{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:36:12Z","timestamp":1750221372720,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,28]],"date-time":"2018-03-28T00:00:00Z","timestamp":1522195200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,28]]},"DOI":"10.1145\/3185467.3185496","type":"proceedings-article","created":{"date-parts":[[2018,3,23]],"date-time":"2018-03-23T12:30:47Z","timestamp":1521808247000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Oko"],"prefix":"10.1145","author":[{"given":"Paul","family":"Chaignon","sequence":"first","affiliation":[{"name":"Orange Labs, Inria Nancy Grand Est"}]},{"given":"Kahina","family":"Lazri","sequence":"additional","affiliation":[{"name":"Orange Labs"}]},{"given":"J\u00e9r\u00f4me","family":"Fran\u00e7ois","sequence":"additional","affiliation":[{"name":"Inria Nancy Grand Est"}]},{"given":"Thibault","family":"Delmas","sequence":"additional","affiliation":[{"name":"Telecom ParisTech"}]},{"given":"Olivier","family":"Festor","sequence":"additional","affiliation":[{"name":"Inria Nancy Grand Est, Telecom Nancy, University of Lorraine"}]}],"member":"320","published-online":{"date-parts":[[2018,3,28]]},"reference":[{"volume-title":"Retrieved","year":"2017","unstructured":"2005. The LuaJIT Project. (2005) . Retrieved Feb. 16, 2017 from http:\/\/luajit.org 2005. The LuaJIT Project. (2005). Retrieved Feb. 16, 2017 from http:\/\/luajit.org","key":"e_1_3_2_1_1_1"},{"volume-title":"Retrieved","year":"2017","unstructured":"2012. The CAIDA anonymized OC48 Internet traces 2002-2003 dataset. (2012) . Retrieved Apr. , 2017 from http:\/\/data.caida.org\/datasets\/passive\/passive-oc48 2012. The CAIDA anonymized OC48 Internet traces 2002-2003 dataset. (2012). Retrieved Apr., 2017 from http:\/\/data.caida.org\/datasets\/passive\/passive-oc48","key":"e_1_3_2_1_2_1"},{"volume-title":"What is Open vSwitch (OVS)?","year":"2012","unstructured":"2012. What is Open vSwitch (OVS)? ( 2012 ). Retrieved Feb . 9, 2018 from https:\/\/www.sdxcentral.com\/cloud\/open-source\/definitions\/what-is-open-vswitch 2012. What is Open vSwitch (OVS)? (2012). Retrieved Feb. 9, 2018 from https:\/\/www.sdxcentral.com\/cloud\/open-source\/definitions\/what-is-open-vswitch","key":"e_1_3_2_1_3_1"},{"volume-title":"OpenDaylight project. (Feb","year":"2013","unstructured":"2013. OpenDaylight project. (Feb . 2013 ). Retrieved Feb . 9, 2018 from https:\/\/www.opendaylight.org 2013. OpenDaylight project. (Feb. 2013). Retrieved Feb. 9, 2018 from https:\/\/www.opendaylight.org","key":"e_1_3_2_1_4_1"},{"volume-title":"HTTP aware network security for containers. (Dec.","year":"2015","unstructured":"2015. Linux native , HTTP aware network security for containers. (Dec. 2015 ). Retrieved Feb . 9, 2018 from https:\/\/github.com\/cilium\/cilium 2015. Linux native, HTTP aware network security for containers. (Dec. 2015). Retrieved Feb. 9, 2018 from https:\/\/github.com\/cilium\/cilium","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","volume-title":"Introducing the","author":"Bertin G.","year":"2016","unstructured":"G. Bertin . 2016. Introducing the p0f BPF compiler. ( Aug. 2016 ). Retrieved Feb . 9, 2018 from https:\/\/blog.cloudflare.com\/introducing-the-p0f-bpf-compiler G. Bertin. 2016. Introducing the p0f BPF compiler. (Aug. 2016). Retrieved Feb. 9, 2018 from https:\/\/blog.cloudflare.com\/introducing-the-p0f-bpf-compiler"},{"key":"e_1_3_2_1_7_1","volume-title":"Retrieved","author":"Borkmann D.","year":"2018","unstructured":"D. Borkmann . 2018 . net: add bpfilter. (Feb. 2018) . Retrieved Feb. 27, 2018 from https:\/\/lwn.net\/Articles\/747504 D. Borkmann. 2018. net: add bpfilter. (Feb. 2018). Retrieved Feb. 27, 2018 from https:\/\/lwn.net\/Articles\/747504"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/2656877.2656890"},{"volume-title":"Proc. USENIX ATC.","author":"Cantrill B. M.","unstructured":"B. M. Cantrill , M. W. Shapiro , and A. H. Leventhal . 