{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:15:12Z","timestamp":1758845712507,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.23919\/tma.2017.8002912","type":"proceedings-article","created":{"date-parts":[[2017,8,7]],"date-time":"2017-08-07T16:31:20Z","timestamp":1502123480000},"page":"1-9","source":"Crossref","is-referenced-by-count":9,"title":["Threats and surprises behind IPv6 extension headers"],"prefix":"10.23919","author":[{"given":"Luuk","family":"Hendriks","sequence":"first","affiliation":[]},{"given":"Petr","family":"Velan","sequence":"additional","affiliation":[]},{"given":"Ricardo de O.","family":"Schmidt","sequence":"additional","affiliation":[]},{"given":"Pieter-Tjerk","family":"de Boer","sequence":"additional","affiliation":[]},{"given":"Aiko","family":"Pras","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Operational Implications of IPv6 Packets with Extension Headers","year":"2016","author":"gont","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20305-3_6"},{"key":"ref12","article-title":"IPv6 Security: Attacks and Countermeasures in a Nutshell","author":"ullrich","year":"2014","journal-title":"USENIX WOOT"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6828880"},{"key":"ref14","first-page":"42","article-title":"GNU Parallel - The Command-Line Power Tool","volume":"36","author":"tange","year":"2011","journal-title":"LOGIN The USENIX Magazine"},{"key":"ref4","article-title":"RFC 5095: Deprecation of Type 0 Routing Headers in IPv6","author":"afilias","year":"2007","journal-title":"CSC\/FUNET"},{"journal-title":"Assigned Internet Protocol Number","year":"0","key":"ref3"},{"journal-title":"RFC 7112 Implications of Oversized IPv6 Header Chains","year":"2014","author":"gont","key":"ref6"},{"journal-title":"The Impact of Extension Headers on IPv6 Access Control Lists Real Life Use Cases","year":"2016","author":"atlasis","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2321898"},{"journal-title":"IP Flow Information Export (IPFIX) Entities","year":"0","key":"ref7"},{"journal-title":"RFC 2460 Internet Protocol Version 6 (IPv6) specification","year":"1998","author":"cisco","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7872"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5741152"}],"event":{"name":"2017 Network Traffic Measurement and Analysis Conference (TMA)","start":{"date-parts":[[2017,6,21]]},"location":"Dublin","end":{"date-parts":[[2017,6,23]]}},"container-title":["2017 Network Traffic Measurement and Analysis Conference (TMA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7999197\/8002894\/08002912.pdf?arnumber=8002912","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,3]],"date-time":"2020-02-03T21:42:31Z","timestamp":1580766151000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8002912\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":14,"URL":"https:\/\/doi.org\/10.23919\/tma.2017.8002912","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}