{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T21:08:06Z","timestamp":1724965686438},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,10,23]]},"DOI":"10.1145\/2504730.2504757","type":"proceedings-article","created":{"date-parts":[[2013,10,22]],"date-time":"2013-10-22T13:42:56Z","timestamp":1382449376000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":77,"title":["Revealing middlebox interference with tracebox"],"prefix":"10.1145","author":[{"given":"Gregory","family":"Detal","sequence":"first","affiliation":[{"name":"Universit\u00e9 catholique de Louvain, Louvain-la-Neuve, Belgium"}]},{"given":"Benjamin","family":"Hesmans","sequence":"additional","affiliation":[{"name":"Universit\u00e9 catholique de Louvain, Louvain-la-Neuve, Belgium"}]},{"given":"Olivier","family":"Bonaventure","sequence":"additional","affiliation":[{"name":"Universit\u00e9 catholique de Louvain, Louvain-la-Neuve, Belgium"}]},{"given":"Yves","family":"Vanaubel","sequence":"additional","affiliation":[{"name":"Universit\u00e9 de Li\u00e8ge, Li\u00e8ge, Belgium"}]},{"given":"Benoit","family":"Donnet","sequence":"additional","affiliation":[{"name":"Universit\u00e9 de Li\u00e8ge, Li\u00e8ge, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2013,10,23]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342359"},{"key":"e_1_3_2_2_2_1","volume-title":"RFC","author":"Carpenter B.","year":"2002","unstructured":"B. Carpenter and S. Brim , \" Middleboxes: Taxonomy and issues,\" Internet Engineering Task Force , RFC 3234, February 2002 . B. Carpenter and S. Brim, \"Middleboxes: Taxonomy and issues,\" Internet Engineering Task Force, RFC 3234, February 2002."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018479"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068834"},{"key":"e_1_3_2_2_5_1","volume-title":"RFC","author":"Stewart R.","year":"2000","unstructured":"R. Stewart , Q. Xie , K. Morneault , C. Sharp , H. Schwarzbauer , T. Taylor , I. Rytina , M. Kalla , L. Zhang , and V. Paxson , \" Stream control transmission protocol,\" Internet Engineering Task Force , RFC 2960, October 2000 . R. Stewart, Q. Xie, K. Morneault, C. Sharp, H. Schwarzbauer, T. Taylor, I. Rytina, M. Kalla, L. Zhang, and V. Paxson, \"Stream control transmission protocol,\" Internet Engineering Task Force, RFC 2960, October 2000."},{"key":"e_1_3_2_2_6_1","volume-title":"RFC","author":"Ford A.","year":"2013","unstructured":"A. Ford , C. Raiciu , M. Handley , and O. Bonaventure , \" TCP extensions for multipath operation with multiple addresses,\" Internet Engineering Task Force , RFC 6824, January 2013 . A. Ford, C. Raiciu, M. Handley, and O. Bonaventure, \"TCP extensions for multipath operation with multiple addresses,\" Internet Engineering Task Force, RFC 6824, January 2013."},{"key":"e_1_3_2_2_7_1","volume-title":"traceroute,\" UNIX,\" man page","author":"Jacobson V.","year":"1989","unstructured":"V. Jacobson , \" traceroute,\" UNIX,\" man page , 1989 , see source code: ftp:\/\/ftp.ee.lbl.gov\/traceroute.tar.gz. V. Jacobson et al., \"traceroute,\" UNIX,\" man page, 1989, see source code: ftp:\/\/ftp.ee.lbl.gov\/traceroute.tar.gz."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"crossref","unstructured":"J. Postel \"Internet control message protocol \" Internet Engineering Task Force RFC 792 September 1981. J. Postel \"Internet control message protocol \" Internet Engineering Task Force RFC 792 September 1981.","DOI":"10.17487\/rfc0792"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"crossref","unstructured":"F. Baker \"Requirements for IP version 4 routers \" Internet Engineering Task Force RFC 1812 June 1995. F. Baker \"Requirements for IP version 4 routers \" Internet Engineering Task Force RFC 1812 June 1995.","DOI":"10.17487\/rfc1812"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(199606)26:6%3C635::AID-SPE26%3E3.0.CO;2-P"},{"key":"e_1_3_2_2_11_1","unstructured":"P. Biondi \"Scapy \" see http:\/\/www.secdev.org\/projects\/scapy\/. P. Biondi \"Scapy \" see http:\/\/www.secdev.org\/projects\/scapy\/."},{"key":"e_1_3_2_2_12_1","unstructured":"G. Detal \"\\tracebox \" July 2013 see http:\/\/www.tracebox.org. G. Detal \"\\tracebox \" July 2013 see http:\/\/www.tracebox.org."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/354871.354874"},{"key":"e_1_3_2_2_14_1","unstructured":"B. Hesmans \"Mbclick \" July 2013 see https:\/\/bitbucket.org\/bhesmans\/mbclick. B. Hesmans \"Mbclick \" July 2013 see https:\/\/bitbucket.org\/bhesmans\/mbclick."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"crossref","unstructured":"A. Heffernan \"Protection of BGP sessions via the TCP MD5 signature option \" Internet Engineering Task Force RFC 2385 August 1998. A. Heffernan \"Protection of BGP sessions via the TCP MD5 signature option \" Internet Engineering Task Force RFC 2385 August 1998.","DOI":"10.17487\/rfc2385"},{"key":"e_1_3_2_2_16_1","volume-title":"RFC","author":"Jacobson V.","year":"1992","unstructured":"V. Jacobson , R. Braden , and D. Borman , \" TCP extensions for high performance,\" Internet Engineering Task Force , RFC 1323, May 1992 . V. Jacobson, R. Braden, and D. Borman, \"TCP extensions for high performance,\" Internet Engineering Task Force, RFC 1323, May 1992."