{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:34:31Z","timestamp":1763458471633,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,24]],"date-time":"2017-10-24T00:00:00Z","timestamp":1508803200000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-13-18415"],"award-info":[{"award-number":["CNS-13-18415"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978305","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T08:46:35Z","timestamp":1477385195000},"page":"1280-1291","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Protecting Insecure Communications with Topology-aware Network Tunnels"],"prefix":"10.1145","author":[{"given":"Georgios","family":"Kontaxis","sequence":"first","affiliation":[{"name":"Columbia University, New York, NY, USA"}]},{"given":"Angelos D.","family":"Keromytis","sequence":"additional","affiliation":[{"name":"Columbia University, New York, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"A Certificate Authority to Encrypt the Entire Web. https:\/\/www.eff.org\/deeplinks\/2014\/11\/certificate-authority-encrypt-entire-web."},{"key":"e_1_3_2_1_2_1","unstructured":"Cloud are - Introducing Universal SSL. https:\/\/blog.cloudflare.com\/introducing-universal-ssl\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Electronic Frontier Foundation - Verizon Injecting Perma-Cookies to Track Mobile Customers Bypassing Privacy Controls. https:\/\/www.eff.org\/deeplinks\/2014\/11\/verizon-x-uidh."},{"key":"e_1_3_2_1_4_1","unstructured":"ISPs Removing Their Customers' Email Encryption. https:\/\/www.eff.org\/deeplinks\/2014\/11\/starttls-downgrade-attacks."},{"key":"e_1_3_2_1_5_1","unstructured":"Official Gmail Blog - Staying at the forefront of email security and reliability. http:\/\/gmailblog.blogspot.com\/2014\/03\/staying-at-forefront-of-email-security.html."},{"key":"e_1_3_2_1_6_1","unstructured":"The Official Microsoft Blog - Protecting customer data from government snooping. http:\/\/blogs.microsoft.com\/blog\/2013\/12\/04\/protecting-customer-data-from-government-snooping\/."},{"key":"e_1_3_2_1_7_1","unstructured":"The Washington Post - NSA in ltrates links to Yahoo Google data centers worldwide. https:\/\/www.washingtonpost.com\/world\/national-security\/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say\/2013\/10\/30\/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html."},{"key":"e_1_3_2_1_8_1","unstructured":"The Washington Post - NSA uses Google cookies to pinpoint targets for hacking. https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2013\/12\/10\/nsa-uses-google-cookies-to-pinpoint-targets-for-hacking\/."},{"key":"e_1_3_2_1_9_1","unstructured":"Tor Meek. https:\/\/trac.torproject.org\/projects\/tor\/wiki\/doc\/meek."},{"key":"e_1_3_2_1_10_1","unstructured":"Tracking the FREAK Attack. https:\/\/freakattack.com\/."},{"key":"e_1_3_2_1_11_1","unstructured":"CVE-2014-0160 2014. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-0160."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.35"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502048"},{"key":"e_1_3_2_1_14_1","volume-title":"FREAK: Factoring RSA Export Keys","author":"Bhargavan K.","year":"2015","unstructured":"K. Bhargavan, A. Delignat-Lavaud, C. Fournet, M. Kohlweiss, A. Pironti, P.-Y. Strub, S. Zanella-Beguelin, J.-K. Zinzindohoue, and B. Beurdouche. FREAK: Factoring RSA Export Keys, 2015. https:\/\/www.smacktls.com\/#freak."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.974527"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028828"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251254.1251267"},{"key":"e_1_3_2_1_19_1","unstructured":"D. S. Miller 2012. http:\/\/git.kernel.org\/cgit\/linux\/kernel\/git\/torvalds\/linux.git\/commit\/?id=89aef8921bfbac22f00e04f8450f6e447db13e42."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23322"},{"key":"e_1_3_2_1_21_1","volume-title":"NYTimes - China Is Said to Use Powerful New Weapon to Censor Internet","author":"Perlroth N.","year":"2015","unstructured":"N. Perlroth. NYTimes - China Is Said to Use Powerful New Weapon to Censor Internet, 2015. http:\/\/www.nytimes.com\/2015\/04\/11\/technology\/china-is-said-to-use-powerful-new-weapon-to-censor-internet.html."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1387589.1387592"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/40.748796"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium. Internet Society","author":"Sherr M.","year":"2010","unstructured":"M. Sherr, A. Mao, W. R. Marczak, W. Zhou, B. T. Loo, and M. Blaze. A3: An Extensible Platform for Application-Aware Anonymity. In Proceedings of the Network and Distributed System Security Symposium. Internet Society, 2010."}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Vienna Austria","acronym":"CCS'16"},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978305","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978305","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978305","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:25:48Z","timestamp":1763457948000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978305"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":24,"alternative-id":["10.1145\/2976749.2978305","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978305","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}