{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T03:53:25Z","timestamp":1768017205506,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T00:00:00Z","timestamp":1539561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3243734.3243749","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T12:56:36Z","timestamp":1539694596000},"page":"3-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Towards Fine-grained Network Security Forensics and Diagnosis in the SDN Era"],"prefix":"10.1145","author":[{"given":"Haopei","family":"Wang","sequence":"first","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]},{"given":"Guangliang","family":"Yang","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]},{"given":"Phakpoom","family":"Chinprutthiwong","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]},{"given":"Lei","family":"Xu","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]},{"given":"Yangyong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]},{"given":"Guofei","family":"Gu","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Test OpenFlow Applications. In NSDI","author":"Canini M.","year":"2012"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920307"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064212"},{"key":"e_1_3_2_1_4_1","volume-title":"Wallach Efficient Data Structures for Tamper-evident Logging USENIX Security","author":"Crosby Scott A.","year":"2009"},{"key":"e_1_3_2_1_5_1","volume-title":"USENIX Security","author":"Fayaz S. K.","year":"2015"},{"key":"e_1_3_2_1_6_1","volume-title":"I Know What Your Packet Did Last Hop: Using Packet Histories to Troubleshoot Networks NSDI","author":"Handigol N.","year":"2014"},{"key":"e_1_3_2_1_7_1","volume-title":"Towards SDN-Defined Programmable BYOD (Bring Your Own Device) Security NDSS","author":"Hong S.","year":"2016"},{"key":"e_1_3_2_1_8_1","volume-title":"Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures NDSS","author":"Hong S.","year":"2015"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620749"},{"key":"e_1_3_2_1_10_1","volume-title":"Identifier Binding Attacks and Defenses in Software-Defined Networks Usenix Security","author":"Jero S.","year":"2017"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134045"},{"key":"e_1_3_2_1_12_1","volume-title":"Real Time Network Policy Checking using Header Space Analysis NSDI","author":"Kazemian P.","year":"2013"},{"key":"e_1_3_2_1_13_1","volume-title":"Header Space Analysis: Static Checking for Networks NSDI","author":"Kazemian P.","year":"2013"},{"key":"e_1_3_2_1_14_1","volume-title":"Veriflow: Verifying Network-Wide Invariants in Real Time NSDI","author":"Khurshid A.","year":"2013"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945467"},{"key":"e_1_3_2_1_16_1","volume-title":"The soot framework for java program analysis: a retrospective CETUS","author":"Lam P.","year":"2011"},{"key":"e_1_3_2_1_17_1","volume-title":"DELTA: A Security Assessment Framework for Software-Defined Networks NDSS","author":"Lee S.","year":"2017"},{"key":"e_1_3_2_1_18_1","unstructured":"K. Mahajan M. Dhawan R. Poddar and V. Mann. 2015. CloudNaaS: a cloud networking platform for enterprise applications NDSS 2015).  K. Mahajan M. Dhawan R. Poddar and V. Mann. 2015. CloudNaaS: a cloud networking platform for enterprise applications NDSS 2015)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018470"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402980"},{"key":"e_1_3_2_1_21_1","volume-title":"Compiling Path Queries. In NSDI","author":"Narayana S.","year":"2016"},{"key":"e_1_3_2_1_22_1","volume-title":"Resonance: Dynamic Access Control for Enterprise Networks WREN","author":"Nayak A.","year":"2009"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251086.1251088"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342466"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626304"},{"key":"e_1_3_2_1_26_1","volume-title":"FRESCO: Modular Composable Security Services for Software-Defined Networks NDSS","author":"Shin S.","year":"2013"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660353"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516684"},{"key":"e_1_3_2_1_29_1","volume-title":"Toward Efficient Querying of Compressed Network Payloads Usenix ATC","author":"Taylor T.","year":"2012"},{"key":"e_1_3_2_1_30_1","volume-title":"VAST: A Unified Platform for Interactive Network Forensics NSDI","author":"Vallentin M.","year":"2016"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.27"},{"key":"e_1_3_2_1_32_1","volume-title":"Automated Bug Removal for Software-Defined Networks NSDI","author":"Wu Y.","year":"2017"},{"key":"e_1_3_2_1_33_1","volume-title":"OFRewind: Enabling Record and Replay Troubleshooting for Networks USENIX ATC","author":"Wundsam A.","year":"2011"},{"key":"e_1_3_2_1_34_1","volume-title":"Attacking the Brain: Races in the SDN Control Plane Usenix Security","author":"Xu L.","year":"2017"},{"key":"e_1_3_2_1_35_1","volume-title":"Attacking the Brain: Races in the SDN Control Plane USENIX Security","author":"Xu Lei","year":"2017"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Attila Yavuz Peng Ning and Michael Reiter. Efficient compromise resilient and append-only cryptographic schemes for secure audit logging. Financial Cryptography and Data Security 2012 (. ????).  Attila Yavuz Peng Ning and Michael Reiter. Efficient compromise resilient and append-only cryptographic schemes for secure audit logging. Financial Cryptography and Data Security 2012 (. ????).","DOI":"10.1007\/978-3-642-32946-3_12"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315261"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36516-4_4"},{"key":"e_1_3_2_1_39_1","volume-title":"Software Defined Traffic Measurement with OpenSketch NSDI","author":"Yu M.","year":"2013"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043584"}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","location":"Toronto Canada","acronym":"CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243749","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243749","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:32Z","timestamp":1750208252000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243749"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":40,"alternative-id":["10.1145\/3243734.3243749","10.1145\/3243734"],"URL":"https:\/\/doi.org\/10.1145\/3243734.3243749","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}