{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T22:10:05Z","timestamp":1755900605751,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":99,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2345563, 1941583, 2145631, 2215017, 222644"],"award-info":[{"award-number":["2345563, 1941583, 2145631, 2215017, 222644"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"The NSF and Office of the Under Secretary of Defense?Research and Engineering","award":["ITE 2326898, 2515378"],"award-info":[{"award-number":["ITE 2326898, 2515378"]}]},{"DOI":"10.13039\/501100006374","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["D22AP00148"],"award-info":[{"award-number":["D22AP00148"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,30]]},"DOI":"10.1145\/3734477.3734713","type":"proceedings-article","created":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T21:11:01Z","timestamp":1751058661000},"page":"76-87","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Cloud Nine Connectivity: Security Analysis of In-Flight Wi-Fi Paywall Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0629-2895","authenticated-orcid":false,"given":"Abdullah Al","family":"Ishtiaq","sequence":"first","affiliation":[{"name":"The Pennsylvania State University, University Park, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-6813-1764","authenticated-orcid":false,"given":"Raja Hasnain","family":"Anwar","sequence":"additional","affiliation":[{"name":"University of Massachusetts Amherst, Amherst, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3436-6452","authenticated-orcid":false,"given":"Yasra","family":"Chandio","sequence":"additional","affiliation":[{"name":"University of Massachusetts Amherst, Amherst, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7119-7232","authenticated-orcid":false,"given":"Fatima Muhammad","family":"Anwar","sequence":"additional","affiliation":[{"name":"University of Massachusetts Amherst, Amherst, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9222-8544","authenticated-orcid":false,"given":"Syed Rafiul","family":"Hussain","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, University Park, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1245-1151","authenticated-orcid":false,"given":"Muhammad Taqi","family":"Raza","sequence":"additional","affiliation":[{"name":"University of Massachusetts Amherst, Amherst, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,6,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2023. Bypass paywall on airline wifi. www.reddit.com\/r\/hacking\/comments\/177w08k\/bypass_paywall_on_airline_wifi\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Feross Aboukhadijeh. 2011. Announcing SpoofMAC - Spoof your MAC address in Mac OS X. www.feross.org\/spoofmac\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Claudio Agosti. 2017. sniffjoke: a client-only layer of protection from the wiretap\/sniff\/IDS analysis. www.github.com\/vecna\/sniffjoke."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0969-6997(99)00014-9"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2004.1390773"},{"key":"e_1_3_2_1_6_1","unstructured":"Seamless Air Alliance. 2020. Introduction to SR1: A New Era of Inflight Connectivity. www.seamlessalliance.com\/wp-content\/uploads\/SAA-White-Paper-Design-Layout-Final-Spreads.pdf."},{"key":"e_1_3_2_1_7_1","unstructured":"Ran Atkinson and SN Bhatti. 2012. RFC 6747: Address Resolution Protocol (ARP) for the Identifier-Locator Network Protocol for IPv4 (ILNPv4). USA."},{"key":"e_1_3_2_1_8_1","unstructured":"Gogo Business Aviation. 