2004. Dynamic instrumentation of production systems . In Proc. USENIX ATC. B. M. Cantrill, M. W. Shapiro, and A. H. Leventhal. 2004. Dynamic instrumentation of production systems. In Proc. USENIX ATC.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","volume-title":"BPF: The universal in-kernel virtual machine. (May","author":"Corbet J.","year":"2014","unstructured":"J. Corbet . 2014 . BPF: The universal in-kernel virtual machine. (May 2014). Retrieved Feb . 9, 2018 from https:\/\/lwn.net\/Articles\/599755 J. Corbet. 2014. BPF: The universal in-kernel virtual machine. (May 2014). Retrieved Feb. 9, 2018 from https:\/\/lwn.net\/Articles\/599755"},{"key":"e_1_3_2_1_11_1","volume-title":"Early packet drop---and more---with BPF. (Apr","author":"Corbet J.","year":"2016","unstructured":"J. Corbet . 2016. Early packet drop---and more---with BPF. (Apr . 2016 ). Retrieved Feb . 9, 2018 from https:\/\/lwn.net\/Articles\/682538 J. Corbet. 2016. Early packet drop---and more---with BPF. (Apr. 2016). Retrieved Feb. 9, 2018 from https:\/\/lwn.net\/Articles\/682538"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/2815675.2815692"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/3050220.3050228"},{"unstructured":"B. Gregg. 2016. Linux 4.X tracing tools: Using BPF superpowers. USENIX LISA.  B. Gregg. 2016. Linux 4.X tracing tools: Using BPF superpowers. USENIX LISA.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","volume-title":"Technical Report UCB\/EECS-2015-155. EECS Department","author":"Han S.","year":"2015","unstructured":"S. Han , K. Jang , A. Panda , S. Palkar , D. Han , and S. Ratnasamy . 2015 . SoftNIC: A software NIC to augment hardware. Technical Report UCB\/EECS-2015-155. EECS Department , University of California, Berkeley . http:\/\/www2.eecs.berkeley.edu\/Pubs\/TechRpts\/2015\/EECS-2015-155.html S. Han, K. Jang, A. Panda, S. Palkar, D. Han, and S. Ratnasamy. 2015. SoftNIC: A software NIC to augment hardware. Technical Report UCB\/EECS-2015-155. EECS Department, University of California, Berkeley. http:\/\/www2.eecs.berkeley.edu\/Pubs\/TechRpts\/2015\/EECS-2015-155.html"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1145\/1243418.1243424"},{"volume-title":"Proc. USENIX NSDI.","author":"Hwang J.","unstructured":"J. Hwang , K. K. Ramakrishnan , and T. Wood . 2014. NetVM: High performance and flexible networking using virtualization on commodity platforms . In Proc. USENIX NSDI. J. Hwang, K. K. Ramakrishnan, and T. Wood. 2014. NetVM: High performance and flexible networking using virtualization on commodity platforms. In Proc. USENIX NSDI.","key":"e_1_3_2_1_17_1"},{"volume-title":"Proc. USENIX ATC.","author":"Jackson E. J.","unstructured":"E. J. Jackson , M. Walls , A. Panda , J. Pettit , B. Pfaff , J. Rajahalme , T. Koponen , and S. Shenker . 2016. SoftFlow: A middlebox architecture for Open vSwitch . In Proc. USENIX ATC. E. J. Jackson, M. Walls, A. Panda, J. Pettit, B. Pfaff, J. Rajahalme, T. Koponen, and S. Shenker. 2016. SoftFlow: A middlebox architecture for Open vSwitch. In Proc. USENIX ATC.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","volume-title":"A hash function for hash table lookup. (2016). Retrieved","author":"Jenkins B.","year":"2018","unstructured":"B. Jenkins . 2016. A hash function for hash table lookup. (2016). Retrieved Feb. 9, 2018 from http:\/\/burtleburtle.net\/bob\/hash\/doobs.html B. Jenkins. 2016. A hash function for hash table lookup. (2016). Retrieved Feb. 9, 2018 from http:\/\/burtleburtle.net\/bob\/hash\/doobs.html"},{"unstructured":"S. Jouet R. Cziva and D. Pezaros. 