{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T10:04:17Z","timestamp":1766484257736,"version":"3.37.3"},"reference-count":122,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"\u201cPioneer\u201d and \u201cLeading Goose\u201d Research and Development Program of Zhejiang Province","award":["2022C01078"],"award-info":[{"award-number":["2022C01078"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902362","62172007"],"award-info":[{"award-number":["61902362","62172007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Provincial Key Research and Development Program of Zhejiang","award":["2021C01032"],"award-info":[{"award-number":["2021C01032"]}]},{"DOI":"10.13039\/501100001809","name":"Joint Funds of the National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U20A20179"],"award-info":[{"award-number":["U20A20179"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Yangzhou Science and Technology Plan Project","award":["SSX2023000034"],"award-info":[{"award-number":["SSX2023000034"]}]},{"DOI":"10.13039\/501100007062","name":"Self-Developing Experimental Instrument and Equipment Project of Yangzhou University","doi-asserted-by":"publisher","award":["zzyq2023zy06"],"award-info":[{"award-number":["zzyq2023zy06"]}],"id":[{"id":"10.13039\/501100007062","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Major Science and Technology Infrastructure Project of Zhijiang Laboratory"},{"DOI":"10.13039\/501100002383","name":"King Saud University, Riyadh, Saudi Arabia","doi-asserted-by":"publisher","award":["RSP2023R12"],"award-info":[{"award-number":["RSP2023R12"]}],"id":[{"id":"10.13039\/501100002383","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/tifs.2023.3315128","type":"journal-article","created":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T17:31:47Z","timestamp":1694626307000},"page":"5832-5847","source":"Crossref","is-referenced-by-count":6,"title":["Stalker Attacks: Imperceptibly Dropping Sketch Measurement Accuracy on Programmable Switches"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0249-9664","authenticated-orcid":false,"given":"Xiang","family":"Chen","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7753-0294","authenticated-orcid":false,"given":"Hongyan","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2387-6131","authenticated-orcid":false,"given":"Qun","family":"Huang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6379-0244","authenticated-orcid":false,"given":"Dong","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Big Data and the Zhicheng College, Fuzhou University, Fuzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8008-2805","authenticated-orcid":false,"given":"Haifeng","family":"Zhou","sequence":"additional","affiliation":[{"name":"College of Control Science and Engineering, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7958-9687","authenticated-orcid":false,"given":"Chunming","family":"Wu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7966-4488","authenticated-orcid":false,"given":"Xuan","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Information Engineering (College of Artificial Intelligence), Yangzhou University, Yangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6636-0533","authenticated-orcid":false,"given":"Muhammad Khurram","family":"Khan","sequence":"additional","affiliation":[{"name":"Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11599-3_14"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6553676"},{"key":"ref59","first-page":"1","article-title":"How to detect a compromised SDN switch","author":"chi","year":"2015","journal-title":"Proc 1st IEEE Conf Netw Softwarization (NetSoft)"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.14722\/sent.2014.23002"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043584"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294279"},{"journal-title":"SDN switches aren't hard to compromise researcher says","year":"2023","key":"ref55"},{"key":"ref54","first-page":"1","article-title":"Persistent OSPF attacks","author":"nakibly","year":"2012","journal-title":"Proc NDSS"},{"key":"ref51","first-page":"1","article-title":"Tesseract: A 4D network control plane","author":"yan","year":"2007","journal-title":"Proc USENIX NSDI"},{"journal-title":"CVE-2017-12340","year":"2023","key":"ref50"},{"journal-title":"CVE-2021-1487","year":"2023","key":"ref46"},{"journal-title":"CVE-2021-1541","year":"2023","key":"ref45"},{"journal-title":"CVE-2021-1376","year":"2023","key":"ref48"},{"journal-title":"CVE-2021-1451","year":"2023","key":"ref47"},{"journal-title":"CVE-2021-1571","year":"2023","key":"ref42"},{"journal-title":"CVE-2021-1584","year":"2023","key":"ref41"},{"journal-title":"CVE-2021-1542","year":"2023","key":"ref44"},{"journal-title":"CVE-2021-1543","year":"2023","key":"ref43"},{"journal-title":"CVE-2019-1649","year":"2023","key":"ref49"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2452376.2452456"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098831"},{"key":"ref9","first-page":"1","article-title":"SketchLib: Enabling efficient sketch-based monitoring on programmable switches","author":"namkung","year":"2022","journal-title":"Proc USENIX NSDI"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737499"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230544"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2716281.2836099"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934906"},{"key":"ref100","first-page":"683","article-title":"Dataplane equivalence and its applications","author":"dragos","year":"2019","journal-title":"Proc USENIX NSDI"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405888"},{"journal-title":"CVE-2017-3765","year":"2023","key":"ref40"},{"journal-title":"CVE-2020-3416","year":"2023","key":"ref35"},{"journal-title":"CVE-2020-3513","year":"2023","key":"ref34"},{"journal-title":"CVE-2018-0296","year":"2023","key":"ref37"},{"journal-title":"CVE-2020-3207","year":"2023","key":"ref36"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"journal-title":"Tofino","year":"2023","key":"ref30"},{"journal-title":"The caida internet traces","year":"2023","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505212"},{"journal-title":"CVE-2017-3883","year":"2023","key":"ref39"},{"journal-title":"CVE-2018-0251","year":"2023","key":"ref38"},{"journal-title":"Tofino","year":"2023","key":"ref24"},{"key":"ref23","first-page":"691","article-title":"sRDMA&#x2013;efficient NIC-based authentication and encryption for remote direct memory access","author":"taranov","year":"2020","journal-title":"Proc USENIX ATC"},{"journal-title":"report Facebook","year":"2023","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230559"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8485861"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24203"},{"key":"ref21","article-title":"DTLS performance&#x2014;How expensive is security?","author":"gallenm\u00fcller","year":"2019","journal-title":"arXiv 