{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:15:14Z","timestamp":1763507714784,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":72,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,4,23]],"date-time":"2017-04-23T00:00:00Z","timestamp":1492905600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1065130"],"award-info":[{"award-number":["CNS-1065130"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,4,23]]},"DOI":"10.1145\/3064176.3064212","type":"proceedings-article","created":{"date-parts":[[2017,4,17]],"date-time":"2017-04-17T12:27:04Z","timestamp":1492432024000},"page":"374-388","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["One Primitive to Diagnose Them All"],"prefix":"10.1145","author":[{"given":"Ang","family":"Chen","sequence":"first","affiliation":[{"name":"University of Pennsylvania"}]},{"given":"Andreas","family":"Haeberlen","sequence":"additional","affiliation":[{"name":"University of Pennsylvania"}]},{"given":"Wenchao","family":"Zhou","sequence":"additional","affiliation":[{"name":"Georgetown University"}]},{"given":"Boon Thau","family":"Loo","sequence":"additional","affiliation":[{"name":"University of Pennsylvania"}]}],"member":"320","published-online":{"date-parts":[[2017,4,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"NTT SLA. http:\/\/www.ntt.net\/english\/service\/sla_ts.html.  NTT SLA. http:\/\/www.ntt.net\/english\/service\/sla_ts.html."},{"key":"e_1_3_2_1_2_1","unstructured":"Police face &pound;750k bill for false Operation Ore charges. http:\/\/www.telegraph.co.uk\/technology\/news\/8422200\/Police-face-750k-bill-for-false-Operation-Ore-charges.html.  Police face &pound;750k bill for false Operation Ore charges. http:\/\/www.telegraph.co.uk\/technology\/news\/8422200\/Police-face-750k-bill-for-false-Operation-Ore-charges.html."},{"key":"e_1_3_2_1_3_1","unstructured":"Sprint SLA. https:\/\/www.sprint.net\/sla_performance.php.  Sprint SLA. https:\/\/www.sprint.net\/sla_performance.php."},{"key":"e_1_3_2_1_4_1","unstructured":"Symantec says hackers tried extortion. http:\/\/bits.blogs.nytimes.com\/2012\/02\/07\/symantec-says-hackers-tried-extortion\/.  Symantec says hackers tried extortion. http:\/\/bits.blogs.nytimes.com\/2012\/02\/07\/symantec-says-hackers-tried-extortion\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Techie lands in jail due to Airtel sues it. http:\/\/ibnlive.in.com\/news\/techie-lands-in-jail-due-to-airtelsues-it\/101343-3.html.  Techie lands in jail due to Airtel sues it. http:\/\/ibnlive.in.com\/news\/techie-lands-in-jail-due-to-airtelsues-it\/101343-3.html."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1941487.1941508"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402997"},{"key":"e_1_3_2_1_8_1","volume-title":"Proc. HotNets","author":"Argyraki K.","year":"2004","unstructured":"K. Argyraki , P. Maniatis , D. R. Cheriton , and S. Shenker . Providing packet obituaries . In Proc. HotNets , 2004 . K. Argyraki, P. Maniatis, D. R. Cheriton, and S. Shenker. Providing packet obituaries. In Proc. HotNets, 2004."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2007.4375850"},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. CoNEXT","author":"Argyraki K.","year":"2010","unstructured":"K. Argyraki , P. Maniatis , and A. Singla . Verifiable networkperformance measurements . In Proc. CoNEXT , 2010 . K. Argyraki, P. Maniatis, and A. Singla. Verifiable networkperformance measurements. In Proc. CoNEXT, 2010."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177100"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2010.84"},{"key":"e_1_3_2_1_13_1","volume-title":"Xilinx Xcell Journal","author":"Blott M.","year":"2010","unstructured":"M. Blott , J. Ellithorpe , N. McKeown , K. Visssers , and H. Zeng . FPGA research design platform fuels network advances . Xilinx Xcell Journal , 2010 . M. Blott, J. Ellithorpe, N. McKeown, K. Visssers, and H. Zeng. FPGA research design platform fuels network advances. Xilinx Xcell Journal, 2010."