{"id":"https://openalex.org/W4407950337","doi":"https://doi.org/10.1109/ton.2025.3543734","title":"StateShield: Real-Time Defenses Against Information Leakage Over Connectionless Protocols","display_name":"StateShield: Real-Time Defenses Against Information Leakage Over Connectionless Protocols","publication_year":2025,"publication_date":"2025-02-26","ids":{"openalex":"https://openalex.org/W4407950337","doi":"https://doi.org/10.1109/ton.2025.3543734"},"language":"en","primary_location":{"id":"doi:10.1109/ton.2025.3543734","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ton.2025.3543734","pdf_url":null,"source":{"id":"https://openalex.org/S5407042750","display_name":"IEEE Transactions on Networking","issn_l":"2998-4157","issn":["2998-4157"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Haibin Li","orcid":"https://orcid.org/0000-0003-1040-0262"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haibin Li","raw_affiliation_strings":["Department of Computer Science and Technology, Tsinghua University, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-1040-0262","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100350165","display_name":"Qi Li","orcid":"https://orcid.org/0000-0001-8776-8730"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Li","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0001-8776-8730","affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yingying Su","orcid":"https://orcid.org/0009-0009-2744-0624"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yingying Su","raw_affiliation_strings":["Zhongguancun Laboratory, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0009-2744-0624","affiliations":[{"raw_affiliation_string":"Zhongguancun Laboratory, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101743396","display_name":"Xuewei Feng","orcid":"https://orcid.org/0000-0003-3736-6623"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuewei Feng","raw_affiliation_strings":["Department of Computer Science and Technology, Tsinghua University, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-3736-6623","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072990224","display_name":"Chuanpu Fu","orcid":"https://orcid.org/0000-0003-4568-6125"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chuanpu Fu","raw_affiliation_strings":["Department of Computer Science and Technology, Tsinghua University, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-4568-6125","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100665814","display_name":"Ke Xu","orcid":"https://orcid.org/0000-0003-2587-8517"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ke Xu","raw_affiliation_strings":["Department of Computer Science and Technology, Tsinghua University, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-2587-8517","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":2.1733,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.87300759,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"33","issue":"4","first_page":"1701","last_page":"1716"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9897000193595886,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/connectionless-communication","display_name":"Connectionless communication","score":0.978857159614563},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.623768150806427},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.46906542778015137},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.29006877541542053},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.05412063002586365}],"concepts":[{"id":"https://openalex.org/C153043593","wikidata":"https://www.wikidata.org/wiki/Q727896","display_name":"Connectionless communication","level":3,"score":0.978857159614563},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.623768150806427},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.46906542778015137},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.29006877541542053},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.05412063002586365},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ton.2025.3543734","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ton.2025.3543734","pdf_url":null,"source":{"id":"https://openalex.org/S5407042750","display_name":"IEEE Transactions on