@inproceedings{ffc51bde8dc54102bc095839461fdc51,
title = "AVOID: Automatic Verification Of Internet Data-paths",
abstract = "Department of Defense (DOD) use of commercial networks entails unprecedented reliance on untrusted third-party communications infrastructure, and the associated risk of exposing DOD communications to an adversary. Traversing adversary-controlled infrastructure allows DOD's adversaries to recognize, disrupt, or extract intelligence even from encrypted communications. The resulting arms race of obfuscation vs intelligence techniques is inherently limited: with each new obfuscation, DOD can never know if it fools the adversary, or if the adversary is lulling DOD into a false sense of security.",
author = "Alexander Marder and Jon Larrea and Kc Claffy and Erik Kline and Kyle Jamieson and Bradley Huffaker and Lincoln Thurlow and Matthew Luckie",
note = "Publisher Copyright: {\textcopyright} 2024 IEEE.; 2024 IEEE Military Communications Conference, MILCOM 2024 ; Conference date: 28-10-2024 Through 01-11-2024",
year = "2024",
doi = "10.1109/MILCOM61039.2024.10773840",
language = "English (US)",
series = "Proceedings - IEEE Military Communications Conference MILCOM",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "647--648",
booktitle = "2024 IEEE Military Communications Conference, MILCOM 2024",
address = "United States",
}