{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:13Z","timestamp":1772164033125,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,8,15]],"date-time":"2011-08-15T00:00:00Z","timestamp":1313366400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,8,15]]},"DOI":"10.1145\/2018436.2018479","type":"proceedings-article","created":{"date-parts":[[2011,8,31]],"date-time":"2011-08-31T11:22:45Z","timestamp":1314789765000},"page":"374-385","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":87,"title":["An untold story of middleboxes in cellular networks"],"prefix":"10.1145","author":[{"given":"Zhaoguang","family":"Wang","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Zhiyun","family":"Qian","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Qiang","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Zhuoqing","family":"Mao","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Ming","family":"Zhang","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,8,15]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Video streaming dominated mobile data traffic in first half","year":"2010","unstructured":"Allot : Video streaming dominated mobile data traffic in first half 2010 . http:\/\/www.indiatelecomtracker.com\/archives\/2669. Allot: Video streaming dominated mobile data traffic in first half 2010. http:\/\/www.indiatelecomtracker.com\/archives\/2669."},{"key":"e_1_3_2_2_2_1","unstructured":"Apple Push Notification Service. http:\/\/en.wikipedia.org\/wiki\/Apple_Push_Notification_Service.  Apple Push Notification Service. http:\/\/en.wikipedia.org\/wiki\/Apple_Push_Notification_Service."},{"key":"e_1_3_2_2_3_1","unstructured":"Building Push Applications for Android. http:\/\/dl.google.com\/googleio\/2010\/android-push-applications-android.pdf.  Building Push Applications for Android. http:\/\/dl.google.com\/googleio\/2010\/android-push-applications-android.pdf."},{"key":"e_1_3_2_2_4_1","unstructured":"Cisco Mobile Exchange. http:\/\/docstore.mik.ua\/univercd\/cc\/td\/doc\/product\/wireless\/moblwrls\/cmx\/mmg_sg\/cmxdesc.htm.  Cisco Mobile Exchange. http:\/\/docstore.mik.ua\/univercd\/cc\/td\/doc\/product\/wireless\/moblwrls\/cmx\/mmg_sg\/cmxdesc.htm."},{"key":"e_1_3_2_2_5_1","unstructured":"Fring. http:\/\/www.fring.com.  Fring. http:\/\/www.fring.com."},{"key":"e_1_3_2_2_6_1","unstructured":"Tango. http:\/\/tango.me.  Tango. http:\/\/tango.me."},{"key":"e_1_3_2_2_7_1","unstructured":"tcp(7) - Linux man page. http:\/\/linux.die.net\/man\/7\/tcp.  tcp(7) - Linux man page. http:\/\/linux.die.net\/man\/7\/tcp."},{"key":"e_1_3_2_2_8_1","unstructured":"WindRider: A Mobile Network Neutrality Monitoring System. http:\/\/www.cs.northwestern.edu\/~ict992\/mobile.htm.  WindRider: A Mobile Network Neutrality Monitoring System. http:\/\/www.cs.northwestern.edu\/~ict992\/mobile.htm."},{"key":"e_1_3_2_2_9_1","volume-title":"http:\/\/www.cisco.com\/en\/US\/prod\/collateral\/iosswrel\/ps8802\/ps6947\/ps5413\/prod_bulletin0900aecd802e0859.html","author":"Release GGSN","year":"2005","unstructured":"Cisco GGSN Release . http:\/\/www.cisco.com\/en\/US\/prod\/collateral\/iosswrel\/ps8802\/ps6947\/ps5413\/prod_bulletin0900aecd802e0859.html , 2005 . Cisco GGSN Release. http:\/\/www.cisco.com\/en\/US\/prod\/collateral\/iosswrel\/ps8802\/ps6947\/ps5413\/prod_bulletin0900aecd802e0859.html, 2005."},{"key":"e_1_3_2_2_10_1","volume-title":"http:\/\/www.cisco.com\/en\/US\/docs\/ios\/12_4t\/12_4t11\/ht_ooop.html","author":"Order Packet TCP","year":"2006","unstructured":"TCP Out-of- Order Packet Support for Cisco IOS Firewall and Cisco IOS IPS. http:\/\/www.cisco.com\/en\/US\/docs\/ios\/12_4t\/12_4t11\/ht_ooop.html , 2006 . TCP Out-of-Order Packet Support for Cisco IOS Firewall and Cisco IOS IPS. http:\/\/www.cisco.com\/en\/US\/docs\/ios\/12_4t\/12_4t11\/ht_ooop.html, 2006."},{"key":"e_1_3_2_2_11_1","unstructured":"Interworking between the Public Land Mobile Network (PLMN) supporting packet based services and Packet Data Networks (PDN). 3GPP TS 29.061 V6.15.0 2008.  Interworking between the Public Land Mobile Network (PLMN) supporting packet based services and Packet Data Networks (PDN). 3GPP TS 29.061 V6.15.0 2008."},{"key":"e_1_3_2_2_12_1","volume-title":"http:\/\/tools.ietf.org\/html\/rfc5961","year":"2010","unstructured":"Improving TCP's Robustness to Blind In-Window Attacks. http:\/\/tools.ietf.org\/html\/rfc5961 , 2010 . Improving TCP's Robustness to Blind In-Window Attacks. http:\/\/tools.ietf.org\/html\/rfc5961, 2010."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948246"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644936"},{"key":"e_1_3_2_2_15_1","volume-title":"Proc. of ACM SIGCOMM ASIA Workshop","author":"Biggadike A.","year":"2005","unstructured":"A. Biggadike , D. Ferullo , G. Wilson , and A. Perrig . NATBLASTER: Establishing TCP Connections Between Hosts Behind NATs . In Proc. of ACM SIGCOMM ASIA Workshop , 2005 . A. Biggadike, D. Ferullo, G. Wilson, and A. Perrig. NATBLASTER: Establishing TCP Connections Between Hosts Behind NATs. In Proc. of ACM SIGCOMM ASIA Workshop, 2005."