{"id":"https://openalex.org/W4411552017","doi":"https://doi.org/10.1109/cscwd64889.2025.11033241","title":"QShield: Universal Defense Framework Against QUIC Client-Side Attacks with eBPF","display_name":"QShield: Universal Defense Framework Against QUIC Client-Side Attacks with eBPF","publication_year":2025,"publication_date":"2025-05-05","ids":{"openalex":"https://openalex.org/W4411552017","doi":"https://doi.org/10.1109/cscwd64889.2025.11033241"},"language":"en","primary_location":{"id":"doi:10.1109/cscwd64889.2025.11033241","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cscwd64889.2025.11033241","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 28th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081441019","display_name":"Yongqing Ni","orcid":"https://orcid.org/0000-0003-4876-589X"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yulin Ni","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China,100093"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China,100093","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060046826","display_name":"E Yuepeng","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuepeng E","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China,100093"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China,100093","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051863970","display_name":"Jingguo Ge","orcid":"https://orcid.org/0000-0002-6648-324X"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingguo Ge","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China,100093"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China,100093","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021066087","display_name":"Bingzhen Wu","orcid":"https://orcid.org/0009-0006-7267-839X"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bingzhen Wu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China,100093"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China,100093","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5081441019"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07821027,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"279","last_page":"285"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6844010353088379},{"id":"https://openalex.org/keywords/client-side","display_name":"Client-side","score":0.6601452231407166},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5429979562759399},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.4279301166534424},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.26726263761520386},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.255414754152298}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6844010353088379},{"id":"https://openalex.org/C202477664","wikidata":"https://www.wikidata.org/wiki/Q1352449","display_name":"Client-side","level":2,"score":0.6601452231407166},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5429979562759399},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.4279301166534424},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.26726263761520386},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.255414754152298}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cscwd64889.2025.11033241","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cscwd64889.2025.11033241","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 28th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1068030091","display_name":null,"funder_award_id":"2022YFB2901504","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1989454965","https://openalex.org/W2109767152","https://openalex.org/W2111427271","https://openalex.org/W2137145600","https://openalex.org/W2545990795","https://openalex.org/W2558483943","https://openalex.org/W2745034467","https://openalex.org/W2901983155","https://openalex.org/W2970091567","https://openalex.org/W3011176047","https://openalex.org/W3011196476","https://openalex.org/W3044526025","https://openalex.org/W3196394649","https://openalex.org/W4308086016","https://openalex.org/W4321204601","https://openalex.org/W4390204169","https://openalex.org/W4392388421","https://openalex.org/W4403017185","https://openalex.org/W6637696349","https://openalex.org/W6760417723"],"related_works":["https://openalex.org/W4302890120","https://openalex.org/W4402156186","https://openalex.org/W2159609636","https://openalex.org/W3196561854","https://openalex.org/W4410204431","https://openalex.org/W4288264855","https://openalex.org/W1995482645","https://openalex.org/W2767251466","https://openalex.org/W2800367972","https://openalex.org/W1979999931"],"abstract_inverted_index":{"QUIC":[0,50,59,137,240],"adapts":[1],"well":[2],"to":[3,8,45,66,98,116,143],"complex":[4],"network":[5,191],"situations":[6],"due":[7,97],"mechanisms":[9],"such":[10],"as":[11,92,155],"0/1-RTT":[12],"handshake":[13],"and":[14,82,96,147,167,202,228],"fast":[15],"retransmission.":[16],"It":[17],"has":[18],"now":[19],"become":[20],"a":[21,30,171],"new":[22],"star":[23],"in":[24],"the":[25,33,41,76,79,83,99,103,107,113,125,134,156,165,176,185,189,210,231,238],"era":[26],"of":[27,36,48,58,78,101,130,173,188],"IoT.":[28],"However,":[29,85],"phenomenon":[31],"reveals":[32],"security":[34,72,91],"risks":[35],"QUIC.":[37],"Studies":[38],"indicate":[39],"that":[40,206],"internet":[42],"is":[43,106],"exposed":[44],"an":[46,120],"average":[47],"four":[49],"flood":[51],"attacks":[52],"per":[53],"hour.":[54],"The":[55],"efficiency-oriented":[56],"features":[57],"introduce":[60],"vulnerabilities,":[61],"making":[62],"it":[63],"particularly":[64],"susceptible":[65],"attacks.":[67],"In":[68,175],"IoT":[69],"scenarios,":[70],"protocol":[71,80,192],"often":[73],"depends":[74],"on":[75,124,237],"design":[77,87],"itself":[81],"middlewares.":[84],"QUIC's":[86],"does":[88],"not":[89],"prioritize":[90],"its":[93],"highest":[94],"concern":[95],"ossification":[100],"middleboxes,":[102],"server-side":[104],"defense":[105],"only":[108],"option.":[109],"Therefore,":[110],"we":[111],"propose":[112],"QShield":[114,128,179,197,207],"framework":[115],"seek":[117],"breakthroughs":[118],"from":[119],"engineering":[121],"perspective.":[122],"Based":[123],"SDN":[126],"principles,":[127],"consists":[129],"three":[131],"parts.":[132],"At":[133],"application":[135],"layer,":[136,158,178],"applications":[138],"can":[139,208],"utilize":[140],"this":[141],"library":[142,153],"implement":[144],"strategy":[145],"development":[146],"enable":[148],"data":[149,162,177],"sharing.":[150],"A":[151],"user-space":[152],"operates":[154],"control":[157],"facilitating":[159],"real-time":[160],"bidirectional":[161],"transfers":[163],"between":[164],"kernel":[166],"user":[168],"space":[169],"via":[170],"suite":[172],"APIs.":[174],"core":[180],"blocks":[181],"attack":[182,216],"packets":[183,217],"at":[184],"lowest":[186],"layer":[187],"Linux":[190],"stack":[193],"using":[194],"eBPF":[195],"technology.":[196],"effectively":[198],"resists":[199],"client-side":[200],"attacks,":[201],"experimental":[203],"results":[204],"show":[205],"reduce":[209],"server's":[211],"CPU":[212],"usage":[213],"for":[214],"processing":[215],"by":[218,234],"nearly":[219],"50%,":[220],"thereby":[221],"essentially":[222],"restoring":[223],"normal":[224],"Queries":[225],"Per":[226],"Second":[227],"bandwidth,":[229],"reducing":[230],"bandwidth":[232],"amplification":[233],"about":[235],"68%":[236],"specific":[239],"implementation.":[241]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
