{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:55:23Z","timestamp":1730321723457,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":104,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,19]],"date-time":"2019-08-19T00:00:00Z","timestamp":1566172800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Gouvernement Wallon","award":["Projet MQUIC (DGO6) + Digitrans (num\u00e9ro de convention 7618)"]},{"DOI":"10.13039\/501100002661","name":"Fonds De La Recherche Scientifique - FNRS","doi-asserted-by":"publisher","award":["ASP-REN 2018 (32704212) + ASP 2018 (32914025)"],"id":[{"id":"10.13039\/501100002661","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,19]]},"DOI":"10.1145\/3341302.3342078","type":"proceedings-article","created":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T19:32:36Z","timestamp":1565811156000},"page":"59-74","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":49,"title":["Pluginizing QUIC"],"prefix":"10.1145","author":[{"given":"Quentin","family":"De Coninck","sequence":"first","affiliation":[{"name":"UCLouvain, Belgium"}]},{"given":"Fran\u00e7ois","family":"Michel","sequence":"additional","affiliation":[{"name":"UCLouvain, Belgium"}]},{"given":"Maxime","family":"Piraux","sequence":"additional","affiliation":[{"name":"UCLouvain, Belgium"}]},{"given":"Florentin","family":"Rochet","sequence":"additional","affiliation":[{"name":"UCLouvain, Belgium"}]},{"given":"Thomas","family":"Given-Wilson","sequence":"additional","affiliation":[{"name":"UCLouvain, Belgium"}]},{"given":"Axel","family":"Legay","sequence":"additional","affiliation":[{"name":"UCLouvain, Belgium"}]},{"given":"Olivier","family":"Pereira","sequence":"additional","affiliation":[{"name":"UCLouvain, Belgium"}]},{"given":"Olivier","family":"Bonaventure","sequence":"additional","affiliation":[{"name":"UCLouvain, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2019,8,19]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"2018 USENIX Annual Technical Conference (USENIX ATC 18)","author":"Amit Nadav","year":"2018","unstructured":"Nadav Amit and Michael Wei . 2018 . The design and implementation of hyper-upcalls . In 2018 USENIX Annual Technical Conference (USENIX ATC 18) . 97--112. Nadav Amit and Michael Wei. 2018. The design and implementation of hyper-upcalls. In 2018 USENIX Annual Technical Conference (USENIX ATC 18). 97--112."},{"key":"e_1_3_2_2_2_1","unstructured":"Apple. 2018. Improving Network Reliability Using Multipath TCP. (2018). https:\/\/developer.apple.com\/documentation\/foundation\/urlsessionconfiguration\/improving_network_reliability_using_multipath_tcp. Apple. 2018. Improving Network Reliability Using Multipath TCP. (2018). https:\/\/developer.apple.com\/documentation\/foundation\/urlsessionconfiguration\/improving_network_reliability_using_multipath_tcp."},{"key":"e_1_3_2_2_3_1","volume-title":"Usage for timestamp options in the wild. (Sept","author":"Balasubramanian Praveen","year":"2018","unstructured":"Praveen Balasubramanian . 2018. Usage for timestamp options in the wild. (Sept . 2018 ). https:\/\/mailarchive.ietf.org\/arch\/legacy\/msg\/tcpm\/11522. Praveen Balasubramanian. 2018. Usage for timestamp options in the wild. (Sept. 2018). https:\/\/mailarchive.ietf.org\/arch\/legacy\/msg\/tcpm\/11522."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/316194.316214"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.26"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080123"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"e_1_3_2_2_8_1","volume-title":"TCP-BPF: Programmatically tuning TCP behavior through BPF. NetDev 2.2","author":"Brakmo Lawrence","year":"2017","unstructured":"Lawrence Brakmo . 