1904 11423"},{"journal-title":"google report","year":"2023","key":"ref28"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342085"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486011"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP49622.2020.9259414"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP49622.2020.9259415"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00017"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2859483"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230582"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405877"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230548"},{"key":"ref10","first-page":"1027","article-title":"Toward nearly-zero-error sketching via compressive sensing","author":"huang","year":"2021","journal-title":"Proc USENIX NSDI"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1145\/3281411.3281421"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2685596"},{"key":"ref16","article-title":"Order P4-66: Characterizing and mitigating surreptitious programmable network device exploitation","author":"kassing","year":"2021","journal-title":"arXiv 2103 16437"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2396556.2396598"},{"key":"ref18","article-title":"Charting the security landscape of programmable dataplanes","author":"agape","year":"2018","journal-title":"arXiv 1807 00128"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3063772"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/90.851975"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626316"},{"key":"ref94","first-page":"29","article-title":"Software defined traffic measurement with OpenSketch","author":"yu","year":"2013","journal-title":"Proc USENIX NSDI"},{"journal-title":"Pktgen","year":"2023","key":"ref91"},{"key":"ref90","first-page":"2005","article-title":"Towards an algorithmic theory of compressed sensing","volume":"25","author":"cormode","year":"2005"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851192"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787472"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2748159"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592576"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879175"},{"key":"ref82","first-page":"143","article-title":"DistCache: Provable load balancing for large-scale storage systems with distributed caching","author":"liu","year":"2019","journal-title":"Proc USENIX FAST"},{"key":"ref81","first-page":"35","article-title":"NetChain: Scale-free sub-RTT coordination","author":"jin","year":"2018","journal-title":"Proc USENIX NSDI"},{"key":"ref84","first-page":"451","article-title":"Attacking the brain: Races in the SDN control plane","author":"xu","year":"2017","journal-title":"Proc USENIX Security07"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.20"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132764"},{"journal-title":"HotNets-XVI Dialogue In-Network Computation is a Dumb Idea Whose Time has Come","year":"2023","key":"ref79"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/3185467.3185475"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3406214"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934879"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1145\/3373360.3380843"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488772"},{"journal-title":"gRPC","year":"2023","key":"ref75"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/3185467.3185497"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098839"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/3326285.3329040"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/3482898.3483359"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1145\/3386367.3431313"},{"journal-title":"OpenSSL","year":"2023","key":"ref76"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446764"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45465-9_59"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3386367.3431309"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488732"},{"journal-title":"Joint U S &#x2014;U K Statement on Malicious Cyber Activity Carried Out by Russian Government","year":"2023","key":"ref70"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2971213"},{"key":"ref73","first-page":"1","article-title":"New streaming algorithms for fast detection of superspreaders","author":"venkataraman","year":"2005","journal-title":"Proc NDSS"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23457"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.3034890"},{"journal-title":"Postmortem of a Compromised MikroTik Router","year":"2023","key":"ref68"},{"key":"ref119","first-page":"3829","article-title":"Jaqen: A high-performance switch-native approach for detecting and mitigating volumetric DDoS attacks with programmable switches","author":"liu","year":"2021","journal-title":"Proc USENIX Security07"},{"journal-title":"Cisco Patches Critical Switch Flaws","year":"2023","key":"ref67"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24007"},{"journal-title":"Unpatched Routers Being Used to Build Vast Proxy Army Spy on Networks","year":"2023","key":"ref69"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1145\/3132465.3132474"},{"journal-title":"200 000 Cisco Switches Were Hacked","year":"2023","key":"ref64"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354235"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.281"},{"key":"ref116","first-page":"161","article-title":"Blink: Fast connectivity recovery entirely in the data plane","author":"holterbach","year":"2019","journal-title":"Proc USENIX NSDI"},{"journal-title":"CVE-2020-3198","year":"2023","key":"ref66"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3078810"},{"journal-title":"Cisco&#x2019;s Warning Critical Flaw in IOS Routers Allows &#x2019;Complete System Compromise&#x2019;","year":"2023","key":"ref65"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.021.2000318"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/2809826.2809833"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23252"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053039"},{"key":"ref120","first-page":"2039","article-title":"NetWarden: Mitigating network covert channels while preserving performance","author":"xing","year":"2020","journal-title":"Proc USENIX Security07"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2016.7502486"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057008"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9970396\/10250891.pdf?arnumber=10250891","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T17:58:27Z","timestamp":1698083907000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10250891\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":122,"URL":"https:\/\/doi.org\/10.1109\/tifs.2023.3315128","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2023]]}}}