{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T21:19:44Z","timestamp":1730323184064,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":76,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,4]]},"DOI":"10.1145\/3422604.3425947","type":"proceedings-article","created":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T00:50:36Z","timestamp":1604019036000},"page":"45-52","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["TCPLS"],"prefix":"10.1145","author":[{"given":"Florentin","family":"Rochet","sequence":"first","affiliation":[{"name":"UCLouvain, Louvain-La-Neuve, Belgium"}]},{"given":"Emery","family":"Assogba","sequence":"additional","affiliation":[{"name":"UCLouvain, Louvain-la-Neuve, Belgium"}]},{"given":"Olivier","family":"Bonaventure","sequence":"additional","affiliation":[{"name":"UCLouvain, Louvain-la-Neuve, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2020,11,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363192"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355601"},{"key":"e_1_3_2_1_3_1","unstructured":"M. Bagnulo. [n. d.]. Threat Analysis for TCP Extensions for Multipath Operation with Multiple Addresses. RFC 6181. ([n. d.]). https:\/\/tools.ietf.org\/html\/rfc6181 M. Bagnulo. [n. d.]. Threat Analysis for TCP Extensions for Multipath Operation with Multiple Addresses. RFC 6181. ([n. d.]). https:\/\/tools.ietf.org\/html\/rfc6181"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2895165"},{"key":"e_1_3_2_1_5_1","unstructured":"D Bider. [n. d.]. QUIC-based UDP Transport for Secure Shell (SSH). Internet-Draft. ([n. d.]). https:\/\/datatracker.ietf.org\/doc\/draft-bider-ssh-quic Work in Progress. D Bider. [n. d.]. QUIC-based UDP Transport for Secure Shell (SSH). Internet-Draft. ([n. d.]). https:\/\/datatracker.ietf.org\/doc\/draft-bider-ssh-quic Work in Progress."},{"key":"e_1_3_2_1_6_1","unstructured":"Mike Bishop. 2020. Hypertext Transfer Protocol Version 3 (HTTP\/3). Internet-Draft draft-ietf-quic-http-29. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-quic-http-29 Work in Progress. Mike Bishop. 2020. Hypertext Transfer Protocol Version 3 (HTTP\/3). Internet-Draft draft-ietf-quic-http-29. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-quic-http-29 Work in Progress."},{"volume-title":"Smith","year":"2019","author":"Bittau Andrea","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","first-page":"24","article-title":"Multipath TCP deployments","volume":"12","author":"Bonaventure Olivier","year":"2016","journal-title":"IETF Journal"},{"volume-title":"Linux Plumbers Conference'18 .","year":"2018","author":"Borkmann Daniel","key":"e_1_3_2_1_9_1"},{"volume-title":"TCP Extensions for High Performance. RFC 1323. (May","year":"1992","author":"Borman David A.","key":"e_1_3_2_1_10_1"},{"volume-title":"Tcp-bpf: Programmatically tuning tcp behavior through bpf. NetDev 2.2","year":"2017","author":"Brakmo Lawrence","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2333112.2333113"},{"key":"e_1_3_2_1_13_1","unstructured":"Zimo Chai Amirhossein Ghafari and Amir Houmansadr. 2019. On the Importance of Encrypted-SNI (ESNI) to Censorship Circumvention. In Free and Open Communications on the Internet. USENIX. https:\/\/www.usenix.org\/system\/files\/foci19-paper_chai_update.pdf Zimo Chai Amirhossein Ghafari and Amir Houmansadr. 2019. On the Importance of Encrypted-SNI (ESNI) to Censorship Circumvention. In Free and Open Communications on the Internet. USENIX. https:\/\/www.usenix.org\/system\/files\/foci19-paper_chai_update.pdf"},{"volume-title":"International Workshop on Selected Areas in Cryptography. Springer, 293--319","year":"2011","author":"Chatterjee Sanjit","key":"e_1_3_2_1_14_1"},{"volume-title":"TCP Fast Open. RFC 7413. (Dec","year":"2014","author":"Cheng Yuchung","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.29545"},{"key":"e_1_3_2_1_17_1","unstructured":"Yong Cui Zhiwen Liu Hang Shi Jie Zhang Kai Zheng and Wei Wang. 2020. Deadline-aware Transport Protocol. Internet-Draft draft-shi-quic-dtp-01. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-shi-quic-dtp-01 Work in Progress. Yong Cui Zhiwen Liu Hang Shi Jie Zhang Kai Zheng and Wei Wang. 2020. Deadline-aware Transport Protocol. Internet-Draft draft-shi-quic-dtp-01. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-shi-quic-dtp-01 Work in Progress."