{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T03:45:53Z","timestamp":1768016753428,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":89,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T00:00:00Z","timestamp":1539561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1657534,CNS-1750024"],"award-info":[{"award-number":["CNS-1657534,CNS-1750024"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000005","name":"U.S. Department of Defense","doi-asserted-by":"publisher","award":["FA8721-05-C-0002,FA8702-15-D-0001"],"award-info":[{"award-number":["FA8721-05-C-0002,FA8702-15-D-0001"]}],"id":[{"id":"10.13039\/100000005","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Maryland Procurement Office","award":["H98230-18-D-0007"],"award-info":[{"award-number":["H98230-18-D-0007"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3243734.3243759","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T17:38:33Z","timestamp":1539711513000},"page":"648-663","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["Cross-App Poisoning in Software-Defined Networking"],"prefix":"10.1145","author":[{"given":"Benjamin E.","family":"Ujcich","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Samuel","family":"Jero","sequence":"additional","affiliation":[{"name":"MIT Lincoln Laboratory, Lexington, MA, USA"}]},{"given":"Anne","family":"Edmundson","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]},{"given":"Qi","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Richard","family":"Skowyra","sequence":"additional","affiliation":[{"name":"MIT Lincoln Laboratory, Lexington, MA, USA"}]},{"given":"James","family":"Landry","sequence":"additional","affiliation":[{"name":"MIT Lincoln Laboratory, Lexington, MA, USA"}]},{"given":"Adam","family":"Bates","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"William H.","family":"Sanders","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Cristina","family":"Nita-Rotaru","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]},{"given":"Hamed","family":"Okhravi","sequence":"additional","affiliation":[{"name":"MIT Lincoln Laboratory, Lexington, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2578855.2535862"},{"key":"e_1_3_2_2_2_1","volume-title":"Proceedings of the Theory and Practice of Provenance (TaPP '14)","author":"Arab B","year":"2014","unstructured":"B Arab , Dieter Gawlick , Venkatesh Radhakrishnan , Hao Guo , and Boris Glavic . 2014 . A Generic Provenance Middleware for Database Queries, Updates, and Transactions . In Proceedings of the Theory and Practice of Provenance (TaPP '14) . B Arab, Dieter Gawlick, Venkatesh Radhakrishnan, Hao Guo, and Boris Glavic. 2014. A Generic Provenance Middleware for Database Queries, Updates, and Transactions. In Proceedings of the Theory and Practice of Provenance (TaPP '14)."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664264"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30569-9_2"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0956796804005453"},{"key":"e_1_3_2_2_6_1","volume-title":"Let SDN Be Your Eyes: Secure Forensics in Data Center Networks Proceedings of USENIX SENT '14","author":"Bates Adam","year":"2014","unstructured":"Adam Bates , Kevin Butler , Andreas Haeberlen , Micah Sherr , and Wenchao Zhou . 2014 . Let SDN Be Your Eyes: Secure Forensics in Data Center Networks Proceedings of USENIX SENT '14 . USENIX Association. Adam Bates, Kevin Butler, Andreas Haeberlen, Micah Sherr, and Wenchao Zhou. 2014. Let SDN Be Your Eyes: Secure Forensics in Data Center Networks Proceedings of USENIX SENT '14. USENIX Association."},{"key":"e_1_3_2_2_7_1","volume-title":"Butler","author":"Bates Adam","year":"2016","unstructured":"Adam Bates , Devin J. Pohly , and Kevin R. B . Butler . 