2017. TCP-BPF: Programmatically tuning TCP behavior through BPF. NetDev 2.2 ( 2017 ). Lawrence Brakmo. 2017. TCP-BPF: Programmatically tuning TCP behavior through BPF. NetDev 2.2 (2017)."},{"key":"e_1_3_2_2_9_1","unstructured":"Marc Brockschmidt and Heidy Khlaaf. 2019. T2 Temporal Prover. http:\/\/mmjb.github.io\/T2\/. Marc Brockschmidt and Heidy Khlaaf. 2019. T2 Temporal Prover. http:\/\/mmjb.github.io\/T2\/."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1129582.1129590"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.642357"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96142-2_26"},{"key":"e_1_3_2_2_13_1","unstructured":"Lucas Clemente and Marten Seemann. 2018. quic-go. Source code. https:\/\/github.com\/lucas-clemente\/quic-go. Lucas Clemente and Marten Seemann. 2018. quic-go. Source code. https:\/\/github.com\/lucas-clemente\/quic-go."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1190215.1190257"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/2032305.2032331"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11817963_37"},{"volume-title":"Efficient Data Structures For Tamper-Evident Logging. In USENIX Security Symposium. 317--334","author":"Scott","key":"e_1_3_2_2_17_1","unstructured":"Scott A. Crosby and Dan S. Wallach. 2009 . Efficient Data Structures For Tamper-Evident Logging. In USENIX Security Symposium. 317--334 . Scott A. Crosby and Dan S. Wallach. 2009. Efficient Data Structures For Tamper-Evident Logging. In USENIX Security Symposium. 317--334."},{"key":"e_1_3_2_2_18_1","volume-title":"Linux Plumbers Conference.","author":"de Bruijn Willem","year":"2018","unstructured":"Willem de Bruijn and Eric Dumazet . 2018 . Optimizing UDP for content delivery: GSO, pacing and zerocopy . In Linux Plumbers Conference. Willem de Bruijn and Eric Dumazet. 2018. Optimizing UDP for content delivery: GSO, pacing and zerocopy. In Linux Plumbers Conference."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3143361.3143370"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"crossref","unstructured":"Quentin De Coninck and Olivier Bonaventure. 2018. Multipath Extension for QUIC. Internet-Draft draft-deconinck-quic-multipath-01. Internet Engineering Task Force. Quentin De Coninck and Olivier Bonaventure. 2018. Multipath Extension for QUIC . Internet-Draft draft-deconinck-quic-multipath-01. Internet Engineering Task Force.","DOI":"10.1145\/3143361.3143370"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278535"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/285243.285285"},{"key":"e_1_3_2_2_24_1","volume-title":"A Roadmap for Transmission Control Protocol (TCP) Specification Documents. RFC7414. (Feb","author":"Duke Martin","year":"2015","unstructured":"Martin Duke , Robert Braden , Wesley M. Eddy , Ethan Blanton , and Alexander Zimmermann . 2015. A Roadmap for Transmission Control Protocol (TCP) Specification Documents. RFC7414. (Feb . 2015 ), 57 pages. Martin Duke, Robert Braden, Wesley M. Eddy, Ethan Blanton, and Alexander Zimmermann. 2015. A Roadmap for Transmission Control Protocol (TCP) Specification Documents. RFC7414. (Feb. 2015), 57 pages."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/762761.762777"},{"key":"e_1_3_2_2_26_1","volume-title":"A seccomp overview. Linux Weekly News (September","author":"Edge Jake","year":"2015","unstructured":"Jake Edge . 2015. A seccomp overview. Linux Weekly News (September 2015 ). https:\/\/old.lwn.net\/Articles\/656307\/. Jake Edge. 2015. A seccomp overview. Linux Weekly News (September 2015). https:\/\/old.lwn.net\/Articles\/656307\/."