},{"volume-title":"Maxime Piraux, Florentin Rochet, Thomas Given-Wilson, Axel Legay, Olivier Pereira, and Olivier Bonaventure.","year":"2019","author":"Coninck Quentin De","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504757"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504757"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.23919\/ITC.2017.8064352"},{"volume-title":"Taher Elgamal and Kipp E.B. Hickman","year":"1995","key":"e_1_3_2_1_22_1"},{"volume-title":"et almbox","year":"2018","author":"Firestone Daniel","key":"e_1_3_2_1_23_1"},{"volume-title":"Inappropriate TCP Resets Considered Harmful. RFC 3360. (Aug","year":"2002","author":"Floyd Sally","key":"e_1_3_2_1_24_1"},{"volume-title":"TCP Selective Acknowledgment Options. RFC 2018","year":"1996","author":"Floyd Sally","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6824"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8684"},{"volume-title":"TCP User Timeout Option. RFC 5482. (March","year":"2009","author":"Gont Fernando","key":"e_1_3_2_1_28_1"},{"volume-title":"Mending Wall: On the Implementation of Censorship in India. In SecureComm","year":"2017","author":"Gosain Devashish","key":"e_1_3_2_1_29_1"},{"key":"e_1_3_2_1_30_1","unstructured":"QUIC Working Group. [n. d.]. Available QUIC Implementations. ([n. d.]). https:\/\/github.com\/quicwg\/base-drafts\/wiki\/Implementations. QUIC Working Group. [n. d.]. Available QUIC Implementations. ([n. d.]). https:\/\/github.com\/quicwg\/base-drafts\/wiki\/Implementations."},{"key":"e_1_3_2_1_31_1","unstructured":"F G\u00fcnther M. Thomson and C.A. Wood. [n. d.]. Usage Limits on AEAD Algorithms . Internet-Draft. ([n. d.]). https:\/\/tools.ietf.org\/html\/draft-wood-cfrg-aead-limits-00 Work in Progress. F G\u00fcnther M. Thomson and C.A. Wood. [n. d.]. Usage Limits on AEAD Algorithms . Internet-Draft. ([n. d.]). https:\/\/tools.ietf.org\/html\/draft-wood-cfrg-aead-limits-00 Work in Progress."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2959424.2959433"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535828.2535830"},{"volume-title":"The Era of TLS 1.3: Measuring Deployment and Use with Active and Passive Methods. arXiv preprint arXiv:1907.12762","year":"2019","author":"Holz Ralph","key":"e_1_3_2_1_34_1"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068834"},{"volume-title":"On Sockets and System Calls: Minimizing Context Switches for the Socket API. In 2014 Conference on Timely Results in Operating Systems (TRIOS 14)","year":"2014","author":"Hruby Tomas","key":"e_1_3_2_1_36_1"},{"key":"e_1_3_2_1_37_1","unstructured":"Christian Huitema. 2020. Quic Timestamps For Measuring One-Way Delays. Internet-Draft draft-huitema-quic-ts-02. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-huitema-quic-ts-02 Work in Progress. Christian Huitema. 2020. Quic Timestamps For Measuring One-Way Delays. Internet-Draft draft-huitema-quic-ts-02. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-huitema-quic-ts-02 Work in Progress."},{"key":"e_1_3_2_1_38_1","unstructured":"Christian Huitema Allison Mankin and Sara Dickinson. 2020. Specification of DNS over Dedicated QUIC Connections. Internet-Draft draft-ietf-dprive-dnsoquic-00. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-dprive-dnsoquic-00 Work in Progress. Christian Huitema Allison Mankin and Sara Dickinson. 2020. Specification of DNS over Dedicated QUIC Connections. Internet-Draft draft-ietf-dprive-dnsoquic-00. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-dprive-dnsoquic-00 Work in Progress."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Jana Iyengar and Martin Thomson. 2020. QUIC: A UDP-Based Multiplexed and Secure Transport. Internet-Draft draft-ietf-quic-transport-28. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-quic-transport-28 Work in Progress. Jana Iyengar and Martin Thomson. 2020. QUIC: A UDP-Based Multiplexed and Secure Transport. Internet-Draft draft-ietf-quic-transport-28. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-quic-transport-28 Work in Progress.","DOI":"10.17487\/RFC9000"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.882843"},{"volume-title":"Educational Virtual Routing Labs with IPMininet. ACM SIGCOMM Education Workshop","year":"2020","author":"Jadin Mathieu","key":"e_1_3_2_1_41_1"},{"volume-title":"11th {USENIX} Symposium on Networked Systems Design and Implementation ($NSDI$ 14). 