.alexa.com\/topsites.  Alexa Top Sites. http:\/\/www.alexa.com\/topsites."},{"key":"e_1_3_2_2_2_1","unstructured":"DPDK\n  : Data Plane Development Kit. http:\/\/dpdk.org\/.  DPDK: Data Plane Development Kit. http:\/\/dpdk.org\/."},{"key":"e_1_3_2_2_3_1","unstructured":"Emerging Threats: Open Source Signatures. https:\/\/rules.emergingthreats.net\/open\/snort-2.9.0\/rules\/.  Emerging Threats: Open Source Signatures. https:\/\/rules.emergingthreats.net\/open\/snort-2.9.0\/rules\/."},{"key":"e_1_3_2_2_4_1","unstructured":"McAfee Network Security Platform. http:\/\/www.mcafee.com\/us\/products\/network-security-platform.aspx.  McAfee Network Security Platform. http:\/\/www.mcafee.com\/us\/products\/network-security-platform.aspx."},{"key":"e_1_3_2_2_5_1","unstructured":"OT Extension library. https:\/\/github.com\/encryptogroup\/OTExtension.  OT Extension library. https:\/\/github.com\/encryptogroup\/OTExtension."},{"key":"e_1_3_2_2_6_1","unstructured":"Palo Alto Networks. https:\/\/www.paloaltonetworks.com\/.  Palo Alto Networks. https:\/\/www.paloaltonetworks.com\/."},{"key":"e_1_3_2_2_7_1","unstructured":"Qosmos Deep Packet Inspection and Metadata Engine. http:\/\/www.qosmos.com\/products\/deep-packet-inspection-engine\/.  Qosmos Deep Packet Inspection and Metadata Engine. http:\/\/www.qosmos.com\/products\/deep-packet-inspection-engine\/."},{"key":"e_1_3_2_2_8_1","unstructured":"Radisys R220 Network Appliance. http:\/\/www.radisys.com\/products\/network-appliance\/.  Radisys R220 Network Appliance. http:\/\/www.radisys.com\/products\/network-appliance\/."},{"key":"e_1_3_2_2_9_1","unstructured":"Snort. https:\/\/www.snort.org\/.  Snort. https:\/\/www.snort.org\/."},{"key":"e_1_3_2_2_10_1","unstructured":"ssldump. http:\/\/www.rtfm.com\/ssldump\/.  ssldump. http:\/\/www.rtfm.com\/ssldump\/."},{"key":"e_1_3_2_2_11_1","unstructured":"Symantec | Enterprise. http:\/\/www.symantec.com\/index.jsp.  Symantec | Enterprise. http:\/\/www.symantec.com\/index.jsp."},{"key":"e_1_3_2_2_12_1","unstructured":"The GnuTLS Transport Layer Security Library. http:\/\/www.gnutls.org\/.  The GnuTLS Transport Layer Security Library. http:\/\/www.gnutls.org\/."},{"key":"e_1_3_2_2_13_1","unstructured":"University of Toulouse Internet Blacklists. http:\/\/dsi.ut-capitole.fr\/blacklists\/.  University of Toulouse Internet Blacklists. http:\/\/dsi.ut-capitole.fr\/blacklists\/."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516738"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1777777.1777820"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.39"},{"key":"e_1_3_2_2_17_1","unstructured":"BlueCoat. Comparing Explicit and Transparent PRoxies. https:\/\/bto.bluecoat.com\/webguides\/proxysg\/security_first_steps\/Content\/Solutions\/SharedTopics\/Explicit_Transparent_Proxy_Comparison.htm.  BlueCoat. Comparing Explicit and Transparent PRoxies. https:\/\/bto.bluecoat.com\/webguides\/proxysg\/security_first_steps\/Content\/Solutions\/SharedTopics\/Explicit_Transparent_Proxy_Comparison.htm."},{"key":"e_1_3_2_2_18_1","unstructured":"BlueCoat. SSL Encrypted Traffic Visibility and Management. https:\/\/www.bluecoat.com\/products\/ssl-encrypted-traffic-visibility-and-management.  BlueCoat. SSL Encrypted Traffic Visibility and Management. https:\/\/www.bluecoat.com\/products\/ssl-encrypted-traffic-visibility-and-management."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"e_1_3_2_2_20_1","volume-title":"NAT Port Mapping Protocol (NAT-PMP). RFC","author":"Cheshire S.","year":"2013","unstructured":"S. Cheshire and M. Krochmal . NAT Port Mapping Protocol (NAT-PMP). RFC 6886, Apr. 2013 . S. Cheshire and M. Krochmal. NAT Port Mapping Protocol (NAT-PMP). RFC 6886, Apr. 2013."},{"key":"e_1_3_2_2_21_1","volume-title":"Proc. USENIX NSDI","author":"Dixon C.","year":"2011","unstructured":"C. Dixon , H. Uppal , V. Brajkovic , D. Brandon , T. Anderson , and A. Krishnamurthy . ETTM: A Scalable Fault Tolerant Network Manager . In Proc. USENIX NSDI , 2011 . C. Dixon, H. Uppal, V. Brajkovic, D. Brandon, T. Anderson, and A. Krishnamurthy. ETTM: A Scalable Fault Tolerant Network Manager. In Proc. USENIX NSDI, 2011."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3812.3818"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.13"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_49"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488608.2488678"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.13"},{"key":"e_1_3_2_2_28_1","volume-title":"Presentation at Black Hat Europe","author":"Jarmoc J.","year":"2012","unstructured":"J. Jarmoc . SSL\/ TLS Interception Proxies and Transitive Trust . Presentation at Black Hat Europe , 2012 . J. Jarmoc. SSL\/TLS Interception Proxies and Transitive Trust. Presentation at Black Hat Europe, 2012."