2018. Anatomy of an Air-to-Ground (ATG) Network. www.gogoair.com\/GogoBA\/media\/Media\/PDFs\/eBooks\/gogo-ebook-anatomy-of-a-network.pdf."},{"key":"e_1_3_2_1_9_1","unstructured":"Gogo Business Aviation. 2021. Inflight Connectivity 101. www.gogoair.com\/ebooks-whitepapers\/inflight-connectivity-101\/."},{"key":"e_1_3_2_1_10_1","unstructured":"Philip Bell. 2021. What Internet Speed do you Need for Video Conferencing www.megameeting.com\/news\/what-internet-speed-for-video-conferencing\/."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Mike Bishop. 2022. RFC 9114: HTTP\/3. USA.","DOI":"10.17487\/RFC9114"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405889"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363189"},{"key":"e_1_3_2_1_14_1","unstructured":"Bryce Boe. 2012. Bypassing Gogo's Inflight Internet Authentication. www.bryceboe.com\/2012\/03\/12\/bypassing-gogos-inflight-internet-authentication\/."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-018-1039-6"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/511399.511338"},{"key":"e_1_3_2_1_17_1","volume-title":"Bypassing Captive Portals and Limited Networks. https:\/\/www.youtube.com\/watch?v=GhUUzGBjhXQ. DEF CON 24","author":"Bugher Grant","year":"2016","unstructured":"Grant Bugher. 2016. Bypassing Captive Portals and Limited Networks. https:\/\/www.youtube.com\/watch?v=GhUUzGBjhXQ. DEF CON 24 (2016)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Rui Castro Mark Coates Gang Liang Robert Nowak and Bin Yu. 2004. Network tomography: Recent developments. (2004).","DOI":"10.1214\/088342304000000422"},{"key":"e_1_3_2_1_19_1","unstructured":"Philippe Delteil. 2021. How to have free Internet WIFI on United Airlines flights. www.medium.com\/hacking-info-sec\/how-to-have-free-internet-wifi-on-united-airlines-flights-65ead4087bc9."},{"key":"e_1_3_2_1_20_1","volume-title":"Leading in-flight connectivity providers in the narrowbody market in North America from","author":"Statista Research Department","year":"2016","unstructured":"Statista Research Department. 2024. Leading in-flight connectivity providers in the narrowbody market in North America from September 2016 to September 2019, by market share. www.statista.com\/statistics\/1171871\/in-flight-connectivity-providers-market-share-north-america\/."},{"key":"e_1_3_2_1_21_1","volume-title":"Projected size of the global in-flight Wi-Fi market from 2021 to","author":"Statista Research Department","year":"2031","unstructured":"Statista Research Department. 2024. Projected size of the global in-flight Wi-Fi market from 2021 to 2031. www.statista.com\/statistics\/624184\/inflight-wifi-market-size\/."},{"key":"e_1_3_2_1_22_1","unstructured":"Jason Donenfeld. 2015. WireGuard: fast modern secure VPN tunnel. https:\/\/www.wireguard.com\/."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Ralph Droms. 1997. RFC2131: Dynamic Host Configuration Protocol. USA.","DOI":"10.17487\/rfc2131"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Wesley Eddy. 2022. RFC 9293: Transmission Control Protocol (TCP). USA.","DOI":"10.17487\/RFC9293"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"D. Farinacci T. Li S. Hanks D. Meyer and P. Traina. 2000. RFC 2784: Generic Routing Encapsulation (GRE). USA.","DOI":"10.17487\/rfc2784"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Roy Fielding and Julian Reschke. 2014. RFC 7235: Hypertext Transfer Protocol (HTTP\/1.1): Authentication. USA.","DOI":"10.17487\/rfc7235"},{"key":"e_1_3_2_1_27_1","volume-title":"d.]. Wireshark. https:\/\/www.wireshark.org\/. Accessed","author":"Foundation Wireshark","year":"2024","unstructured":"Wireshark Foundation. [n. d.]. Wireshark. https:\/\/www.wireshark.org\/. Accessed: March 30, 2024."