2016 . Secure and Trustworthy Provenance Collection for Digital Forensics. In Digital Fingerprinting, bibfieldeditorCliff Wang, Ryan M. Gerdes, Yong Guan, and Sneha Kumar Kasera (Eds.). Springer New York , 141--176. Adam Bates, Devin J. Pohly, and Kevin R. B. Butler. 2016. Secure and Trustworthy Provenance Collection for Digital Forensics. In Digital Fingerprinting, bibfieldeditorCliff Wang, Ryan M. Gerdes, Yong Guan, and Sneha Kumar Kasera (Eds.). Springer New York, 141--176."},{"key":"e_1_3_2_2_8_1","volume-title":"Trustworthy Whole-system Provenance for the Linux Kernel Proceedings of USENIX Security Symposium '15","author":"Bates Adam","year":"2015","unstructured":"Adam Bates , Dave Tian , Kevin R. B. Butler , and Thomas Moyer . 2015 . Trustworthy Whole-system Provenance for the Linux Kernel Proceedings of USENIX Security Symposium '15 . USENIX Association, 319--334. Adam Bates, Dave Tian, Kevin R. B. Butler, and Thomas Moyer. 2015. Trustworthy Whole-system Provenance for the Linux Kernel Proceedings of USENIX Security Symposium '15. USENIX Association, 319--334."},{"key":"e_1_3_2_2_9_1","volume-title":"Run-time Monitoring and Formal Analysis of Information Flows in Chromium Proceedings of NDSS '15","author":"Bauer Lujo","year":"2015","unstructured":"Lujo Bauer , Shaoying Cai , Limin Jia , Timothy Passaro , Michael Stroucken , and Yuan Tian . 2015 . Run-time Monitoring and Formal Analysis of Information Flows in Chromium Proceedings of NDSS '15 . Internet Society. Lujo Bauer, Shaoying Cai, Limin Jia, Timothy Passaro, Michael Stroucken, and Yuan Tian. 2015. Run-time Monitoring and Formal Analysis of Information Flows in Chromium Proceedings of NDSS '15. Internet Society."},{"key":"e_1_3_2_2_11_1","volume-title":"Proceedings of NSDI '12","volume":"12","author":"Canini Marco","year":"2012","unstructured":"Marco Canini , Daniele Venzano , Peter Perevs'\u0131ni , Dejan Kosti\u00e7 , and Jennifer Rexford . 2012 . A NICE Way to Test OpenFlow Applications . In Proceedings of NSDI '12 , Vol. Vol. 12 . 127--140. http:\/\/dl.acm.org\/citation.cfm?id=2228298.2228312 Marco Canini, Daniele Venzano, Peter Perevs'\u0131ni, Dejan Kosti\u00e7, and Jennifer Rexford. 2012. A NICE Way to Test OpenFlow Applications. In Proceedings of NSDI '12, Vol. Vol. 12. 127--140. http:\/\/dl.acm.org\/citation.cfm?id=2228298.2228312"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934910"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066296"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.46"},{"key":"e_1_3_2_2_15_1","volume-title":"SPHINX: Detecting Security Attacks in Software-Defined Networks Proceedings of NDSS '15","author":"Dhawan Mohan","year":"2015","unstructured":"Mohan Dhawan , Rishabh Poddar , Kshiteej Mahajan , and Vijay Mann . 2015 . SPHINX: Detecting Security Attacks in Software-Defined Networks Proceedings of NDSS '15 . Internet Society. Mohan Dhawan, Rishabh Poddar, Kshiteej Mahajan, and Vijay Mann. 2015. SPHINX: Detecting Security Attacks in Software-Defined Networks Proceedings of NDSS '15. Internet Society."},{"key":"e_1_3_2_2_16_1","volume-title":"Wallach","author":"Dietz Michael","year":"2011","unstructured":"Michael Dietz , Shashi Shekhar , Yuliy Pisetsky , Anhei Shu , and Dan S . Wallach . 2011 . Quire : Lightweight Provenance for Smart Phone Operating Systems Proceedings of USENIX Security '11. USENIX Association , 23--23. Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, and Dan S. Wallach. 2011. Quire: Lightweight Provenance for Smart Phone Operating Systems Proceedings of USENIX Security '11. USENIX Association, 23--23."