2016. Programmable dataplane for next generation networks. (Mar. 2016). Retrieved Feb. 9 2018 from https:\/\/netlab.dcs.gla.ac.uk\/uploads\/files\/d99abd5bbadbed8c0f29808ee812bd26.pdf  S. Jouet R. Cziva and D. Pezaros. 2016. Programmable dataplane for next generation networks. (Mar. 2016). Retrieved Feb. 9 2018 from https:\/\/netlab.dcs.gla.ac.uk\/uploads\/files\/d99abd5bbadbed8c0f29808ee812bd26.pdf","key":"e_1_3_2_1_20_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1109\/ANCS.2017.14"},{"volume-title":"Proc. USENIX NSDI.","author":"Koponen T.","unstructured":"T. Koponen , K. Amidon , P. Balland , M. Casado , A. Chanda , B. Fulton , I. Ganichev , J. Gross , N. Gude , P. Ingram , E. Jackson , A. Lambeth , R. Lenglet , S.-H. Li , A. Padmanabhan , J. Pettit , B. Pfaff , R. Ramanathan , S. Shenker , A. Shieh , J. Stribling , P. Thakkar , D. Wendlandt , A. Yip , and R. Zhang . 2014. Network virtualization in multi-tenant datacenters . In Proc. USENIX NSDI. T. Koponen, K. Amidon, P. Balland, M. Casado, A. Chanda, B. Fulton, I. Ganichev, J. Gross, N. Gude, P. Ingram, E. Jackson, A. Lambeth, R. Lenglet, S.-H. Li, A. Padmanabhan, J. Pettit, B. Pfaff, R. Ramanathan, S. Shenker, A. Shieh, J. Stribling, P. Thakkar, D. Wendlandt, A. Yip, and R. Zhang. 2014. Network virtualization in multi-tenant datacenters. In Proc. USENIX NSDI.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","volume-title":"Userspace eBPF VM. (Aug","author":"Lane R.","year":"2015","unstructured":"R. Lane . 2015. Userspace eBPF VM. (Aug . 2015 ). Retrieved Feb . 9, 2018 from https:\/\/github.com\/iovisor\/ubpf R. Lane. 2015. Userspace eBPF VM. (Aug. 2015). Retrieved Feb. 9, 2018 from https:\/\/github.com\/iovisor\/ubpf"},{"volume-title":"Proc. USENIX Winter Conf.","author":"Mccanne S.","unstructured":"S. Mccanne and V. Jacobson . 1993. The BSD packet filter: A new architecture for user-level packet capture . In Proc. USENIX Winter Conf. S. Mccanne and V. Jacobson. 1993. The BSD packet filter: A new architecture for user-level packet capture. In Proc. USENIX Winter Conf.","key":"e_1_3_2_1_24_1"},{"volume-title":"Network function virtualization enablement within SDN data plane","author":"Mekky H.","unstructured":"H. Mekky , F. Hao , S. Mukherjee , T. V. Lakshman , and Z.-L. Zhang . 2017. Network function virtualization enablement within SDN data plane . In IEEE INFOCOM. H. Mekky, F. Hao, S. Mukherjee, T. V. Lakshman, and Z.-L. Zhang. 2017. Network function virtualization enablement within SDN data plane. In IEEE INFOCOM.","key":"e_1_3_2_1_25_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1145\/2620728.2620735"},{"doi-asserted-by":"crossref","unstructured":"J. Meyer and T. Downing. 1997. Java Virtual Machine. O'Reilly & Associates Inc.   J. Meyer and T. Downing. 1997. Java Virtual Machine. O'Reilly & Associates Inc.","key":"e_1_3_2_1_27_1","DOI":"10.1016\/S1353-4858(97)83033-4"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1145\/319151.319166"},{"volume-title":"Proc. USENIX OSDI.","author":"Panda A.","unstructured":"A. Panda , S. Han , K. Jang , M. Walls , S. Ratnasamy , and S. Shenker . 2016. NetBricks: Taking the V out of NFV . In Proc. USENIX OSDI. A. Panda, S. Han, K. Jang, M. Walls, S. Ratnasamy, and S. Shenker. 2016. NetBricks: Taking the V out of NFV. In Proc. USENIX OSDI.","key":"e_1_3_2_1_29_1"},{"unstructured":"B. Pfaff. 2016. Converging approaches in software switches. ACM APSys.  B. Pfaff. 2016. Converging approaches in software switches. ACM APSys.","key":"e_1_3_2_1_30_1"},{"volume-title":"Proc. USENIX NSDI.","author":"Pfaff B.","unstructured":"B. Pfaff , J. Pettit , T. Koponen , E. Jackson , A. Zhou , J. Rajahalme , J. Gross , A. Wang , J. Stringer , P. Shelar , K. Amidon , and M. Casado . 2015. The design and implementation of Open vSwitch . In Proc. USENIX NSDI. B. Pfaff, J. Pettit, T. Koponen, E. Jackson, A. Zhou, J. Rajahalme, J. Gross, A. Wang, J. Stringer, P. Shelar, K. Amidon, and M. Casado. 