{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T05:21:07Z","timestamp":1775107267292,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,27]],"date-time":"2020-10-27T00:00:00Z","timestamp":1603756800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Google Faculty Research Award"},{"DOI":"10.13039\/501100004801","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1518888"],"award-info":[{"award-number":["CNS-1518888"]}],"id":[{"id":"10.13039\/501100004801","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,27]]},"DOI":"10.1145\/3419394.3423665","type":"proceedings-article","created":{"date-parts":[[2020,10,22]],"date-time":"2020-10-22T20:30:22Z","timestamp":1603398622000},"page":"125-132","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["Investigating Large Scale HTTPS Interception in Kazakhstan"],"prefix":"10.1145","author":[{"given":"Ram Sundara","family":"Raman","sequence":"first","affiliation":[{"name":"University of Michigan"}]},{"given":"Leonid","family":"Evdokimov","sequence":"additional","affiliation":[{"name":"Independent"}]},{"given":"Eric","family":"Wurstrow","sequence":"additional","affiliation":[{"name":"University of Colorado Boulder"}]},{"given":"J. Alex","family":"Halderman","sequence":"additional","affiliation":[{"name":"University of Michigan"}]},{"given":"Roya","family":"Ensafi","sequence":"additional","affiliation":[{"name":"University of Michigan"}]}],"member":"320","published-online":{"date-parts":[[2020,10,27]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363192"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813707"},{"key":"e_1_3_2_2_3_1","volume-title":"ITPro","author":"Afifi-Sabet K.","year":"2019","unstructured":"K. Afifi-Sabet. Kazakh government will intercept the nation's HTTPS traffic. ITPro, July 19, 2019. https:\/\/www.itpro.co.uk\/network-internet\/34051\/kazakh-government-will-intercept-the-nation-s-https-traffic."},{"key":"e_1_3_2_2_4_1","first-page":"000","volume":"1","year":"2019","unstructured":"Alexa. Top 1,000,000 sites, July 2019. http:\/\/s3.amazonaws.com\/alexa-static\/top-1m.csv.zip.","journal-title":"Alexa. Top"},{"key":"e_1_3_2_2_5_1","volume-title":"Techie Buzz","author":"Bhat S.","year":"2011","unstructured":"S. Bhat. Gmail users in Iran hit by MITM attacks. Techie Buzz, August 30, 2011. http:\/\/techie-buzz.com\/tech-news\/gmail-iran-hit-mitm.html."},{"key":"e_1_3_2_2_6_1","volume-title":"CRYPTO","author":"Bleichenbacher D.","year":"2006","unstructured":"D. Bleichenbacher. Forging some RSA signatures with pencil and paper. Presentation in the rump session, CRYPTO, 2006."},{"key":"e_1_3_2_2_7_1","volume-title":"April 12","year":"2016","unstructured":"bne IntelliNews. Kazakhstan blocks Tumblr for promoting terrorism, porn, April 12, 2016. https:\/\/www.intellinews.com\/kazakhstan-blocks-tumblr-for-promoting-terrorism-porn-94928\/."},{"key":"e_1_3_2_2_8_1","volume-title":"MITM on all HTTPS traffic in Kazakhstan","year":"2019","unstructured":"Bugzilla. MITM on all HTTPS traffic in Kazakhstan, 2019. https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=1567114."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.12"},{"key":"e_1_3_2_2_10_1","volume-title":"USENIX Workshop on Free and Open Communications on the Internet (FOCI)","author":"Chai Z.","year":"2019","unstructured":"Z. Chai, A. Ghafari, and A. Houmansadr. On the importance of encrypted-SNI (ESNI) to censorship circumvention. In USENIX Workshop on Free and Open Communications on the Internet (FOCI), 2019."},{"key":"e_1_3_2_2_11_1","volume-title":"ZDNet","author":"Cimpanu C.","year":"2019","unstructured":"C. Cimpanu. Kazakhstan government is now intercepting all HTTPS traffic. ZDNet, July 18, 2019. https:\/\/www.zdnet.com\/article\/kazakhstan-government-is-now-intercepting-all-https-traffic\/."