{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:41Z","timestamp":1750306301923,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,11]],"date-time":"2016-03-11T00:00:00Z","timestamp":1457654400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,11]]},"DOI":"10.1145\/2876019.2876028","type":"proceedings-article","created":{"date-parts":[[2016,3,8]],"date-time":"2016-03-08T14:13:39Z","timestamp":1457446419000},"page":"35-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Leveraging SDN to Improve the Security of DHCP"],"prefix":"10.1145","author":[{"suffix":"Jr.","given":"Jacob H.","family":"Cox","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Russell J.","family":"Clark","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"suffix":"III","given":"Henry L.","family":"Owen","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,3,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2670518.2673872"},{"key":"e_1_3_2_1_2_1","unstructured":"R. Droms. Rfc2131 dynamic host configuration protocol. http:\/\/www.ietf.org\/rfc\/rfc2131.txt.  R. Droms. Rfc2131 dynamic host configuration protocol. http:\/\/www.ietf.org\/rfc\/rfc2131.txt."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2602204.2602219"},{"key":"e_1_3_2_1_4_1","unstructured":"isc-dhcp-server. https:\/\/help.ubuntu.com\/community\/ isc-dhcp-server.  isc-dhcp-server. https:\/\/help.ubuntu.com\/community\/ isc-dhcp-server."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868447.1868466"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"e_1_3_2_1_7_1","volume-title":"Tracking down rogue dhcp servers","author":"Meraki C.","year":"2015","unstructured":"C. Meraki . Tracking down rogue dhcp servers , 2015 . C. Meraki. Tracking down rogue dhcp servers, 2015."},{"key":"e_1_3_2_1_8_1","volume-title":"Dec","author":"O'Connor D.","year":"2014","unstructured":"D. O'Connor . Dhcp snooping--filter those broadcasts! https:\/\/mellowd.co.uk\/ccie\/?p=5796 , Dec 2014 . D. O'Connor. Dhcp snooping--filter those broadcasts! https:\/\/mellowd.co.uk\/ccie\/?p=5796, Dec 2014."},{"key":"e_1_3_2_1_9_1","unstructured":"T. Oconnor. How to find a rogue dhcp server on your network. http:\/\/tomoconnor.eu\/blogish\/how-to- find-rogue-dhcp-server-your-network\/ 2013.  T. Oconnor. How to find a rogue dhcp server on your network. http:\/\/tomoconnor.eu\/blogish\/how-to- find-rogue-dhcp-server-your-network\/ 2013."},{"key":"e_1_3_2_1_10_1","volume-title":"Sep","author":"O'Connor T.","year":"2015","unstructured":"T. O'Connor . Personal communication , Sep 2015 . T. O'Connor. Personal communication, Sep 2015."},{"key":"e_1_3_2_1_11_1","unstructured":"Pox. http:\/\/www.noxrepo.org\/pox\/about-pox\/.  Pox. http:\/\/www.noxrepo.org\/pox\/about-pox\/."},{"issue":"5","key":"e_1_3_2_1_12_1","first-page":"128","article-title":"Modular sdn programming with pyretic","volume":"38","author":"Reich J.","year":"2013","unstructured":"J. Reich , C. Monsanto , N. Foster , J. Rexford , and D. Walker . Modular sdn programming with pyretic . Communications Magazine, IEEE , 38 ( 5 ): 128 -- 134 , 2013 . J. Reich, C. Monsanto, N. Foster, J. Rexford, and D. Walker. Modular sdn programming with pyretic. Communications Magazine, IEEE, 38(5):128--134, 2013.","journal-title":"Communications Magazine, IEEE"},{"key":"e_1_3_2_1_13_1","volume-title":"Mar","author":"Rietz R.","year":"2015","unstructured":"R. Rietz , A. Brinner , and R. Cwalinsky . Improving network security in virtualized environments with openflow , Mar 2015 . R. Rietz, A. Brinner, and R. Cwalinsky. Improving network security in virtualized environments with openflow, Mar 2015."},{"key":"e_1_3_2_1_14_1","unstructured":"Ryu. http:\/\/osrg.github.io\/ryu\/.  Ryu. http:\/\/osrg.github.io\/ryu\/."},{"key":"e_1_3_2_1_15_1","unstructured":"Rancid. http:\/\/www.shrubbery.net\/rancid\/.  Rancid. http:\/\/www.shrubbery.net\/rancid\/."},{"key":"e_1_3_2_1_16_1","unstructured":"Udhcpd(8). http:\/\/manpages.ubuntu.com\/ manpages\/hardy\/man8\/udhcpd .8.html.  Udhcpd(8). http:\/\/manpages.ubuntu.com\/ manpages\/hardy\/man8\/udhcpd .8.html."},{"key":"e_1_3_2_1_17_1","unstructured":"W. Wimer. Rfc1542 clarifications and extensions for the bootstrap protocol. https:\/\/tools.ietf.org\/html\/rfc1542.   W. Wimer. Rfc1542 clarifications and extensions for the bootstrap protocol. https:\/\/tools.ietf.org\/html\/rfc1542."},{"key":"e_1_3_2_1_18_1","unstructured":"WS. Wireshark. https:\/\/www.wireshark.org\/.  WS. Wireshark. https:\/\/www.wireshark.org\/."}],"event":{"name":"CODASPY'16: Sixth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"New Orleans Louisiana USA","acronym":"CODASPY'16"},"container-title":["Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks &amp; Network Function Virtualization"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2876019.2876028","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2876019.2876028","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:39:19Z","timestamp":1750221559000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2876019.2876028"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,11]]},"references-count":18,"alternative-id":["10.1145\/2876019.2876028","10.1145\/2876019"],"URL":"https:\/\/doi.org\/10.1145\/2876019.2876028","relation":{},"subject":[],"published":{"date-parts":[[2016,3,11]]},"assertion":[{"value":"2016-03-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}