To Intercept or Not to Intercept:
Analyzing TLS Interception in Network Appliances

Extended Paper