},{"key":"e_1_3_2_2_17_1","volume-title":"October","author":"TCP","year":"1999","unstructured":"Microsoft, \"Patch available to improve TCP initial sequence number randomness,\" Microsoft , Microsoft Security Bulletin MS99-066 , October 1999 , see http:\/\/technet.microsoft.com\/en-us\/security\/bulletin\/ms99-046. Microsoft, \"Patch available to improve TCP initial sequence number randomness,\" Microsoft, Microsoft Security Bulletin MS99-066, October 1999, see http:\/\/technet.microsoft.com\/en-us\/security\/bulletin\/ms99-046."},{"key":"e_1_3_2_2_18_1","volume-title":"RFC 2018","author":"Mathis M.","year":"1996","unstructured":"M. Mathis , J. Mahdavi , S. Floyd , and A. Romanow , \" TCP selective acknowledgement options,\" Internet Engineering Task Force , RFC 2018 , October 1996 . M. Mathis, J. Mahdavi, S. Floyd, and A. Romanow, \"TCP selective acknowledgement options,\" Internet Engineering Task Force, RFC 2018, October 1996."},{"key":"e_1_3_2_2_19_1","unstructured":"C. Paasch \"Presentation ietf 87 \" July 2013 see http:\/\/tools.ietf.org\/agenda\/87\/slides\/slides-87-tcpm-11.pdf. C. Paasch \"Presentation ietf 87 \" July 2013 see http:\/\/tools.ietf.org\/agenda\/87\/slides\/slides-87-tcpm-11.pdf."},{"key":"e_1_3_2_2_20_1","volume-title":"RFC","author":"Mogul J.","year":"1990","unstructured":"J. Mogul and S. Deering , \" Path MTU discovery,\" Internet Engineering Task Force , RFC 1191, November 1990 . J. Mogul and S. Deering, \"Path MTU discovery,\" Internet Engineering Task Force, RFC 1191, November 1990."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028835"},{"key":"e_1_3_2_2_22_1","volume-title":"RFC","author":"Srisuresh P.","year":"1999","unstructured":"P. Srisuresh and M. Holdrege , \" IP network address translator (NAT) terminology and considerations,\" Internet Engineering Task Force , RFC 2663, August 1999 . P. Srisuresh and M. Holdrege, \"IP network address translator (NAT) terminology and considerations,\" Internet Engineering Task Force, RFC 2663, August 1999."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2007.4444750"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2008.4564479"},{"key":"e_1_3_2_2_25_1","unstructured":"M. Torren \"tcptraceroute - a traceroute implementation using TCP packets \" UNIX \" man page 2001 see source code: http:\/\/michael.toren.net\/code\/tcptraceroute\/. M. Torren \"tcptraceroute - a traceroute implementation using TCP packets \" UNIX \" man page 2001 see source code: http:\/\/michael.toren.net\/code\/tcptraceroute\/."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452557"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177100"},{"key":"e_1_3_2_2_28_1","volume-title":"USENIX Symposium on Networked Systems Design and Implementations (NSDI)","author":"Katz-Bassett E.","year":"2010","unstructured":"E. Katz-Bassett , H. Madhyastha , V. Adhikari , C. Scott , J. Sherry , P. van Wesep , A. Krishnamurthy , and T. Anderson , \" Reverse traceroute,\" in Proc . USENIX Symposium on Networked Systems Design and Implementations (NSDI) , June 2010 . E. Katz-Bassett, H. Madhyastha, V. Adhikari, C. Scott, J. Sherry, P. van Wesep, A. Krishnamurthy, and T. Anderson, \"Reverse traceroute,\" in Proc. USENIX Symposium on Networked Systems Design and Implementations (NSDI), June 2010."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064256"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879162"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36516-4_2"},{"key":"e_1_3_2_2_32_1","volume-title":"RFC","author":"Ramakrishnan K.","year":"2001","unstructured":"K. Ramakrishnan , S. Floyd , and D. Black , \" The addition of explicit congestion notification (ECN) to IP,\" Internet Engineering Task Force , RFC 3168, September 2001 . K. Ramakrishnan, S. Floyd, and D. Black, \"The addition of explicit congestion notification (ECN) to IP,\" Internet Engineering Task Force, RFC 3168, September 2001."}],"event":{"name":"IMC'13: Internet Measurement Conference","location":"Barcelona Spain","acronym":"IMC'13","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 2013 conference on Internet measurement conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2504730.2504757","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T08:03:16Z","timestamp":1673251396000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2504730.2504757"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10,23]]},"references-count":32,"alternative-id":["10.1145\/2504730.2504757","10.1145\/2504730"],"URL":"https:\/\/doi.org\/10.1145\/2504730.2504757","relation":{},"subject":[],"published":{"date-parts":[[2013,10,23]]},"assertion":[{"value":"2013-10-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}