{"id":112852,"date":"2014-12-29T16:46:39","date_gmt":"2014-12-29T07:46:39","guid":{"rendered":"http:\/\/175.125.95.178\/research-achieve\/12852\/"},"modified":"2026-04-13T18:03:59","modified_gmt":"2026-04-13T09:03:59","slug":"12852","status":"publish","type":"research-achieve","link":"http:\/\/ee.presscat.kr\/en\/research-achieve\/12852\/","title":{"rendered":"ACM S3 2013 Best Paper Award"},"content":{"rendered":"<p><span style=\"font-size: 11pt\">PhD students Younghwan Go, Shinae Woo (advisor : KyoungSoo Park), Prof. KyoungSoo Park and Yongdae Kim received BEST PAPER AWARD from <\/span><font color=\"#000000\" size=\"3\"><span style=\"font-size: 11pt\">The 5th Annual Wireless of the Students, by the Students, for      the Students Workshop <\/span><\/font><font color=\"#000000\"><span style=\"font-size: 11pt\"> (ACM S3 2013) <\/span><span style=\"font-size: 11pt\">on Septermber 30 2013 with paper titled &#8220;<\/span><\/font><font color=\"#000000\" size=\"3\"><span style=\"font-size: 11pt\">Impact of Malicious TCP Retransmission on Cellular Traffic      Accounting&#8221;<\/span><\/font><\/p>\n<p style=\"text-align: center\"><img decoding=\"async\" src=\"\/upload\/board\/esub07_08_01\/20141229\/20141229164519743.jpg\" class=\"txc-image\" alt=\"\" title=\"\"><\/p>\n<p>ABSTRACT<br \/>Current cellular network architecture charges users based on the consumed IP traffic in byte-level. While the users receive payload at the application layer, there exists a transport layer (TCP) that can cause additional data consumption due to the retransmission that guarantees a reliable delivery. In this paper, we examine the accounting policies regarding the TCP\u2019s retransmission in five major cellular ISPs in the U.S. and South Korea and show that the current implementation is either vulnerable to billing inflation or allows the subscribers to bypass the charging. Two ISPs account for all retransmission packets, allowing attackers to inflate a victim\u2019s bill by intentionally retransmitting packets. Three ISPs exclude the retransmission packets from the user\u2019s bill thus allowing tunneling through TCP retransmissions. We present real-world attack scenarios where \u201cusage-inflation\u201d and \u201cfree-riding\u201d attacks are plausible.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>544<\/p>\n","protected":false},"featured_media":0,"template":"","research_category":[],"class_list":["post-112852","research-achieve","type-research-achieve","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/research-achieve\/112852","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/research-achieve"}],"about":[{"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/types\/research-achieve"}],"wp:attachment":[{"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/media?parent=112852"}],"wp:term":[{"taxonomy":"research_category","embeddable":true,"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/research_category?post=112852"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}