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Sheila Frankel and Suresh Krishnan. 2011. RFC 6071: IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap. USA.","DOI":"10.17487\/rfc6071"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879170"},{"key":"e_1_3_2_1_30_1","unstructured":"GOST. 2022. Go Simple Tunnel. www.gost.run\/."},{"key":"e_1_3_2_1_31_1","unstructured":"Alan Henry. 2016. Get Free Unlimited Wi-Fi on Flights and Bypass Paywalls. www.lifehacker.com\/get-free-unlimited-wi-fi-on-flights-and-bypass-paywall-1788148516."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.49"},{"key":"e_1_3_2_1_33_1","unstructured":"Peter Holslin. 2022. This Is the Internet Speed You Need for Zoom. www.highspeedinternet.com\/resources\/zoom-guide."},{"key":"e_1_3_2_1_34_1","unstructured":"Michelle Yan Huang. 2021. Everything wrong with airplane WiFi and why it barely works. www.businessinsider.com\/in-flight-wifi-is-slow-and-expensive-2019-9."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jairtraman.2006.01.008"},{"key":"e_1_3_2_1_36_1","unstructured":"Viasat Inc. 2019. The Flight Department's manual for selecting private jet Wi-Fi. www.viasat.com\/content\/dam\/us-site\/aviation\/documents\/939539_Private_Jet_Wi-Fi_Ebook_Short_003_hires-2-compressed.pdf."},{"key":"e_1_3_2_1_37_1","unstructured":"Dhaval Kapil. 2015. icmptunnel: Transparently tunnel your IP traffic through ICMP echo and reply packets. www.dhavalkapil.com\/icmptunnel\/."},{"key":"e_1_3_2_1_38_1","volume-title":"3rd USENIX Workshop on Free and Open Communications on the Internet (FOCI 13)","author":"Khattak Sheharbano","year":"2013","unstructured":"Sheharbano Khattak, Mobin Javed, Philip D. Anderson, and Vern Paxson. 2013. Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion. In 3rd USENIX Workshop on Free and Open Communications on the Internet (FOCI 13)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Benjamin Knoblauch Patricia Best Vijay Ragothaman and Ravi Pendse. 2011. Common firewall approach to aviation architecture. Technical Report. SAE.","DOI":"10.4271\/2011-01-2718"},{"key":"e_1_3_2_1_40_1","unstructured":"Joern Krause. 2024. Non-Terrestrial Networks (NTN). https:\/\/www.3gpp.org\/technologies\/ntn-overview."},{"key":"e_1_3_2_1_41_1","volume-title":"Issued Feb. 3rd","author":"Girish Michael","year":"2015","unstructured":"Michael Foxworthy; Girish Chandran; Jason Lau. 2015. Access node\/gateway to access node\/gateway layer-2 connectivity (end-to-end). Assignee: Viasat Inc., Patent No. US8948149B2, Issued Feb. 3rd, 2015."},{"key":"e_1_3_2_1_42_1","volume-title":"Issued Aug. 9th","author":"Lauer Bryan Adrian","year":"2022","unstructured":"Bryan Adrian Lauer. 2022. Presence-based network authentication. Assignee: Gogo Business Aviation LLC, Patent No. US11412045B2, Issued Aug. 9th, 2022."},{"key":"e_1_3_2_1_43_1","volume-title":"Arntzen","author":"Lauer Bryan A.","year":"2012","unstructured":"Bryan A. Lauer, Jerry Stamatopoulos, Anjum Rashid, Joseph A. Tobin, Patrick J. Walsh, and Steven J. Arntzen. 2012. System for creating an air-to-ground IP tunnel in an airborne wireless cellular network to differentiate individual passengers. Assignee: Gogo LLC, Patent No. US8254914B2."},{"key":"e_1_3_2_1_44_1","volume-title":"Patent No. US20140334379A1, Issued Nov. 13th","author":"Lauer Bryan A.","year":"2014","unstructured":"Bryan A. Lauer, Jerry Stamatopoulos, Anjum Rashid, Joseph A. Tobin, Patrick J. Walsh, and Steven J. Arntzen. 2014. System for managing mobile internet protocol addresses in an airborne wireless cellular network. Assignee: Gogo Business Aviation LLC, Patent No. US20140334379A1, Issued Nov. 13th, 2014."