},{"key":"e_1_3_2_2_27_1","volume-title":"Network and Distributed System Security Symposium (NDSS' 11)","author":"Egele Manuel","year":"2011","unstructured":"Manuel Egele , Christopher Kruegel , Engin Kirda , and Giovanni Vigna . 2011 . PiOS: Detecting Privacy Leaks in iOS Applications . In Network and Distributed System Security Symposium (NDSS' 11) . 177--183. Manuel Egele, Christopher Kruegel, Engin Kirda, and Giovanni Vigna. 2011. PiOS: Detecting Privacy Leaks in iOS Applications. In Network and Distributed System Security Symposium (NDSS' 11). 177--183."},{"key":"e_1_3_2_2_28_1","unstructured":"Ronald Aylmer Fisher. 1935. The design of experiments. Oliver & Boyd. Ronald Aylmer Fisher. 1935. The design of experiments . Oliver & Boyd."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486014"},{"key":"e_1_3_2_2_30_1","volume-title":"A thorough introduction to eBPF. Linux Weekly News (December","author":"Fleming Matt","year":"2017","unstructured":"Matt Fleming . 2017. A thorough introduction to eBPF. Linux Weekly News (December 2017 ). https:\/\/old.lwn.net\/Articles\/740157\/. Matt Fleming. 2017. A thorough introduction to eBPF. Linux Weekly News (December 2017). https:\/\/old.lwn.net\/Articles\/740157\/."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.413212"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"crossref","DOI":"10.17487\/rfc6824","volume-title":"TCP Extensions for Multipath Operation with Multiple Addresses. RFC 6824. (Jan","author":"Ford Alan","year":"2013","unstructured":"Alan Ford , Costin Raiciu , Mark Handley , and Olivier Bonaventure . 2013. TCP Extensions for Multipath Operation with Multiple Addresses. RFC 6824. (Jan . 2013 ), 64 pages. https:\/\/www.rfc-editor.org\/rfc\/rfc6824.txt Alan Ford, Costin Raiciu, Mark Handley, and Olivier Bonaventure. 2013. TCP Extensions for Multipath Operation with Multiple Addresses. RFC 6824. (Jan. 2013), 64 pages. https:\/\/www.rfc-editor.org\/rfc\/rfc6824.txt"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111322.1111337"},{"key":"e_1_3_2_2_34_1","volume-title":"RTP: A Transport Protocol for Real-Time Applications. RFC","author":"Frederick Ron","year":"1996","unstructured":"Ron Frederick , Stephen L. Casner , Van Jacobson , and Henning Schulzrinne . 1996 . RTP: A Transport Protocol for Real-Time Applications. RFC 1889. (Jan. 1996). Ron Frederick, Stephen L. Casner, Van Jacobson, and Henning Schulzrinne. 1996. RTP: A Transport Protocol for Real-Time Applications. RFC 1889. (Jan. 1996)."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/1986282.1986286"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837854.1736006"},{"key":"e_1_3_2_2_37_1","volume-title":"eBPF: One Small Step. (May","author":"Gregg Brendan","year":"2015","unstructured":"Brendan Gregg . 2015. eBPF: One Small Step. (May 2015 ). http:\/\/www.brendangregg.com\/blog\/2015-05-15\/ebpf-one-small-step.html. Brendan Gregg. 2015. eBPF: One Small Step. (May 2015). http:\/\/www.brendangregg.com\/blog\/2015-05-15\/ebpf-one-small-step.html."},{"key":"e_1_3_2_2_38_1","volume-title":"Arpaci-Dusseau","author":"Gunawi Haryadi S.","year":"2004","unstructured":"Haryadi S. Gunawi , Andrea C. Arpaci-Dusseau , and Remzi H . Arpaci-Dusseau . 2004 . Deploying Safe User-Level Network Services with icTCP. In OSDI. 317--332. Haryadi S. Gunawi, Andrea C. Arpaci-Dusseau, and Remzi H. Arpaci-Dusseau. 2004. Deploying Safe User-Level Network Services with icTCP. In OSDI. 317--332."