{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T06:26:32Z","timestamp":1775715992045,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,25]],"date-time":"2022-10-25T00:00:00Z","timestamp":1666656000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"DARPA","award":["HR0011-20-C-0107"],"award-info":[{"award-number":["HR0011-20-C-0107"]}]},{"name":"NSF","award":["CNS-2147909, CNS-1901510"],"award-info":[{"award-number":["CNS-2147909, CNS-1901510"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,25]]},"DOI":"10.1145\/3517745.3561414","type":"proceedings-article","created":{"date-parts":[[2022,10,21]],"date-time":"2022-10-21T21:28:36Z","timestamp":1666387716000},"page":"244-260","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":42,"title":["Enabling passive measurement of zoom performance in production networks"],"prefix":"10.1145","author":[{"given":"Oliver","family":"Michel","sequence":"first","affiliation":[{"name":"Princeton University"}]},{"given":"Satadal","family":"Sengupta","sequence":"additional","affiliation":[{"name":"Princeton University"}]},{"given":"Hyojoon","family":"Kim","sequence":"additional","affiliation":[{"name":"Princeton University"}]},{"given":"Ravi","family":"Netravali","sequence":"additional","affiliation":[{"name":"Princeton University"}]},{"given":"Jennifer","family":"Rexford","sequence":"additional","affiliation":[{"name":"Princeton University"}]}],"member":"320","published-online":{"date-parts":[[2022,10,25]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/HCS49909.2020.9220636"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3482898.3483366"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.312"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3453182"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282386"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3410048.3410064"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315286"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2703615"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487847"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3405669.3405823"},{"key":"e_1_3_2_2_12_1","volume-title":"Passive and Active Network Measurement","author":"Choi Albert","unstructured":"Albert Choi , Mehdi Karamollahi , Carey Williamson , and Martin Arlitt . 2022. Zoom Session Quality: A Network-Level View . In Passive and Active Network Measurement . Springer , Berlin, Germany , 555--572. Albert Choi, Mehdi Karamollahi, Carey Williamson, and Martin Arlitt. 2022. Zoom Session Quality: A Network-Level View. In Passive and Active Network Measurement. Springer, Berlin, Germany, 555--572."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.14"},{"key":"e_1_3_2_2_14_1","volume-title":"Wang","author":"Cui Weidong","year":"2007","unstructured":"Weidong Cui , Jayanthkumar Kannan , and Helen J . Wang . 2007 . Discoverer : Automatic Protocol Reverse Engineering from Network Traces. In USENIX Security Symposium. USENIX Association , USA, Article 14, 14 pages. Weidong Cui, Jayanthkumar Kannan, and Helen J. Wang. 2007. Discoverer: Automatic Protocol Reverse Engineering from Network Traces. In USENIX Security Symposium. USENIX Association, USA, Article 14, 14 pages."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3766889"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423658"},{"key":"e_1_3_2_2_17_1","volume-title":"USENIX Annual Technical Conference. USENIX Association, USA, 13","author":"Ford Bryan","year":"2005","unstructured":"Bryan Ford , Pyda Srisuresh , and Dan Kegel . 2005 . Peer-to-Peer Communication across Network Address Translators . In USENIX Annual Technical Conference. USENIX Association, USA, 13 . Bryan Ford, Pyda Srisuresh, and Dan Kegel. 2005. Peer-to-Peer Communication across Network Address Translators. In USENIX Annual Technical Conference. USENIX Association, USA, 13."