},{"key":"e_1_3_2_1_45_1","volume-title":"Issued Sep. 12th","author":"Peter Lepeska William B.","year":"2017","unstructured":"William B. Sebastian; Peter Lepeska. 2017. Content set based pre-positioning. Assignee: Viasat Inc., Patent No. US9762635B2, Issued Sep. 12th, 2017."},{"key":"e_1_3_2_1_46_1","unstructured":"Kemi Lewis. 2023. Has the U.S. In-Flight Connectivity Market Reached Saturation? www.linkedin.com\/pulse\/has-us-in-flight-connectivity-market-reached-saturation-kemi-lewis\/."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813618"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131376"},{"key":"e_1_3_2_1_49_1","unstructured":"Cyrex Limited. 2020. Flying High on Free Wi-Fi: A Lesson Learned in DNS Tunnelling. www.cyrex.tech\/lessons-in-dns-tunnelling\/."},{"key":"e_1_3_2_1_50_1","volume-title":"Starlink: HIGH-SPEED INTERNET AROUND THE WORLD. https:\/\/www.starlink.com\/us.","author":"Star","year":"2025","unstructured":"Star link. 2025. Starlink: HIGH-SPEED INTERNET AROUND THE WORLD. https:\/\/www.starlink.com\/us."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.876295"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"M. Mahalingam D. Dutt K. Duda P. Agarwal L. Kreeger T. Sridhar M. Bursell and C. Wright. 2014. RFC 7348: Virtual eXtensible Local Area Network (VXLAN): A Framework for Overlaying Virtualized Layer 2 Networks over Layer 3 Networks. USA.","DOI":"10.17487\/rfc7348"},{"key":"e_1_3_2_1_53_1","unstructured":"TEMP MAIL. 2024. Temp Mail - Disposable Temporary Email. www.temp-mail.org\/en\/."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"crossref","unstructured":"Paul Mockapetris. 1987. RFC 1034: Domain names - concepts and facilities. USA.","DOI":"10.17487\/rfc1034"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"crossref","unstructured":"Paul Mockapetris. 1987. RFC 1035: Domain names - implementation and specification. USA.","DOI":"10.17487\/rfc1035"},{"volume-title":"Pryde: A Modular Generalizable Workflow for Uncovering Evasion Attacks Against Stateful Firewall Deployments. In 2024 IEEE Symposium on Security and Privacy (SP). 144-144","author":"Moon S.","key":"e_1_3_2_1_56_1","unstructured":"S. Moon, M. Srivastava, Y. Bieri, R. Martins, and V. Sekar. 2024. Pryde: A Modular Generalizable Workflow for Uncovering Evasion Attacks Against Stateful Firewall Deployments. In 2024 IEEE Symposium on Security and Privacy (SP). 144-144."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2010.5421588"},{"key":"e_1_3_2_1_58_1","unstructured":"Home Networking. 2022. Router crashing because of UDP port scan attacks. www.reddit.com\/r\/HomeNetworking\/comments\/uqhdgo\/router_crashing_because_of_udp_port_scan_attacks\/."},{"key":"e_1_3_2_1_59_1","volume-title":"Issued Jul. 2nd","author":"Velayudhan Nirmalkumar Veena","year":"2014","unstructured":"Veena Padmanabhan; Velayudhan Nirmalkumar. 2014. Transport path-aware quality of service for mobile communications. Assignee: Viasat Inc., Patent No. US10341408B2, Issued Jul. 2nd, 2019."},{"key":"e_1_3_2_1_60_1","unstructured":"Takahiro Oda. 2021. Bypass Firewalls using Various Evasion Techniques!! takahiro-oda.medium.com\/project-bypass-firewalls-using-various-evasion-techniques-d8411eb5f5eb."},{"key":"e_1_3_2_1_61_1","unstructured":"Bureau of Transportation Statistics. 2024. Average Domestic Airline Itinerary Fares. https:\/\/www.transtats.bts.gov\/averagefare\/."},{"key":"e_1_3_2_1_62_1","unstructured":"Alvaro Lopez Ortega. 2014. MAC Changer. github.com\/alobbs\/macchanger."