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382298"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1788414.1788423"},{"key":"e_1_3_2_2_31_1","volume-title":"ZDNet","author":"Kingsley-Hughes A.","year":"2015","unstructured":"A. Kingsley-Hughes . Gogo in-flight Wi-Fi serving spoofed SSL certificates . ZDNet , 2015 . A. Kingsley-Hughes. Gogo in-flight Wi-Fi serving spoofed SSL certificates. ZDNet, 2015."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/354871.354874"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-008-9036-8"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/646764.703981"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674991"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"e_1_3_2_2_38_1","volume-title":"Proc. USENIX NSDI","author":"Popa R. A.","year":"2014","unstructured":"R. A. Popa , E. Stark , S. Valdez , J. Helfer , N. Zeldovich , M. F. Kaashoek , and H. Balakrishnan . Building Web Applications on Top of Encrypted Data using Mylar . In Proc. USENIX NSDI , 2014 . R. A. Popa, E. Stark, S. Valdez, J. Helfer, N. Zeldovich, M. F. Kaashoek, and H. Balakrishnan. Building Web Applications on Top of Encrypted Data using Mylar. In Proc. USENIX NSDI, 2014."},{"key":"e_1_3_2_2_39_1","volume-title":"Aiken Computation Lab","author":"Rabin M. O.","year":"2005","unstructured":"M. O. Rabin . How to Exchange Secrets with Oblivious Transfer. TR-81 , Aiken Computation Lab , Harvard University http:\/\/eprint.iacr.org\/ 2005 \/187.pdf, 1981. M. O. Rabin. How to Exchange Secrets with Oblivious Transfer. TR-81, Aiken Computation Lab, Harvard University http:\/\/eprint.iacr.org\/2005\/187.pdf, 1981."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2413247.2413286"},{"key":"e_1_3_2_2_41_1","volume-title":"Tor Project Blog","year":"2012","unstructured":"Runa. Security vulnerability found in Cyberoam DPI devices (CVE-2012--3372) . Tor Project Blog , 2012 . Runa. Security vulnerability found in Cyberoam DPI devices (CVE-2012--3372). Tor Project Blog, 2012."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342359"},{"key":"e_1_3_2_2_44_1","volume-title":"Operators look to embed deep packet inspection (DPI) in apps","author":"Levine Shira","year":"2018","unstructured":"Shira Levine . Operators look to embed deep packet inspection (DPI) in apps ; Market growing to$2B by 2018 . Infonetics Research . http:\/\/www.infonetics.com\/pr\/2014\/2H13-Service-Provider-DPI-Products-Market-Highlights.asp. Shira Levine. Operators look to embed deep packet inspection (DPI) in apps; Market growing to$2B by 2018. Infonetics Research. http:\/\/www.infonetics.com\/pr\/2014\/2H13-Service-Provider-DPI-Products-Market-Highlights.asp."},{"key":"e_1_3_2_2_46_1","volume-title":"Proc. IEEE S&P","author":"Song D. X.","year":"2000","unstructured":"D. X. Song , D. Wagner , and A. Perrig . Practical Techniques for Searches on Encrypted Data . In Proc. IEEE S&P , 2000 . D. X. Song, D. Wagner, and A. Perrig. Practical Techniques for Searches on Encrypted Data. In Proc. IEEE S&P, 2000."},{"key":"e_1_3_2_2_47_1","volume-title":"Snort users manual","author":"Project The Snort","year":"2014","unstructured":"The Snort Project . Snort users manual , 2014 . Version 2.9.7. The Snort Project. Snort users manual, 2014. Version 2.9.7."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742675"},{"key":"e_1_3_2_2_49_1","unstructured":"G. Vigna. ICTF Data. https:\/\/ictf.cs.ucsb.edu\/#\/.  G. Vigna. ICTF Data. https:\/\/ictf.cs.ucsb.edu\/#\/."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"key":"e_1_3_2_2_51_1","volume-title":"Wired Magazine","author":"Zetter K.","year":"2014","unstructured":"K. Zetter . The Feds Cut a Deal With In-Flight Wi-Fi Providers, and Privacy Groups Are Worried . Wired Magazine , 2014 . K. Zetter. The Feds Cut a Deal With In-Flight Wi-Fi Providers, and Privacy Groups Are Worried. Wired Magazine, 2014."}],"event":{"name":"SIGCOMM '15: ACM SIGCOMM 2015 Conference","location":"London United Kingdom","acronym":"SIGCOMM '15","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2785956.2787502","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2785956.2787502","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:42:38Z","timestamp":1750210958000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2785956.2787502"}},"subtitle":["Deep Packet Inspection over Encrypted Traffic"],"short-title":[],"issued":{"date-parts":[[2015,8,17]]},"references-count":49,"alternative-id":["10.1145\/2785956.2787502","10.1145\/2785956"],"URL":"https:\/\/doi.org\/10.1145\/2785956.2787502","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2829988.2787502","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2015,8,17]]},"assertion":[{"value":"2015-08-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}