},{"key":"e_1_3_2_2_16_1","volume-title":"INFOCOM","author":"Cao Z.","year":"2000","unstructured":"Z. Cao , Z. Wang , and E. Zegura . Performance of HashingnBased Schemes for Internet Load Balancing . In INFOCOM , 2000 . Z. Cao, Z. Wang, and E. Zegura. Performance of HashingnBased Schemes for Internet Load Balancing. In INFOCOM, 2000."},{"key":"e_1_3_2_2_17_1","volume-title":"Proc. Symposium on Networked Systems Design and Implementation","author":"Casado M.","year":"2007","unstructured":"M. Casado and M. J. Freedman . Peering through the shroud: The effect of edge opacity on IP-based client identification . In Proc. Symposium on Networked Systems Design and Implementation , 2007 . M. Casado and M. J. Freedman. Peering through the shroud: The effect of edge opacity on IP-based client identification. In Proc. Symposium on Networked Systems Design and Implementation, 2007."},{"key":"e_1_3_2_2_18_1","unstructured":"J. L. Eppinger. TCP Connections for P2P Apps: A Software Approach to Solving the NAT Problem. http:\/\/reports-archive.adm.cs.cmu.edu\/anon\/isri2005\/Carnegie Mellon University-ISRI-05-104.pdf.  J. L. Eppinger. TCP Connections for P2P Apps: A Software Approach to Solving the NAT Problem. http:\/\/reports-archive.adm.cs.cmu.edu\/anon\/isri2005\/Carnegie Mellon University-ISRI-05-104.pdf."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814453"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1247360.1247373"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251086.1251104"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1016707.1016715"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814452"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"crossref","unstructured":"V. Jacobson R. Braden and D. Borman. TCP Extensions for High Performance. http:\/\/tools.ietf.org\/html\/rfc1323 1992.   V. Jacobson R. Braden and D. Borman. TCP Extensions for High Performance. http:\/\/tools.ietf.org\/html\/rfc1323 1992.","DOI":"10.17487\/rfc1323"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.153"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.153"},{"key":"e_1_3_2_2_27_1","unstructured":"D. MacDonald and B. Lowekamp. NAT Behavior Discovery Using STUN. http:\/\/tools.ietf.org\/html\/draft-ietf-behave-nat-behavior-discovery-08.  D. MacDonald and B. Lowekamp. NAT Behavior Discovery Using STUN. http:\/\/tools.ietf.org\/html\/draft-ietf-behave-nat-behavior-discovery-08."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/NGI.2008.42"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028835"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17502-2_12"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879159"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOMW.2006.359550"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"crossref","unstructured":"P. Sarolahti and M. Kojo. Forward RTO-Recovery (F-RTO): An Algorithm for Detecting Spurious Retransmission Timeouts with TCP and the Stream Control Transmission Protocol (SCTP). http:\/\/tools.ietf.org\/html\/rfc4138 2005.  P. Sarolahti and M. Kojo. Forward RTO-Recovery (F-RTO): An Algorithm for Detecting Spurious Retransmission Timeouts with TCP and the Stream Control Transmission Protocol (SCTP). http:\/\/tools.ietf.org\/html\/rfc4138 2005.","DOI":"10.17487\/rfc4138"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1161289.1161304"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/829515.830553"},{"key":"e_1_3_2_2_36_1","volume-title":"Proc. of 16th USENIX Security Symposium","author":"Traynor P.","year":"2007","unstructured":"P. Traynor , P. McDaniel , and T. La Porta . On Attack Causality in Internet-connected Cellular Networks . In Proc. of 16th USENIX Security Symposium , 2007 . P. Traynor, P. McDaniel, and T. La Porta. On Attack Causality in Internet-connected Cellular Networks. In Proc. of 16th USENIX Security Symposium, 2007."}],"event":{"name":"SIGCOMM '11: ACM SIGCOMM 2011 Conference","location":"Toronto Ontario Canada","acronym":"SIGCOMM '11","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the ACM SIGCOMM 2011 conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2018436.2018479","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2018436.2018479","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:46Z","timestamp":1750225726000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2018436.2018479"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8,15]]},"references-count":36,"alternative-id":["10.1145\/2018436.2018479","10.1145\/2018436"],"URL":"https:\/\/doi.org\/10.1145\/2018436.2018479","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2043164.2018479","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2011,8,15]]},"assertion":[{"value":"2011-08-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}