{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T01:52:14Z","timestamp":1773193934222,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,27]],"date-time":"2019-10-27T00:00:00Z","timestamp":1572134400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Schweizerischer Nationalfonds zur F\u00f6rderung der Wissenschaftlichen Forschung","award":["BSSGI0_155834"],"award-info":[{"award-number":["BSSGI0_155834"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,27]]},"DOI":"10.1145\/3341301.3359647","type":"proceedings-article","created":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T13:34:22Z","timestamp":1571664862000},"page":"275-290","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Verifying software network functions with no verification expertise"],"prefix":"10.1145","author":[{"given":"Arseniy","family":"Zaostrovnykh","sequence":"first","affiliation":[{"name":"EPFL, Switzerland"}]},{"given":"Solal","family":"Pirelli","sequence":"additional","affiliation":[{"name":"EPFL, Switzerland"}]},{"given":"Rishabh","family":"Iyer","sequence":"additional","affiliation":[{"name":"EPFL, Switzerland"}]},{"given":"Matteo","family":"Rizzo","sequence":"additional","affiliation":[{"name":"EPFL, Switzerland"}]},{"given":"Luis","family":"Pedrosa","sequence":"additional","affiliation":[{"name":"EPFL, Switzerland"}]},{"given":"Katerina","family":"Argyraki","sequence":"additional","affiliation":[{"name":"EPFL, Switzerland"}]},{"given":"George","family":"Candea","sequence":"additional","affiliation":[{"name":"EPFL, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2019,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872404"},{"key":"e_1_3_2_1_2_1","volume-title":"LMS-Verify: Abstraction Without Regret for Verified Systems Programming. In Symp. on Principles of Programming Languages.","author":"Amin Nada","year":"2017","unstructured":"Nada Amin and Tiark Rompf . 2017 . LMS-Verify: Abstraction Without Regret for Verified Systems Programming. In Symp. on Principles of Programming Languages. Nada Amin and Tiark Rompf. 2017. LMS-Verify: Abstraction Without Regret for Verified Systems Programming. In Symp. on Principles of Programming Languages."},{"key":"e_1_3_2_1_3_1","volume-title":"Intl. Conf. on Formal Methods in Computer-Aided Design.","author":"Ball Thomas","year":"2010","unstructured":"Thomas Ball , Ella Bounimova , Rahul Kumar , and Vladimir Levin . 2010 . SLAM2: Static Driver Verification with Under 4% False Alarms . In Intl. Conf. on Formal Methods in Computer-Aided Design. Thomas Ball, Ella Bounimova, Rahul Kumar, and Vladimir Levin. 2010. SLAM2: Static Driver Verification with Under 4% False Alarms. In Intl. Conf. on Formal Methods in Computer-Aided Design."},{"key":"e_1_3_2_1_4_1","volume-title":"Verified Correctness and Security of OpenSSL HMAC. In USENIX Security Symp.","author":"Beringer Lennart","year":"2015","unstructured":"Lennart Beringer , Adam Petcher , Q Ye Katherine , and Andrew W Appel . 2015 . Verified Correctness and Security of OpenSSL HMAC. In USENIX Security Symp. Lennart Beringer, Adam Petcher, Q Ye Katherine, and Andrew W Appel. 2015. Verified Correctness and Security of OpenSSL HMAC. In USENIX Security Symp."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080123"},{"key":"e_1_3_2_1_6_1","volume-title":"RWset: Attacking Path Explosion in Constraint-Based Test Generation. In Intl. Conf. on Tools and Algorithms for the Construction and Analysis of Systems.","author":"Boonstoppel Peter","unstructured":"Peter Boonstoppel , Cristian Cadar , and Dawson R. Engler . 2008 . RWset: Attacking Path Explosion in Constraint-Based Test Generation. In Intl. Conf. on Tools and Algorithms for the Construction and Analysis of Systems. Peter Boonstoppel, Cristian Cadar, and Dawson R. Engler. 