{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T20:58:47Z","timestamp":1761339527791},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319263618"},{"type":"electronic","value":"9783319263625"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26362-5_16","type":"book-chapter","created":{"date-parts":[[2015,10,26]],"date-time":"2015-10-26T10:10:45Z","timestamp":1445854245000},"page":"339-356","source":"Crossref","is-referenced-by-count":27,"title":["SDN Rootkits: Subverting Network Operating Systems of Software-Defined Networks"],"prefix":"10.1007","author":[{"given":"Christian","family":"R\u00f6pke","sequence":"first","affiliation":[]},{"given":"Thorsten","family":"Holz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,12]]},"reference":[{"key":"16_CR1","unstructured":"Ali, S.T., Sivaraman, V., Radford, A., Jha, S.: A Survey of Securing Networks using Software Defined Networking. To appear in IEEE Transactions on Reliability"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Bodden, E., Sewe, A., Sinschek, J., Oueslati, H., Mezini, M.: Taming reflection: aiding static analysis in the presence of reflection and custom class loaders. In: International Conference on Software Engineering, ICSE (2011)","DOI":"10.1145\/1985793.1985827"},{"key":"16_CR3","unstructured":"Canini, M., Venzano, D., Peresini, P., Kostic, D., Rexford, J.: A NICE way to test openflow applications. In: USENIX Symposium on Networked Systems Design and Implementation (2012)"},{"key":"16_CR4","unstructured":"Cisco. Extensible Network Controller. \n                      www.cisco.com\/c\/en\/us\/products\/collateral\/cloud-systems-management\/extensible-network-controller-xnc\/data_sheet_c78-729453.html"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Dhawan, M., Poddar, R., Mahajan, K., Mann, V.: SPHINX: detecting security attacks in software-defined networks. In: Symposium on Network and Distributed System Security (2015)","DOI":"10.14722\/ndss.2015.23064"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Feamster, N., Rexford, J., Zegura, E.: The Road to SDN. In: ACM Queue: Tomorrow\u2019s Computing Today (2013)","DOI":"10.1145\/2559899.2560327"},{"key":"16_CR7","unstructured":"Floodlight. \n                      www.floodlight.openflowhub.org"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Gude, N., Koponen, T., Pettit, J., Pfaff, B., Casado, M., McKeown, N., Shenker, S.: NOX: towards an operating system for networks. In: ACM SIGCOMM Computer Communication Review (2008)","DOI":"10.1145\/1384609.1384625"},{"key":"16_CR9","unstructured":"Hewlett-Packard. HP VAN SDN Controller. \n                      www.hp.com"},{"key":"16_CR10","unstructured":"Hewlett-Packard: HP Open Ecosystem Breaks Down Barriers to Software-Defined Networking (2013). \n                      www.hp.com"},{"key":"16_CR11","unstructured":"H\u00f6lzle, U.: OpenFlow @ Google. Open Networking Summit (2012)"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Hong, S., Xu, L., Wang, H., Gu, G.: Poisoning network visibility in software-defined networks: new attacks and countermeasures. In: Symposium on Network and Distributed System Security (2015)","DOI":"10.14722\/ndss.2015.23283"},{"key":"16_CR13","unstructured":"Kazemian, P., Chang, M., Zeng, H., Varghese, G., McKeown, N., Whyte, S.: Real time network policy checking using header space analysis. In: USENIX Symposium on Networked Systems Design and Implementation (2013)"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Khurshid, A., Zhou, W., Caesar, M., Godfrey, P.: VeriFlow: verifying network-wide invariants in real time. In: USENIX Symposium on Networked Systems Design and Implementation (2013)","DOI":"10.1145\/2342441.2342452"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Kreutz, D., Ramos, F., Verissimo, P.: Towards secure and dependable software-defined networks. In: ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (2013)","DOI":"10.1145\/2491185.2491199"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Kreutz, D., Ramos, F.M., Verissimo, P., Rothenberg, C.E., Azodolmolky, S., Uhlig, S.: Software-defined networking: a comprehensive survey. In: Proceedings of the IEEE (2015)","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Lantz, B., Heller, B., McKeown, N.: A network in a laptop: rapid prototyping for software-defined networks. In: ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (2010)","DOI":"10.1145\/1868447.1868466"},{"key":"16_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/11575467_11","volume-title":"Programming