},{"key":"e_1_3_2_2_12_1","unstructured":"Citizen Lab. Block test list. https:\/\/github.com\/citizenlab\/test-lists."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2793013.2793021"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_12"},{"key":"e_1_3_2_2_15_1","volume-title":"Department of Homeland Security","author":"Dittrich D.","year":"2012","unstructured":"D. Dittrich, E. Kenneally, et al. The Menlo Report: Ethical principles guiding information and communication technology research. Technical report, U.S. Department of Homeland Security, 2012."},{"key":"e_1_3_2_2_16_1","volume-title":"ACM Conference on Computer and Communications Security (CCS)","author":"Durumeric Z.","year":"2015","unstructured":"Z. Durumeric, D. Adrian, A. Mirian, M. Bailey, and J. A. Halderman. Censys: A search engine backed by Internet-wide scanning. In ACM Conference on Computer and Communications Security (CCS), 2015."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23456"},{"key":"e_1_3_2_2_18_1","volume-title":"USENIX Security Symposium","author":"Durumeric Z.","year":"2013","unstructured":"Z. Durumeric, E. Wustrow, and J. A. Halderman. ZMap: Fast internet-wide scanning and its security applications. In USENIX Security Symposium, 2013."},{"key":"e_1_3_2_2_19_1","volume-title":"EFF Deeplinks Blog","author":"Eckersley P.","year":"2011","unstructured":"P. Eckersley. A Syrian man-in-the-middle attack against Facebook. EFF Deeplinks Blog, May 5, 2011. https:\/\/www.eff.org\/deeplinks\/2011\/05\/syrian-man-middle-against-facebook."},{"key":"e_1_3_2_2_20_1","volume-title":"Freedom on the net report","author":"House Freedom","year":"2019","unstructured":"Freedom House. Freedom on the net report, 2019. https:\/\/freedomhouse.org\/countries\/freedom-world\/scores."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23511"},{"key":"e_1_3_2_2_22_1","volume-title":"Bleeping Computer","author":"Gatlan S.","year":"2019","unstructured":"S. Gatlan. South Korea is censoring the Internet by snooping on SNI traffic. Bleeping Computer, February 13, 2019. https:\/\/www.bleepingcomputer.com\/news\/security\/south-korea-is-censoring-the-internet-by-snooping-on-sni-traffic\/."},{"key":"e_1_3_2_2_23_1","volume-title":"Transparency report: HTTPS encryption on the web","year":"2020","unstructured":"Google. Transparency report: HTTPS encryption on the web, 2020. https:\/\/transparencyreport.google.com\/https\/overview."},{"key":"e_1_3_2_2_24_1","volume-title":"GitHub and the man-in-the-middle. GreatFire.org","author":"Johnson M.","year":"2013","unstructured":"M.Johnson. China, GitHub and the man-in-the-middle. GreatFire.org, January 30, 2013. https:\/\/en.greatfire.org\/blog\/2013\/jan\/china-github-and-man-middle."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2793013.2793015"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_28"},{"key":"e_1_3_2_2_27_1","volume-title":"Kazakhtelecom JSC notifies on introduction of national security certificate from","author":"Kazakhtelecom","year":"2016","unstructured":"Kazakhtelecom JSC. Kazakhtelecom JSC notifies on introduction of national security certificate from 1 January 2016, 2015. Archived at https:\/\/web.archive.org\/web\/20151202203337\/http:\/\/telecom.kz\/en\/news\/view\/18729."},{"key":"e_1_3_2_2_28_1","volume-title":"ACM Queue","author":"Laurie B.","year":"2014","unstructured":"B. Laurie, A. Langley, and E. Kasper. Certificate transparency. ACM Queue, 2014."