Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security 2017
DOI: 10.1145/3052973.3053013
|View full text |Cite
|
Sign up to set email alerts
|

BlindIDS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 52 publications
(12 citation statements)
references
References 13 publications
0
11
0
1
Order By: Relevance
“…Existing solutions that may be used to overcome the previous problem rely mainly on searchable encryption based techniques [1][2][3][4][5][6][7]21]. Unfortunately, these techniques suffer from at least one of the following limitations.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Existing solutions that may be used to overcome the previous problem rely mainly on searchable encryption based techniques [1][2][3][4][5][6][7]21]. Unfortunately, these techniques suffer from at least one of the following limitations.…”
Section: Introductionmentioning
confidence: 99%
“…Unfortunately, these techniques suffer from at least one of the following limitations. First, the lack of support for pattern-matching with evolving patterns, such as virus signatures which are updated frequently (case of symmetric searchable encryption [2][3][4][5]21]); second, the lack of support for variable pattern lengths (e.g., tokenization-based techniques such as BlindBox [6]); third, the incompleteness of pattern detection methods which yield false negatives (case of BlindIDS [7]); and fourth, the disclosure of detection patterns (case of searchable encryption with shiftable trapdoors [1]). We provide a full comparison with related literature in Section 2.…”
Section: Introductionmentioning
confidence: 99%
“…MPC or Searchable Encryption [8,36,54,55,59,94,107,108,150,153,182,199,215,216,225,226,228,246,273,274,295,309,311,336,382] (total: 25) Trusted Execution Environment [78,104,157,158,213,271,294,295,328,339,356,357,369,380] (total: 14) Other [137,295,310,337,387] (total: 5)…”
Section: Corporate Network Monitoringmentioning
confidence: 99%
“…A typical setting is to detect or block specific keywords, websites, or content in TLS traffic, usually with no special hardware. MPC or Searchable Encryption [54,55,108,150,182,215,216,226,274,295,304,305,336] (total: 13) Trusted Execution Environment [328] (total: 1)…”
Section: Parental or Educational Controlmentioning
confidence: 99%
See 1 more Smart Citation