{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T07:02:42Z","timestamp":1760598162797},"reference-count":47,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T00:00:00Z","timestamp":1656288000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T00:00:00Z","timestamp":1656288000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,27]]},"DOI":"10.1109\/netsoft54395.2022.9844121","type":"proceedings-article","created":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T19:34:09Z","timestamp":1659555249000},"page":"411-419","source":"Crossref","is-referenced-by-count":2,"title":["Investigating the Vulnerability of Programmable Data Planes to Static Analysis-Guided Attacks"],"prefix":"10.1109","author":[{"given":"Conor","family":"Black","sequence":"first","affiliation":[{"name":"Queen&#x2019;s University Belfast,Centre for Secure Information Technologies,Belfast,N. Ireland"}]},{"given":"Sandra","family":"Scott-Hayward","sequence":"additional","affiliation":[{"name":"Queen&#x2019;s University Belfast,Centre for Secure Information Technologies,Belfast,N. Ireland"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3185467.3185468"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108174"},{"journal-title":"Bounded loops in BPF for the 5 3 kernel","year":"2019","author":"rybczynska","key":"ref33"},{"key":"ref32","article-title":"Gauntlet: Finding bugs in compilers for programmable packet processing","author":"ruffy","year":"2020","journal-title":"14th USENIX Symposium on Operating Systems Design and Implementation (OSD? 20)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3485730.3494114"},{"key":"ref30","article-title":"Automated Verification of Network Function Binaries","author":"pirelli","year":"2022","journal-title":"19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22)"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3464994.3464996"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787508"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3192366.3192418"},{"journal-title":"Cloud Snooper Attack Bypasses AWS Security Measures","year":"2020","author":"shevchenko","key":"ref34"},{"journal-title":"Cisco Annual Internet Report (2018-2023)","year":"2020","key":"ref10"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7511197"},{"key":"ref11","article-title":"Killing the myth of Cisco IOS diversity","author":"cui","year":"2011","journal-title":"USENIX Worshop on Offensive Technologies"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"ref13","article-title":"BUZZ: Testing Context-Dependent Policies in Stateful Networks","author":"fayaz","year":"2016","journal-title":"13th USENIX Symposium on Networked Systems Design and Implementation (NSDI16)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314590"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.23919\/IFIPNetworking52078.2021.9472782"},{"journal-title":"P4 Tutorial Firewall","year":"2019","author":"ibanez","key":"ref16"},{"journal-title":"Tofino","year":"2018","key":"ref17"},{"key":"ref18","article-title":"Programmable In-Network Security for Context-aware BYOD Policies","author":"kang","year":"2020","journal-title":"29th USENIX Security Symposium"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2010.5452024"},{"journal-title":"Website","article-title":"P4 Runtime Specification","year":"2017","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3445968.3452092"},{"journal-title":"Simple Firewall","year":"2020","author":"osinski","key":"ref27"},{"key":"ref3","article-title":"Leveraging Stratum and Tofino Fast Refresh for Software Upgrades","author":"bas","year":"2018","journal-title":"ONF Connect"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2014.6926000"},{"key":"ref29","article-title":"Staying persistent in software defined networks","author":"pickett","year":"2015","journal-title":"Black Hat Briefings"},{"key":"ref5","first-page":"508","article-title":"Adversarial Exploitation of P4 Data Planes","author":"black","year":"2021","journal-title":"In 2021 IFIP\/IEEE International Symposium on Integrated Network Management (IM)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3386367.3431313"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2891891"},{"key":"ref9","article-title":"BPF Map Tracing: Hot Updates of Stateful Programs","author":"burton","year":"2021","journal-title":"Linux Plumbers Conference"},{"journal-title":"eBPF Documentation","year":"0","key":"ref1"},{"journal-title":"DDoS Mitigation","year":"2018","author":"zhang","key":"ref46"},{"key":"ref20","article-title":"MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation","author":"liu","year":"2021","journal-title":"In USENIX Security Symposium"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN48450.2020.9059298"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/HPSR.2018.8850758"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3326285.3329040"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230582"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693084"},{"journal-title":"Chinese State-Sponsored Actors Exploit Publicly Known Vulnerabilities","year":"2020","key":"ref24"},{"key":"ref41","article-title":"From hack to elaborate technique&#x2014;a survey on binary rewriting","author":"wenzl","year":"2019","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"ref23","article-title":"A proof-carrying approach to building correct and flexible BPF verifiers","author":"nelson","year":"2021","journal-title":"Linux Plumbers Conference"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2866469"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3055900"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1050849.1050865"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ANCS.2019.8901885"}],"event":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","start":{"date-parts":[[2022,6,27]]},"location":"Milan, Italy","end":{"date-parts":[[2022,7,1]]}},"container-title":["2022 IEEE 8th International Conference on Network Softwarization (NetSoft)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9844017\/9844019\/09844121.pdf?arnumber=9844121","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,22]],"date-time":"2022-08-22T20:02:15Z","timestamp":1661198535000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9844121\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,27]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/netsoft54395.2022.9844121","relation":{},"subject":[],"published":{"date-parts":[[2022,6,27]]}}}