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23547"},{"key":"e_1_3_2_2_30_1","unstructured":"M. Marlinspike. Convergence 2011. Archived at https:\/\/web.archive.org\/web\/20160803195327\/http:\/\/convergence.io\/."},{"key":"e_1_3_2_2_31_1","unstructured":"MaxMind. https:\/\/www.maxmind.com\/."},{"key":"e_1_3_2_2_32_1","volume-title":"The Mozilla Blog","year":"2014","unstructured":"Mozilla. Phasing out certificates with 1024-bit RSA keys. The Mozilla Blog, September 08, 2014. https:\/\/blog.mozilla.org\/securitty\/2014\/09\/08\/phasing-out-certificates-with-1024-bit-rsa-keys\/."},{"key":"e_1_3_2_2_33_1","volume-title":"The Mozilla Blog","year":"2019","unstructured":"Mozilla. Mozilla takes action to protect users in Kazakhstan. The Mozilla Blog, August 21, 2019. https:\/\/blog.mozilla.org\/blog\/2019\/08\/21\/mozilla-takes-action-to-protect-users-in-kazakhstan\/."},{"key":"e_1_3_2_2_34_1","volume-title":"HTTP Public Key Pinning (HPKP)","year":"2020","unstructured":"Mozilla. HTTP Public Key Pinning (HPKP), 2020. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/HTTP\/Public_Key_Pinning."},{"key":"e_1_3_2_2_35_1","volume-title":"Nation state MITM CAs? (thread). mozilla.dev.security.policy mailing list","author":"Multiple","year":"2016","unstructured":"Multiple authors. Nation state MITM CAs? (thread). mozilla.dev.security.policy mailing list, 2016. https:\/\/groups.google.com\/forum\/#!msg\/mozilla.dev.security.policy\/wnuKAhACo3E\/cpsvHgcuDwAJ."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2665148"},{"key":"e_1_3_2_2_37_1","volume-title":"The Belmont Report: Ethical principles and guidelines for the protection of human subjects of research","author":"National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research.","year":"1978","unstructured":"National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. The Belmont Report: Ethical principles and guidelines for the protection of human subjects of research, 1978."},{"key":"e_1_3_2_2_38_1","unstructured":"National Security Committee of the Republic of Kazakhstan. B OTHOIIIeH&Icy;&Icy; cepT&Icy;&Fcy;&Icy;kaTa &bcy;e3oIIaCHOCY&Icy; 2019. http:\/\/knb.gov.kz\/ru\/news\/v-otnoshenii-sertifikata-bezopasnosti."},{"key":"e_1_3_2_2_39_1","volume-title":"The Register","author":"Nichols S.","year":"2015","unstructured":"S. Nichols. Is Kazakhstan about to man-in-the-middle diddle all of its Internet traffic with dodgy root certs? The Register, December 3, 2015. https:\/\/www.theregister.co.uk\/2015\/12\/03\/kazakhstan_to_maninthemiddle_all_internet_traffic\/."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987488"},{"key":"e_1_3_2_2_41_1","volume-title":"Country profile: Kazakhstan","author":"Initiative OpenNet","year":"2010","unstructured":"OpenNet Initiative. Country profile: Kazakhstan, 2010. https:\/\/opennet.net\/research\/profiles\/kazakhstan."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2793013.2793014"},{"key":"e_1_3_2_2_43_1","volume-title":"USENIX Security Symposium","author":"Pearce P.","year":"2017","unstructured":"P. Pearce, B. Jones, F. Li, R. Ensafi, N. Feamster, N. Weaver, and V. Paxson. Global measurement of DNS censorship. In USENIX Security Symposium, 2017."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.23098"},{"key":"e_1_3_2_2_45_1","volume-title":"Dentons","author":"Shapovalova N.","year":"2015","unstructured":"N. Shapovalova. Security certificate of the Republic of Kazakhstan: the state will be able to control the encrypted Internet traffic of users. Dentons, Dec. 2015. https:\/\/www.dentons.com\/en\/insights\/alerts\/2015\/december\/30\/security-certificate-of-the-republic-of-kazakhstan."