{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:19:19Z","timestamp":1761401959754,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,7]],"date-time":"2018-08-07T00:00:00Z","timestamp":1533600000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,7]]},"DOI":"10.1145\/3229616.3229623","type":"proceedings-article","created":{"date-parts":[[2018,8,1]],"date-time":"2018-08-01T19:07:07Z","timestamp":1533150427000},"page":"20-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["AEGIS"],"prefix":"10.1145","author":[{"given":"Heedo","family":"Kang","sequence":"first","affiliation":[{"name":"KAIST"}]},{"given":"Seungwon","family":"Shin","sequence":"additional","affiliation":[{"name":"KAIST"}]},{"given":"Vinod","family":"Yegneswaran","sequence":"additional","affiliation":[{"name":"SRI International"}]},{"given":"Shalini","family":"Ghosh","sequence":"additional","affiliation":[{"name":"SRI International"}]},{"given":"Phillip","family":"Porras","sequence":"additional","affiliation":[{"name":"SRI International"}]}],"member":"320","published-online":{"date-parts":[[2018,8,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"A Big Switch Networks. 2013. Project Floodlight. http:\/\/www.projectfloodlight.org\/floodlight\/.  A Big Switch Networks. 2013. Project Floodlight. http:\/\/www.projectfloodlight.org\/floodlight\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Android project. 2012. Android Security Mechanism. https:\/\/source.android.com\/security\/overview\/app-security.html.  Android project. 2012. Android Security Mechanism. https:\/\/source.android.com\/security\/overview\/app-security.html."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620744"},{"key":"e_1_3_2_1_4_1","unstructured":"Samantha Bookman. 2016. AT&T: Data centers are key as NFV SDN become increasingly important. http:\/\/www.fiercetelecom.com\/telecom\/at-t-data-centers-are-key-as-nfv-sdn-become-increasingly-important  Samantha Bookman. 2016. AT&T: Data centers are key as NFV SDN become increasingly important. http:\/\/www.fiercetelecom.com\/telecom\/at-t-data-centers-are-key-as-nfv-sdn-become-increasingly-important"},{"key":"e_1_3_2_1_5_1","volume-title":"Javasnoop: How to hack anything in java. BlackHat Las Vegas","author":"Dabirsiaghi Arshan","year":"2010","unstructured":"Arshan Dabirsiaghi . 2010 . Javasnoop: How to hack anything in java. BlackHat Las Vegas (2010). Arshan Dabirsiaghi. 2010. Javasnoop: How to hack anything in java. BlackHat Las Vegas (2010)."},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of LREC","volume":"6","author":"De Marneffe Marie-Catherine","year":"2006","unstructured":"Marie-Catherine De Marneffe , Bill MacCartney , Christopher D Manning , 2006 . Generating typed dependency parses from phrase structure parses . In Proceedings of LREC , Vol. 6 . Genoa Italy, 449--454. Marie-Catherine De Marneffe, Bill MacCartney, Christopher D Manning, et al. 2006. Generating typed dependency parses from phrase structure parses. In Proceedings of LREC, Vol. 6. Genoa Italy, 449--454."},{"key":"e_1_3_2_1_7_1","unstructured":"Alissa Irei. 2016. New Verizon service uses Viptela SD-WAN technology. http:\/\/searchsdn.techtarget.com\/news\/4500276392\/New-Verizon-service-uses-Viptela-SD-WAN-technology  Alissa Irei. 2016. New Verizon service uses Viptela SD-WAN technology. http:\/\/searchsdn.techtarget.com\/news\/4500276392\/New-Verizon-service-uses-Viptela-SD-WAN-technology"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486019"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813689"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23457"},{"key":"e_1_3_2_1_11_1","volume-title":"Information Theory and Aerospace & Electronic Systems (VITAE), 2014 4th International Conference on. IEEE, 1--5.","author":"Lei Tao","year":"2014","unstructured":"Tao Lei , Zhaoming Lu , Xiangming Wen , Xing Zhao , and Luhan Wang . 2014 . SWAN: An SDN based campus WLAN framework. In Wireless Communications, Vehicular Technology , Information Theory and Aerospace & Electronic Systems (VITAE), 2014 4th International Conference on. IEEE, 1--5. Tao Lei, Zhaoming Lu, Xiangming Wen, Xing Zhao, and Luhan Wang. 2014. SWAN: An SDN based campus WLAN framework. In Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE), 2014 4th International Conference on. IEEE, 1--5."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2014.6918985"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/219717.219748"},{"key":"e_1_3_2_1_14_1","unstructured":"Oracle. 2017. How to Write Doc Comments for the Javadoc Tool. http:\/\/www.oracle.com\/technetwork\/articles\/java\/index-137868.html.  Oracle. 2017. How to Write Doc Comments for the Javadoc Tool. http:\/\/www.oracle.com\/technetwork\/articles\/java\/index-137868.html."