{"id":"https://openalex.org/W7106215498","doi":"https://doi.org/10.1145/3730567.3764447","title":"The Developer, the RFC, and the Middlebox: An HTTP/2 Compliance Story","display_name":"The Developer, the RFC, and the Middlebox: An HTTP/2 Compliance Story","publication_year":2025,"publication_date":"2025-10-28","ids":{"openalex":"https://openalex.org/W7106215498","doi":"https://doi.org/10.1145/3730567.3764447"},"language":null,"primary_location":{"id":"doi:10.1145/3730567.3764447","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3730567.3764447","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM Internet Measurement Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3730567.3764447","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Mahmoud Attia","orcid":"https://orcid.org/0009-0005-3523-1938"},"institutions":[{"id":"https://openalex.org/I71920554","display_name":"King Abdullah University of Science and Technology","ror":"https://ror.org/01q3tbs38","country_code":"SA","type":"education","lineage":["https://openalex.org/I71920554"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Mahmoud Attia","raw_affiliation_strings":["KAUST, Thuwal, Saudi Arabia"],"raw_orcid":"https://orcid.org/0009-0005-3523-1938","affiliations":[{"raw_affiliation_string":"KAUST, Thuwal, Saudi Arabia","institution_ids":["https://openalex.org/I71920554"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Ilies Benhabbour","orcid":"https://orcid.org/0000-0002-0694-6767"},"institutions":[{"id":"https://openalex.org/I71920554","display_name":"King Abdullah University of Science and Technology","ror":"https://ror.org/01q3tbs38","country_code":"SA","type":"education","lineage":["https://openalex.org/I71920554"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Ilies Benhabbour","raw_affiliation_strings":["KAUST, Thuwal, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0002-0694-6767","affiliations":[{"raw_affiliation_string":"KAUST, Thuwal, Saudi Arabia","institution_ids":["https://openalex.org/I71920554"]}]},{"author_position":"last","author":{"id":null,"display_name":"Marc Dacier","orcid":"https://orcid.org/0000-0003-3206-2030"},"institutions":[{"id":"https://openalex.org/I71920554","display_name":"King Abdullah University of Science and Technology","ror":"https://ror.org/01q3tbs38","country_code":"SA","type":"education","lineage":["https://openalex.org/I71920554"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Marc Dacier","raw_affiliation_strings":["KAUST, Thuwal, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0003-3206-2030","affiliations":[{"raw_affiliation_string":"KAUST, Thuwal, Saudi Arabia","institution_ids":["https://openalex.org/I71920554"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I71920554"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.76421659,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"258","last_page":"273"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.4779999852180481,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.4779999852180481,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.1648000031709671,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.09489999711513519,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6539000272750854},{"id":"https://openalex.org/keywords/compliance","display_name":"Compliance (psychology)","score":0.6187000274658203},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.593999981880188},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.576200008392334},{"id":"https://openalex.org/keywords/suite","display_name":"Suite","score":0.5713000297546387},{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.5188999772071838}],"concepts":[{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6539000272750854},{"id":"https://openalex.org/C2781460075","wikidata":"https://www.wikidata.org/wiki/Q1399332","display_name":"Compliance (psychology)","level":2,"score":0.6187000274658203},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.593999981880188},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.576200008392334},{"id":"https://openalex.org/C79581498","wikidata":"https://www.wikidata.org/wiki/Q1367530","display_name":"Suite","level":2,"score":0.5713000297546387},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5404000282287598},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.5188999772071838},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.5016999840736389},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.4616999924182892},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.3970000147819519},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3301999866962433},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3093999922275543},{"id":"https://openalex.org/C83849155","wikidata":"https://www.wikidata.org/wiki/Q1472399","display_name":"Internet access","level":3,"score":0.3068999946117401},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.2962000072002411},{"id":"https://openalex.org/C115874739","wikidata":"https://www.wikidata.org/wiki/Q825377","display_name":"Critical path method","level":2,"score":0.29109999537467957},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.28870001435279846},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.2809999883174896},{"id":"https://openalex.org/C148043351","wikidata":"https://www.wikidata.org/wiki/Q4456944","display_name":"Current (fluid)","level":2,"score":0.2624000012874603},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.26089999079704285},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.2596000134944916}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3730567.3764447","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3730567.3764447","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM Internet Measurement Conference","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3730567.3764447","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3730567.3764447","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM Internet Measurement Conference","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1744779065","https://openalex.org/W1786840554","https://openalex.org/W1981800388","https://openalex.org/W2018501701","https://openalex.org/W2123942028","https://openalex.org/W2187970900","https://openalex.org/W2275661548","https://openalex.org/W2292658497","https://openalex.org/W2538556898","https://openalex.org/W2746419656","https://openalex.org/W2794138106","https://openalex.org/W2895212262","https://openalex.org/W2943820709","https://openalex.org/W3110509121","https://openalex.org/W3211708465","https://openalex.org/W3212665059","https://openalex.org/W4281622875","https://openalex.org/W4281737183","https://openalex.org/W4286297387","https://openalex.org/W4287849789","https://openalex.org/W4320025031","https://openalex.org/W4399151509","https://openalex.org/W4400121685","https://openalex.org/W4402957841","https://openalex.org/W4407179717"],"related_works":[],"abstract_inverted_index":{"The":[0],"current":[1,117],"Internet":[2,18],"landscape":[3,118],"is":[4,76,143],"shaped":[5],"by":[6,64],"intermediate":[7],"elements,":[8],"known":[9,77],"as":[10,48,105,107],"middleboxes,":[11],"which":[12],"disrupt":[13],"the":[14,17,25,28,35,51,95,116,129,154],"end-to-end":[15],"principle":[16],"was":[19],"originally":[20],"designed":[21],"around.":[22],"In":[23],"[5],":[24],"authors":[26],"examine":[27],"HTTP/1.1":[29],"~protocol":[30],"and":[31,100],"demonstrate":[32],"that":[33,75,140],"assessing":[34],"compliance":[36,132],"of":[37,88,119,131,153],"a":[38,68,86],"remote":[39],"implementation":[40],"with":[41,122],"respect":[42,123],"to":[43,78,81,124,147],"its":[44],"RFC":[45],"~is":[46],"challenging,":[47],"middleboxes":[49],"on":[50,61,66,98],"network":[52],"path":[53],"can":[54],"alter":[55],"application-layer":[56],"content.":[57],"This":[58,111],"paper":[59],"builds":[60],"their":[62],"work":[63,112],"focusing":[65],"HTTP/2,":[67],"more":[69,72,91],"efficient":[70],"yet":[71,157],"complex":[73],"protocol":[74],"be":[79],"vulnerable":[80],"denial-of-service":[82],"attacks.":[83],"We":[84,138],"create":[85],"suite":[87],"156":[89],"tests,":[90],"than":[92],"three":[93],"times":[94],"number":[96],"conducted":[97],"HTTP/1.1,":[99,151],"analyze":[101],"12":[102],"popular":[103],"proxies":[104,155],"well":[106],"3":[108],"cloud":[109],"proxies.":[110,137],"not":[113],"only":[114],"investigates":[115],"proxy":[120],"implementations":[121],"RFCs,":[125],"but":[126],"also":[127],"examines":[128],"evolution":[130],"over":[133],"time":[134],"in":[135,150],"local":[136],"show":[139],"while":[141],"there":[142],"an":[144],"improvement":[145],"compared":[146],"previous":[148],"results":[149],"none":[152],"are":[156],"fully":[158],"compliant.":[159]},"counts_by_year":[],"updated_date":"2025-11-23T05:13:22.807545","created_date":"2025-11-23T00:00:00"}
