{"id":"https://openalex.org/W4402896943","doi":"https://doi.org/10.1109/iwqos61813.2024.10682845","title":"A Horizontal Study on the Mixed IPID Assignment Vulnerability in the Linux Ecosystem","display_name":"A Horizontal Study on the Mixed IPID Assignment Vulnerability in the Linux Ecosystem","publication_year":2024,"publication_date":"2024-06-19","ids":{"openalex":"https://openalex.org/W4402896943","doi":"https://doi.org/10.1109/iwqos61813.2024.10682845"},"language":"en","primary_location":{"id":"doi:10.1109/iwqos61813.2024.10682845","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iwqos61813.2024.10682845","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE/ACM 32nd International Symposium on Quality of Service (IWQoS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100759967","display_name":"Ao Wang","orcid":"https://orcid.org/0009-0000-5045-7357"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ao Wang","raw_affiliation_strings":["Southeast University"],"affiliations":[{"raw_affiliation_string":"Southeast University","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101743396","display_name":"Xuewei Feng","orcid":"https://orcid.org/0000-0003-3736-6623"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuewei Feng","raw_affiliation_strings":["Tsinghua University"],"affiliations":[{"raw_affiliation_string":"Tsinghua University","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100350165","display_name":"Qi Li","orcid":"https://orcid.org/0000-0001-8776-8730"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Li","raw_affiliation_strings":["Tsinghua University"],"affiliations":[{"raw_affiliation_string":"Tsinghua University","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016817843","display_name":"Yuxiang Yang","orcid":"https://orcid.org/0000-0002-1837-3628"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuxiang Yang","raw_affiliation_strings":["Tsinghua University"],"affiliations":[{"raw_affiliation_string":"Tsinghua University","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100665814","display_name":"Ke Xu","orcid":"https://orcid.org/0000-0003-2587-8517"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ke Xu","raw_affiliation_strings":["Tsinghua University"],"affiliations":[{"raw_affiliation_string":"Tsinghua University","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100759967"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.25705121,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.9108999967575073,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.9108999967575073,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.7241073250770569},{"id":"https://openalex.org/keywords/ecosystem","display_name":"Ecosystem","score":0.6466382741928101},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5870632529258728},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3351399898529053},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2691790461540222},{"id":"https://openalex.org/keywords/ecology","display_name":"Ecology","score":0.1463591754436493}],"concepts":[{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.7241073250770569},{"id":"https://openalex.org/C110872660","wikidata":"https://www.wikidata.org/wiki/Q37813","display_name":"Ecosystem","level":2,"score":0.6466382741928101},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5870632529258728},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3351399898529053},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2691790461540222},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.1463591754436493},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwqos61813.2024.10682845","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iwqos61813.2024.10682845","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE/ACM 32nd International Symposium on Quality of Service (IWQoS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322271","display_name":"Science Fund for Creative Research Groups","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W89759755","https://openalex.org/W91341907","https://openalex.org/W1920802909","https://openalex.org/W2041188073","https://openalex.org/W2070670160","https://openalex.org/W2085246080","https://openalex.org/W2133467782","https://openalex.org/W2147877969","https://openalex.org/W2274774510","https://openalex.org/W2904027722","https://openalex.org/W2962940036","https://openalex.org/W2965279841","https://openalex.org/W3004522518","https://openalex.org/W3007224029","https://openalex.org/W3082884087","https://openalex.org/W3099114729","https://openalex.org/W4225646281","https://openalex.org/W4235381699","https://openalex.org/W4307020316","https://openalex.org/W4324007097","https://openalex.org/W4385080273","https://openalex.org/W4391725267","https://openalex.org/W6603627386","https://openalex.org/W6640239109","https://openalex.org/W6677217071","https://openalex.org/W6681844275","https://openalex.org/W6689131603","https://openalex.org/W6720824080","https://openalex.org/W7019367677"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W2382290278","https://openalex.org/W4395014643"],"abstract_inverted_index":{"The":[0],"off-path":[1],"TCP":[2,35],"hijacking":[3,36],"attack":[4,37,49],"poses":[5,189],"a":[6,29,33,162,190],"significant":[7],"threat":[8,192],"to":[9,14,53,71,78,143,185,193],"Internet":[10],"security,":[11],"allowing":[12],"attackers":[13],"manipulate":[15],"various":[16,176],"upper-layer":[17],"applications":[18],"and":[19,90,114,178,188],"causing":[20],"severe":[21],"real-world":[22],"damage.":[23],"In":[24,99],"this":[25,80],"paper,":[26],"we":[27,103],"undertake":[28],"horizontal":[30,101],"study":[31,64,122,160],"on":[32,60,67],"critical":[34],"affecting":[38],"Linux":[39,119,126,173],"servers,":[40],"which":[41,72,180],"was":[42],"reported":[43],"in":[44,86,165,171],"November":[45],"2020":[46],"(CVE-2020-36516).":[47],"This":[48,121],"has":[50],"the":[51,61,69,73,87,96,106,110,118,151,166,169,172,182,194],"potential":[52,186],"compromise":[54],"over":[55],"20%":[56],"of":[57,109,117,168],"popular":[58],"websites":[59,155],"Internet.":[62,195],"Our":[63,159],"particularly":[65],"focuses":[66],"determining":[68],"extent":[70],"developed":[74],"stack":[75],"patches,":[76],"designed":[77],"address":[79],"vulnerability,":[81,111],"have":[82,93],"been":[83],"effectively":[84],"deployed":[85],"real":[88],"world":[89],"whether":[91],"they":[92],"successfully":[94],"mitigated":[95],"identified":[97],"attack.":[98],"our":[100],"study,":[102],"thoroughly":[104],"examine":[105],"current":[107],"status":[108],"covering":[112],"upstream":[113],"downstream":[115],"components":[116],"ecosystem.":[120],"encompasses":[123],"12":[124],"mainstream":[125],"distributions,":[127],"296":[128],"images":[129],"from":[130,138,156],"7":[131],"leading":[132],"cloud":[133],"vendors,":[134,147,179],"2.92":[135],"million":[136,154],"IPs":[137],"301":[139],"network":[140],"segments":[141],"belonging":[142],"6":[144],"major":[145],"CDN":[146],"as":[148,150],"well":[149],"top":[152],"1":[153],"3":[157],"datasets.":[158],"unveils":[161],"notable":[163],"disparity":[164],"patching":[167],"vulnerability":[170,183],"ecosystem,":[174],"spanning":[175],"ISPs":[177],"leaves":[181],"open":[184],"exploitation":[187],"serious":[191]},"counts_by_year":[],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