2008. RWset: Attacking Path Explosion in Constraint-Based Test Generation. In Intl. Conf. on Tools and Algorithms for the Construction and Analysis of Systems."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"S. Bradner and J. McQuaid. 1999. Benchmarking Methodology for Network Interconnect Devices. RFC 2544. RFC Editor. http:\/\/www.rfc-editor.org\/rfc\/rfc2647.txt  S. Bradner and J. McQuaid. 1999. Benchmarking Methodology for Network Interconnect Devices. RFC 2544. RFC Editor. http:\/\/www.rfc-editor.org\/rfc\/rfc2647.txt","DOI":"10.17487\/rfc2544"},{"key":"e_1_3_2_1_8_1","volume-title":"KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. In Symp. on Operating Sys. Design and Implem.","author":"Cadar Cristian","unstructured":"Cristian Cadar , Daniel Dunbar , and Dawson R. Engler . 2008 . KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. In Symp. on Operating Sys. Design and Implem. Cristian Cadar, Daniel Dunbar, and Dawson R. Engler. 2008. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. In Symp. on Operating Sys. Design and Implem."},{"key":"e_1_3_2_1_9_1","volume-title":"Symp. on Networked Systems Design and Implem.","author":"Canini Marco","year":"2012","unstructured":"Marco Canini , Daniele Venzano , Peter Pere\u0161\u00edni , Dejan Kosti\u0107 , and Jennifer Rexford . 2012 . A NICE Way to Test OpenFlow Applications . In Symp. on Networked Systems Design and Implem. Marco Canini, Daniele Venzano, Peter Pere\u0161\u00edni, Dejan Kosti\u0107, and Jennifer Rexford. 2012. A NICE Way to Test OpenFlow Applications. In Symp. on Networked Systems Design and Implem."},{"key":"e_1_3_2_1_10_1","volume-title":"Using Crash Hoare Logic for Certifying the FSCQ File System. In Symp. on Operating Systems Principles.","author":"Chen Haogang","year":"2015","unstructured":"Haogang Chen , Daniel Ziegler , Tej Chajed , Adam Chlipala , M Frans Kaashoek , and Nickolai Zeldovich . 2015 . Using Crash Hoare Logic for Certifying the FSCQ File System. In Symp. on Operating Systems Principles. Haogang Chen, Daniel Ziegler, Tej Chajed, Adam Chlipala, M Frans Kaashoek, and Nickolai Zeldovich. 2015. Using Crash Hoare Logic for Certifying the FSCQ File System. In Symp. on Operating Systems Principles."},{"key":"e_1_3_2_1_12_1","volume-title":"Software Dataplane Verification. In Symp. on Networked Systems Design and Implem.","author":"Dobrescu Mihai","year":"2014","unstructured":"Mihai Dobrescu and Katerina Argyraki . 2014 . Software Dataplane Verification. In Symp. on Networked Systems Design and Implem. Mihai Dobrescu and Katerina Argyraki. 2014. Software Dataplane Verification. In Symp. on Networked Systems Design and Implem."},{"key":"e_1_3_2_1_13_1","unstructured":"DPDK 2019. Data Plane Development Kit. http:\/\/dpdk.org.  DPDK 2019. Data Plane Development Kit. http:\/\/dpdk.org."},{"key":"e_1_3_2_1_14_1","volume-title":"Maglev: A Fast and Reliable Software Network Load Balancer. In Symp. on Networked Systems Design and Implem.","author":"Eisenbud Daniel E.","year":"2016","unstructured":"Daniel E. Eisenbud , Cheng Yi , Carlo Contavalli , Cody Smith , Roman Kononov , Eric Mann-Hielscher , Ardas Cilingiroglu , Bin Cheyney , Wentao Shang , and Jinnah Dylan Hosein . 2016 . Maglev: A Fast and Reliable Software Network Load Balancer. In Symp. on Networked Systems Design and Implem. Daniel E. Eisenbud, Cheng Yi, Carlo Contavalli, Cody Smith, Roman Kononov, Eric Mann-Hielscher, Ardas Cilingiroglu, Bin Cheyney, Wentao Shang, and Jinnah Dylan Hosein. 2016. Maglev: A Fast and Reliable Software Network Load Balancer. In Symp. on Networked Systems Design and Implem."