Back to Results
First PageMeta Content
Voice over IP / Videotelephony / Computer network security / Internet privacy / Broadband / Skype protocol / Deep packet inspection / Tor / Traffic shaping / Software / Computing / Skype


SkypeMorph: Protocol Obfuscation for Tor Bridges∗ Hooman Mohajeri Moghaddam Baiyu Li Mohammad Derakhshani Ian Goldberg Cheriton School of Computer Science
Add to Reading List

Document Date: 2012-08-25 10:47:50


Open Document

File Size: 812,68 KB

Share Result on Facebook

City

Raleigh / /

Company

Skype / Computer-Communication Networks / Facebook / Simmons / the AES / SkypeMorph Software / Microsoft / /

Country

China / United States / /

Currency

USD / /

/

Event

FDA Phase / /

Facility

UDP port PC / UDP port PS / Computer Science University of Waterloo Waterloo / Overhead Normal bridge / UDP port / port PS / bridge SkypeMorph / UDP port PS0 / /

IndustryTerm

Web browsing / counter mode stream cipher algorithm / online applications / open-source steganographic tools / transport protocol / listed routers / transport algorithm / target protocol / Internet traffic / arbitrary encrypted protocols / chat services / electronic devices / onion routers / http /

OperatingSystem

Microsoft Windows / Linux / /

Organization

Computer Science University of Waterloo Waterloo / Tor Bridges∗ Hooman Mohajeri Moghaddam Baiyu Li Mohammad Derakhshani Ian Goldberg Cheriton School / /

Person

George Kadianakis / Paul Syverson / Tor Tra / Tor Traffic / Tor bridges / Mohammad Derakhshani Ian Goldberg / Tor Bridges∗ Hooman Mohajeri / /

Position

General / engineer / Privacy General / /

Product

Traffic Morphing / Skype ID / SkypeMorph / /

ProgrammingLanguage

RC / C++ / /

ProvinceOrState

Kansas / North Carolina / /

Technology

publicly listed routers / Linux / API / arbitrary encrypted protocols / encrypted protocol / target protocol / instant messaging / secret key / encrypted UDP-based target protocols / mobile devices / encryption / cryptography / ISP / VoIP protocols / source protocol / counter mode stream cipher algorithm / arbitrary TCP protocol / Control Network / transport algorithm / peer-to-peer / onion routers / streaming video / MTU / UDP / SSL / operating systems / half-duplex / TCP/IP / target protocols / public key / Firewall / transport protocol / HTTP / VOIP / outgoing and incoming message encryption / stream cipher / Network protocols / /

URL

http /

SocialTag