{"id":"https://openalex.org/W7125651767","doi":"https://doi.org/10.56553/popets-2026-0014","title":"QUICstep: Evaluating connection migration based QUIC censorship circumvention","display_name":"QUICstep: Evaluating connection migration based QUIC censorship circumvention","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7125651767","doi":"https://doi.org/10.56553/popets-2026-0014"},"language":null,"primary_location":{"id":"doi:10.56553/popets-2026-0014","is_oa":true,"landing_page_url":"https://doi.org/10.56553/popets-2026-0014","pdf_url":"https://petsymposium.org/popets/2026/popets-2026-0014.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://petsymposium.org/popets/2026/popets-2026-0014.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Seungju Lee","orcid":null},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Seungju Lee","raw_affiliation_strings":["Princeton University"],"affiliations":[{"raw_affiliation_string":"Princeton University","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123786173","display_name":"Mona Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mona Wang","raw_affiliation_strings":["Princeton University"],"affiliations":[{"raw_affiliation_string":"Princeton University","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027733168","display_name":"Watson Jia","orcid":null},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Watson Jia","raw_affiliation_strings":["Princeton University"],"affiliations":[{"raw_affiliation_string":"Princeton University","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123797445","display_name":"Qiang Wu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Qiang Wu","raw_affiliation_strings":["GFW Report"],"affiliations":[{"raw_affiliation_string":"GFW Report","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073735427","display_name":"Henry Birge-Lee","orcid":"https://orcid.org/0000-0001-7141-345X"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Henry Birge-Lee","raw_affiliation_strings":["Princeton University"],"affiliations":[{"raw_affiliation_string":"Princeton University","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123793590","display_name":"Liang Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Liang Wang","raw_affiliation_strings":["Princeton University"],"affiliations":[{"raw_affiliation_string":"Princeton University","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103814915","display_name":"Prateek Mittal","orcid":null},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Prateek Mittal","raw_affiliation_strings":["Princeton University"],"affiliations":[{"raw_affiliation_string":"Princeton University","institution_ids":["https://openalex.org/I20089843"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I20089843"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.23381513,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2026","issue":"1","first_page":"257","last_page":"272"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9904999732971191,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9904999732971191,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.00279999990016222,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.002300000051036477,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6748999953269958},{"id":"https://openalex.org/keywords/handshake","display_name":"Handshake","score":0.5791000127792358},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5336999893188477},{"id":"https://openalex.org/keywords/connection","display_name":"Connection (principal bundle)","score":0.5095999836921692},{"id":"https://openalex.org/keywords/censorship","display_name":"Censorship","score":0.44279998540878296},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.3804999887943268}],"concepts":[{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6748999953269958},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6532999873161316},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6061000227928162},{"id":"https://openalex.org/C2778000800","wikidata":"https://www.wikidata.org/wiki/Q830043","display_name":"Handshake","level":3,"score":0.5791000127792358},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5336999893188477},{"id":"https://openalex.org/C13355873","wikidata":"https://www.wikidata.org/wiki/Q2920850","display_name":"Connection (principal bundle)","level":2,"score":0.5095999836921692},{"id":"https://openalex.org/C52930066","wikidata":"https://www.wikidata.org/wiki/Q543","display_name":"Censorship","level":2,"score":0.44279998540878296},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39879998564720154},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.3804999887943268},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.3240000009536743},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3165999948978424},{"id":"https://openalex.org/C20574231","wikidata":"https://www.wikidata.org/wiki/Q844605","display_name":"Backward compatibility","level":2,"score":0.29350000619888306},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2669000029563904},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.26269999146461487},{"id":"https://openalex.org/C2779298391","wikidata":"https://www.wikidata.org/wiki/Q11189","display_name":"Proxy server","level":2,"score":0.25360000133514404}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.56553/popets-2026-0014","is_oa":true,"landing_page_url":"https://doi.org/10.56553/popets-2026-0014","pdf_url":"https://petsymposium.org/popets/2026/popets-2026-0014.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.56553/popets-2026-0014","is_oa":true,"landing_page_url":"https://doi.org/10.56553/popets-2026-0014","pdf_url":"https://petsymposium.org/popets/2026/popets-2026-0014.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.7849018573760986,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7125651767.pdf","grobid_xml":"https://content.openalex.org/works/W7125651767.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Internet":[0],"censors":[1],"often":[2],"rely":[3],"on":[4,166],"information":[5],"in":[6,69,125,155],"the":[7,19,22,30,39,55,156,167,190,195,200],"first":[8,40],"few":[9,41],"packets":[10,43],"of":[11,21,32,57,71,85,98,171],"a":[12,45,81,94,108,121,147,186],"connection":[13,35,58,152,163,175],"to":[14,37,106],"censor":[15],"unwanted":[16],"traffic.":[17],"With":[18],"rise":[20],"QUIC":[23,34,110,151,173,193],"transport":[24],"protocol,":[25],"prior":[26],"work":[27],"has":[28,63],"suggested":[29],"method":[31],"using":[33,44,144],"migration":[36,59,153,164,176],"conceal":[38],"handshake":[42],"different":[46],"network":[47],"path":[48],"(e.g.,":[49],"an":[50],"encrypted":[51,123,138],"proxy":[52],"channel).":[53],"However,":[54],"use":[56],"for":[60,137,149,162,189,199],"censorship":[61],"circumvention":[62],"not":[64,116],"been":[65],"explored":[66],"or":[67,73],"validated":[68],"terms":[70],"feasibility":[72],"performance.":[74],"We":[75,92,113,141],"bridge":[76],"this":[77,86],"gap":[78],"by":[79],"providing":[80],"rigorous":[82],"quantitative":[83],"evaluation":[84],"approach":[87],"that":[88,102,115,130,160,182],"we":[89,180],"name":[90],"QUICstep.":[91],"develop":[93],"lightweight,":[95],"application-agnostic":[96],"prototype":[97],"QUICstep":[99,103,119,145,183],"and":[100,158,174],"demonstrate":[101],"is":[104,165,178,194],"able":[105],"circumvent":[107],"real-world":[109],"SNI":[111],"censor.":[112],"find":[114],"only":[117],"does":[118],"outperform":[120],"fully":[122],"channel":[124,139],"diverse":[126],"settings,":[127],"but":[128],"also":[129,142],"it":[131],"can":[132,184],"significantly":[133],"reduce":[134],"traffic":[135],"load":[136],"providers.":[140],"propose":[143],"as":[146,170],"tool":[148,188],"measuring":[150],"support":[154,161,177],"wild":[157],"show":[159],"rise.":[168],"While":[169],"now":[172],"limited,":[179],"envision":[181],"be":[185],"useful":[187],"future":[191],"where":[192],"de":[196],"facto":[197],"norm":[198],"Internet.":[201]},"counts_by_year":[],"updated_date":"2026-03-25T23:56:10.502304","created_date":"2026-01-26T00:00:00"}