2015. The design and implementation of Open vSwitch. In Proc. USENIX NSDI.","key":"e_1_3_2_1_31_1"},{"unstructured":"V. Pu\u0161 J. Ku\u010dera M. \u017d\u00e1dn\u00edk and J. Ko\u0159enek. 2016. FPGA-based 100 Gbps DDoS protector. TNC17. https:\/\/tnc17.geant.org\/core\/event\/31  V. Pu\u0161 J. Ku\u010dera M. \u017d\u00e1dn\u00edk and J. Ko\u0159enek. 2016. FPGA-based 100 Gbps DDoS protector. TNC17. https:\/\/tnc17.geant.org\/core\/event\/31","key":"e_1_3_2_1_32_1"},{"key":"e_1_3_2_1_33_1","volume-title":"Proc. USENIX ATC.","author":"Rizzo L.","year":"2012","unstructured":"L. Rizzo . 2012 . Netmap: A novel framework for fast packet I\/O . In Proc. USENIX ATC. L. Rizzo. 2012. Netmap: A novel framework for fast packet I\/O. In Proc. USENIX ATC."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1145\/2934872.2934886"},{"key":"e_1_3_2_1_35_1","volume-title":"Introduction to the Theory of Computation","author":"Sipser M.","unstructured":"M. Sipser . 1996. Introduction to the Theory of Computation ( 1 st ed.). International Thomson Publishing . M. Sipser. 1996. Introduction to the Theory of Computation (1st ed.). International Thomson Publishing.","edition":"1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1145\/2934872.2934900"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.1145\/3050220.3063772"},{"doi-asserted-by":"crossref","unstructured":"J. Sonchack J. M. Smith A. J. Aviv and E. Keller. 2016. Enabling practical software-defined networking security applications with OFX. In NDSS.  J. Sonchack J. M. Smith A. J. Aviv and E. Keller. 2016. Enabling practical software-defined networking security applications with OFX. In NDSS.","key":"e_1_3_2_1_38_1","DOI":"10.14722\/ndss.2016.23309"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_39_1","DOI":"10.1145\/3139645.3139657"},{"volume-title":"Proc. USENIX OSDI.","author":"Wang X.","unstructured":"X. Wang , D. Lazar , N. Zeldovich , A. Chlipala , and Z. Tatlock . 2014. Jitk: A trustworthy in-kernel interpreter infrastructure . In Proc. USENIX OSDI. X. Wang, D. Lazar, N. Zeldovich, A. Chlipala, and Z. Tatlock. 2014. Jitk: A trustworthy in-kernel interpreter infrastructure. In Proc. USENIX OSDI.","key":"e_1_3_2_1_40_1"},{"volume-title":"Proc. USENIX NSDI.","author":"Yu M.","unstructured":"M. Yu , L. Jose , and R. Miao . 2013. Software defined traffic measurement with OpenSketch . In Proc. USENIX NSDI. M. Yu, L. Jose, and R. Miao. 2013. Software defined traffic measurement with OpenSketch. In Proc. USENIX NSDI.","key":"e_1_3_2_1_41_1"},{"unstructured":"M. Zalewski. 2012. p0f v3. (2012). Retrieved Feb. 9 2018 from http:\/\/lcamtuf.coredump.cx\/p0f3  M. Zalewski. 2012. p0f v3. (2012). Retrieved Feb. 9 2018 from http:\/\/lcamtuf.coredump.cx\/p0f3","key":"e_1_3_2_1_42_1"}],"event":{"sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","ONS Open Networking Summit"],"acronym":"SOSR '18","name":"SOSR '18: Symposium on SDN Research","location":"Los Angeles CA USA"},"container-title":["Proceedings of the Symposium on SDN Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3185467.3185496","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3185467.3185496","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:36Z","timestamp":1750213596000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3185467.3185496"}},"subtitle":["Extending Open vSwitch with Stateful Filters"],"short-title":[],"issued":{"date-parts":[[2018,3,28]]},"references-count":42,"alternative-id":["10.1145\/3185467.3185496","10.1145\/3185467"],"URL":"https:\/\/doi.org\/10.1145\/3185467.3185496","relation":{},"subject":[],"published":{"date-parts":[[2018,3,28]]},"assertion":[{"value":"2018-03-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}