{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:21:36Z","timestamp":1774369296098,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427662","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"332-344","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["DPIFuzz: A Differential Fuzzing Framework to Detect DPI Elusion Strategies for QUIC"],"prefix":"10.1145","author":[{"given":"Gaganjeet Singh","family":"Reen","sequence":"first","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Germany"}]},{"given":"Christian","family":"Rossow","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Germany"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2015. A collection of vulnerabilities discovered by the AFL fuzzer (afl-fuzz). https:\/\/github.com\/mrash\/afl-cve  2015. A collection of vulnerabilities discovered by the AFL fuzzer (afl-fuzz). https:\/\/github.com\/mrash\/afl-cve"},{"key":"e_1_3_2_1_2_1","volume-title":"Fuzzing Basics. Retrieved","year":"2020"},{"key":"e_1_3_2_1_3_1","volume-title":"Retrieved","author":"CWE","year":"2020"},{"key":"e_1_3_2_1_4_1","volume-title":"Retrieved","year":"2020"},{"key":"e_1_3_2_1_5_1","volume-title":"Hongfuzz Found Bugs. Retrieved","year":"2020"},{"key":"e_1_3_2_1_6_1","unstructured":"2020. Overlapping Offsets. Retrieved June 06 2020 from https:\/\/quicwg.org\/base-drafts\/draft-ietf-quic-transport#section-2.2-4  2020. Overlapping Offsets. Retrieved June 06 2020 from https:\/\/quicwg.org\/base-drafts\/draft-ietf-quic-transport#section-2.2-4"},{"key":"e_1_3_2_1_7_1","volume-title":"Retrieved","year":"2020"},{"key":"e_1_3_2_1_8_1","volume-title":"Retrieved","year":"2020"},{"key":"e_1_3_2_1_9_1","volume-title":"Retrieved","year":"2020"},{"key":"e_1_3_2_1_10_1","volume-title":"Syzkaller Found Bugs. Retrieved","year":"2020"},{"key":"e_1_3_2_1_11_1","volume-title":"Retrieved","year":"2020"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the Conference of the ACM Special Interest Group on Data Communication. https:\/\/dl.acm.org\/doi\/10","author":"\u00a0al Alyssa Wilk","year":"2017"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-015-0247-x"},{"key":"e_1_3_2_1_14_1","volume-title":"Exploiting Dissent: Towards Fuzzing-based Differential Black-Box Testing of TLS Implementations","author":"Andreas\u00a0Walz Axel\u00a0Sikora","year":"2020"},{"key":"e_1_3_2_1_15_1","volume-title":"Quiche: Savoury implementation of the QUIC transport protocol and HTTP\/3. https:\/\/github.com\/cloudflare\/quiche","year":"2018"},{"key":"e_1_3_2_1_16_1","volume-title":"MVFST: A client and server implementation of IETF QUIC protocol in C++ by Facebook. https:\/\/github.com\/facebookincubator\/mvfst","year":"2018"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the 2017 Internet Measurement Conference. ACM, 128\u2013141","author":"Kakhki Arian Akhavan Niaki Arash Molavi","year":"2017"},{"key":"e_1_3_2_1_18_1","volume-title":"Quicly: A QUIC implementation, written from the ground up to be used within the H2O HTTP server. https:\/\/github.com\/h2o\/quicly","year":"2017"},{"key":"e_1_3_2_1_19_1","unstructured":"Google. 2015. honggfuzz: Security oriented software fuzzer. https:\/\/github.com\/google\/honggfuzz  Google. 2015. honggfuzz: Security oriented software fuzzer. https:\/\/github.com\/google\/honggfuzz"},{"key":"e_1_3_2_1_20_1","unstructured":"Google. 2015. syzkaller: An unsupervised coverage-guided kernel fuzzer. https:\/\/github.com\/google\/syzkaller  Google. 2015. syzkaller: An unsupervised coverage-guided kernel fuzzer. https:\/\/github.com\/google\/syzkaller"},{"key":"e_1_3_2_1_21_1","unstructured":"Erik Hjelmvik. 2020. Sniffing Decrypted TLS Traffic with Security Onion. https:\/\/www.netresec.com\/?page=Blog&month=2020-01&post=Sniffing-Decrypted-TLS-Traffic-with-Security-Onion  Erik Hjelmvik. 2020. Sniffing Decrypted TLS Traffic with Security Onion. https:\/\/www.netresec.com\/?page=Blog&month=2020-01&post=Sniffing-Decrypted-TLS-Traffic-with-Security-Onion"},{"key":"e_1_3_2_1_22_1","unstructured":"Jeff Jarmoc. 2012. SSL\/TLS Interception Proxies and Transitive Trust. In Black Hat Europe. blackhat.  Jeff Jarmoc. 2012. SSL\/TLS Interception Proxies and Transitive Trust. In Black Hat Europe. blackhat."},{"key":"e_1_3_2_1_23_1","volume-title":"Geneva: Evolving Censorship Evasion Strategies. In CCS. ACM.","year":"2019"},{"key":"e_1_3_2_1_24_1","unstructured":"Konstantin Serebryany. 