Publication:
Demo: Security Vulnerabilities and Network Service Disruptions with HTTP/3

cris.author.scopus-author-id59512918500
cris.author.scopus-author-id57191339154
cris.lastimport.scopus2026-04-07T06:02:24Z
cris.sourceId21101269365
cris.virtual.departmentComputer Science and Engineering
cris.virtual.orcid0000-0003-4727-6875
cris.virtualsource.departmentfd643ee7-073d-4633-a049-521e75c4d7cf
cris.virtualsource.orcidfd643ee7-073d-4633-a049-521e75c4d7cf
dc.author.categoryM. Tech.
dc.author.categoryFaculty
dc.bid8901
dc.contributor.affiliationIndian Institute of Technology Gandhinagar
dc.contributor.affiliationIndian Institute of Technology Gandhinagar
dc.contributor.affiliationIndian Institute of Technology Gandhinagar
dc.contributor.authorSelvam, Hari Hara Sudhan
dc.contributor.authorKulkarni, Sameer G.
dc.coverage.spatialFrance
dc.date.accessioned2025-08-31T19:25:03Z
dc.date.accessioned2026-04-02T16:53:37Z
dc.date.available2025-08-31T19:25:03Z
dc.date.issued2024-01-01
dc.description.abstractIn this work, we meticulously examine and demonstrate the security vulnerabilities associated with HTTP/3 and the adversities it brings to the operations of the network services (middleboxes). HTTP/3 is built using the new QUIC transport protocol to introduce enhancements to web communication by leveraging the QUIC protocols secure and privacy focused features such as connection migration, passive latency monitoring, congestion control, flow control, and support for multiple streams. In the course of our investigation, we unveil unintended vulnerabilities inherent in the QUIC protocol. Specifically, we demonstrate that the passive latency monitoring feature in the QUIC protocol exposes a covert channel that can be exploited for reliable covert communication. Furthermore, we reveal that the QUIC connection migration feature disrupts the functionality of critical network functions, such as NAT/NAPT, leading to a denial-of-service vulnerability.We provide a practical demonstration of this denial-of-service vulnerability in a NAT network. Our findings highlight the need for comprehensive and robust security solutions to address the outlined vulnerabilities in HTTP/3.
dc.identifier.citedby0
dc.identifier.coverDisplayDate2024
dc.identifier.crossref_citation0
dc.identifier.doi10.1109/LCN60385.2024.10639685
dc.identifier.isbn[9798350388008]
dc.identifier.scopus2-s2.0-85214901105
dc.identifier.upurlnull
dc.identifier.urihttps://repository.iitgn.ac.in/handle/IITG2025/28472
dc.language.isoen_US
dc.relation.ispartofIEEE 49th Conference on Local Computer Networks (LCN 2024)
dc.relation.ispartofseriesIEEE 49th Conference on Local Computer Networks (LCN 2024)
dc.right0
dc.rightsfalse
dc.sourceIEEE 49th Conference on Local Computer Networks (LCN 2024)
dc.subjectCovert Channel | Denail of Service (DoS) | HTTP/3 | Loadbalancer | Middlebox | NAT/NAPT | QUIC | Security
dc.subject_scopusENG
dc.titleDemo: Security Vulnerabilities and Network Service Disruptions with HTTP/3
dc.typeConference Paper
dspace.entity.typePublication
oaire.venue.unpaywallclose
person.affiliation.cityGandhinagar
person.affiliation.countryIndia
person.affiliation.id60104341
person.identifier.scopus-author-id59512918500
person.identifier.scopus-author-id57191339154

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
8901.pdf
Size:
1.41 MB
Format:
Adobe Portable Document Format