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2774993.2775064"},{"key":"e_1_3_2_2_18_1","volume-title":"Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (OSDI'10)","author":"Enck William","year":"1924","unstructured":"William Enck , Peter Gilbert , Byung-Gon Chun , Landon P. Cox , Jaeyeon Jung , Patrick McDaniel , and Anmol N. Sheth . 2010. TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones . In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (OSDI'10) . USENIX Association, Berkeley, CA, USA, 393--407. http:\/\/dl.acm.org\/citation.cfm?id= 1924 943.1924971 William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth. 2010. TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (OSDI'10). USENIX Association, Berkeley, CA, USA, 393--407. http:\/\/dl.acm.org\/citation.cfm?id=1924943.1924971"},{"key":"e_1_3_2_2_19_1","volume-title":"Proceedings of the 20th USENIX Conference on Security Symposium (SEC '11)","author":"Felt Adrienne Porter","year":"2011","unstructured":"Adrienne Porter Felt , Helen J. Wang , Alexander Moshchuk , Steven Hanna , and Erika Chin . 2011 . Permission Re-delegation: Attacks and Defenses . In Proceedings of the 20th USENIX Conference on Security Symposium (SEC '11) . USENIX Association, Berkeley, CA, USA, 22--22. http:\/\/dl.acm.org\/citation.cfm?id= 2028067.2028089 Adrienne Porter Felt, Helen J. Wang, Alexander Moshchuk, Steven Hanna, and Erika Chin. 2011. Permission Re-delegation: Attacks and Defenses. In Proceedings of the 20th USENIX Conference on Security Symposium (SEC '11). USENIX Association, Berkeley, CA, USA, 22--22. http:\/\/dl.acm.org\/citation.cfm?id=2028067.2028089"},{"key":"e_1_3_2_2_20_1","unstructured":"Floodlight. 2018. (2018). http:\/\/www.projectfloodlight.org\/  Floodlight. 2018. (2018). http:\/\/www.projectfloodlight.org\/"},{"key":"e_1_3_2_2_21_1","volume-title":"Floodlight Controller: MemoryStorageSource (Dev).","author":"Floodlight Project","year":"2018","unstructured":"Project Floodlight . 2018 . Floodlight Controller: MemoryStorageSource (Dev). (2018). https:\/\/floodlight.atlassian.net\/wiki\/spaces\/floodlightcontroller\/pages\/1343633\/MemoryStorageSource+Dev Project Floodlight. 2018. Floodlight Controller: MemoryStorageSource (Dev). (2018). https:\/\/floodlight.atlassian.net\/wiki\/spaces\/floodlightcontroller\/pages\/1343633\/MemoryStorageSource+Dev"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SSDM.2002.1029704"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1921151.1921160"},{"key":"e_1_3_2_2_24_1","unstructured":"Linux Foundation. 2018. Open vSwitch. (2018). https:\/\/www.openvswitch.org\/  Linux Foundation. 2018. Open vSwitch. (2018). https:\/\/www.openvswitch.org\/"},{"key":"e_1_3_2_2_25_1","unstructured":"Python Software Foundation. 2018. ast--Abstract Syntax Trees. (2018). https:\/\/docs.python.org\/3\/library\/ast.html  Python Software Foundation. 2018. ast--Abstract Syntax Trees. (2018). https:\/\/docs.python.org\/3\/library\/ast.html"},{"key":"e_1_3_2_2_26_1","volume-title":"LOMAC: Low Water-Mark integrity protection for COTS environments Proceeding of the 2000 IEEE Symposium on Security and Privacy (S&P '00). 230--245.","author":"Fraser Timothy","year":"2000","unstructured":"Timothy Fraser . 2000 . LOMAC: Low Water-Mark integrity protection for COTS environments Proceeding of the 2000 IEEE Symposium on Security and Privacy (S&P '00). 230--245. Timothy Fraser. 2000. LOMAC: Low Water-Mark integrity protection for COTS environments Proceeding of the 2000 IEEE Symposium on Security and Privacy (S&P '00). 230--245."},{"key":"e_1_3_2_2_27_1","volume-title":"SPADE: Support for Provenance Auditing in Distributed Environments Proceedings of Middleware '12","author":"Gehani Ashish","year":"2012","unstructured":"Ashish Gehani and Dawood Tariq . 2012 . SPADE: Support for Provenance Auditing in Distributed Environments Proceedings of Middleware '12 . Springer-Verlag New York, 101--120. Ashish Gehani and Dawood Tariq. 