},{"key":"e_1_3_2_2_18_1","volume-title":"Salsify: Low-Latency Network Video through Tighter Integration between a Video Codec and a Transport Protocol. In USENIX Networked Systems Design and Implementation","author":"Fouladi Sadjad","year":"2018","unstructured":"Sadjad Fouladi , John Emmons , Emre Orbay , Catherine Wu , Riad S. Wahby , and Keith Winstein . 2018 . Salsify: Low-Latency Network Video through Tighter Integration between a Video Codec and a Transport Protocol. In USENIX Networked Systems Design and Implementation . USENIX Association , USA , 267--282. Sadjad Fouladi, John Emmons, Emre Orbay, Catherine Wu, Riad S. Wahby, and Keith Winstein. 2018. Salsify: Low-Latency Network Video through Tighter Integration between a Video Codec and a Transport Protocol. In USENIX Networked Systems Design and Implementation. USENIX Association, USA, 267--282."},{"key":"e_1_3_2_2_19_1","unstructured":"Todd Hof. 2020. A Short On How Zoom Works. (2020). http:\/\/highscalability.com\/blog\/2020\/5\/14\/a-short-on-how-zoom-works.html  Todd Hof. 2020. A Short On How Zoom Works. (2020). http:\/\/highscalability.com\/blog\/2020\/5\/14\/a-short-on-how-zoom-works.html"},{"key":"e_1_3_2_2_20_1","volume-title":"Retrieved","author":"Intel Corp.","year":"2022","unstructured":"Intel Corp. 2022 . Intel Tofino. (2022) . Retrieved September 12, 2022 from https:\/\/www.intel.com\/content\/www\/us\/en\/products\/network-io\/programmable-ethernet-switch\/tofino-series.html Intel Corp. 2022. Intel Tofino. (2022). Retrieved September 12, 2022 from https:\/\/www.intel.com\/content\/www\/us\/en\/products\/network-io\/programmable-ethernet-switch\/tofino-series.html"},{"key":"e_1_3_2_2_21_1","volume-title":"The Trusted Source for IP Address Data. (2022). Retrieved","year":"2022","unstructured":"ipinfo.io. 2022. The Trusted Source for IP Address Data. (2022). Retrieved April 3, 2022 from https:\/\/www.ipinfo.io ipinfo.io. 2022. The Trusted Source for IP Address Data. (2022). Retrieved April 3, 2022 from https:\/\/www.ipinfo.io"},{"key":"e_1_3_2_2_22_1","volume-title":"One-way transmission time. Recommendation I.371","author":"ITU-T.","unstructured":"ITU-T. 2003. One-way transmission time. Recommendation I.371 . International Telecommunication Union , Geneva, Switzerland . ITU-T. 2003. One-way transmission time. Recommendation I.371. International Telecommunication Union, Geneva, Switzerland."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8445"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341216.3342208"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475523"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177123"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487842"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2021.301107"},{"key":"e_1_3_2_2_29_1","volume-title":"Retrieved","author":"Marczak Bill","year":"2020","unstructured":"Bill Marczak and John Scott-Railton . 2020 . Move fast and roll your own crypto. (2020) . Retrieved March 26, 2022 from https:\/\/citizenlab.ca\/2020\/04\/move-fast-roll-your-own-crypto-a-quick-look-at-the-confidentiality-of-zoom-meetings\/ Bill Marczak and John Scott-Railton. 2020. Move fast and roll your own crypto. (2020). Retrieved March 26, 2022 from https:\/\/citizenlab.ca\/2020\/04\/move-fast-roll-your-own-crypto-a-quick-look-at-the-confidentiality-of-zoom-meetings\/"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC5389"},{"key":"e_1_3_2_2_31_1","unstructured":"Oliver Michel Satadal Sengupta Hyojoon Kim Ravi Netravali and Jennifer Rexford. 2022. Zoom Analysis Source Code. (2022). https:\/\/github.com\/princeton-cabernet\/zoom-analysis  Oliver Michel Satadal Sengupta Hyojoon Kim Ravi Netravali and Jennifer Rexford. 2022. Zoom Analysis Source Code. (2022). https:\/\/github.com\/princeton-cabernet\/zoom-analysis"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-98785-5_12"},{"key":"e_1_3_2_2_33_1","volume-title":"Retrieved","author":"Maurizio","year":"2022","unstructured":"Maurizio M. Munafo and Martino Trevisan. 