{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T22:17:09Z","timestamp":1768688229882,"version":"3.49.0"},"reference-count":107,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Union under the Italian National Recovery and Resilience Plan (NRRP) of NextGenerationEU, partnership on \u201cTelecommunications of the Future\u201d","doi-asserted-by":"publisher","award":["PE00000001"],"award-info":[{"award-number":["PE00000001"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Research, Development and Innovation Office (NKFIH)\/Hungarian Scientific Research Fund (OTKA) Project","award":["135606"],"award-info":[{"award-number":["135606"]}]},{"name":"Magyar Tudom\u00e1nyos Akad\u00e9mia (MTA)-Budapest University of Technology and Economics (BME) Information Systems Research Group"},{"name":"MTA-BME Network Softwarization Research Group"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1109\/tnet.2023.3346286","type":"journal-article","created":{"date-parts":[[2023,12,27]],"date-time":"2023-12-27T19:54:57Z","timestamp":1703706897000},"page":"2269-2284","source":"Crossref","is-referenced-by-count":4,"title":["Morpheus: A Run Time Compiler and Optimizer for Software Data Planes"],"prefix":"10.1109","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1247-9640","authenticated-orcid":false,"given":"Sebastiano","family":"Miano","sequence":"first","affiliation":[{"name":"Department of Electronics, Information and Bioengineering, Politecnico di Milano, Milan, Italy"}]},{"given":"Alireza","family":"Sanaee","sequence":"additional","affiliation":[{"name":"School of Electronic Engineering and Computer Science, Queen Mary University of London, London, U.K"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6134-7890","authenticated-orcid":false,"given":"Fulvio","family":"Risso","sequence":"additional","affiliation":[{"name":"Department of Control and Computer Engineering, Politecnico di Torino, Turin, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5958-7817","authenticated-orcid":false,"given":"G\u00e1bor","family":"R\u00e9tv\u00e1ri","sequence":"additional","affiliation":[{"name":"Department of Telecommunications and Media Informatics, Budapest University of Technology and Economics, Budapest, Hungary"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6063-4975","authenticated-orcid":false,"given":"Gianni","family":"Antichi","sequence":"additional","affiliation":[{"name":"Department of Electronics, Information and Bioengineering, Politecnico di Milano, Milan, Italy"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507769"},{"key":"ref2","volume-title":"Snort\u2014Network Intrusion Detection & Prevention System","year":"2020"},{"key":"ref3","volume-title":"Istio\u2014Connect, Secure, Control, and Observe Services","year":"2020"},{"key":"ref4","volume-title":"Suricata\u2014Intrusion Detection System","year":"2020"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/wimob.2012.6379165"},{"key":"ref6","volume-title":"Katran: A High Performance Layer 4 Load Balancer","author":"Hopps","year":"2019"},{"key":"ref7","volume-title":"Unimog\u2014Cloudflare\u2019s Edge Load Balancer","author":"Wragg","year":"2020"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3281411.3281426"},{"key":"ref9","first-page":"203","article-title":"NetBricks: Taking the V out of NFV","volume-title":"Proc. OSDI","author":"Panda"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2896848"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3286062.3286073"},{"key":"ref12","volume-title":"GNU Compiler Collection","year":"2023"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.5555\/977395.977673"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/349299.349303"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/40.591653"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2019.8661201"},{"key":"ref17","first-page":"12","article-title":"AutoFDO: Automatic feedback-directed optimization for warehouse-scale applications","volume-title":"Proc. IEEE\/ACM Int. Symp. Code Gener. Optim. (CGO)","author":"Chen"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934887"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3050235"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3422604.3425941"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446724"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3373360.3380832"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/249069.231409"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1543135.1542528"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2259016.2259025"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2018.00027"},{"key":"ref27","volume-title":"Perf (Linux)","year":"2018"},{"key":"ref28","first-page":"163","article-title":"DMon: Efficient detection and correction of data locality problems using selective profiling","volume-title":"Proc. 15th USENIX Symp. Operating Syst. Design Implement.","author":"Khan"},{"key":"ref29","volume-title":"Kubernetes: Production-Grade Container Orchestration","year":"2019"},{"key":"ref30","volume-title":"Morpheus: Domain specific run time optimization for software data planes\u2014Artifact for ASPLOS\u201922","author":"Miano","year":"2022"},{"key":"ref31","volume-title":"Propeller: Profile Guided Optimizing Large Scale LLVM-Based Relinker","year":"2019"},{"key":"ref32","volume-title":"L3 Forwarding With Access Control Sample Application","year":"2021"},{"key":"ref33","first-page":"1","article-title":"Dynamic compilation and optimization of packet processing programs","volume-title":"Proc. ACM SIGCOMM NetPL","author":"Retvari"},{"key":"ref34","volume-title":"Kubernetes Long Road to Dual IPv4\/IPv6 Support","author":"Jackson","year":"2019"},{"key":"ref35","volume-title":"The Open Virtual Network Architecture: Tunnel Encapsulations","year":"2018"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230563"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/HPSR.2018.8850758"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.893156"},{"key":"ref39","volume-title":"OpenStack","year":"2020"},{"key":"ref40","first-page":"113","article-title":"Header space analysis: Static checking for networks","volume-title":"Proc. USENIX NSDI","author":"Kazemian"},{"key":"ref41","first-page":"125","article-title":"Stateless datacenter load-balancing with beamer","volume-title":"Proc. 5th USENIX Symp. Networked Syst. Design