2011. Address Sanitizer. Google. https:\/\/github.com\/google\/sanitizers\/wiki\/AddressSanitizer  Konstantin Serebryany. 2011. Address Sanitizer. Google. https:\/\/github.com\/google\/sanitizers\/wiki\/AddressSanitizer"},{"key":"e_1_3_2_1_25_1","volume-title":"Analyzing Forged SSL Certificates in the Wild. In IEEE Symposium on Security and Privacy.","author":"Collin\u00a0Jackson Erling Ellingsen"},{"key":"e_1_3_2_1_26_1","unstructured":"LLVM. 2015. libFuzzer: a library for coverage-guided fuzz testing. http:\/\/llvm.org\/docs\/LibFuzzer.html  LLVM. 2015. libFuzzer: a library for coverage-guided fuzz testing. http:\/\/llvm.org\/docs\/LibFuzzer.html"},{"key":"e_1_3_2_1_27_1","unstructured":"Mohammad\u00a0Mannan Louis\u00a0Waked and Amr Youssef. 2018. The Sorry State of TLS Security in Enterprise Interception Appliances. (2018).  Mohammad\u00a0Mannan Louis\u00a0Waked and Amr Youssef. 2018. The Sorry State of TLS Security in Enterprise Interception Appliances. (2018)."},{"key":"e_1_3_2_1_28_1","volume-title":"Observing the Evolution of QUIC Implementations. In EPIQ\u201918: Proceedings of the Workshop on the Evolution, Performance, and Interoperability of QUIC. https:\/\/doi.org\/10","author":"De\u00a0Coninck Maxime\u00a0Piraux Quentin","year":"2018"},{"key":"e_1_3_2_1_29_1","unstructured":"Michal Zalewski. 2019. american fuzzy lop. Google. https:\/\/lcamtuf.coredump.cx\/afl\/  Michal Zalewski. 2019. american fuzzy lop. Google. https:\/\/lcamtuf.coredump.cx\/afl\/"},{"key":"e_1_3_2_1_30_1","volume-title":"Neqo: An Implementation of QUIC written in Rust. https:\/\/github.com\/mozilla\/neqo","year":"2019"},{"key":"e_1_3_2_1_31_1","volume-title":"Quant: QUIC implementation for POSIX and IoT platforms. https:\/\/github.com\/NTAP\/quant","year":"2016"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 7th International Workshop on Automation of Software Test (AST","author":"Torabi\u00a0Dashti Petar\u00a0Tsankov Mohammad","year":"2012"},{"key":"e_1_3_2_1_33_1","unstructured":"Thomas Ptacek and Timothy Newsham. [n.d.]. Insertion Evasion and Denial of Service: Eluding Network Intrusion Detection. ([n.\u00a0d.]).  Thomas Ptacek and Timothy Newsham. [n.d.]. Insertion Evasion and Denial of Service: Eluding Network Intrusion Detection. ([n.\u00a0d.])."},{"key":"e_1_3_2_1_34_1","volume-title":"VUzzer: Application-aware Evolutionary Fuzzing. In NDSS Symposium","author":"Lucian Cojocar Cristiano Giuffrida Ashish Kumar","year":"2017"},{"key":"e_1_3_2_1_35_1","volume-title":"Facilitate Evasion. In 3rd USENIX Workshop on Free and Open Communications on the Internet (FOCI \u201913)","author":"Philip"},{"key":"e_1_3_2_1_36_1","volume-title":"International Conference on Cloud and Service Computing. IEEE, 342\u2013347","author":"Smallwood D."},{"key":"e_1_3_2_1_37_1","volume-title":"Phishlimiter: A phishing detection and mitigation approach using software-defined networking","author":"Chin Xiong","year":"2018"},{"key":"e_1_3_2_1_38_1","volume-title":"World Congress on Computer Applications and Information Systems (WCCAIS). IEEE, 1\u20136.","author":"Tahboub R."},{"key":"e_1_3_2_1_39_1","unstructured":"Roelof\u00a0Du Toit. 2017. Responsibly Intercepting TLS and the Impact of TLS 1.3. (2017).  Roelof\u00a0Du Toit. 2017. Responsibly Intercepting TLS and the Impact of TLS 1.3. (2017)."},{"key":"e_1_3_2_1_40_1","volume-title":"AFLNET: A Greybox Fuzzer for Network Protocols. In IEEE International Conference on Software Testing, Verification and Validation (ICST). IEEE.","author":"Van-Thuan\u00a0Pham Abhik\u00a0Roychoudhury","year":"2020"},{"key":"e_1_3_2_1_41_1","volume-title":"SYMTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery. In NDSS Symposium","year":"2020"},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the 2017 Internet Measurement Conference. ACM, 114\u2013127","author":"Chengyu Song Zhiyun Qian","year":"2017"}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","location":"Austin USA","acronym":"ACSAC '20"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427662","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427662","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:25Z","timestamp":1750197745000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427662"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":42,"alternative-id":["10.1145\/3427228.3427662","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427662","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}