2020. Zoom PCAP Cleaner. (2020) . Retrieved April 14, 2022 from https:\/\/github.com\/marty90\/rtc_pcap_cleaners Maurizio M. Munafo and Martino Trevisan. 2020. Zoom PCAP Cleaner. (2020). Retrieved April 14, 2022 from https:\/\/github.com\/marty90\/rtc_pcap_cleaners"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2840724"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISM.2020.00007"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3711"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC4566"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3261"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3551"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3550"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2007.905532"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544222"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2012.2221191"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.839617"},{"key":"e_1_3_2_2_45_1","volume-title":"Retrieved","author":"Valenzuela Ismael","year":"2021","unstructured":"Ismael Valenzuela and Douglas McKee . 2021 . Hacking Proprietary Protocols with Sharks and Pandas. (2021) . Retrieved March 28, 2022 from https:\/\/www.mcafee.com\/blogs\/enterprise\/security-operations\/hacking-proprietary-protocols-with-sharks-and-pandas\/ Ismael Valenzuela and Douglas McKee. 2021. Hacking Proprietary Protocols with Sharks and Pandas. (2021). Retrieved March 28, 2022 from https:\/\/www.mcafee.com\/blogs\/enterprise\/security-operations\/hacking-proprietary-protocols-with-sharks-and-pandas\/"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC6716"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3056504"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815165"},{"key":"e_1_3_2_2_49_1","volume-title":"Retrieved","year":"2022","unstructured":"Wireshark. 2022 . The Wireshark Network Protocol Analyzer. (2022) . Retrieved March 30, 2022 from https:\/\/www.wireshark.org Wireshark. 2022. The Wireshark Network Protocol Analyzer. (2022). Retrieved March 30, 2022 from https:\/\/www.wireshark.org"},{"key":"e_1_3_2_2_50_1","volume-title":"Network and Distributed System Security Symposium. Internet Society","author":"Wondracek Gilbert","year":"2008","unstructured":"Gilbert Wondracek , Paolo Milani Comparetti , Christopher Kruegel , and Engin Kirda . 2008 . Automatic network protocol analysis . In Network and Distributed System Security Symposium. Internet Society , Reston, VA, USA, Article 13, 18 pages. Gilbert Wondracek, Paolo Milani Comparetti, Christopher Kruegel, and Engin Kirda. 2008. Automatic network protocol analysis. In Network and Distributed System Security Symposium. Internet Society, Reston, VA, USA, Article 13, 18 pages."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3483259"},{"key":"e_1_3_2_2_52_1","volume-title":"Retrieved","author":"Communications Zoom Video","year":"2020","unstructured":"Zoom Video Communications , Inc. 2020 . Connection Process. (2020) . Retrieved March 30, 2022 from https:\/\/explore.zoom.us\/docs\/doc\/Zoom%20Connection%20Process%20Whitepaper.pdf Zoom Video Communications, Inc. 2020. Connection Process. (2020). Retrieved March 30, 2022 from https:\/\/explore.zoom.us\/docs\/doc\/Zoom%20Connection%20Process%20Whitepaper.pdf"},{"key":"e_1_3_2_2_53_1","volume-title":"Accessing meeting and phone statistics. (2021","author":"Communications Zoom Video","year":"2021","unstructured":"Zoom Video Communications , Inc. 2021 . Accessing meeting and phone statistics. (2021 ). Retrieved May 18, 2022 fromhttps:\/\/support.zoom.us\/hc\/en-us\/articles\/202920719-Accessing-meeting-and-phone-statistics Zoom Video Communications, Inc. 2021. Accessing meeting and phone statistics. (2021). Retrieved May 18, 2022 fromhttps:\/\/support.zoom.us\/hc\/en-us\/articles\/202920719-Accessing-meeting-and-phone-statistics"},{"key":"e_1_3_2_2_54_1","volume-title":"Retrieved","author":"Communications