{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T08:50:01Z","timestamp":1768985401020,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":76,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,4]],"date-time":"2020-11-04T00:00:00Z","timestamp":1604448000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,4]]},"DOI":"10.1145\/3422604.3425947","type":"proceedings-article","created":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T00:50:36Z","timestamp":1604019036000},"page":"45-52","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["TCPLS"],"prefix":"10.1145","author":[{"given":"Florentin","family":"Rochet","sequence":"first","affiliation":[{"name":"UCLouvain, Louvain-La-Neuve, Belgium"}]},{"given":"Emery","family":"Assogba","sequence":"additional","affiliation":[{"name":"UCLouvain, Louvain-la-Neuve, Belgium"}]},{"given":"Olivier","family":"Bonaventure","sequence":"additional","affiliation":[{"name":"UCLouvain, Louvain-la-Neuve, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2020,11,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363192"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355601"},{"key":"e_1_3_2_1_3_1","unstructured":"M. Bagnulo. [n. d.]. Threat Analysis for TCP Extensions for Multipath Operation with Multiple Addresses. RFC 6181. ([n. d.]). https:\/\/tools.ietf.org\/html\/rfc6181  M. Bagnulo. [n. d.]. Threat Analysis for TCP Extensions for Multipath Operation with Multiple Addresses. RFC 6181. ([n. d.]). https:\/\/tools.ietf.org\/html\/rfc6181"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2895165"},{"key":"e_1_3_2_1_5_1","unstructured":"D Bider. [n. d.]. QUIC-based UDP Transport for Secure Shell (SSH). Internet-Draft. ([n. d.]). https:\/\/datatracker.ietf.org\/doc\/draft-bider-ssh-quic Work in Progress.  D Bider. [n. d.]. QUIC-based UDP Transport for Secure Shell (SSH). Internet-Draft. ([n. d.]). https:\/\/datatracker.ietf.org\/doc\/draft-bider-ssh-quic Work in Progress."},{"key":"e_1_3_2_1_6_1","unstructured":"Mike Bishop. 2020. Hypertext Transfer Protocol Version 3 (HTTP\/3). Internet-Draft draft-ietf-quic-http-29. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-quic-http-29 Work in Progress.  Mike Bishop. 2020. Hypertext Transfer Protocol Version 3 (HTTP\/3). Internet-Draft draft-ietf-quic-http-29. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-quic-http-29 Work in Progress."},{"key":"e_1_3_2_1_7_1","volume-title":"Smith","author":"Bittau Andrea","year":"2019"},{"key":"e_1_3_2_1_8_1","first-page":"24","article-title":"Multipath TCP deployments","volume":"12","author":"Bonaventure Olivier","year":"2016","journal-title":"IETF Journal"},{"key":"e_1_3_2_1_9_1","volume-title":"Linux Plumbers Conference'18 .","author":"Borkmann Daniel","year":"2018"},{"key":"e_1_3_2_1_10_1","volume-title":"TCP Extensions for High Performance. RFC 1323. (May","author":"Borman David A.","year":"1992"},{"key":"e_1_3_2_1_11_1","volume-title":"Tcp-bpf: Programmatically tuning tcp behavior through bpf. NetDev 2.2","author":"Brakmo Lawrence","year":"2017"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2333112.2333113"},{"key":"e_1_3_2_1_13_1","unstructured":"Zimo Chai Amirhossein Ghafari and Amir Houmansadr. 2019. On the Importance of Encrypted-SNI (ESNI) to Censorship Circumvention. In Free and Open Communications on the Internet. USENIX. https:\/\/www.usenix.org\/system\/files\/foci19-paper_chai_update.pdf  Zimo Chai Amirhossein Ghafari and Amir Houmansadr. 2019. On the Importance of Encrypted-SNI (ESNI) to Censorship Circumvention. In Free and Open Communications on the Internet. USENIX. https:\/\/www.usenix.org\/system\/files\/foci19-paper_chai_update.pdf"},{"key":"e_1_3_2_1_14_1","volume-title":"International Workshop on Selected Areas in Cryptography. Springer, 293--319","author":"Chatterjee Sanjit","year":"2011"},{"key":"e_1_3_2_1_15_1","volume-title":"TCP Fast Open. RFC 7413. (Dec","author":"Cheng Yuchung","year":"2014"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.29545"},{"key":"e_1_3_2_1_17_1","unstructured":"Yong Cui Zhiwen Liu Hang Shi Jie Zhang Kai Zheng and Wei Wang. 2020. Deadline-aware Transport Protocol. Internet-Draft draft-shi-quic-dtp-01. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-shi-quic-dtp-01 Work in Progress.  Yong Cui Zhiwen Liu Hang Shi Jie Zhang Kai Zheng and Wei Wang. 2020. Deadline-aware Transport Protocol. Internet-Draft draft-shi-quic-dtp-01. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-shi-quic-dtp-01 Work in Progress."