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382220"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660346"},{"key":"e_1_3_2_1_65_1","volume-title":"How easy is it to hack an airplane? The Washington Post (20","author":"Peterson Andrea","year":"2015","unstructured":"Andrea Peterson. 2015. How easy is it to hack an airplane? The Washington Post (20 Apr 2015)."},{"key":"e_1_3_2_1_66_1","unstructured":"David C. Plummer. 1982. RFC 826: An Ethernet Address Resolution Protocol. USA."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"crossref","unstructured":"Jon Postel. 1981. RFC 792: Internet Control Message Protocol. USA.","DOI":"10.17487\/rfc0777"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"crossref","unstructured":"Jon Postel. 1981. RFC 793: Transmission Control Protocol (TCP). USA.","DOI":"10.17487\/rfc0793"},{"key":"e_1_3_2_1_69_1","unstructured":"Jon Postel. 1988. RFC 768: User Datagram Protocol. USA."},{"key":"e_1_3_2_1_70_1","unstructured":"Team Privacy. 2024. Online Payment Security. www.privacy.com\/."},{"key":"e_1_3_2_1_71_1","unstructured":"Thomas H Ptacek and Timothy N Newsham. 1998. Insertion evasion and denial of service: Eluding network intrusion detection. Technical Report. Secure Networks Inc."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644903"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186057"},{"volume-title":"2018 International Conference on Networking, Embedded and Wireless Systems (ICNEWS). 1-5.","author":"Rohith Raj","key":"e_1_3_2_1_74_1","unstructured":"Rohith Raj S, Rohith R, Minal Moharir, and Shobha G. 2018. SCAPY- A powerful interactive packet manipulation program. In 2018 International Conference on Networking, Embedded and Wireless Systems (ICNEWS). 1-5."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"crossref","unstructured":"Peter Saint-Andre. 2011. RFC 6120: Extensible Messaging and Presence Protocol (XMPP): Core. USA.","DOI":"10.17487\/rfc6120"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"crossref","unstructured":"Peter Saint-Andre. 2011. RFC 6121: Extensible Messaging and Presence Protocol (XMPP): Instant Messaging and Presence. USA.","DOI":"10.17487\/rfc6121"},{"key":"e_1_3_2_1_77_1","volume-title":"Patent No. US20120320916A1, Issued Nov. 25th","author":"Sebastian William B.","year":"2014","unstructured":"William B. Sebastian. 2014. Transport protocol for anticipatory content. Assignee: Viasat Inc., Patent No. US20120320916A1, Issued Nov. 25th, 2014."},{"key":"e_1_3_2_1_78_1","volume-title":"Issued Aug. 30th","author":"Sebastian William B.","year":"2016","unstructured":"William B. Sebastian. 2016. Internet protocol broadcasting. Assignee: Viasat Inc., Patent No. US9432307B2, Issued Aug. 30th, 2016."},{"key":"e_1_3_2_1_79_1","unstructured":"AmazonWeb Services. 2023. Amazon EC2 Pricing. aws.amazon.com\/ec2\/pricing."},{"key":"e_1_3_2_1_80_1","unstructured":"Amazon Web Services. 2024. Amazon EC2 Calculator. calculator.aws\/#\/createCalculator\/ec2-enhancement."},{"key":"e_1_3_2_1_81_1","unstructured":"AmazonWeb Services. 2024. Amazon Free Tier. www.aws.amazon.com\/free\/?all-free-tier.sort-by=item.additionalFields.SortRank&all-free-tier.sort-order=asc&awsf.Free%20Tier%20Types=*all&awsf.Free%20Tier%20Categories=*all."},{"key":"e_1_3_2_1_82_1","unstructured":"Joe Supan. 2023. How much internet speed do I need? www.allconnect.com\/blog\/faqs-internet-speeds-what-speed-do-you-need."},{"key":"e_1_3_2_1_83_1","unstructured":"Allied Telesis. 2022. RADIUS - Feature Overview and Configuration Guide. www.alliedtelesis.com\/sites\/default\/files\/radius_feature_overview_guide.pdf."