2012. SPADE: Support for Provenance Auditing in Distributed Environments Proceedings of Middleware '12. Springer-Verlag New York, 101--120."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.15"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1384609.1384625"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/54289.871709"},{"key":"e_1_3_2_2_31_1","volume-title":"2018 a. HPE SDN app store. https:\/\/community.arubanetworks.com\/t5\/SDN-Apps\/ct-p\/SDN-Apps. (Aug","author":"Enterprise Hewlett-Packard","year":"2018","unstructured":"Hewlett-Packard Enterprise . 2018 a. HPE SDN app store. https:\/\/community.arubanetworks.com\/t5\/SDN-Apps\/ct-p\/SDN-Apps. (Aug . 2018 ). Hewlett-Packard Enterprise. 2018 a. HPE SDN app store. https:\/\/community.arubanetworks.com\/t5\/SDN-Apps\/ct-p\/SDN-Apps. (Aug. 2018)."},{"key":"e_1_3_2_2_32_1","volume-title":"2018 b. Software Defined Networking. (Aug","author":"Enterprise Hewlett-Packard","year":"2018","unstructured":"Hewlett-Packard Enterprise . 2018 b. Software Defined Networking. (Aug .. 2018 ). https:\/\/www.hpe.com\/us\/en\/networking\/sdn.html Hewlett-Packard Enterprise. 2018 b. Software Defined Networking. (Aug.. 2018). https:\/\/www.hpe.com\/us\/en\/networking\/sdn.html"},{"key":"e_1_3_2_2_33_1","volume-title":"According to IDC. https:\/\/www.idc.com\/getdoc.jsp?containerId=prUS41005016. (3 Feb..","author":"International Data Corporation","year":"2016","unstructured":"International Data Corporation . 2016. SDN Market to Experience Strong Growth Over Next Several Years , According to IDC. https:\/\/www.idc.com\/getdoc.jsp?containerId=prUS41005016. (3 Feb.. 2016 ). International Data Corporation. 2016. SDN Market to Experience Strong Growth Over Next Several Years, According to IDC. https:\/\/www.idc.com\/getdoc.jsp?containerId=prUS41005016. (3 Feb.. 2016)."},{"key":"e_1_3_2_2_34_1","volume-title":"BEADS: Automated Attack Discovery in OpenFlow-based SDN Systems Proceedings of RAID '17","author":"Jero Samuel","year":"2017","unstructured":"Samuel Jero , Xiangyu Bu , Cristina Nita-Rotaru , Hamed Okhravi , Richard Skowyra , and Sonia Fahmy . 2017 . BEADS: Automated Attack Discovery in OpenFlow-based SDN Systems Proceedings of RAID '17 . Samuel Jero, Xiangyu Bu, Cristina Nita-Rotaru, Hamed Okhravi, Richard Skowyra, and Sonia Fahmy. 2017. BEADS: Automated Attack Discovery in OpenFlow-based SDN Systems Proceedings of RAID '17."},{"key":"e_1_3_2_2_35_1","volume-title":"Real Time Network Policy Checking Using Header Space Analysis Proceedings of NSDI '13","author":"Kazemian Peyman","year":"2013","unstructured":"Peyman Kazemian , Michael Chan , Hongyi Zeng , George Varghese , Nick McKeown , and Scott Whyte . 2013 . Real Time Network Policy Checking Using Header Space Analysis Proceedings of NSDI '13 . 99--111. http:\/\/dl.acm.org\/citation.cfm?id=2482626.2482638 Peyman Kazemian, Michael Chan, Hongyi Zeng, George Varghese, Nick McKeown, and Scott Whyte. 2013. Real Time Network Policy Checking Using Header Space Analysis Proceedings of NSDI '13. 99--111. http:\/\/dl.acm.org\/citation.cfm?id=2482626.2482638"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2377677.2377766"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491199"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2876019.2876026"},{"key":"e_1_3_2_2_40_1","volume-title":"High Accuracy Attack Provenance via Binary-based Execution Partition Proceedings of NDSS '13","author":"Lee Kyu Hyung","unstructured":"Kyu Hyung Lee , Xiangyu Zhang , and Dongyan Xu. 2013. High Accuracy Attack Provenance via Binary-based Execution Partition Proceedings of NDSS '13 . Internet Society . Kyu Hyung Lee, Xiangyu Zhang, and Dongyan Xu. 2013. High Accuracy Attack Provenance via Binary-based Execution Partition Proceedings of NDSS '13. Internet Society."