{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T15:10:01Z","timestamp":1768317001121,"version":"3.49.0"},"publisher-location":"Cham","reference-count":51,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031562518","type":"print"},{"value":"9783031562525","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-56252-5_13","type":"book-chapter","created":{"date-parts":[[2024,3,19]],"date-time":"2024-03-19T06:51:26Z","timestamp":1710831086000},"page":"273-290","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["QUIC Hunter: Finding QUIC Deployments and\u00a0Identifying Server Libraries Across the\u00a0Internet"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2918-016X","authenticated-orcid":false,"given":"Johannes","family":"Zirngibl","sequence":"first","affiliation":[]},{"given":"Florian","family":"Gebauer","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9375-3113","authenticated-orcid":false,"given":"Patrick","family":"Sattler","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7322-5804","authenticated-orcid":false,"given":"Markus","family":"Sosnowski","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2347-1839","authenticated-orcid":false,"given":"Georg","family":"Carle","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,20]]},"reference":[{"key":"13_CR1","unstructured":"A QUIC implementation in pure Go (2023). https:\/\/github.com\/quic-go\/quic-go"},{"key":"13_CR2","unstructured":"A2 Hosting: The Best LiteSpeed Web Server Hosting Solution (2023). https:\/\/www.a2hosting.com\/litespeed-hosting\/"},{"key":"13_CR3","unstructured":"Althouse, J., Smart, A., Nunnally, Jr., R., Brady, M.: Easily Identify Malicious Servers on the Internet with JARM (2020). https:\/\/engineering.salesforce.com\/easily-identify-malicious-servers-on-the-internet-with-jarm-e095edac525a"},{"key":"13_CR4","doi-asserted-by":"publisher","unstructured":"Bauer, S., Sattler, P., Zirngibl, J., Schwarzenberg, C., Carle, G.: Evaluating the benefits: quantifying the effects of TCP options, QUIC, and CDNs on throughput. In: Proceedings of the Applied Networking Research Workshop, Association for Computing Machinery (2023). https:\/\/doi.org\/10.1145\/3606464.3606474","DOI":"10.1145\/3606464.3606474"},{"key":"13_CR5","unstructured":"Cloudflare: quiche (2023). https:\/\/github.com\/cloudflare\/quiche"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Dittrich, D., Kenneally, E., et al.: The Menlo Report: Ethical principles guiding information and communication technology research. US Department of Homeland Security (2012)","DOI":"10.2139\/ssrn.2445102"},{"key":"13_CR7","unstructured":"Durumeric, Z., Wustrow, E., Halderman, J.A.: ZMap: fast internet-wide scanning and its security applications. In: Proceedings of USENIX Security Symposium (2013)"},{"key":"13_CR8","doi-asserted-by":"publisher","unstructured":"Gasser, O., et al.: Clusters in the expanse: understanding and unbiasing IPv6 hitlists. In: Proceedings of ACM International Measurement Conference (IMC) (2018). https:\/\/doi.org\/10.1145\/3278532.3278564","DOI":"10.1145\/3278532.3278564"},{"key":"13_CR9","doi-asserted-by":"publisher","unstructured":"Gbur, Y., Tschorsch, F.: QUICforge: client-side request forgery in QUIC. In: Proceedings of Network and Distributed System Security Symposium (NDSS) (2023). https:\/\/doi.org\/10.14722\/ndss.2023.23072","DOI":"10.14722\/ndss.2023.23072"},{"key":"13_CR10","unstructured":"Google: QUICHE (2023). https:\/\/github.com\/google\/quiche"},{"key":"13_CR11","unstructured":"Google: Randomization of QUIC Transport Parameter Order (2023). https:\/\/github.com\/google\/quiche\/blob\/main\/quiche\/quic\/core\/crypto\/transport_parameters.cc#L832"},{"key":"13_CR12","unstructured":"Herrera, J.C.: Deliver Fast, Reliable, and Secure Web Experiences with HTTP\/3 (2023). https:\/\/www.akamai.com\/blog\/performance\/deliver-fast-reliable-secure-web-experiences-http3"},{"key":"13_CR13","unstructured":"IANA: QUIC Transport Parameters (2023). https:\/\/www.iana.org\/assignments\/quic\/quic.xhtml#quic-transport"},{"key":"13_CR14","unstructured":"IANA: Transport Layer Security (TLS) Extensions (2023). https:\/\/www.iana.org\/assignments\/tls-extensiontype-values\/tls-extensiontype-values.xhtml"},{"key":"13_CR15","unstructured":"IANA Registry: TLS Cipher Suites (2023). https:\/\/www.iana.org\/assignments\/tls-parameters\/tls-parameters.xhtml#tls-parameters-4"},{"key":"13_CR16","unstructured":"IETF QUIC Working Group: Implementations (2023). https:\/\/github.com\/quicwg\/base-drafts\/wiki\/Implementations"},{"key":"13_CR17","doi-asserted-by":"publisher","unstructured":"Iyengar, J., Thomson, M.: QUIC: A UDP-Based Multiplexed and Secure Transport. RFC 9000 May 2021. https:\/\/doi.org\/10.17487\/RFC9000","DOI":"10.17487\/RFC9000"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Jaeger, B., Zirngibl, J., Kempf, M., Ploch, K., Carle, G.: QUIC on the highway: evaluating performance on high-rate links. In: IFIP Networking Conference (Networking) (2023)","DOI":"10.23919\/IFIPNetworking57963.2023.10186365"},{"key":"13_CR19","doi-asserted-by":"publisher","unstructured":"Kunze, I., Sander, C., Wehrle, K.: Does it spin? On the adoption and use of QUIC\u2019s spin bit. In: Proceedings of ACM International Measurement Conference (IMC) (2023). https:\/\/doi.org\/10.1145\/3618257.3624844","DOI":"10.1145\/3618257.3624844"},{"key":"13_CR20","doi-asserted-by":"publisher","unstructured":"Labovitz, C., Iekel-Johnson, S., McPherson, D., Oberheide, J., Jahanian, F.: Internet Inter-Domain Traffic. ACM SIGCOMM Computer Communication Review (2010). https:\/\/doi.org\/10.1145\/1851275.1851194","DOI":"10.1145\/1851275.1851194"},{"key":"13_CR21","unstructured":"Lapiene, A.: Improving Website Performance with LiteSpeed (2019). https:\/\/www.hostinger.com\/blog\/introducing-litespeed"},{"key":"13_CR22","unstructured":"LSQUIC: LSQUIC ALPN error (2024). https:\/\/github.com\/litespeedtech\/lsquic\/blame\/master\/src\/liblsquic\/lsquic_mini_conn_ietf.c#L2157"},{"key":"13_CR23","unstructured":"Lyon, G.F.: Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning (2009)"},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"Marx, R., Herbots, J., Lamotte, W., Quax, P.: Same standards, different decisions: a study of QUIC and HTTP\/3 implementation diversity. In: Proceedings of the Workshop on the Evolution, Performance, and Interoperability of QUIC (2020)","DOI":"10.1145\/3405796.3405828"},{"key":"13_CR25","unstructured":"M\u00fccke, J., et al.: Waiting for QUIC: On the Opportunities of Passive Measurements to Understand QUIC Deployments (2022). https:\/\/arxiv.org\/abs\/2209.00965"},{"key":"13_CR26","doi-asserted-by":"publisher","unstructured":"Nawrocki, M., Hiesgen, R., Schmidt, T.C., W\u00e4hlisch, M.: QUICsand: quantifying QUIC reconnaissance scans and DoS flooding events. In: Proceedings of ACM International Measurement Conference (IMC) (2021). https:\/\/doi.org\/10.1145\/3487552.3487840","DOI":"10.1145\/3487552.3487840"},{"key":"13_CR27","doi-asserted-by":"publisher","unstructured":"Nawrocki, M., Tehrani, P.F., Hiesgen, R., M\u00fccke, J., Schmidt, T.C., W\u00e4hlisch, M.: On the interplay between TLS certificates and QUIC performance. In: Proceedings of ACM International Conference on emerging Networking Experiments and Technologies (CoNEXT), November 2022. https:\/\/doi.org\/10.1145\/3555050.3569123","DOI":"10.1145\/3555050.3569123"},{"key":"13_CR28","doi-asserted-by":"crossref","unstructured":"Nepomuceno, K., et