489--502.","author":"Jeong EunYoung","key":"e_1_3_2_1_42_1"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159918"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278568"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098842"},{"volume-title":"Limits on authenticated encryption use in TLS. Personal webpage: http:\/\/www.isg.rhul.ac.uk\/~kp\/TLS-AEbounds. pdf","year":"2015","author":"Luykx Atul","key":"e_1_3_2_1_46_1"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626311"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028835"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064413.1064418"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.23919\/IFIPNetworking46909.2019.8999475"},{"volume-title":"Syed Ishtiaque Ahmed, and Neha Kumar","year":"2017","author":"Morshed Mehrab Bin","key":"e_1_3_2_1_51_1"},{"volume-title":"Network support for TCP Fast Open. Presentation at NANOG","year":"2016","author":"Paasch Christoph","key":"e_1_3_2_1_52_1"},{"volume-title":"Wood","year":"2020","author":"Pauly Tommy","key":"e_1_3_2_1_53_1"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2932905"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC0793"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2079296.2079317"},{"volume-title":"9th {USENIX} Symposium on Networked Systems Design and Implementation (NSDI 12). 399--412.","author":"Raiciu Costin","key":"e_1_3_2_1_57_1"},{"volume-title":"The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446. (Aug","year":"2018","author":"Rescorla Eric","key":"e_1_3_2_1_58_1"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090147.2103536"},{"key":"e_1_3_2_1_60_1","unstructured":"Jim Roskind. 2013. QUIC Quick UDP Internet Connections. https:\/\/docs.google.com\/document\/d\/1RNHkx_VvKWyWg6Lr8SZ-saqsQx7rFV-ev2jRFUoVD34\/preview. (2013). Jim Roskind. 2013. QUIC Quick UDP Internet Connections. https:\/\/docs.google.com\/document\/d\/1RNHkx_VvKWyWg6Lr8SZ-saqsQx7rFV-ev2jRFUoVD34\/preview. (2013)."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/381906.381940"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8305"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535372.2535405"},{"volume-title":"BPF syscall, maps, verifier, sample. (June","year":"2014","author":"Starovoitov Alexei","key":"e_1_3_2_1_64_1"},{"volume-title":"Stream Control Transmission Protocol. RFC 4960. (Sept","year":"2007","author":"Stewart Randall R.","key":"e_1_3_2_1_65_1"},{"key":"e_1_3_2_1_66_1","unstructured":"Ian Swett Marie-Jose Montpetit Vincent Roca and Fran\u00e7ois Michel. 2020. Coding for QUIC. Internet-Draft draft-swett-nwcrg-coding-for-quic-04. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-swett-nwcrg-coding-for-quic-04 Work in Progress. Ian Swett Marie-Jose Montpetit Vincent Roca and Fran\u00e7ois Michel. 2020. Coding for QUIC. Internet-Draft draft-swett-nwcrg-coding-for-quic-04. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-swett-nwcrg-coding-for-quic-04 Work in Progress."},{"key":"e_1_3_2_1_67_1","unstructured":"Olivier Tilmans and Mathieu Jadin. [n. d.]. IPMininet. ([n. d.]). https:\/\/github.com\/cnp3\/ipmininet Accessed Feb-20--2020. Olivier Tilmans and Mathieu Jadin. [n. d.]. IPMininet. ([n. d.]). https:\/\/github.com\/cnp3\/ipmininet Accessed Feb-20--2020."},{"volume-title":"Touch and Wesley Eddy","year":"2018","author":"Joseph","key":"e_1_3_2_1_68_1"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.23919\/IFIPNetworking.2019.8816857"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.07.036"},{"volume-title":"Sockets API Extensions for the Stream Control Transmission Protocol (SCTP). RFC 6458. (Dec","year":"2011","author":"T\u00fcxen Michael","key":"e_1_3_2_1_71_1"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422951"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018479"},{"key":"e_1_3_2_1_74_1","unstructured":"Nicholas Weaver Robin Sommer and Vern Paxson. 2009. Detecting Forged TCP Reset Packets.. In NDSS. Nicholas Weaver Robin Sommer and Vern Paxson. 2009. Detecting Forged TCP Reset Packets.. In NDSS."},{"key":"e_1_3_2_1_75_1","first-page":"8","article-title":"Design, Implementation and Evaluation of Congestion Control for Multipath TCP","volume":"11","author":"Wischik Damon","year":"2011","journal-title":"NSDI"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15509-8_20"}],"event":{"name":"HotNets '20: The 19th ACM Workshop on Hot Topics in Networks","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Virtual Event USA","acronym":"HotNets '20"},"container-title":["Proceedings of the 19th ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422604.3425947","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,7]],"date-time":"2023-01-07T05:33:16Z","timestamp":1673069596000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422604.3425947"}},"subtitle":["Closely Integrating TCP and TLS"],"short-title":[],"issued":{"date-parts":[[2020,11,4]]},"references-count":76,"alternative-id":["10.1145\/3422604.3425947","10.1145\/3422604"],"URL":"https:\/\/doi.org\/10.1145\/3422604.3425947","relation":{},"subject":[],"published":{"date-parts":[[2020,11,4]]},"assertion":[{"value":"2020-11-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}