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44503-X_20"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934910"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/52325.52336"},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. NSDI","author":"Dischinger M.","year":"2010","unstructured":"M. Dischinger , M. Marcon , S. Guha , K. P. Gummadi , R. Mahajan , and S. Saroiu . Glasnost: Enabling end users to detect traffic differentiation . In Proc. NSDI , 2010 . M. Dischinger, M. Marcon, S. Guha, K. P. Gummadi, R. Mahajan, and S. Saroiu. Glasnost: Enabling end users to detect traffic differentiation. In Proc. NSDI, 2010."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.929851"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015491"},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. Second SHA-3 Candidate Conference","author":"Gaj K.","year":"2010","unstructured":"K. Gaj , E. Homsirikamol , and M. Rogawski . Comprehensive comparison of hardware performance of fourteen round 2 SHA-3 candidates with 512-bit outputs using field programmable gate arrays . In Proc. Second SHA-3 Candidate Conference , 2010 . K. Gaj, E. Homsirikamol, and M. Rogawski. Comprehensive comparison of hardware performance of fourteen round 2 SHA-3 candidates with 512-bit outputs using field programmable gate arrays. In Proc. Second SHA-3 Candidate Conference, 2010."},{"key":"e_1_3_2_1_22_1","unstructured":"K. Gaj E. Homsirikamol M. Rogawski R. Shahid and M. U. Sharif. Comprehensive evaluation of high-speed and mediumspeed implementations of five SHA-3 finalists using Xilinx and Altera FPGAs. https:\/\/eprint.iacr.org\/2012\/368.pdf.  K. Gaj E. Homsirikamol M. Rogawski R. Shahid and M. U. Sharif. Comprehensive evaluation of high-speed and mediumspeed implementations of five SHA-3 finalists using Xilinx and Altera FPGAs. https:\/\/eprint.iacr.org\/2012\/368.pdf."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1496091.1496103"},{"key":"e_1_3_2_1_24_1","volume-title":"Proc. NSDI","author":"Haeberlen A.","year":"2009","unstructured":"A. Haeberlen , I. Avramopoulos , J. Rexford , and P. Druschel . NetReview: Detecting when interdomain routing goes wrong . In Proc. NSDI , 2009 . A. Haeberlen, I. Avramopoulos, J. Rexford, and P. Druschel. NetReview: Detecting when interdomain routing goes wrong. In Proc. NSDI, 2009."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177095"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10877-8_10"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294279"},{"key":"e_1_3_2_1_29_1","volume-title":"Proc. NSDI","author":"Handigol N.","year":"2014","unstructured":"N. Handigol , B. Heller , V. Jeyakumar , D. Mazi\u00e8res , and N. McKeown . I know what your packet did last hop: Using packet histories to troubleshoot networks . In Proc. NSDI , 2014 . N. Handigol, B. Heller, V. Jeyakumar, D. Mazi\u00e8res, and N. McKeown. I know what your packet did last hop: Using packet histories to troubleshoot networks. In Proc. NSDI, 2014."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504753"},{"key":"e_1_3_2_1_31_1","volume-title":"Proc. FAST","author":"Hasan R.","year":"2009","unstructured":"R. Hasan , R. Sion , and M. Winslett . The case of the fake picasso: Preventing history forgery with secure provenance . In Proc. FAST , 2009 . R. Hasan, R. Sion, and M. Winslett. The case of the fake picasso: Preventing history forgery with secure provenance. In Proc. FAST, 2009."},{"key":"e_1_3_2_1_32_1","unstructured":"X. Inc. Virtex-5 family overview. http:\/\/www.xilinx.com\/support\/documentation\/data_sheets\/ds100.pdf Feb. 2009.  X. Inc. Virtex-5 family overview. http:\/\/www.xilinx.com\/support\/documentation\/data_sheets\/ds100.pdf Feb. 2009."},{"key":"e_1_3_2_1_33_1","unstructured":"V. Jacobson. Traceroute. ftp:\/\/ftp.ee.lbl.gov\/traceroute.tar.gz.  V. Jacobson. Traceroute. ftp:\/\/ftp.ee.lbl.gov\/traceroute.tar.gz."},{"key":"e_1_3_2_1_34_1","volume-title":"Proc. NDSS","author":"Juels A.","year":"1999","unstructured":"A. Juels and J. Brainard . Client puzzles: A cryptographic countermeasure against connection depletion attacks . In Proc. NDSS , 1999 . A. Juels and J. Brainard. Client puzzles: A cryptographic countermeasure against connection depletion attacks. In Proc. NDSS, 1999."},{"key":"e_1_3_2_1_35_1","unstructured":"Juniper Networks. Packets per second. http:\/\/kb.juniper.net\/InfoCenter\/index?page=content&id=KB14737.  