},{"key":"e_1_3_2_2_41_1","volume-title":"DELTA: A Security Assessment Framework for Software-Defined Networks Proceedings of NDSS '17","author":"Lee Seungsoo","year":"2017","unstructured":"Seungsoo Lee , Changhoon Yoon , Chanhee Lee , Seungwon Shin , Vinod Yegneswaran , and Phillip Porras . 2017 . DELTA: A Security Assessment Framework for Software-Defined Networks Proceedings of NDSS '17 . Internet Society. Seungsoo Lee, Changhoon Yoon, Chanhee Lee, Seungwon Shin, Vinod Yegneswaran, and Phillip Porras. 2017. DELTA: A Security Assessment Framework for Software-Defined Networks Proceedings of NDSS '17. Internet Society."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2876019.2876024"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/322017.322025"},{"key":"e_1_3_2_2_44_1","volume-title":"MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning. In 26th USENIX Security Symposium.","author":"Ma Shiqing","year":"2017","unstructured":"Shiqing Ma , Juan Zhai , Fei Wang , Kyu Hyung Lee , Xiangyu Zhang , and Dongyan Xu . 2017 . MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning. In 26th USENIX Security Symposium. Shiqing Ma, Juan Zhai, Fei Wang, Kyu Hyung Lee, Xiangyu Zhang, and Dongyan Xu. 2017. MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning. In 26th USENIX Security Symposium."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23350"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2452376.2452478"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535771.2535795"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103621.2103685"},{"key":"e_1_3_2_2_50_1","volume-title":"Proceedings of NSDI '13","volume":"13","author":"Monsanto Christopher","year":"2013","unstructured":"Christopher Monsanto , Joshua Reich , Nate Foster , Jennifer Rexford , David Walker , 2013 . Composing Software Defined Networks . In Proceedings of NSDI '13 , Vol. Vol. 13 . 1--13. http:\/\/dl.acm.org\/citation.cfm?id=2482626.2482629 Christopher Monsanto, Joshua Reich, Nate Foster, Jennifer Rexford, David Walker, et almbox.. 2013. Composing Software Defined Networks. In Proceedings of NSDI '13, Vol. Vol. 13. 1--13. http:\/\/dl.acm.org\/citation.cfm?id=2482626.2482629"},{"key":"e_1_3_2_2_51_1","volume-title":"Provenance: an introduction to PROV. Synthesis Lectures on the Semantic Web: Theory and Technology","author":"Moreau Luc","unstructured":"Luc Moreau and Paul Groth . 2013. Provenance: an introduction to PROV. Synthesis Lectures on the Semantic Web: Theory and Technology , Vol. Vol. 3 . Morgan & Claypool Publishers . 1--129 pages. Luc Moreau and Paul Groth. 2013. Provenance: an introduction to PROV. Synthesis Lectures on the Semantic Web: Theory and Technology, Vol. Vol. 3. Morgan & Claypool Publishers. 1--129 pages."},{"key":"e_1_3_2_2_52_1","volume-title":"Proceedings of USENIX ATC '06","author":"Muniswamy-Reddy Kiran-Kumar","year":"2006","unstructured":"Kiran-Kumar Muniswamy-Reddy , David A. Holland , Uri Braun , and Margo Seltzer . 2006 . Provenance-aware Storage Systems . In Proceedings of USENIX ATC '06 . USENIX Association, 1. Kiran-Kumar Muniswamy-Reddy, David A. Holland, Uri Braun, and Margo Seltzer. 2006. Provenance-aware Storage Systems. In Proceedings of USENIX ATC '06. USENIX Association, 1."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266669"},{"key":"e_1_3_2_2_54_1","volume-title":"Jif: Java+ Information Flow.","author":"Myers Andrew C.","year":"2018","unstructured":"Andrew C. Myers , Lantian Zheng , Steve Zdancewic , Stephen Chong , and Nathaniel Nystrom . 2018 . Jif: Java+ Information Flow. (2018). http:\/\/www.cs.cornell.edu\/jif\/ Andrew C. Myers, Lantian Zheng, Steve Zdancewic, Stephen Chong, and Nathaniel Nystrom. 