},{"key":"e_1_3_2_1_18_1","volume-title":"Maxime Piraux, Florentin Rochet, Thomas Given-Wilson, Axel Legay, Olivier Pereira, and Olivier Bonaventure.","author":"Coninck Quentin De","year":"2019"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504757"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504757"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.23919\/ITC.2017.8064352"},{"key":"e_1_3_2_1_22_1","volume-title":"Taher Elgamal and Kipp E.B. Hickman","year":"1995"},{"key":"e_1_3_2_1_23_1","volume-title":"et almbox","author":"Firestone Daniel","year":"2018"},{"key":"e_1_3_2_1_24_1","volume-title":"Inappropriate TCP Resets Considered Harmful. RFC 3360. (Aug","author":"Floyd Sally","year":"2002"},{"key":"e_1_3_2_1_25_1","volume-title":"TCP Selective Acknowledgment Options. RFC 2018","author":"Floyd Sally","year":"1996"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6824"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8684"},{"key":"e_1_3_2_1_28_1","volume-title":"TCP User Timeout Option. RFC 5482. (March","author":"Gont Fernando","year":"2009"},{"key":"e_1_3_2_1_29_1","volume-title":"Mending Wall: On the Implementation of Censorship in India. In SecureComm","author":"Gosain Devashish","year":"2017"},{"key":"e_1_3_2_1_30_1","unstructured":"QUIC Working Group. [n. d.]. Available QUIC Implementations. ([n. d.]). https:\/\/github.com\/quicwg\/base-drafts\/wiki\/Implementations.  QUIC Working Group. [n. d.]. Available QUIC Implementations. ([n. d.]). https:\/\/github.com\/quicwg\/base-drafts\/wiki\/Implementations."},{"key":"e_1_3_2_1_31_1","unstructured":"F G\u00fcnther M. Thomson and C.A. Wood. [n. d.]. Usage Limits on AEAD Algorithms . Internet-Draft. ([n. d.]). https:\/\/tools.ietf.org\/html\/draft-wood-cfrg-aead-limits-00 Work in Progress.  F G\u00fcnther M. Thomson and C.A. Wood. [n. d.]. Usage Limits on AEAD Algorithms . Internet-Draft. ([n. d.]). https:\/\/tools.ietf.org\/html\/draft-wood-cfrg-aead-limits-00 Work in Progress."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2959424.2959433"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535828.2535830"},{"key":"e_1_3_2_1_34_1","volume-title":"The Era of TLS 1.3: Measuring Deployment and Use with Active and Passive Methods. arXiv preprint arXiv:1907.12762","author":"Holz Ralph","year":"2019"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068834"},{"key":"e_1_3_2_1_36_1","volume-title":"On Sockets and System Calls: Minimizing Context Switches for the Socket API. In 2014 Conference on Timely Results in Operating Systems (TRIOS 14)","author":"Hruby Tomas","year":"2014"},{"key":"e_1_3_2_1_37_1","unstructured":"Christian Huitema. 2020. Quic Timestamps For Measuring One-Way Delays. Internet-Draft draft-huitema-quic-ts-02. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-huitema-quic-ts-02 Work in Progress.  Christian Huitema. 2020. Quic Timestamps For Measuring One-Way Delays. Internet-Draft draft-huitema-quic-ts-02. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-huitema-quic-ts-02 Work in Progress."},{"key":"e_1_3_2_1_38_1","unstructured":"Christian Huitema Allison Mankin and Sara Dickinson. 2020. Specification of DNS over Dedicated QUIC Connections. Internet-Draft draft-ietf-dprive-dnsoquic-00. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-dprive-dnsoquic-00 Work in Progress.  Christian Huitema Allison Mankin and Sara Dickinson. 2020. Specification of DNS over Dedicated QUIC Connections. Internet-Draft draft-ietf-dprive-dnsoquic-00. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-dprive-dnsoquic-00 Work in Progress."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Jana Iyengar and Martin Thomson. 2020. QUIC: A UDP-Based Multiplexed and Secure Transport. Internet-Draft draft-ietf-quic-transport-28. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-quic-transport-28 Work in Progress.  Jana Iyengar and Martin Thomson. 2020. QUIC: A UDP-Based Multiplexed and Secure Transport. Internet-Draft draft-ietf-quic-transport-28. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-quic-transport-28 Work in Progress.","DOI":"10.17487\/RFC9000"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.882843"},{"key":"e_1_3_2_1_41_1","volume-title":"Educational Virtual Routing Labs with IPMininet. ACM SIGCOMM Education Workshop","author":"Jadin Mathieu","year":"2020"},{"key":"e_1_3_2_1_42_1","volume-title":"11th {USENIX} Symposium on Networked Systems Design and Implementation ($NSDI$ 14). 