{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:18:22Z","timestamp":1761401902329,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T00:00:00Z","timestamp":1512345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1446426"],"award-info":[{"award-number":["1446426"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Software R&D Center, Samsung Electronics Co., Ltd"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,4]]},"DOI":"10.1145\/3134600.3134603","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T19:18:32Z","timestamp":1512415112000},"page":"461-473","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["A Security-Mode for Carrier-Grade SDN Controllers"],"prefix":"10.1145","author":[{"given":"Changhoon","family":"Yoon","sequence":"first","affiliation":[{"name":"KAIST"}]},{"given":"Seungwon","family":"Shin","sequence":"additional","affiliation":[{"name":"KAIST"}]},{"given":"Phillip","family":"Porras","sequence":"additional","affiliation":[{"name":"SRI International"}]},{"given":"Vinod","family":"Yegneswaran","sequence":"additional","affiliation":[{"name":"SRI International"}]},{"given":"Heedo","family":"Kang","sequence":"additional","affiliation":[{"name":"KAIST"}]},{"given":"Martin","family":"Fong","sequence":"additional","affiliation":[{"name":"SRI International"}]},{"given":"Brian","family":"O'Connor","sequence":"additional","affiliation":[{"name":"Open Networking Laboratory"}]},{"given":"Thomas","family":"Vachuska","sequence":"additional","affiliation":[{"name":"Open Networking Laboratory"}]}],"member":"320","published-online":{"date-parts":[[2017,12,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Onos system test. https:\/\/wiki.onosproject.org\/display\/ONOS\/System+Tests.  Onos system test. https:\/\/wiki.onosproject.org\/display\/ONOS\/System+Tests."},{"key":"e_1_3_2_1_2_1","unstructured":"A Linux Foundation Collaborative Project. OpenDaylight SDN Controller. http:\/\/www.opendaylight.org.  A Linux Foundation Collaborative Project. OpenDaylight SDN Controller. http:\/\/www.opendaylight.org."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620741"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620744"},{"key":"e_1_3_2_1_5_1","unstructured":"Z. Cai A. L. Cox and T. S. Eugene. Maestro-platform. https:\/\/code.google.com\/p\/maestro-platform\/.  Z. Cai A. L. Cox and T. S. Eugene. Maestro-platform. https:\/\/code.google.com\/p\/maestro-platform\/."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2670518.2673880"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491189"},{"key":"e_1_3_2_1_8_1","unstructured":"FloodLight. Open SDN Controller. http:\/\/floodlight.openflowhub.org\/.  FloodLight. Open SDN Controller. http:\/\/floodlight.openflowhub.org\/."},{"key":"e_1_3_2_1_9_1","first-page":"103","volume-title":"USENIX Symposium on Internet Technologies and Systems","author":"Gong L.","year":"1997","unstructured":"L. Gong , M. Mueller , H. Prafullchandra , and R. Schemers . Going beyond the sandbox: An overview of the new security architecture in the java development kit 1.2 . In USENIX Symposium on Internet Technologies and Systems , pages 103 -- 112 , 1997 . L. Gong, M. Mueller, H. Prafullchandra, and R. Schemers. Going beyond the sandbox: An overview of the new security architecture in the java development kit 1.2. In USENIX Symposium on Internet Technologies and Systems, pages 103--112, 1997."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1384609.1384625"},{"key":"e_1_3_2_1_11_1","first-page":"113","volume-title":"Presented as part of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12)","author":"Kazemian P.","year":"2012","unstructured":"P. Kazemian , G. Varghese , and N. McKeown . Header space analysis: Static checking for networks . In Presented as part of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12) , pages 113 -- 126 , 2012 . P. Kazemian, G. Varghese, and N. McKeown. Header space analysis: Static checking for networks. In Presented as part of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12), pages 113--126, 2012."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342452"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620773"},{"key":"e_1_3_2_1_14_1","first-page":"1","volume-title":"OSDI","volume":"10","author":"Koponen T.","year":"2010","unstructured":"T. Koponen , M. Casado , N. Gude , J. Stribling , L. Poutievski , M. Zhu , R. Ramanathan , Y. Iwata , H. Inoue , T. Hama , : A Distributed Control Platform for Large-scale Production Networks . In OSDI , volume 10 , pages 1 -- 6 , 2010 . T. Koponen, M. Casado, N. Gude, J. Stribling, L. Poutievski, M. Zhu, R. Ramanathan, Y. Iwata, H. Inoue, T. Hama, et al. Onix: A Distributed Control Platform for Large-scale Production Networks. In OSDI, volume 10, pages 1--6, 2010."},{"key":"e_1_3_2_1_15_1","unstructured":"Open Networking Laboratory. Gossip Protocols. https:\/\/wiki.onosproject.org\/display\/ONOS\/Network+Topology+State.  Open Networking Laboratory. Gossip Protocols. https:\/\/wiki.onosproject.org\/display\/ONOS\/Network+Topology+State."},{"key":"e_1_3_2_1_16_1","unstructured":"Open Networking Laboratory. Security-Mode ONOS Wiki. https:\/\/wiki.onosproject.org\/display\/ONOS\/Security-Mode+ONOS.  Open Networking Laboratory. Security-Mode ONOS Wiki. https:\/\/wiki.onosproject.org\/display\/ONOS\/Security-Mode+ONOS."},{"key":"e_1_3_2_1_17_1","unstructured":"The Apache Software Foundation. Apache Karaf. http:\/\/karaf.apache.org.  The Apache Software Foundation. Apache Karaf. http:\/\/karaf.apache.org."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535771.2535789"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/2643634.2643666"},{"key":"e_1_3_2_1_21_1","unstructured":"OSGi Alliance. Osgi specification. http:\/\/www.osgi.org\/Specifications.  OSGi Alliance. Osgi specification. http:\/\/www.osgi.org\/Specifications."},{"key":"e_1_3_2_1_22_1","first-page":"29","volume-title":"Proceedings of the FREENIX Track:... USENIX Annual Technical Conference","author":"Peter Loscocco N.","unstructured":"N. Peter Loscocco . Integrating flexible support for security policies into the Linux operating system . In Proceedings of the FREENIX Track:... USENIX Annual Technical Conference , page 29 . The Association, 2001. N. Peter Loscocco. Integrating flexible support for security policies into the Linux operating system. In Proceedings of the FREENIX Track:... USENIX Annual Technical Conference, page 29. The Association, 2001."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23222"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342466"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/1924943.1924969"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660353"},{"key":"e_1_3_2_1_27_1","unstructured":"The Apache Software Foundation. Apache felix framework security. http:\/\/felix.apache.org\/documentation\/subprojects\/apache-felix-framework-security.html.  The Apache Software Foundation. Apache felix framework security. http:\/\/felix.apache.org\/documentation\/subprojects\/apache-felix-framework-security.html."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.20"}],"event":{"name":"ACSAC 2017: 2017 Annual Computer Security Applications Conference","acronym":"ACSAC 2017","location":"Orlando FL USA"},"container-title":["Proceedings of the 33rd Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134603","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134600.3134603","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134600.3134603","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:11Z","timestamp":1750217411000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134603"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,4]]},"references-count":28,"alternative-id":["10.1145\/3134600.3134603","10.1145\/3134600"],"URL":"https:\/\/doi.org\/10.1145\/3134600.3134603","relation":{},"subject":[],"published":{"date-parts":[[2017,12,4]]},"assertion":[{"value":"2017-12-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}