Languages and Systems","author":"B Livshits","year":"2005","unstructured":"Livshits, B., Whaley, J., Lam, M.S.: Reflection analysis for java. In: Yi, K. (ed.) APLAS 2005. LNCS, vol. 3780, pp. 139\u2013160. Springer, Heidelberg (2005)"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., Shenker, S.,Turner, J.: OpenFlow: enabling innovation in campus networks. In: ACM SIGCOMM Computer Communication Review (2008)","DOI":"10.1145\/1355734.1355746"},{"key":"16_CR20","unstructured":"Networks, J.: Whats behind network downtime? (2008). \n                      www-935.ibm.com\/services\/au\/gts\/pdf\/200249.pdf"},{"key":"16_CR21","unstructured":"McKeown, N.: How SDN will shape networking. Open Networking Summit (2011)"},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"Nunes, B.A.A., Mendonca, M., Nguyen, X.-N., Obraczka, K., Turletti, T.: A survey of software-defined networking: past, present, and future of programmable networks. In: IEEE Communications Surveys & Tutorials (2014)","DOI":"10.1109\/SURV.2014.012214.00180"},{"key":"16_CR23","unstructured":"ONF. Open Networking Foundation. \n                      www.opennetworking.org"},{"key":"16_CR24","unstructured":"ONOS. Open Network Operating System. \n                      http:\/\/onosproject.org\/"},{"key":"16_CR25","unstructured":"Open Networking Foundation: Software-Defined Networking: The New Norm for Networks. White paper, Open Networking Foundation (2012)"},{"key":"16_CR26","unstructured":"Oracle. Sun Alert 1000560.1. \n                      www.oracle.com\n                      \n                     (last update in 2008)"},{"key":"16_CR27","unstructured":"Oracle. Sun Alert 1000148.1. \n                      www.oracle.com\n                      \n                    , (last update in 2010)"},{"key":"16_CR28","doi-asserted-by":"crossref","unstructured":"Porras, P., Cheung, S., Fong, M., Skinner, K., Yegneswaran, V.: Securing the software-defined network control layer. In: Symposium on Network and Distributed System Security (2015)","DOI":"10.14722\/ndss.2015.23222"},{"key":"16_CR29","doi-asserted-by":"crossref","unstructured":"Porras, P., Shin, S., Yegneswaran, V., Fong, M., Tyson, M., Gu, G.: A security enforcement kernel for openflow networks. In: ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (2012)","DOI":"10.1145\/2342441.2342466"},{"key":"16_CR30","doi-asserted-by":"crossref","unstructured":"R\u00f6pke, C., Holz, T.: Retaining control over sdn network services. In: International Conference on Networked Systems (2015)","DOI":"10.1109\/NetSys.2015.7089082"},{"key":"16_CR31","unstructured":"Shin, S., Porras, P., Yegneswaran, V., Fong, M., Gu, G., Tyson, M.: FRESCO: modular composable security services for software-defined networks. In: Symposium on Network and Distributed System Security (2013)"},{"key":"16_CR32","doi-asserted-by":"crossref","unstructured":"Shin, S., Song, Y., Lee, T., Lee, S., Chung, J., Porras, P., Yegneswaran, V., Noh, J., Kang, B.B.: Rosemary: a robust, secure, and high-performance network operating system. In: ACM SIGSAC Conference on Computer and Communications Security (2014)","DOI":"10.1145\/2660267.2660353"},{"key":"16_CR33","doi-asserted-by":"crossref","unstructured":"Shin, S., Yegneswaran, V., Porras, P., Gu, G.: AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks. In: ACM Conference on Computer and Communications Security (2013)","DOI":"10.1145\/2508859.2516684"},{"key":"16_CR34","unstructured":"Vogl, S., Gawlik, R., Garmany, B., Kittel, T., Pfoh, J., Eckert, C., Holz, T.: Dynamic hooks: hiding control flow changes within non-control data. In: USENIX Security Symposium (2014)"},{"key":"16_CR35","doi-asserted-by":"crossref","unstructured":"Wen, X., Chen, Y., Hu, C., Shi, C., Wang, Y.: Towards a secure controller platform for OpenFlow applications. In: ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (2013)","DOI":"10.1145\/2491185.2491212"}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions, and Defenses"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26362-5_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T05:22:58Z","timestamp":1559280178000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26362-5_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319263618","9783319263625"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26362-5_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}