Protocol misidentification made easy with format-transforming encryption

  title={Protocol misidentification made easy with format-transforming encryption},
  author={Kevin P. Dyer and Scott E. Coull and Thomas Ristenpart and Thomas Shrimpton},
  booktitle={ACM Conference on Computer and Communications Security},
Deep packet inspection (DPI) technologies provide much-needed visibility and control of network traffic using port-independent protocol identification, where a network flow is labeled with its application-layer protocol based on packet contents. In this paper, we provide the first comprehensive evaluation of a large set of DPI systems from the point of view of protocol misidentification attacks, in which adversaries on the network attempt to force the DPI to mislabel connections. Our approach… CONTINUE READING
Highly Cited
This paper has 79 citations. REVIEW CITATIONS
55 Citations
5 References
Similar Papers


Publications citing this paper.
Showing 1-10 of 55 extracted citations

80 Citations

Citations per Year
Semantic Scholar estimates that this publication has 80 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-5 of 5 references

Iran vows to unplug internet

  • Christopher Rhoads, Farnaz Fassihi
  • Available at:
  • 2011
Highly Influential
4 Excerpts

Similar Papers

Loading similar papers…