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062363"},{"key":"e_1_3_2_2_40_1","volume-title":"QUIC: A UDP-Based Secure and Reliable Transport for HTTP\/2. Internet-Draft draft-hamilton-early-deployment-quic-00.","author":"Hamilton Ryan","year":"2016","unstructured":"Ryan Hamilton , Janardhan Iyengar , Ian Swett , and Alyssa Wilk . 2016 . QUIC: A UDP-Based Secure and Reliable Transport for HTTP\/2. Internet-Draft draft-hamilton-early-deployment-quic-00. Ryan Hamilton, Janardhan Iyengar, Ian Swett, and Alyssa Wilk. 2016. QUIC: A UDP-Based Secure and Reliable Transport for HTTP\/2. Internet-Draft draft-hamilton-early-deployment-quic-00."},{"key":"e_1_3_2_2_41_1","unstructured":"Stephen Hemminger. 2005. Network emulation with NetEm. In Australia's National Linux Conference. 18--23. Stephen Hemminger. 2005. Network emulation with NetEm. In Australia's National Linux Conference . 18--23."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535828.2535830"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/291251.289431"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.774909"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2602204.2602212"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068834"},{"volume-title":"Performance, Quality of Service, and Control of Next-Generation Communication and Sensor Networks III","author":"Honda Osamu","key":"e_1_3_2_2_47_1","unstructured":"Osamu Honda , Hiroyuki Ohsaki , Makoto Imase , Mika Ishizuka , and Junichi Murayama . 2005. Understanding TCP over TCP: effects of TCP tunneling on end-to-end throughput and latency . In Performance, Quality of Service, and Control of Next-Generation Communication and Sensor Networks III , Vol. 6011 . International Society for Optics and Photonics , 60110H. Osamu Honda, Hiroyuki Ohsaki, Makoto Imase, Mika Ishizuka, and Junichi Murayama. 2005. Understanding TCP over TCP: effects of TCP tunneling on end-to-end throughput and latency. In Performance, Quality of Service, and Control of Next-Generation Communication and Sensor Networks III, Vol. 6011. International Society for Optics and Photonics, 60110H."},{"key":"e_1_3_2_2_48_1","unstructured":"Christian Huitema. 2018. picoquic. Source code. https:\/\/github.com\/private-octopus\/picoquic. Christian Huitema. 2018. picoquic . Source code. https:\/\/github.com\/private-octopus\/picoquic."},{"key":"e_1_3_2_2_49_1","unstructured":"IO Visor Project. 2018. Userspace eBPF VM. Source code. https:\/\/github.com\/iovisor\/ubpf. IO Visor Project. 2018. Userspace eBPF VM . Source code. https:\/\/github.com\/iovisor\/ubpf."},{"key":"e_1_3_2_2_50_1","volume-title":"QUIC: Developing and Deploying a TCP Replacement for the Web. In Netdev 0x12.","author":"Iyengar Janardhan","year":"2018","unstructured":"Janardhan Iyengar and Ian Swett . 2018 . QUIC: Developing and Deploying a TCP Replacement for the Web. In Netdev 0x12. Janardhan Iyengar and Ian Swett. 2018. QUIC: Developing and Deploying a TCP Replacement for the Web. In Netdev 0x12."},{"key":"e_1_3_2_2_51_1","volume-title":"QUIC: A UDP-Based Multiplexed and Secure Transport. Internet-Draft draft-ietf-quic-transport-14. Work in Progress.","author":"Iyengar Jana","year":"2018","unstructured":"Jana Iyengar and Martin Thomson . 2018 . QUIC: A UDP-Based Multiplexed and Secure Transport. Internet-Draft draft-ietf-quic-transport-14. Work in Progress. Jana Iyengar and Martin Thomson. 2018. QUIC: A UDP-Based Multiplexed and Secure Transport. Internet-Draft draft-ietf-quic-transport-14. Work in Progress."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC1323"},{"key":"e_1_3_2_2_53_1","volume-title":"Cyclone: A Safe Dialect of C. In USENIX Annual Technical Conference, General Track. 275--288","author":"Jim Trevor","year":"2002","unstructured":"Trevor Jim , Gregory Morrisett , Dan Grossman , Michael Hicks , James Cheney , and Yanling Wang . 