2018. Jif: Java+ Information Flow. (2018). http:\/\/www.cs.cornell.edu\/jif\/"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241181"},{"key":"e_1_3_2_2_56_1","volume-title":"https:\/\/jgrapht.org\/","author":"Naveh Barak","year":"2018","unstructured":"Barak Naveh . 2018. JGraph T. ( 2018 ). https:\/\/jgrapht.org\/ Barak Naveh. 2018. JGraphT. (2018). https:\/\/jgrapht.org\/"},{"key":"e_1_3_2_2_57_1","unstructured":"Open Networking Foundation. 2018. Creating Security-Mode Compatible ONOS Applications. (2018). https:\/\/wiki.onosproject.org\/display\/ONOS\/Creating+Security-Mode+compatible+ONOS+applications  Open Networking Foundation. 2018. Creating Security-Mode Compatible ONOS Applications. (2018). https:\/\/wiki.onosproject.org\/display\/ONOS\/Creating+Security-Mode+compatible+ONOS+applications"},{"key":"e_1_3_2_2_58_1","unstructured":"Open Networking Foundation. 2018. Enabling Security-Mode ONOS. (2018). https:\/\/wiki.onosproject.org\/display\/ONOS\/Enabling+Security-Mode+ONOS  Open Networking Foundation. 2018. Enabling Security-Mode ONOS. (2018). https:\/\/wiki.onosproject.org\/display\/ONOS\/Enabling+Security-Mode+ONOS"},{"key":"e_1_3_2_2_59_1","unstructured":"Open Networking Foundation. 2018. GitHub -- onos\/apps at 1.10.0. (2018). https:\/\/github.com\/opennetworkinglab\/onos\/tree\/1.10.0\/apps  Open Networking Foundation. 2018. GitHub -- onos\/apps at 1.10.0. (2018). https:\/\/github.com\/opennetworkinglab\/onos\/tree\/1.10.0\/apps"},{"key":"e_1_3_2_2_60_1","unstructured":"Open Networking Foundation. 2018. GitHub -- opennetworkinglab\/onos at 1.10.0. (2018). https:\/\/github.com\/opennetworkinglab\/onos\/tree\/1.10.0  Open Networking Foundation. 2018. GitHub -- opennetworkinglab\/onos at 1.10.0. (2018). https:\/\/github.com\/opennetworkinglab\/onos\/tree\/1.10.0"},{"key":"e_1_3_2_2_61_1","volume-title":"ONOS - A new carrier-grade SDN network operating system designed for high availability, performance, scale-out. (Aug","author":"Foundation Open Networking","year":"2018","unstructured":"Open Networking Foundation . 2018. ONOS - A new carrier-grade SDN network operating system designed for high availability, performance, scale-out. (Aug .. 2018 ). https:\/\/onosproject.org\/ Open Networking Foundation. 2018. ONOS - A new carrier-grade SDN network operating system designed for high availability, performance, scale-out. (Aug.. 2018). https:\/\/onosproject.org\/"},{"key":"e_1_3_2_2_62_1","unstructured":"Open Networking Foundation. 2018. ONOS In Action. (2018). https:\/\/onosproject.org\/in-action\/  Open Networking Foundation. 2018. ONOS In Action. (2018). https:\/\/onosproject.org\/in-action\/"},{"key":"e_1_3_2_2_63_1","volume-title":"Security Advisories: ONOS.","author":"Foundation Open Networking","year":"2018","unstructured":"Open Networking Foundation . 2018 . Security Advisories: ONOS. (2018). https:\/\/wiki.onosproject.org\/display\/ONOS\/Security+advisories Open Networking Foundation. 2018. Security Advisories: ONOS. (2018). https:\/\/wiki.onosproject.org\/display\/ONOS\/Security+advisories"},{"key":"e_1_3_2_2_64_1","unstructured":"OpenDaylight. 2018. Home - OpenDaylight. (Aug.. 2018). https:\/\/www.opendaylight.org\/  OpenDaylight. 2018. Home - OpenDaylight. (Aug.. 2018). https:\/\/www.opendaylight.org\/"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2914642.2914647"},{"key":"e_1_3_2_2_66_1","unstructured":"T. Pasquier J. Singh D. Eyers and J. Bacon. 2017. CamFlow: Managed Data-sharing for Cloud Services. IEEE Transactions on Cloud Computing Vol. PP 99 (2017) 1--1.  T. Pasquier J. Singh D. Eyers and J. Bacon. 2017. CamFlow: Managed Data-sharing for Cloud Services. IEEE Transactions on Cloud Computing Vol. PP 99 (2017) 1--1."