{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:19:04Z","timestamp":1761401944721,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,7]],"date-time":"2018-08-07T00:00:00Z","timestamp":1533600000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,7]]},"DOI":"10.1145\/3229616.3229620","type":"proceedings-article","created":{"date-parts":[[2018,8,1]],"date-time":"2018-08-01T19:07:07Z","timestamp":1533150427000},"page":"40-45","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Preventing Malicious SDN Applications From Hiding Adverse Network Manipulations"],"prefix":"10.1145","author":[{"given":"Christian","family":"R\u00f6pke","sequence":"first","affiliation":[{"name":"Ruhr-University Bochum"}]},{"given":"Thosten","family":"Holz","sequence":"additional","affiliation":[{"name":"Ruhr-University Bochum"}]}],"member":"320","published-online":{"date-parts":[[2018,8,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2890955.2890965"},{"key":"e_1_3_2_1_2_1","unstructured":"Falliere N. Murchu L. O. and Chien E. W32. stuxnet dossier. White paper Symantec (2011).  Falliere N. Murchu L. O. and Chien E. W32. stuxnet dossier. White paper Symantec (2011)."},{"key":"e_1_3_2_1_3_1","unstructured":"Floodlight Project. Floodlight Controller. www.projectfloodlight.org\/floodlight\/.  Floodlight Project. Floodlight Controller. www.projectfloodlight.org\/floodlight\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Floodlight Project. LoxiGen Tool to Generate OpenFlow protocol libraries. https:\/\/github.com\/floodlight\/loxigen.  Floodlight Project. LoxiGen Tool to Generate OpenFlow protocol libraries. https:\/\/github.com\/floodlight\/loxigen."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978361"},{"key":"e_1_3_2_1_6_1","unstructured":"H\u00f6lzle U. OpenFlow @ Google. Open Networking Summit 2012.  H\u00f6lzle U. OpenFlow @ Google. Open Networking Summit 2012."},{"volume-title":"Real Time Network Policy Checking Using Header Space Analysis. In USENIX Symposium on Networked Systems Design and Implementation","year":"2013","author":"Kazemian P.","key":"e_1_3_2_1_7_1"},{"volume-title":"N. Header Space Analysis: Static Checking for Networks. In USENIX Symposium on Networked Systems Design and Implementation","year":"2012","author":"Kazemian P.","key":"e_1_3_2_1_8_1"},{"volume-title":"VeriFlow: Verifying Network-Wide Invariants in Real Time. In USENIX Symposium on Networked Systems Design and Implementation","year":"2013","author":"Khurshid A.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868447.1868466"},{"key":"e_1_3_2_1_11_1","unstructured":"ONOS Project. Open Networking Operating System. onosproject.org\/.  ONOS Project. Open Networking Operating System. onosproject.org\/."},{"key":"e_1_3_2_1_12_1","unstructured":"Open Networking Foundation. OpenFlow Switch Specification. www.opennetworking.org.  Open Networking Foundation. OpenFlow Switch Specification. www.opennetworking.org."},{"key":"e_1_3_2_1_13_1","unstructured":"OpenDaylight Project. OpenDaylight. www.opendaylight.org.  OpenDaylight Project. OpenDaylight. www.opendaylight.org."},{"key":"e_1_3_2_1_14_1","unstructured":"Oracle. Security Alert for CVE-2012-4681. www.oracle.com 2012.  Oracle. Security Alert for CVE-2012-4681. www.oracle.com 2012."},{"key":"e_1_3_2_1_15_1","unstructured":"Oracle. Security Alert for CVE-2013-0422. www.oracle.com 2013.  Oracle. Security Alert for CVE-2013-0422. www.oracle.com 2013."},{"key":"e_1_3_2_1_16_1","unstructured":"Parrend P. and Fr\u00e9not S. Java Components Vulnerabilities - An Experimental Classification Targeted at the OSGi Platform. Technical report 6231 Institut National de Recherche en Informatique et en Automatique (2007).  Parrend P. and Fr\u00e9not S. Java Components Vulnerabilities - An Experimental Classification Targeted at the OSGi Platform. Technical report 6231 Institut National de Recherche en Informatique et en Automatique (2007)."},{"key":"e_1_3_2_1_17_1","unstructured":"Parrend P. and Fr\u00e9not S. More Vulnerabilities in the Java\/OSGi Platform: A Focus on Bundle Interactions. Technical report 6649 Institut National de Recherche en Informatique et en Automatique (2008).  Parrend P. and Fr\u00e9not S. More Vulnerabilities in the Java\/OSGi Platform: A Focus on Bundle Interactions. Technical report 6649 Institut National de Recherche en Informatique et en Automatique (2008)."},{"volume-title":"Securing the Software-Defined Network Control Layer. In Symposium on Network and Distributed System Security","year":"2015","author":"Porras P.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342466"},{"volume-title":"GI Sicherheit","year":"2018","author":"R\u00f6pke C.","key":"e_1_3_2_1_20_1"},{"volume-title":"Retaining Control Over SDN Network Services. In International Conference on Networked Systems","year":"2015","author":"R\u00f6pke C.","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26362-5_16"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660353"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN.2017.8169856"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134603"}],"event":{"name":"SIGCOMM '18: ACM SIGCOMM 2018 Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Budapest Hungary","acronym":"SIGCOMM '18"},"container-title":["Proceedings of the 2018 Workshop on Security in Softwarized Networks: Prospects and Challenges"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3229616.3229620","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3229616.3229620","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:37Z","timestamp":1750212457000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3229616.3229620"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,7]]},"references-count":25,"alternative-id":["10.1145\/3229616.3229620","10.1145\/3229616"],"URL":"https:\/\/doi.org\/10.1145\/3229616.3229620","relation":{},"subject":[],"published":{"date-parts":[[2018,8,7]]},"assertion":[{"value":"2018-08-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}