Juniper Networks. Packets per second. http:\/\/kb.juniper.net\/InfoCenter\/index?page=content&id=KB14737."},{"key":"e_1_3_2_1_36_1","volume-title":"Proc. NSDI","author":"Katz-Bassett E.","year":"2010","unstructured":"E. Katz-Bassett , H. V. Madhyastha , V. K. Adhikari , C. Scott , J. Sherry , P. Van Wesep , T. Anderson , and A. Krishnamurthy . Reverse traceroute . In Proc. NSDI , 2010 . E. Katz-Bassett, H. V. Madhyastha, V. K. Adhikari, C. Scott, J. Sherry, P. Van Wesep, T. Anderson, and A. Krishnamurthy. Reverse traceroute. In Proc. NSDI, 2010."},{"key":"e_1_3_2_1_37_1","volume-title":"Proc. NSDI","author":"Katz-Bassett E.","year":"2008","unstructured":"E. Katz-Bassett , H. V. Madhyastha , J. P. John , A. Krishnamurthy , D. Wetherall , and T. Anderson . Studying black holes in the Internet with Hubble . In Proc. NSDI , 2008 . E. Katz-Bassett, H. V. Madhyastha, J. P. John, A. Krishnamurthy, D. Wetherall, and T. Anderson. Studying black holes in the Internet with Hubble. In Proc. NSDI, 2008."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626323"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/354871.354874"},{"key":"e_1_3_2_1_40_1","unstructured":"M. Kotadia. Trojan horse found responsible for child porn. ZDNet 8\/1\/2003.  M. Kotadia. Trojan horse found responsible for child porn. ZDNet 8\/1\/2003."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644917"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1921168.1921193"},{"key":"e_1_3_2_1_43_1","volume-title":"Proc. NSDI","author":"Liu X.","year":"2008","unstructured":"X. Liu , A. Li , X. Yang , and D. Wetherall . Passport: Secure and adoptable source authentication . In Proc. NSDI , 2008 . X. Liu, A. Li, X. Yang, and D. Wetherall. Passport: Secure and adoptable source authentication. In Proc. NSDI, 2008."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934906"},{"key":"e_1_3_2_1_45_1","volume-title":"Proc. SOSP","author":"Mahajan R.","year":"2003","unstructured":"R. Mahajan , N. Spring , D. Wetherall , and T. Anderson . Userlevel Internet path diagnosis . In Proc. SOSP , 2003 . R. Mahajan, N. Spring, D. Wetherall, and T. Anderson. Userlevel Internet path diagnosis. In Proc. SOSP, 2003."},{"key":"e_1_3_2_1_46_1","volume-title":"Proc. NSDI","author":"Mahajan R.","year":"2008","unstructured":"R. Mahajan , M. Zhang , L. Poole , and V. Pai . Uncovering performance differences among backbone ISPs with Netdiff . In Proc. NSDI , 2008 . R. Mahajan, M. Zhang, L. Poole, and V. Pai. Uncovering performance differences among backbone ISPs with Netdiff. In Proc. NSDI, 2008."},{"key":"e_1_3_2_1_47_1","volume-title":"Proc. USENIX Security","author":"Maniatis P.","year":"2002","unstructured":"P. Maniatis and M. Baker . Secure history preservation through timeline entanglement . In Proc. USENIX Security , 2002 . P. Maniatis and M. Baker. Secure history preservation through timeline entanglement. In Proc. USENIX Security, 2002."},{"key":"e_1_3_2_1_48_1","volume-title":"Proc. Second SHA-3 Candidate Conference","author":"Matsuo S.","year":"2010","unstructured":"S. Matsuo , M. Knezevic , P. Schaumont , I. Verbauwhede , A. Satoh , K. Sakiyama , and K. Ota . How can we conduct fair and consistent hardware evaluation for SHA-3 candidate? In Proc. Second SHA-3 Candidate Conference , 2010 . S. Matsuo, M. Knezevic, P. Schaumont, I. Verbauwhede, A. Satoh, K. Sakiyama, and K. Ota. How can we conduct fair and consistent hardware evaluation for SHA-3 candidate? In Proc. Second SHA-3 Candidate Conference, 2010."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1980.10006"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694805.2694808"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2008.4476069"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1477942.1477944"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2079296.2079326"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626306"},{"key":"e_1_3_2_1_55_1","volume-title":"Proc. HotSec","author":"Piatek M.","year":"2008","unstructured":"M. Piatek , T. Kohno , and A. Krishnamurthy . Challenges and directions for monitoring P2P file sharing networks . In Proc. HotSec , 2008 . M. Piatek, T. Kohno, and A. Krishnamurthy. Challenges and directions for monitoring P2P file sharing networks. In Proc. HotSec, 2008."