2002 . Cyclone: A Safe Dialect of C. In USENIX Annual Technical Conference, General Track. 275--288 . Trevor Jim, Gregory Morrisett, Dan Grossman, Michael Hicks, James Cheney, and Yanling Wang. 2002. Cyclone: A Safe Dialect of C. In USENIX Annual Technical Conference, General Track. 275--288."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131368"},{"key":"e_1_3_2_2_55_1","unstructured":"Jim Keniston Prasanna S. Panchamukhi and Masami Hiramatsu. 2016. Kernel probes (kprobes). (2016). Documentation provided with the Linux kernel sources. Jim Keniston Prasanna S. Panchamukhi and Masami Hiramatsu. 2016. Kernel probes (kprobes). (2016). Documentation provided with the Linux kernel sources."},{"key":"e_1_3_2_2_56_1","volume-title":"Fast Efficient Fixed-Size Memory Pool: No Loops and No Overhead. In The Third International Conference on Computational Logics, Algebras, Programming, Tools, and Benchmarking.","author":"Kenwright Ben","year":"2012","unstructured":"Ben Kenwright . 2012 . Fast Efficient Fixed-Size Memory Pool: No Loops and No Overhead. In The Third International Conference on Computational Logics, Algebras, Programming, Tools, and Benchmarking. Ben Kenwright. 2012. Fast Efficient Fixed-Size Memory Pool: No Loops and No Overhead. In The Third International Conference on Computational Logics, Algebras, Programming, Tools, and Benchmarking."},{"key":"e_1_3_2_2_57_1","unstructured":"Heidy Khlaaf Marc Brockschmidt Stephan Falke Deepak Kapur and Carsten Sinz. 2015. llvm2KITTeL tailored for T2. Source code. https:\/\/github.com\/hkhlaaf\/llvm2kittel. Heidy Khlaaf Marc Brockschmidt Stephan Falke Deepak Kapur and Carsten Sinz. 2015. llvm2KITTeL tailored for T2 . Source code. https:\/\/github.com\/hkhlaaf\/llvm2kittel."},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098842"},{"key":"e_1_3_2_2_59_1","unstructured":"Ben Laurie Adam Langley and Emilia Kasper. 2013. Certificate Transparency. RFC 6962. (June 2013) 27 pages. https:\/\/www.rfc-editor.org\/rfc\/rfc6962.txt Ben Laurie Adam Langley and Emilia Kasper. 2013. Certificate Transparency. RFC 6962. (June 2013) 27 pages. https:\/\/www.rfc-editor.org\/rfc\/rfc6962.txt"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818791"},{"key":"e_1_3_2_2_61_1","unstructured":"Tim Lindholm Frank Yellin Gilad Bracha and Alex Buckley. 2014. The Java virtual machine specification. Pearson Education. Tim Lindholm Frank Yellin Gilad Bracha and Alex Buckley. 2014. The Java virtual machine specification . Pearson Education."},{"key":"e_1_3_2_2_62_1","unstructured":"LLVM Team. 2019. Clang: a C language family frontend for LLVM. (2019). https:\/\/clang.llvm.org\/. LLVM Team. 2019. Clang: a C language family frontend for LLVM. (2019). https:\/\/clang.llvm.org\/."},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241074.3241079"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/956993.957002"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2018"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"e_1_3_2_2_67_1","volume-title":"USENIX Security Symposium","volume":"2015","author":"Melara Marcela","year":"2015","unstructured":"Marcela Melara , Aaron Blankstein , Joseph Bonneau , Edward Felten , and Michael Freedman . 2015 . CONKS: Bringing Key Transparency to End Users . In USENIX Security Symposium , Vol. 2015 . 383--398. Marcela Melara, Aaron Blankstein, Joseph Bonneau, Edward Felten, and Michael Freedman. 2015. CONKS: Bringing Key Transparency to End Users. In USENIX Security Symposium, Vol. 2015. 383--398."