},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 22Nd USENIX Conference on Security (SEC'13)","author":"Pandita Rahul","year":"2013","unstructured":"Rahul Pandita , Xusheng Xiao , Wei Yang , William Enck , and Tao Xie . 2013 . WHYPER: Towards Automating Risk Assessment of Mobile Applications . In Proceedings of the 22Nd USENIX Conference on Security (SEC'13) . USENIX Association, Berkeley, CA, USA, 527--542. http:\/\/dl.acm.org\/citation.cfm?id=2534766.2534812 Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, and Tao Xie. 2013. WHYPER: Towards Automating Risk Assessment of Mobile Applications. In Proceedings of the 22Nd USENIX Conference on Security (SEC'13). USENIX Association, Berkeley, CA, USA, 527--542. http:\/\/dl.acm.org\/citation.cfm?id=2534766.2534812"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Phillip A Porras Steven Cheung Martin W Fong Keith Skinner and Vinod Yegneswaran. 2015. Securing the Software Defined Network Control Layer.. In NDSS.  Phillip A Porras Steven Cheung Martin W Fong Keith Skinner and Vinod Yegneswaran. 2015. Securing the Software Defined Network Control Layer.. In NDSS.","DOI":"10.14722\/ndss.2015.23222"},{"key":"e_1_3_2_1_17_1","unstructured":"POX. 2014. Python Network Controller. http:\/\/www.noxrepo.org\/pox\/about-pox\/.  POX. 2014. Python Network Controller. http:\/\/www.noxrepo.org\/pox\/about-pox\/."},{"key":"e_1_3_2_1_18_1","unstructured":"V. Punyakanok and D. Roth. 2001. The Use of Classifiers in Sequential Inference. In NIPS. MIT Press 995--1001. http:\/\/cogcomp.cs.illinois.edu\/papers\/nips01.pdf   V. Punyakanok and D. Roth. 2001. The Use of Classifiers in Sequential Inference. In NIPS. MIT Press 995--1001. http:\/\/cogcomp.cs.illinois.edu\/papers\/nips01.pdf"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1162\/coli.2008.34.2.257"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660287"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660353"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.20"},{"volume-title":"Natural-language processing. https:\/\/en.wikipedia.org\/wiki\/Natural-language processing Online","year":"2018","key":"e_1_3_2_1_23_1","unstructured":"Wikipedia. 2018. Natural-language processing. https:\/\/en.wikipedia.org\/wiki\/Natural-language processing Online ; Accessed 08-05- 2018 . Wikipedia. 2018. Natural-language processing. https:\/\/en.wikipedia.org\/wiki\/Natural-language processing Online; Accessed 08-05-2018."},{"key":"e_1_3_2_1_24_1","volume-title":"Attacking Sdn Infrastructure: Are We Ready For The Next-Gen Networking? BlackHat-USA-2016","author":"Yoon C","year":"2016","unstructured":"C Yoon and S Lee . 2016. Attacking Sdn Infrastructure: Are We Ready For The Next-Gen Networking? BlackHat-USA-2016 ( 2016 ). C Yoon and S Lee. 2016. Attacking Sdn Infrastructure: Are We Ready For The Next-Gen Networking? BlackHat-USA-2016 (2016)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2748159"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134603"},{"key":"e_1_3_2_1_27_1","volume-title":"2016 IEEE 23rd International Conference on","volume":"1","author":"Yu Le","year":"2016","unstructured":"Le Yu , Xiapu Luo , Chenxiong Qian , and Shuai Wang . 2016 . Revisiting the description-to-behavior fidelity in android applications. In Software Analysis, Evolution, and Reengineering (SANER) , 2016 IEEE 23rd International Conference on , Vol. 1 . IEEE, 415--426. Le Yu, Xiapu Luo, Chenxiong Qian, and Shuai Wang. 2016. Revisiting the description-to-behavior fidelity in android applications. In Software Analysis, Evolution, and Reengineering (SANER), 2016 IEEE 23rd International Conference on, Vol. 1. IEEE, 415--426."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813669"}],"event":{"name":"SIGCOMM '18: ACM SIGCOMM 2018 Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Budapest Hungary","acronym":"SIGCOMM '18"},"container-title":["Proceedings of the 2018 Workshop on Security in Softwarized Networks: Prospects and Challenges"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3229616.3229623","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3229616.3229623","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:37Z","timestamp":1750212457000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3229616.3229623"}},"subtitle":["An Automated Permission Generation and Verification System for SDNs"],"short-title":[],"issued":{"date-parts":[[2018,8,7]]},"references-count":28,"alternative-id":["10.1145\/3229616.3229623","10.1145\/3229616"],"URL":"https:\/\/doi.org\/10.1145\/3229616.3229623","relation":{},"subject":[],"published":{"date-parts":[[2018,8,7]]},"assertion":[{"value":"2018-08-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}