489--502.","author":"Jeong EunYoung"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159918"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278568"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098842"},{"key":"e_1_3_2_1_46_1","volume-title":"Limits on authenticated encryption use in TLS. Personal webpage: http:\/\/www.isg.rhul.ac.uk\/~kp\/TLS-AEbounds. pdf","author":"Luykx Atul","year":"2015"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626311"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028835"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064413.1064418"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.23919\/IFIPNetworking46909.2019.8999475"},{"key":"e_1_3_2_1_51_1","volume-title":"Syed Ishtiaque Ahmed, and Neha Kumar","author":"Morshed Mehrab Bin","year":"2017"},{"key":"e_1_3_2_1_52_1","volume-title":"Network support for TCP Fast Open. Presentation at NANOG","author":"Paasch Christoph","year":"2016"},{"key":"e_1_3_2_1_53_1","volume-title":"Wood","author":"Pauly Tommy","year":"2020"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2932905"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC0793"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2079296.2079317"},{"key":"e_1_3_2_1_57_1","volume-title":"9th {USENIX} Symposium on Networked Systems Design and Implementation (NSDI 12). 399--412.","author":"Raiciu Costin"},{"key":"e_1_3_2_1_58_1","volume-title":"The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446. (Aug","author":"Rescorla Eric","year":"2018"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090147.2103536"},{"key":"e_1_3_2_1_60_1","unstructured":"Jim Roskind. 2013. QUIC Quick UDP Internet Connections. https:\/\/docs.google.com\/document\/d\/1RNHkx_VvKWyWg6Lr8SZ-saqsQx7rFV-ev2jRFUoVD34\/preview. (2013).  Jim Roskind. 2013. QUIC Quick UDP Internet Connections. https:\/\/docs.google.com\/document\/d\/1RNHkx_VvKWyWg6Lr8SZ-saqsQx7rFV-ev2jRFUoVD34\/preview. (2013)."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/381906.381940"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8305"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535372.2535405"},{"key":"e_1_3_2_1_64_1","volume-title":"BPF syscall, maps, verifier, sample. (June","author":"Starovoitov Alexei","year":"2014"},{"key":"e_1_3_2_1_65_1","volume-title":"Stream Control Transmission Protocol. RFC 4960. (Sept","author":"Stewart Randall R.","year":"2007"},{"key":"e_1_3_2_1_66_1","unstructured":"Ian Swett Marie-Jose Montpetit Vincent Roca and Fran\u00e7ois Michel. 2020. Coding for QUIC. Internet-Draft draft-swett-nwcrg-coding-for-quic-04. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-swett-nwcrg-coding-for-quic-04 Work in Progress.  Ian Swett Marie-Jose Montpetit Vincent Roca and Fran\u00e7ois Michel. 2020. Coding for QUIC. Internet-Draft draft-swett-nwcrg-coding-for-quic-04. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-swett-nwcrg-coding-for-quic-04 Work in Progress."},{"key":"e_1_3_2_1_67_1","unstructured":"Olivier Tilmans and Mathieu Jadin. [n. d.]. IPMininet. ([n. d.]). https:\/\/github.com\/cnp3\/ipmininet Accessed Feb-20--2020.  Olivier Tilmans and Mathieu Jadin. [n. d.]. IPMininet. ([n. d.]). https:\/\/github.com\/cnp3\/ipmininet Accessed Feb-20--2020."},{"key":"e_1_3_2_1_68_1","volume-title":"Touch and Wesley Eddy","author":"Joseph","year":"2018"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.23919\/IFIPNetworking.2019.8816857"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.07.036"},{"key":"e_1_3_2_1_71_1","volume-title":"Sockets API Extensions for the Stream Control Transmission Protocol (SCTP). RFC 6458. (Dec","author":"T\u00fcxen Michael","year":"2011"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422951"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018479"},{"key":"e_1_3_2_1_74_1","unstructured":"Nicholas Weaver Robin Sommer and Vern Paxson. 2009. Detecting Forged TCP Reset Packets.. In NDSS.  Nicholas Weaver Robin Sommer and Vern Paxson. 2009. Detecting Forged TCP Reset Packets.. In NDSS."},{"key":"e_1_3_2_1_75_1","first-page":"8","article-title":"Design, Implementation and Evaluation of Congestion Control for Multipath TCP","volume":"11","author":"Wischik Damon","year":"2011","journal-title":"NSDI"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15509-8_20"}],"event":{"name":"HotNets '20: The 19th ACM Workshop on Hot Topics in Networks","location":"Virtual Event USA","acronym":"HotNets '20","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 19th ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422604.3425947","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422604.3425947","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:29Z","timestamp":1750195889000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422604.3425947"}},"subtitle":["Closely Integrating TCP and TLS"],"short-title":[],"issued":{"date-parts":[[2020,11,4]]},"references-count":76,"alternative-id":["10.1145\/3422604.3425947","10.1145\/3422604"],"URL":"https:\/\/doi.org\/10.1145\/3422604.3425947","relation":{},"subject":[],"published":{"date-parts":[[2020,11,4]]},"assertion":[{"value":"2020-11-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}