},{"key":"e_1_3_2_2_68_1","volume-title":"Conference on the theory and application of cryptographic techniques. Springer, 369--378","author":"Merkle Ralph C.","year":"1987","unstructured":"Ralph C. Merkle . 1987 . A digital signature based on a conventional encryption function . In Conference on the theory and application of cryptographic techniques. Springer, 369--378 . Ralph C. Merkle. 1987. A digital signature based on a conventional encryption function. In Conference on the theory and application of cryptographic techniques. Springer, 369--378."},{"key":"e_1_3_2_2_69_1","volume-title":"Quentin De Coninck, and Olivier Bonaventure","author":"Michel Fran\u00e7ois","year":"2019","unstructured":"Fran\u00e7ois Michel , Quentin De Coninck, and Olivier Bonaventure . 2019 . QUIC-FEC: Bringing the benefits of Forward Erasure Correction to QUIC. IFIP Networking ( 2019). Fran\u00e7ois Michel, Quentin De Coninck, and Olivier Bonaventure. 2019. QUIC-FEC: Bringing the benefits of Forward Erasure Correction to QUIC. IFIP Networking (2019)."},{"key":"e_1_3_2_2_70_1","volume-title":"The Design and Implementation of Datagram TLS. In Network and Distributed System Security Symposium (NDSS'04)","author":"Modadugu Nagendra","year":"2004","unstructured":"Nagendra Modadugu and Eric Rescorla . 2004 . The Design and Implementation of Datagram TLS. In Network and Distributed System Security Symposium (NDSS'04) . Nagendra Modadugu and Eric Rescorla. 2004. The Design and Implementation of Datagram TLS. In Network and Distributed System Security Symposium (NDSS'04)."},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230553"},{"volume-title":"Proof and system-reliability","author":"Necula George C.","key":"e_1_3_2_2_72_1","unstructured":"George C. Necula . 2002. Proof-carrying code. Design and implementation . In Proof and system-reliability . Springer , 261--288. George C. Necula. 2002. Proof-carrying code. Design and implementation. In Proof and system-reliability. Springer, 261--288."},{"key":"e_1_3_2_2_73_1","volume-title":"MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation. In 27th USENIX Security Symposium (USENIX Security 18)","author":"Pailoor Shankara","year":"2018","unstructured":"Shankara Pailoor , Andrew Aday , and Suman Jana . 2018 . MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation. In 27th USENIX Security Symposium (USENIX Security 18) . 729--743. Shankara Pailoor, Andrew Aday, and Suman Jana. 2018. MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation. In 27th USENIX Security Symposium (USENIX Security 18). 729--743."},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/1165389.945447"},{"key":"e_1_3_2_2_75_1","unstructured":"Tommy Pauly Eric Kinnear and David Schinazi. 2018. An Unreliable Datagram Extension to QUIC. Internet-Draft draft-pauly-quic-datagram-01. Tommy Pauly Eric Kinnear and David Schinazi. 2018. An Unreliable Datagram Extension to QUIC . Internet-Draft draft-pauly-quic-datagram-01."},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3284850.3284852"},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.5555\/1018438.1021840"},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/1047659.1040317"},{"key":"e_1_3_2_2_79_1","volume-title":"Transmission Control Protocol. RFC793. (Sept","author":"Postel Jon","year":"1981","unstructured":"Jon Postel . 1981. Transmission Control Protocol. RFC793. (Sept . 1981 ), 91 pages. Jon Postel. 1981. Transmission Control Protocol. RFC793. (Sept. 1981), 91 pages."},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.5555\/2228298.2228338"},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3168"},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/263876.263881"},{"key":"e_1_3_2_2_83_1","doi-asserted-by":"crossref","unstructured":"Vincent Roca Ian Swett and Marie-Jose Montpetit. 