al.: QUIC and TCP: a performance evaluation. In: 2018 IEEE Symposium on Computers and Communications (ISCC) (2018)","DOI":"10.1109\/ISCC.2018.8538687"},{"key":"13_CR29","doi-asserted-by":"crossref","unstructured":"Partridge, C., Allman, M.: Addressing ethical considerations in network measurement papers. Commun. ACM (2016)","DOI":"10.1145\/2793013.2793014"},{"key":"13_CR30","doi-asserted-by":"crossref","unstructured":"Piraux, M., De Coninck, Q., Bonaventure, O.: Observing the evolution of QUIC implementations. In: Proceedings of the Workshop on the Evolution, Performance, and Interoperability of QUIC (2018)","DOI":"10.1145\/3284850.3284852"},{"key":"13_CR31","unstructured":"Quant: Randomization of QUIC transport parameter order (2023). https:\/\/github.com\/NTAP\/quant\/blob\/main\/lib\/src\/tls.c#L857"},{"key":"13_CR32","doi-asserted-by":"crossref","unstructured":"R\u00fcth, J., Poese, I., Dietzel, C., Hohlfeld, O.: A First Look at QUIC in the Wild. In: Proceedings Passive and Active Measurement (PAM) (2018)","DOI":"10.1007\/978-3-319-76481-8_19"},{"key":"13_CR33","doi-asserted-by":"publisher","unstructured":"Sander, C., Kunze, I., Bl\u00f6cher, L., Kosek, M., Wehrle, K.: ECN with QUIC: challenges in the wild. In: Proceedings of ACM International Measurement Conference (IMC) (2023). https:\/\/doi.org\/10.1145\/3618257.3624821","DOI":"10.1145\/3618257.3624821"},{"key":"13_CR34","unstructured":"Sander, C., Kunze, I., Wehlre, K.: Analyzing the influence of resource prioritization on HTTP\/3 HOL blocking and performance. In: Proceedings Network Traffic Measurement and Analysis Conference (TMA) (2022)"},{"key":"13_CR35","doi-asserted-by":"publisher","unstructured":"Schwartz, B.M., Bishop, M., Nygren, E.: Service binding and parameter specification via the DNS (SVCB and HTTPS Resource Records). RFC 9460, November 2023. https:\/\/doi.org\/10.17487\/RFC9460, https:\/\/www.rfc-editor.org\/info\/rfc9460","DOI":"10.17487\/RFC9460"},{"key":"13_CR36","doi-asserted-by":"crossref","unstructured":"Seemann, M., Iyengar, J.: Automating QUIC interoperability testing. In: Proceedings of the Workshop on the Evolution, Performance, and Interoperability of QUIC (2020)","DOI":"10.1145\/3405796.3405826"},{"key":"13_CR37","doi-asserted-by":"publisher","DOI":"10.1145\/2637364.2591972","author":"Z Shamsi","year":"2016","unstructured":"Shamsi, Z., Nandwani, A., Leonard, D., Loguinov, D.: Hershel: single-packet OS fingerprinting. IEEE\/ACM Trans. Netw. (2016). https:\/\/doi.org\/10.1145\/2637364.2591972","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"13_CR38","doi-asserted-by":"crossref","unstructured":"Shreedhar, T., Panda, R., Podanev, S., Bajpai, V.: Evaluating QUIC performance over web, cloud storage, and video workloads. IEEE Transactions on Network and Service Management (2022)","DOI":"10.1109\/TNSM.2021.3134562"},{"key":"13_CR39","doi-asserted-by":"publisher","unstructured":"Sosnowski, M., Zirngibl, J., Sattler, P., Carle, G.: DissecTLS: a scalable active scanner for TLS server configurations, capabilities, and TLS fingerprinting. In: Proceedings of Passive and Active Measurement (PAM) (2023). https:\/\/doi.org\/10.1007\/978-3-031-28486-1_6","DOI":"10.1007\/978-3-031-28486-1_6"},{"key":"13_CR40","unstructured":"Sosnowski, M., et al.: Active TLS stack fingerprinting: characterizing TLS server deployments at scale. In: Proceedings of Network Traffic Measurement and Analysis Conference (TMA) (2022)"},{"key":"13_CR41","doi-asserted-by":"publisher","unstructured":"Thomson, M., Turner, S.: Using TLS to Secure QUIC. RFC 9001, May 2021. https:\/\/doi.org\/10.17487\/RFC9001","DOI":"10.17487\/RFC9001"},{"key":"13_CR42","doi-asserted-by":"crossref","unstructured":"Tyunyayev, N., Piraux, M., Bonaventure, O., Barbette, T.: A high-speed QUIC implementation. In: Proceedings of the 3rd International CoNEXT Student Workshop (2022)","DOI":"10.1145\/3565477.3569154"},{"key":"13_CR43","doi-asserted-by":"publisher","unstructured":"Volodina, E., Rathgeb, E.P.: Impact of ack scaling policies on QUIC performance. In: 2021 IEEE 46th Conference on Local Computer Networks (LCN) (2021). https:\/\/doi.org\/10.1109\/LCN52139.2021.9524947","DOI":"10.1109\/LCN52139.2021.9524947"},{"key":"13_CR44","unstructured":"Web Almanac: Negotiating HTTP\/3 (2021). https:\/\/almanac.httparchive.org\/en\/2021\/http#negotiating-http3"},{"key":"13_CR45","doi-asserted-by":"crossref","unstructured":"Wolsing, K., R\u00fcth, J., Wehrle, K., Hohlfeld, O.: A performance perspective on web optimized protocol stacks: TCP+TLS+HTTP\/2 vs. QUIC. In: Proceedings of the Applied Networking Research Workshop (2019)","DOI":"10.1145\/3340301.3341123"},{"key":"13_CR46","doi-asserted-by":"publisher","unstructured":"Yang, X., Eggert, L., Ott, J., Uhlig, S., Sun, Z., Antichi, G.: Making QUIC quicker with NIC offload. In: Proceedings of the Workshop on the Evolution, Performance, and Interoperability of QUIC (2020). https:\/\/doi.org\/10.1145\/3405796.3405827","DOI":"10.1145\/3405796.3405827"},{"key":"13_CR47","doi-asserted-by":"publisher","unstructured":"Yu, A., Benson, T.A.: Dissecting performance of production QUIC. In: Proceedings of the Web Conference (2021). https:\/\/doi.org\/10.1145\/3442381.3450103","DOI":"10.1145\/3442381.3450103"},{"key":"13_CR48","doi-asserted-by":"crossref","unstructured":"Zirngibl, J., Buschmann, P., Sattler, P., Jaeger, B., Aulbach, J., Carle, G.: It\u2019s over 9000: analyzing early QUIC deployments with the standardization on the horizon. In: Proceedings of ACM International Measurement Conference (IMC) (2021)","DOI":"10.1145\/3487552.3487826"},{"key":"13_CR49","unstructured":"Zirngibl, J., Gebauer, F., Sattler, P., Sosnowski, M., Carle, G.: Test Environment and Identification Tools (2023). https:\/\/github.com\/quic-hunter\/libraries"},{"key":"13_CR50","doi-asserted-by":"crossref","unstructured":"Zirngibl, J., Sattler, P., Carle, G.: A first look at SVCB and HTTPS DNS resource records in the wild. In: 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS &PW), pp. 470\u2013474 (2023)","DOI":"10.1109\/EuroSPW59978.2023.00058"},{"key":"13_CR51","doi-asserted-by":"publisher","unstructured":"Zirngibl, J., Steger, L., Sattler, P., Gasser, O., Carle, G.: Rusty clusters? Dusting an IPv6 research foundation. In: Proceedings of ACM International Measurement Conference (IMC) (2022). https:\/\/doi.org\/10.1145\/3517745.3561440","DOI":"10.1145\/3517745.3561440"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-56252-5_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,19]],"date-time":"2024-03-19T07:01:32Z","timestamp":1710831692000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-56252-5_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031562518","9783031562525"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-56252-5_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"20 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Passive and Active Network Measurement","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 March 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 March 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pam2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/pam2024.cs.northwestern.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"64","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.9","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.42","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}