},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420989"},{"key":"e_1_3_2_2_68_1","volume-title":"Securing the Software-Defined Network Control Layer Proceedings of NDSS '15","author":"Porras Phillip","year":"2015","unstructured":"Phillip Porras , Steven Cheung , Martin Fong , Keith Skinner , and Vinod Yegneswaran . 2015 . Securing the Software-Defined Network Control Layer Proceedings of NDSS '15 . Internet Society. Phillip Porras, Steven Cheung, Martin Fong, Keith Skinner, and Vinod Yegneswaran. 2015. Securing the Software-Defined Network Control Layer Proceedings of NDSS '15. Internet Society."},{"key":"e_1_3_2_2_69_1","unstructured":"POX. 2018. POX. (Aug.. 2018). https:\/\/github.com\/noxrepo\/pox  POX. 2018. POX. (Aug.. 2018). https:\/\/github.com\/noxrepo\/pox"},{"key":"e_1_3_2_2_70_1","unstructured":"OpenDaylight Project. 2018. OpenDaylight Documentation: Authentication Authorization and Accounting (AAA) Services. (2018). https:\/\/docs.opendaylight.org\/en\/stable-boron\/user-guide\/authentication-and-authorization-services.html  OpenDaylight Project. 2018. OpenDaylight Documentation: Authentication Authorization and Accounting (AAA) Services. (2018). https:\/\/docs.opendaylight.org\/en\/stable-boron\/user-guide\/authentication-and-authorization-services.html"},{"key":"e_1_3_2_2_71_1","volume-title":"Ryu SDN Framework. (Aug","author":"Framework Community Ryu SDN","year":"2018","unstructured":"Ryu SDN Framework Community . 2018. Ryu SDN Framework. (Aug .. 2018 ). http:\/\/osrg.github.io\/ryu\/ Ryu SDN Framework Community. 2018. Ryu SDN Framework. (Aug.. 2018). http:\/\/osrg.github.io\/ryu\/"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2453114"},{"key":"e_1_3_2_2_74_1","volume-title":"FRESCO: Modular composable security services for software-defined networks Proceedings of NDSS '13","author":"Shin SW","year":"2013","unstructured":"SW Shin , Phillip Porras , Vinod Yegneswaran , Martin Fong , Guofei Gu , and Mabry Tyson . 2013 . FRESCO: Modular composable security services for software-defined networks Proceedings of NDSS '13 . Internet Society . SW Shin, Phillip Porras, Vinod Yegneswaran, Martin Fong, Guofei Gu, and Mabry Tyson. 2013. FRESCO: Modular composable security services for software-defined networks Proceedings of NDSS '13. Internet Society."},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660353"},{"key":"e_1_3_2_2_76_1","unstructured":"The Flick Team. 2018. C Abstract Syntax Tree (CAST) Representation. (2018). http:\/\/www.cs.utah.edu\/flux\/flick\/current\/doc\/guts\/gutsch6.html  The Flick Team. 2018. C Abstract Syntax Tree (CAST) Representation. (2018). http:\/\/www.cs.utah.edu\/flux\/flick\/current\/doc\/guts\/gutsch6.html"},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978398"},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"crossref","unstructured":"Y. Tseng M. Pattaranantakul R. He Z. Zhang and F. Na\u00eft-Abdesselam. 2017. Controller DAC: Securing SDN controller with dynamic access control Proceedings of IEEE ICC '17. 1--6.  Y. Tseng M. Pattaranantakul R. He Z. Zhang and F. Na\u00eft-Abdesselam. 2017. Controller DAC: Securing SDN controller with dynamic access control Proceedings of IEEE ICC '17. 1--6.","DOI":"10.1109\/ICC.2017.7997249"},{"key":"e_1_3_2_2_79_1","volume-title":"Sanders","author":"Ujcich Benjamin E.","year":"2018","unstructured":"Benjamin E. Ujcich , Adam Bates , and William H . Sanders . 2018 . A Provenance Model for the European Union General Data Protection Regulation Provenance and Annotation of Data and Processes , bibfieldeditorKhalid Belhajjame, Ashish Gehani, and Pinar Alper (Eds.). Springer International Publishing. Benjamin E. Ujcich, Adam Bates, and William H. Sanders. 