2019. Sliding Window Random Linear Code (RLC) Forward Erasure Correction (FEC) Schemes for QUIC. Internet-Draft draft-roca-nwcrg-rlc-fec-scheme-for-quic-01. IETF Secretariat. Vincent Roca Ian Swett and Marie-Jose Montpetit. 2019. Sliding Window Random Linear Code (RLC) Forward Erasure Correction (FEC) Schemes for QUIC . Internet-Draft draft-roca-nwcrg-rlc-fec-scheme-for-quic-01. IETF Secretariat.","DOI":"10.17487\/RFC8681"},{"key":"e_1_3_2_2_84_1","volume-title":"Flexible Anonymous Network. In 12th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs","author":"Rochet Florentin","year":"2019","unstructured":"Florentin Rochet , Olivier Bonaventure , and Olivier Pereira . 2019 . Flexible Anonymous Network. In 12th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2019). Florentin Rochet, Olivier Bonaventure, and Olivier Pereira. 2019. Flexible Anonymous Network. In 12th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2019)."},{"key":"e_1_3_2_2_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/2873587.2873605"},{"key":"e_1_3_2_2_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186057"},{"key":"e_1_3_2_2_87_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76481-8_19"},{"key":"e_1_3_2_2_88_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chemolab.2011.06.003"},{"key":"e_1_3_2_2_89_1","volume-title":"Efficient fair queuing using deficit round-robin","author":"Shreedhar Madhavapeddi","year":"1996","unstructured":"Madhavapeddi Shreedhar and George Varghese . 1996. Efficient fair queuing using deficit round-robin . IEEE\/ACM Transactions on networking 4, 3 ( 1996 ), 375--385. Madhavapeddi Shreedhar and George Varghese. 1996. Efficient fair queuing using deficit round-robin. IEEE\/ACM Transactions on networking 4, 3 (1996), 375--385."},{"key":"e_1_3_2_2_90_1","volume-title":"QUIC Interdomain Troubleshooting. (July","author":"Stephan Emile","year":"2017","unstructured":"Emile Stephan , Mathilde Cayla , Arnaud Braud , and Fred Fieau . 2017. QUIC Interdomain Troubleshooting. (July 2017 ). Internet draft, draft-stephan-quic-interdomain-troubleshooting-00.txt, work in progress. Emile Stephan, Mathilde Cayla, Arnaud Braud, and Fred Fieau. 2017. QUIC Interdomain Troubleshooting. (July 2017). Internet draft, draft-stephan-quic-interdomain-troubleshooting-00.txt, work in progress."},{"key":"e_1_3_2_2_91_1","volume-title":"Tom Taylor, Ian Rytina, Malleswar Kalla, Lixia Zhang, and Vern Paxson.","author":"Stewart Randall R.","year":"2000","unstructured":"Randall R. Stewart , Qiaobing Xie , Ken Morneault , Chip Sharp , Hanns Juergen Schwarzbauer , Tom Taylor, Ian Rytina, Malleswar Kalla, Lixia Zhang, and Vern Paxson. 2000 . Stream Control Transmission Protocol. RFC 2960. (Oct. 2000), 134 pages. Randall R. Stewart, Qiaobing Xie, Ken Morneault, Chip Sharp, Hanns Juergen Schwarzbauer, Tom Taylor, Ian Rytina, Malleswar Kalla, Lixia Zhang, and Vern Paxson. 2000. Stream Control Transmission Protocol. RFC2960. (Oct. 2000), 134 pages."},{"key":"e_1_3_2_2_92_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2010.2093850"},{"key":"e_1_3_2_2_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.568214"},{"key":"e_1_3_2_2_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/231699.231701"},{"key":"e_1_3_2_2_96_1","unstructured":"Brian Trammell and Mirja Kuehlewind. 2018. The QUIC Latency Spin Bit. Internet-Draft draft-ietf-quic-spin-exp-01. Brian Trammell and Mirja Kuehlewind. 2018. The QUIC Latency Spin Bit . Internet-Draft draft-ietf-quic-spin-exp-01."