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787502"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.1591033"},{"key":"e_1_3_2_2_48_1","volume-title":"Kazakhstan's HTTPS Interception","author":"Raman R. Sundara","year":"2019","unstructured":"R. Sundara Raman, L. Evdokimov, E. Wustrow, A. Halderman, and R. Ensafi. Kazakhstan's HTTPS Interception, 2019. https:\/\/censoredplanet.org\/kazakhstan."},{"key":"e_1_3_2_2_49_1","volume-title":"Longitudinal Censorship Observatory. In ACM Conference on Computer and Communications Security (CCS)","author":"Raman R. Sundara","year":"2020","unstructured":"R. Sundara Raman, P. Shenoy, K. Kohls, and R. Ensafi. Censored Planet: An Internet-wide, Longitudinal Censorship Observatory. In ACM Conference on Computer and Communications Security (CCS), 2020."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.23099"},{"key":"e_1_3_2_2_51_1","volume-title":"The Kazakhstan interception system's TLS fingerprint (f09427b5aaf9304b)","year":"2019","unstructured":"TLSFingerprint.io. The Kazakhstan interception system's TLS fingerprint (f09427b5aaf9304b), 2019. https:\/\/tlsfingerprint.io\/id\/f09427b5aaf9304b."},{"key":"e_1_3_2_2_52_1","volume-title":"USENIX Security Symposium","author":"VanderSloot B.","year":"2018","unstructured":"B. VanderSloot, A. McDonald, W. Scott, J. A. Halderman, and R. Ensafi. Quack: Scalable remote measurement of application-layer censorship. In USENIX Security Symposium, 2018."},{"key":"e_1_3_2_2_53_1","volume-title":"The sorry state of TLS security in enterprise interception appliances. Digit. Threat. Res. Pract., 1(1)","author":"Waked L.","year":"2019","unstructured":"L. Waked, M. Mannan, and A. Youssef. The sorry state of TLS security in enterprise interception appliances. Digit. Threat. Res. Pract., 1(1), 2019."},{"key":"e_1_3_2_2_54_1","volume-title":"August 1","author":"Warburton D.","year":"2019","unstructured":"D. Warburton. Kazakhstan attempts to MITM its citizens. F5 Labs Blog, August 1, 2019. https:\/\/www.f5.com\/labs\/articles\/threat-intelligence\/kazakhstan-attempts-to-mitm-itscitizens."},{"key":"e_1_3_2_2_55_1","volume-title":"USENIX Annual Technical Conference (ATC)","author":"Wendlandt D.","year":"2008","unstructured":"D. Wendlandt, D. G. Andersen, and A. Perrig. Perspectives: Improving SSH-style host authentication with multi-path probing. In USENIX Annual Technical Conference (ATC), 2008."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2793013"},{"key":"e_1_3_2_2_57_1","volume-title":"GTC Workshop Outcomes Paper","author":"Zevenbergen B.","year":"2015","unstructured":"B. Zevenbergen, B. Mittelstadt, C. V\u00e9liz, C. Detweiler, C. Cath, J. Savulescu, and M. Whittaker. Philosophy meets Internet engineering: Ethics in networked systems research. GTC Workshop Outcomes Paper, 2015. https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2666934."}],"event":{"name":"IMC '20: ACM Internet Measurement Conference","location":"Virtual Event USA","acronym":"IMC '20","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation"]},"container-title":["Proceedings of the ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419394.3423665","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3419394.3423665","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T23:38:13Z","timestamp":1765841893000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419394.3423665"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,27]]},"references-count":57,"alternative-id":["10.1145\/3419394.3423665","10.1145\/3419394"],"URL":"https:\/\/doi.org\/10.1145\/3419394.3423665","relation":{},"subject":[],"published":{"date-parts":[[2020,10,27]]},"assertion":[{"value":"2020-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}