2018. A Provenance Model for the European Union General Data Protection Regulation Provenance and Annotation of Data and Processes, bibfieldeditorKhalid Belhajjame, Ashish Gehani, and Pinar Alper (Eds.). Springer International Publishing."},{"key":"e_1_3_2_2_80_1","volume-title":"2017 a. Towards an accountable software-defined networking architecture Proceedings of IEEE NetSoft '17","author":"Ujcich Benjamin E.","unstructured":"Benjamin E. Ujcich , Andrew Miller , Adam Bates , and William H. Sanders . 2017 a. Towards an accountable software-defined networking architecture Proceedings of IEEE NetSoft '17 . IEEE. Benjamin E. Ujcich, Andrew Miller, Adam Bates, and William H. Sanders. 2017 a. Towards an accountable software-defined networking architecture Proceedings of IEEE NetSoft '17. IEEE."},{"key":"e_1_3_2_2_81_1","volume-title":"ATTAIN: An Attack Injection Framework for Software-Defined Networking Proceedings of IEEE\/IFIP DSN '17","author":"Ujcich Benjamin E.","unstructured":"Benjamin E. Ujcich , Uttam Thakore , and William H. Sanders . 2017 b . ATTAIN: An Attack Injection Framework for Software-Defined Networking Proceedings of IEEE\/IFIP DSN '17 . IEEE. Benjamin E. Ujcich, Uttam Thakore, and William H. Sanders. 2017 b. ATTAIN: An Attack Injection Framework for Software-Defined Networking Proceedings of IEEE\/IFIP DSN '17. IEEE."},{"key":"e_1_3_2_2_82_1","unstructured":"Danny van Bruggen. 2018. JavaParser: For Parsing Java Code. (2018). http:\/\/javaparser.org\/  Danny van Bruggen. 2018. JavaParser: For Parsing Java Code. (2018). http:\/\/javaparser.org\/"},{"key":"e_1_3_2_2_83_1","volume-title":"Doxygen: Generate documentation from source code.","author":"van Heesch Dimitri","year":"2018","unstructured":"Dimitri van Heesch . 2018 . Doxygen: Generate documentation from source code. (2018). http:\/\/www.stack.nl\/ dimitri\/doxygen\/ Dimitri van Heesch. 2018. Doxygen: Generate documentation from source code. (2018). http:\/\/www.stack.nl\/ dimitri\/doxygen\/"},{"key":"e_1_3_2_2_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342451"},{"key":"e_1_3_2_2_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.20"},{"key":"e_1_3_2_2_86_1","volume-title":"Trio: A System for Integrated Management of Data, Accuracy, and Lineage. Technical Report 2004--40. Stanford InfoLab. LCCN0316","author":"Widom Jennifer","year":"2004","unstructured":"Jennifer Widom . 2004 . Trio: A System for Integrated Management of Data, Accuracy, and Lineage. Technical Report 2004--40. Stanford InfoLab. LCCN0316 . http:\/\/ilpubs.stanford.edu:8090\/658\/ Jennifer Widom. 2004. Trio: A System for Integrated Management of Data, Accuracy, and Lineage. Technical Report 2004--40. Stanford InfoLab. LCCN0316. http:\/\/ilpubs.stanford.edu:8090\/658\/"},{"key":"e_1_3_2_2_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/2834050.2834112"},{"key":"e_1_3_2_2_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626335"},{"key":"e_1_3_2_2_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134603"},{"key":"e_1_3_2_2_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043584"}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","location":"Toronto Canada","acronym":"CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243759","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243759","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243759","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:32Z","timestamp":1750208252000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243759"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":89,"alternative-id":["10.1145\/3243734.3243759","10.1145\/3243734"],"URL":"https:\/\/doi.org\/10.1145\/3243734.3243759","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}