Networking","issn_l":"2998-4157","issn":["2998-4157"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Networking","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3697979853","display_name":null,"funder_award_id":"2022YFB3102301","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G4818684285","display_name":null,"funder_award_id":"U22B2031","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W1471507","https://openalex.org/W25350463","https://openalex.org/W1516506771","https://openalex.org/W1534898272","https://openalex.org/W1549081716","https://openalex.org/W1581541814","https://openalex.org/W1739088677","https://openalex.org/W1983192439","https://openalex.org/W2008365755","https://openalex.org/W2034302520","https://openalex.org/W2080234606","https://openalex.org/W2139978474","https://openalex.org/W2151185692","https://openalex.org/W2164413344","https://openalex.org/W2167382913","https://openalex.org/W2288359499","https://openalex.org/W2304319822","https://openalex.org/W2793301585","https://openalex.org/W2963197901","https://openalex.org/W3008207353","https://openalex.org/W3047608117","https://openalex.org/W3082884087","https://openalex.org/W3128341305","https://openalex.org/W3136284412","https://openalex.org/W3173170122","https://openalex.org/W3212980631","https://openalex.org/W4212917135","https://openalex.org/W4225341227","https://openalex.org/W4230038347","https://openalex.org/W4236546623","https://openalex.org/W4288079251","https://openalex.org/W4290714064","https://openalex.org/W4290990900","https://openalex.org/W4324007097","https://openalex.org/W4360997383","https://openalex.org/W4366528422","https://openalex.org/W4385080328"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W1601419341","https://openalex.org/W3082361098","https://openalex.org/W1950579235","https://openalex.org/W2003521295","https://openalex.org/W2112920880","https://openalex.org/W2240817760","https://openalex.org/W2151332408"],"abstract_inverted_index":{"Connectionless":[0],"protocols":[1,34],"such":[2],"as":[3],"ICMP":[4],"and":[5,41,95,138,164,181,220],"UDP":[6,180],"are":[7,39,54,139],"manipulated":[8,67],"to":[9,43,56,64,178],"construct":[10],"novel":[11,175],"information":[12,86,99,135,183],"leakage":[13,87,100,136,184],"channels":[14,137,185],"by":[15,224],"which":[16,38],"attackers":[17,111],"can":[18,93,128,201],"disrupt":[19],"TCP":[20],"connections":[21],"or":[22,53],"leak":[23],"secret":[24],"information.":[25],"Existing":[26],"solutions":[27],"have":[28],"mainly":[29],"focused":[30],"on":[31,155],"repairing":[32],"vulnerable":[33],"through":[35],"OS":[36],"patches,":[37],"OS-specific":[40],"slow":[42],"deploy.":[44],"Other":[45],"traditional":[46],"defenses":[47],"either":[48],"cannot":[49],"cover":[50,129],"these":[51,72],"attacks":[52,88,101],"prone":[55],"incur":[57],"unintended":[58,104,190],"dropping":[59,105,191],"of":[60,106,117,133,152,192],"legitimate":[61,107,118,193,217],"packets":[62],"due":[63],"the":[65,114,150,169,214,221],"heavily":[66,112],"IP":[68,115],"spoofing":[69],"technique":[70],"in":[71,168,209],"attacks.":[73],"In":[74],"this":[75],"paper,":[76],"we":[77,123],"present":[78],"StateShield,":[79],"an":[80],"in-network,":[81],"real-time":[82],"defense":[83,166,176,222],"against":[84,97],"state-of-the-art":[85],"over":[89,216,232],"connectionless":[90,134,218,233],"protocols.":[91,234],"StateShield":[92,153,200,225],"detect":[94],"defend":[96],"various":[98],"without":[102,212],"incurring":[103],"traffic,":[108],"even":[109],"when":[110],"spoof":[113],"addresses":[116],"clients.":[119],"To":[120],"achieve":[121],"that,":[122],"propose":[124],"three":[125],"indicators":[126],"that":[127,199],"major":[130],"attack":[131,146,207],"vectors":[132],"effective":[140],"for":[141,162],"detecting":[142],"more":[143,204],"than":[144,205],"ten":[145,206],"variants.":[147],"We":[148,172],"design":[149],"architecture":[151],"based":[154],"programmable":[156],"switches,":[157],"with":[158],"efficient":[159],"data":[160,170],"structures":[161],"monitoring":[163],"on-demand":[165],"components":[167,177],"plane.":[171],"develop":[173],"two":[174],"mitigate":[179,203],"ICMP-based":[182],"automatically":[186],"while":[187],"achieving":[188],"minimal":[189],"packets.":[194],"Our":[195],"extensive":[196],"experiments":[197],"show":[198],"effectively":[202],"variants":[208],"real":[210],"time":[211],"hurting":[213],"services":[215],"packets,":[219],"provided":[223],"is":[226],"robust":[227],"under":[228],"high-intensive":[229],"background":[230],"traffic":[231]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2025-12-22T23:10:17.713674","created_date":"2025-10-10T00:00:00"}
