Publications
AVOID: Automatic Verification Of Internet Data-paths
Abstract
Department of Defense (DOD) use of commercial networks entails unprecedented reliance on untrusted third-party communications infrastructure, and the associated risk of exposing DOD communications to an adversary. Traversing adversary-controlled infrastructure allows DOD’s adversaries to recognize, disrupt, or extract intelligence even from encrypted communications. The resulting arms race of obfuscation vs intelligence techniques is inherently limited: with each new obfuscation, DOD can never know if it fools the adversary, or if the adversary is lulling DOD into a false sense of security.
Metadata
- publication
- MILCOM 2024-2024 IEEE Military Communications Conference (MILCOM), 647-648, 2024
- year
- 2024
- publication date
- 2024/10/28
- authors
- Alexander Marder, Jon Larrea, Kc Claffy, Erik Kline, Kyle Jamieson, Bradley Huffaker, Lincoln Thurlow, Matthew Luckie
- link
- https://ieeexplore.ieee.org/abstract/document/10773840/
- conference
- MILCOM 2024-2024 IEEE Military Communications Conference (MILCOM)
- pages
- 647-648
- publisher
- IEEE