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2005.1594889"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2004.1405372"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/MAES.2005.1453803"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"crossref","unstructured":"Martin Thomson and Cory Benfield. 2022. RFC 9113: HTTP\/2. USA.","DOI":"10.17487\/RFC9113"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"crossref","unstructured":"W. Townsley A. Valencia A. Rubens G. Pall G. Zorn and B. Palter. 1999. RFC 2661: Layer Two Tunneling Protocol ''L2TP''. USA.","DOI":"10.17487\/rfc2661"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCICCT.2014.6992942"},{"key":"e_1_3_2_1_90_1","volume-title":"Navigation and Surveillance Conference. IEEE, E1-1.","author":"Varet Antoine","year":"2012","unstructured":"Antoine Varet and Nicolas Larrieu. 2012. Design and development of an embedded aeronautical router with security capabilities. In 2012 Integrated Communications, Navigation and Surveillance Conference. IEEE, E1-1."},{"key":"e_1_3_2_1_91_1","unstructured":"Viasat. 2023. Free In-flight Wi-Fi Now Most Influential Factor Other Than Ticket Price for Airline Passengers. https:\/\/news.viasat.com\/newsroom\/press-releases\/free-in-flight-wi-fi-now-most-influential-factor-other-than-ticket-price-for-airline-passengers-reveals-new-viasat-survey."},{"key":"e_1_3_2_1_92_1","volume-title":"Issued Jan. 10th","author":"Wahler Ronald A.","year":"2023","unstructured":"Ronald A. Wahler. 2023. Vehicle data distribution system and method. Assignee: Gogo Business Aviation LLC, Patent No. US11553042B2, Issued Jan. 10th, 2023."},{"volume-title":"Proceedings of the 2017 Internet Measurement Conference.","author":"Wang Zhongjie","key":"e_1_3_2_1_93_1","unstructured":"Zhongjie Wang, Yue Cao, Zhiyun Qian, Chengyu Song, and Srikanth V. Krishnamurthy. 2017. Your state is not mine: a closer look at evading stateful internet censorship. In Proceedings of the 2017 Internet Measurement Conference."},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1007\/11663812_2"},{"key":"e_1_3_2_1_95_1","unstructured":"Rob Wright. 2023. Bypassing Captive Portals Such as GoGo Inflight Air To Get Free Wi-Fi. www.rootandbeer.com\/bypassing-captive-portals-such-as\/."},{"key":"e_1_3_2_1_96_1","unstructured":"Eric Wustrow Colleen M. Swanson and J. Alex Halderman. 2014. TapDance: End-to-Middle Anticensorship without Flow Blocking. In USENIX Security 14."},{"key":"e_1_3_2_1_97_1","volume-title":"Telex: Anticensorship in the Network Infrastructure. In USENIX Security 11.","author":"Wustrow Eric","year":"2011","unstructured":"Eric Wustrow, Scott Wolchok, Ian Goldberg, and J. Alex Halderman. 2011. Telex: Anticensorship in the Network Infrastructure. In USENIX Security 11."},{"key":"e_1_3_2_1_98_1","unstructured":"Ted Young. 2015. Tunneling Data and Commands Over DNS to Bypass Firewalls. https:\/\/news.ycombinator.com\/item?id=9874295."},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1109\/DASC43569.2019.9081750"}],"event":{"name":"WiSec 2025: 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Arlington VA USA","acronym":"WiSec 2025"},"container-title":["18th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3734477.3734713","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T21:47:46Z","timestamp":1755899266000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3734477.3734713"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,30]]},"references-count":99,"alternative-id":["10.1145\/3734477.3734713","10.1145\/3734477"],"URL":"https:\/\/doi.org\/10.1145\/3734477.3734713","relation":{},"subject":[],"published":{"date-parts":[[2025,6,30]]},"assertion":[{"value":"2025-06-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}