AVOID: Automatic Verification Of Internet Data-paths

Alexander Marder, Jon Larrea, Kc Claffy, Erik Kline, Kyle Jamieson, Bradley Huffaker, Lincoln Thurlow, Matthew Luckie

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Department of Defense (DOD) use of commercial networks entails unprecedented reliance on untrusted third-party communications infrastructure, and the associated risk of exposing DOD communications to an adversary. Traversing adversary-controlled infrastructure allows DOD's adversaries to recognize, disrupt, or extract intelligence even from encrypted communications. The resulting arms race of obfuscation vs intelligence techniques is inherently limited: with each new obfuscation, DOD can never know if it fools the adversary, or if the adversary is lulling DOD into a false sense of security.

Original languageEnglish (US)
Title of host publication2024 IEEE Military Communications Conference, MILCOM 2024
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages647-648
Number of pages2
ISBN (Electronic)9798350374230
DOIs
StatePublished - 2024
Event2024 IEEE Military Communications Conference, MILCOM 2024 - Washington, United States
Duration: Oct 28 2024Nov 1 2024

Publication series

NameProceedings - IEEE Military Communications Conference MILCOM
ISSN (Print)2155-7578
ISSN (Electronic)2155-7586

Conference

Conference2024 IEEE Military Communications Conference, MILCOM 2024
Country/TerritoryUnited States
CityWashington
Period10/28/2411/1/24

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'AVOID: Automatic Verification Of Internet Data-paths'. Together they form a unique fingerprint.

Cite this