{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T07:51:13Z","timestamp":1725954673464},"reference-count":61,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T00:00:00Z","timestamp":1687132800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T00:00:00Z","timestamp":1687132800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,19]]},"DOI":"10.1109\/iwqos57198.2023.10188714","type":"proceedings-article","created":{"date-parts":[[2023,7,27]],"date-time":"2023-07-27T17:21:00Z","timestamp":1690478460000},"source":"Crossref","is-referenced-by-count":2,"title":["Vulnerabilities and Attacks of Inter-device Coordination in Programmable Networks"],"prefix":"10.1109","author":[{"given":"Hongyan","family":"Liu","sequence":"first","affiliation":[{"name":"Zhejiang University"}]},{"given":"Xiang","family":"Chen","sequence":"additional","affiliation":[{"name":"Zhejiang University"}]},{"given":"Yi","family":"Shen","sequence":"additional","affiliation":[{"name":"Zhejiang University"}]},{"given":"Qun","family":"Huang","sequence":"additional","affiliation":[{"name":"Peking University"}]},{"given":"Zhengyan","family":"Zhou","sequence":"additional","affiliation":[{"name":"Zhejiang University"}]},{"given":"Dong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Fuzhou University"}]},{"given":"Chunming","family":"Wu","sequence":"additional","affiliation":[{"name":"Zhejiang University"}]}],"member":"263","reference":[{"key":"ref13","first-page":"8","article-title":"Implementing aes encryption on programmable switches via scrambled lookup tables","author":"chen","year":"2020","journal-title":"SPIN"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626310"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23252"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3373360.3380843"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472905"},{"key":"ref59","article-title":"Charting the security landscape of programmable dataplanes","author":"agape","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP49622.2020.9259384"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3406214"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230582"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230548"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472887"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3482898.3483352"},{"key":"ref10","first-page":"29","article-title":"Twenty years after: Hierarchical {Core-Stateless} fair queueing","author":"yu","year":"2021","journal-title":"USENIX NSDI"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3185467.3185499"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405857"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP52444.2021.9651963"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3050233"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3405669.3405822"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2019.8888057"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24007"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3265723.3265731"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131375"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ANCS.2019.8901886"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN53031.2021.9665012"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787472"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1851275.1851192"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2016.17"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.11.023"},{"key":"ref49","first-page":"3829","article-title":"Jaqen: A {High-Performance}{Switch-Native} approach for detecting and mitigating volumetric {DDoS} attacks with programmable switches","author":"liu","year":"2021","journal-title":"Usenix Security"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230552"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796758"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405894"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132764"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342085"},{"key":"ref6","first-page":"3865","article-title":"Ripple: A programmable, decentralized {Link-Flooding} defense against adaptive adversaries","author":"xing","year":"2021","journal-title":"Usenix Security"},{"key":"ref5","first-page":"35","article-title":"Netchain: Scale-free sub-rtt coordination","author":"jin","year":"2018","journal-title":"USENIX NSDI"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796830"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737499"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3063772"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230544"},{"key":"ref31","year":"0","journal-title":"Tofino"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491222"},{"key":"ref33","year":"0","journal-title":"RFC Editor"},{"key":"ref32","year":"0","journal-title":"The university of washington ns-3 consortium"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405855"},{"key":"ref1","article-title":"P4 Language Consortium","year":"0","journal-title":"Specifications"},{"key":"ref39","year":"0","journal-title":"The caida traces"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934906"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2748159"},{"key":"ref23","article-title":"Bedrock: Programmable network support for secure rdma systems","author":"xing","year":"2021","journal-title":"Usenix Security"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243759"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23064"},{"key":"ref20","first-page":"571","article-title":"Flightplan: Dataplane disaggregation and placement for p4 programs","author":"sultana","year":"2021","journal-title":"USENIX NSDI"},{"key":"ref22","first-page":"4277","article-title":"{ReDMArk}: Bypassing {RDMA} security mechanisms","author":"rothenberger","year":"2021","journal-title":"Usenix Security"},{"key":"ref21","first-page":"991","article-title":"{LightGuardian}: A {Full-Visibility}, lightweight, in-band telemetry system using sketchlets","author":"zhao","year":"2021","journal-title":"USENIX NSDI"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23283"},{"key":"ref27","first-page":"3129","article-title":"Blind {In\/On-Path} attacks and applications to {VPNs}","author":"tolley","year":"2021","journal-title":"Usenix Security"},{"key":"ref29","first-page":"2197","article-title":"V-shuttle: Scalable and semantics-aware hyper-visor virtual device fuzzing","author":"pan","year":"2021","journal-title":"ACM CCS"},{"key":"ref60","article-title":"Order p4&#x2013;66: Characterizing and mitigating surreptitious programmable network device exploitation","author":"kassing","year":"2021","journal-title":"ArXiv Preprint"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354235"}],"event":{"name":"2023 IEEE\/ACM 31st International Symposium on Quality of Service (IWQoS)","location":"Orlando, FL, USA","start":{"date-parts":[[2023,6,19]]},"end":{"date-parts":[[2023,6,21]]}},"container-title":["2023 IEEE\/ACM 31st International Symposium on Quality of Service (IWQoS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10188660\/10188690\/10188714.pdf?arnumber=10188714","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,14]],"date-time":"2023-08-14T17:39:13Z","timestamp":1692034753000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10188714\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,19]]},"references-count":61,"URL":"https:\/\/doi.org\/10.1109\/iwqos57198.2023.10188714","relation":{},"subject":[],"published":{"date-parts":[[2023,6,19]]}}}