},{"key":"e_1_3_2_2_97_1","volume-title":"Beyond socket options: making the Linux TCP stack truly extensible. IFIP Networking","author":"Tran Viet Hoang","year":"2019","unstructured":"Viet Hoang Tran and Olivier Bonaventure . 2019. Beyond socket options: making the Linux TCP stack truly extensible. IFIP Networking ( 2019 ). http:\/\/hdl.handle.net\/2078.1\/214176 Viet Hoang Tran and Olivier Bonaventure. 2019. Beyond socket options: making the Linux TCP stack truly extensible. IFIP Networking (2019). http:\/\/hdl.handle.net\/2078.1\/214176"},{"key":"e_1_3_2_2_98_1","unstructured":"Ultimate Team. 2018. Ultimate. Source code. https:\/\/github.com\/ultimate-pa\/ultimate. Ultimate Team. 2018. Ultimate . Source code. https:\/\/github.com\/ultimate-pa\/ultimate."},{"key":"e_1_3_2_2_99_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422951"},{"key":"e_1_3_2_2_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/173668.168635"},{"key":"e_1_3_2_2_101_1","volume-title":"LIPIcs-Leibniz International Proceedings in Informatics","volume":"32","author":"Wang Kunshan","unstructured":"Kunshan Wang , Yi Lin , Stephen M. Blackburn , Michael Norrish , and Antony L. Hosking . 2015. Draining the swamp: Micro virtual machines as solid foundation for language development . In LIPIcs-Leibniz International Proceedings in Informatics , Vol. 32 . Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik. Kunshan Wang, Yi Lin, Stephen M. Blackburn, Michael Norrish, and Antony L. Hosking. 2015. Draining the swamp: Micro virtual machines as solid foundation for language development. In LIPIcs-Leibniz International Proceedings in Informatics, Vol. 32. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik."},{"key":"e_1_3_2_2_102_1","unstructured":"Magnus Westerlund. 2018. Proposal for adding ECN support to QUIC. (2018). https:\/\/github.com\/quicwg\/base-drafts\/pull\/1372. Magnus Westerlund. 2018. Proposal for adding ECN support to QUIC. (2018). https:\/\/github.com\/quicwg\/base-drafts\/pull\/1372."},{"key":"e_1_3_2_2_103_1","volume-title":"Tennenhouse","author":"Wetherall David J.","year":"1998","unstructured":"David J. Wetherall , John V. Guttag , and David L . Tennenhouse . 1998 . ANTS : A toolkit for building and dynamically deploying network protocols. In Open Architectures and Network Programming, 1998 IEEE. IEEE , 117--129. David J. Wetherall, John V. Guttag, and David L. Tennenhouse. 1998. ANTS: A toolkit for building and dynamically deploying network protocols. In Open Architectures and Network Programming, 1998 IEEE. IEEE, 117--129."},{"key":"e_1_3_2_2_104_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916714"},{"key":"e_1_3_2_2_105_1","doi-asserted-by":"publisher","DOI":"10.5555\/2665671.2665740"},{"key":"e_1_3_2_2_106_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.25"}],"event":{"name":"SIGCOMM '19: ACM SIGCOMM 2019 Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Beijing China","acronym":"SIGCOMM '19"},"container-title":["Proceedings of the ACM Special Interest Group on Data Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341302.3342078","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T05:54:21Z","timestamp":1672984461000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341302.3342078"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,19]]},"references-count":104,"alternative-id":["10.1145\/3341302.3342078","10.1145\/3341302"],"URL":"https:\/\/doi.org\/10.1145\/3341302.3342078","relation":{},"subject":[],"published":{"date-parts":[[2019,8,19]]},"assertion":[{"value":"2019-08-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}