Zoom Video","year":"2021","unstructured":"Zoom Video Communications , Inc. 2021 . How QoS Metrics are determined in the Zoom API. (2021) . Retrieved April 12, 2022 from https:\/\/devforum.zoom.us\/t\/how-qos-metrics-are-determined-in-the-zoom-api\/47891 Zoom Video Communications, Inc. 2021. How QoS Metrics are determined in the Zoom API. (2021). Retrieved April 12, 2022 from https:\/\/devforum.zoom.us\/t\/how-qos-metrics-are-determined-in-the-zoom-api\/47891"},{"key":"e_1_3_2_2_55_1","volume-title":"Retrieved","author":"Communications Zoom Video","year":"2021","unstructured":"Zoom Video Communications , Inc. 2021 . Zoom Encryption. (2021) . Retrieved April 14, 2022 from https:\/\/explore.zoom.us\/docs\/doc\/Zoom%20Encryption%20Whitepaper.pdf Zoom Video Communications, Inc. 2021. Zoom Encryption. (2021). Retrieved April 14, 2022 from https:\/\/explore.zoom.us\/docs\/doc\/Zoom%20Encryption%20Whitepaper.pdf"},{"key":"e_1_3_2_2_56_1","unstructured":"Zoom Video Communications Inc. 2022. End-to-end (E2EE) encryption for meetings. (2022). Retrieved April 5 2022 from https:\/\/support.zoom.us\/hc\/en-us\/articles\/360048660871-End-to-end-E2EE-encryption-for-meetings  Zoom Video Communications Inc. 2022. End-to-end (E2EE) encryption for meetings. (2022). Retrieved April 5 2022 from https:\/\/support.zoom.us\/hc\/en-us\/articles\/360048660871-End-to-end-E2EE-encryption-for-meetings"},{"key":"e_1_3_2_2_57_1","volume-title":"Retrieved","author":"Communications Zoom Video","year":"2022","unstructured":"Zoom Video Communications , Inc. 2022 . Zoom Dashboard API. (2022) . Retrieved April 12, 2022 from https:\/\/marketplace.zoom.us\/docs\/api-reference\/zoom-api\/methods\/#tag\/Dashboards Zoom Video Communications, Inc. 2022. Zoom Dashboard API. (2022). Retrieved April 12, 2022 from https:\/\/marketplace.zoom.us\/docs\/api-reference\/zoom-api\/methods\/#tag\/Dashboards"},{"key":"e_1_3_2_2_58_1","volume-title":"Zoom Meeting SDKs. (2022","author":"Communications Zoom Video","year":"2022","unstructured":"Zoom Video Communications , Inc. 2022 . Zoom Meeting SDKs. (2022 ). Retrieved May 10, 2022 from https:\/\/marketplace.zoom.us\/docs\/sdk\/native-sdks\/introduction Zoom Video Communications, Inc. 2022. Zoom Meeting SDKs. (2022). Retrieved May 10, 2022 from https:\/\/marketplace.zoom.us\/docs\/sdk\/native-sdks\/introduction"},{"key":"e_1_3_2_2_59_1","volume-title":"Retrieved","author":"Communications Zoom Video","year":"2022","unstructured":"Zoom Video Communications , Inc. 2022 . Zoom network firewall or proxy server settings. (2022) . Retrieved March 30, 2022 from https:\/\/support.zoom.us\/hc\/en-us\/articles\/201362683-Zoom-network-firewall-or-proxy-server-settings Zoom Video Communications, Inc. 2022. Zoom network firewall or proxy server settings. (2022). Retrieved March 30, 2022 from https:\/\/support.zoom.us\/hc\/en-us\/articles\/201362683-Zoom-network-firewall-or-proxy-server-settings"}],"event":{"name":"IMC '22: ACM Internet Measurement Conference","location":"Nice France","acronym":"IMC '22","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","USENIX Assoc USENIX Assoc"]},"container-title":["Proceedings of the 22nd ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3517745.3561414","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3517745.3561414","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3517745.3561414","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:16Z","timestamp":1750182556000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3517745.3561414"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,25]]},"references-count":59,"alternative-id":["10.1145\/3517745.3561414","10.1145\/3517745"],"URL":"https:\/\/doi.org\/10.1145\/3517745.3561414","relation":{},"subject":[],"published":{"date-parts":[[2022,10,25]]},"assertion":[{"value":"2022-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}