Implement.","author":"Olteanu"},{"key":"ref42","first-page":"667","article-title":"A high-speed load-balancer design with guaranteed per-connection-consistency","volume-title":"Proc. 17th USENIX Symp. Networked Syst. Design Implement.","author":"Barbette"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/800230.806987"},{"key":"ref44","volume-title":"Oprofile: A System Profiler for Linux","author":"Levon","year":"2004"},{"key":"ref45","volume-title":"Dtrace","year":"2023"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2003.1191551"},{"key":"ref47","volume-title":"AutoFDO Tutorial","year":"2016"},{"key":"ref48","volume-title":"Pin\u2014A Dynamic Binary Instrumentation Tool","year":"2020"},{"key":"ref49","volume-title":"Manageability of the QUIC Transport Protocol","author":"Kuehlewind","year":"2021"},{"key":"ref50","volume-title":"LLVM MemorySSA","year":"2021"},{"key":"ref51","volume-title":"LLVM Alias Analysis","year":"2021"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3594255.3594256"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633056"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/178243.178478"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832493"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230573"},{"key":"ref57","volume-title":"Eliminating Unrequired Guards","author":"Worthington","year":"2018"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ANCS.2015.7110117"},{"key":"ref59","volume-title":"ORC Design and Implementation","year":"2023"},{"key":"ref60","volume-title":"MCJIT Design and Implementation","year":"2023"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2774993.2775000"},{"key":"ref62","first-page":"9","article-title":"Netmap: A novel framework for fast packet I\/O","volume-title":"Proc. 21st USENIX Secur. Symp.","author":"Rizzo"},{"key":"ref63","volume-title":"Linux AF_XDP","year":"2021"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ancs.2019.8901880"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ANCS.2015.7110116"},{"key":"ref66","volume-title":"Intel Data Direct I\/O Technology","year":"2021"},{"key":"ref67","volume-title":"Pktgen Traffic Generator Using DPDK","year":"2018"},{"key":"ref68","volume-title":"DPDK Burst Replay Tool","author":"Ribas","year":"2019"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815692"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3055676"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3371927.3371929"},{"key":"ref72","author":"Taylor","year":"2023","journal-title":"Classbench Filter Set & Trace Generator"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1242"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2544"},{"key":"ref75","volume-title":"BPF: Adding Map Batch Processing Support","author":"Song","year":"2019"},{"key":"ref76","volume-title":"The CAIDA UCSD Anonymized Internet Traces","year":"2019"},{"key":"ref77","volume-title":"What Can Cause my Code to Run Slower When the Server JIT is Activated","year":"2011"},{"key":"ref78","volume-title":"Java HotSpot VM Options","year":"2021"},{"key":"ref79","volume-title":"Cilium: Api-Aware Networking and Security Using eBPF and XDP","year":"2020"},{"key":"ref80","volume-title":"Tigera Adds eBPF Support to Calico","year":"2019"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/netsoft54395.2022.9844062"},{"key":"ref82","first-page":"1","article-title":"The design and operation of CloudLab","volume-title":"Proc. USENIX Annu. Tech. Conf.","author":"Duplyakin"},{"key":"ref83","volume-title":"Benchmarking Kubernetes Networking Performance","year":"2023"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/3593856.3595888"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098826"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/isca52012.2021.00018"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446692"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/1168857.1168906"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512566"},{"key":"ref90","article-title":"Souper: A synthesizing superoptimizer","author":"Sasnauskas","year":"2017","journal-title":"arXiv:1711.04422"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/3428245"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872387"},{"key":"ref93","article-title":"SoftNIC: A software NIC to augment hardware","author":"Han","year":"2015"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3060609"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/3106989.3107000"},{"key":"ref96","volume-title":"Vector Packet Processing (VPP) Platform","year":"2020"},{"key":"ref97","first-page":"171","article-title":"Metron: NFV service chains at the true speed of the underlying hardware","volume-title":"Proc. 15th USENIX Symp. Netw. Syst. Design Implement. (NSDI)","author":"Katsikas"},{"key":"ref98","first-page":"459","article-title":"ClickOS and the art of network function virtualization","volume-title":"Proc. NSDI","author":"Martins"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787493"},{"key":"ref100","first-page":"323","article-title":"Design and implementation of a consolidated middlebox architecture","volume-title":"Proc. 9th USENIX Symp. Networked Syst. Design Implement.","author":"Sekar"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/netsoft51509.2021.9492571"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934875"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.98"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405868"},{"key":"ref105","first-page":"517","article-title":"Performance contracts for software network functions","volume-title":"Proc. 16th USENIX Symp. Networked Syst. Design Implement.","author":"Iyer"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1145\/3124680.3124747"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1145\/3123878.3131977"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/90\/10559910\/10375357.pdf?arnumber=10375357","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T21:46:47Z","timestamp":1719352007000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10375357\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6]]},"references-count":107,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2023.3346286","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"value":"1063-6692","type":"print"},{"value":"1558-2566","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6]]}}}