},{"key":"e_1_3_2_1_56_1","volume-title":"Proc. SIGCOMM Poster","author":"Ramachandran A.","year":"2008","unstructured":"A. Ramachandran , K. Bhandankar , M. B. Tariq , and N. Feamster . Packets with provenance . In Proc. SIGCOMM Poster , 2008 . A. Ramachandran, K. Bhandankar, M. B. Tariq, and N. Feamster. Packets with provenance. In Proc. SIGCOMM Poster, 2008."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159947"},{"key":"e_1_3_2_1_58_1","volume-title":"Proc. NSDI","author":"Reis C.","year":"2008","unstructured":"C. Reis , S. D. Gribble , T. Kohno , and N. C. Weaver . Detecting in-flight page changes with web tripwires . In Proc. NSDI , 2008 . C. Reis, S. D. Gribble, T. Kohno, and N. C. Weaver. Detecting in-flight page changes with web tripwires. In Proc. NSDI, 2008."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/347059.347560"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402993"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.804827"},{"key":"e_1_3_2_1_64_1","volume-title":"Proc. NSDI","author":"Subramanian L.","year":"2004","unstructured":"L. Subramanian , V. Roth , I. Stoica , S. Shenker , and R. H. Katz . Listen and Whisper: Security mechanisms for BGP . In Proc. NSDI , 2004 . L. Subramanian, V. Roth, I. Stoica, S. Shenker, and R. H. Katz. Listen and Whisper: Security mechanisms for BGP. In Proc. NSDI, 2004."},{"key":"e_1_3_2_1_65_1","unstructured":"R. Sylvester. IP address typo leads to a false arrest in Kansas. The Wichita Eagle http:\/\/www.kansas.com\/mld\/eagle\/news\/local\/crime_courts\/12620843.htm.  R. Sylvester. IP address typo leads to a false arrest in Kansas. The Wichita Eagle http:\/\/www.kansas.com\/mld\/eagle\/news\/local\/crime_courts\/12620843.htm."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/1016687.1016704"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626335"},{"key":"e_1_3_2_1_68_1","volume-title":"Proc. NSDI","author":"Yu M.","year":"2013","unstructured":"M. Yu , L. Jose , and R. Miao . Software defined traffic measurement with OpenSketch . In Proc. NSDI , 2013 . M. Yu, L. Jose, and R. Miao. Software defined traffic measurement with OpenSketch. In Proc. NSDI, 2013."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544036"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644905"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2066284"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043584"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989488"},{"key":"e_1_3_2_1_74_1","volume-title":"Proc. VLDB","author":"Zhou W.","year":"2013","unstructured":"W. Zhou , S. Mapara , Y. Ren , Y. Li , A. Haeberlen , Z. Ives , B. T. Loo , and M. Sherr . Distributed time-aware provenance . In Proc. VLDB , 2013 . W. Zhou, S. Mapara, Y. Ren, Y. Li, A. Haeberlen, Z. Ives, B. T. Loo, and M. Sherr. Distributed time-aware provenance. In Proc. VLDB, 2013."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807234"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2014.61"}],"event":{"name":"EuroSys '17: Twelfth EuroSys Conference 2017","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Belgrade Serbia","acronym":"EuroSys '17"},"container-title":["Proceedings of the Twelfth European Conference on Computer Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3064176.3064212","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3064176.3064212","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3064176.3064212","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:36:15Z","timestamp":1750217775000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3064176.3064212"}},"subtitle":["Architectural Support for Internet Diagnostics"],"short-title":[],"issued":{"date-parts":[[2017,4,23]]},"references-count":72,"alternative-id":["10.1145\/3064176.3064212","10.1145\/3064176"],"URL":"https:\/\/doi.org\/10.1145\/3064176.3064212","relation":{},"subject":[],"published":{"date-parts":[[2017,4,23]]},"assertion":[{"value":"2017-04-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}