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815692"},{"key":"e_1_3_2_1_16_1","volume-title":"BUZZ: Testing Context-Dependent Policies in Stateful Networks. In Symp. on Networked Systems Design and Implem.","author":"Fayaz Seyed K.","year":"2016","unstructured":"Seyed K. Fayaz , Tianlong Yu , Yoshiaki Tobioka , Sagar Chaki , and Vyas Sekar . 2016 . BUZZ: Testing Context-Dependent Policies in Stateful Networks. In Symp. on Networked Systems Design and Implem. Seyed K. Fayaz, Tianlong Yu, Yoshiaki Tobioka, Sagar Chaki, and Vyas Sekar. 2016. BUZZ: Testing Context-Dependent Policies in Stateful Networks. In Symp. on Networked Systems Design and Implem."},{"key":"e_1_3_2_1_17_1","volume-title":"Symp. on Networked Systems Design and Implem.","author":"Fogel Ari","year":"2015","unstructured":"Ari Fogel , Stanley Fung , Luis Pedrosa , Meg Walraed-Sullivan , Ramesh Govindan , Ratul Mahajan , and Todd Millstein . 2015 . A General Approach to Network Configuration Analysis . In Symp. on Networked Systems Design and Implem. Ari Fogel, Stanley Fung, Luis Pedrosa, Meg Walraed-Sullivan, Ramesh Govindan, Ratul Mahajan, and Todd Millstein. 2015. A General Approach to Network Configuration Analysis. In Symp. on Networked Systems Design and Implem."},{"key":"e_1_3_2_1_18_1","unstructured":"GitStats 2018. GitStats - linux - Lines. https:\/\/phoronix.com\/misc\/linux-20180915\/lines.html.  GitStats 2018. GitStats - linux - Lines. https:\/\/phoronix.com\/misc\/linux-20180915\/lines.html."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7045396"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815428"},{"key":"e_1_3_2_1_21_1","unstructured":"Bart Jacobs and Frank Piessens. 2008. The VeriFast program verifier. https:\/\/lirias.kuleuven.be\/retrieve\/30786  Bart Jacobs and Frank Piessens. 2008. The VeriFast program verifier. https:\/\/lirias.kuleuven.be\/retrieve\/30786"},{"key":"e_1_3_2_1_22_1","volume-title":"Real Time Network Policy Checking Using Header Space Analysis. In Symp. on Networked Systems Design and Implem.","author":"Kazemian Peyman","year":"2013","unstructured":"Peyman Kazemian , Michael Chan , Hongyi Zeng , George Varghese , Nick McKeown , and Scott Whyte . 2013 . Real Time Network Policy Checking Using Header Space Analysis. In Symp. on Networked Systems Design and Implem. Peyman Kazemian, Michael Chan, Hongyi Zeng, George Varghese, Nick McKeown, and Scott Whyte. 2013. Real Time Network Policy Checking Using Header Space Analysis. In Symp. on Networked Systems Design and Implem."},{"key":"e_1_3_2_1_23_1","volume-title":"Header Space Analysis: Static Checking For Networks. In Symp. on Networked Systems Design and Implem.","author":"Kazemian Peyman","year":"2012","unstructured":"Peyman Kazemian , George Varghese , and Nick McKeown . 2012 . Header Space Analysis: Static Checking For Networks. In Symp. on Networked Systems Design and Implem. Peyman Kazemian, George Varghese, and Nick McKeown. 2012. Header Space Analysis: Static Checking For Networks. In Symp. on Networked Systems Design and Implem."},{"key":"e_1_3_2_1_24_1","volume-title":"VeriFlow: Verifying Network-Wide Invariants in Real Time. In Symp. on Networked Systems Design and Implem.","author":"Khurshid Ahmed","unstructured":"Ahmed Khurshid , Xuan Zou , Wenxuan Zhou , Matthew Caesar , and P. Brighten Godfrey . 2013 . VeriFlow: Verifying Network-Wide Invariants in Real Time. In Symp. on Networked Systems Design and Implem. Ahmed Khurshid, Xuan Zou, Wenxuan Zhou, Matthew Caesar, and P. Brighten Godfrey. 2013. VeriFlow: Verifying Network-Wide Invariants in Real Time. In Symp. on Networked Systems Design and Implem."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/354871.354874"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254088"},{"key":"e_1_3_2_1_28_1","volume-title":"Checking Beliefs in Dynamic Networks. In Symp. on Networked Systems Design and Implem.","author":"Lopes Nuno P.","year":"2015","unstructured":"Nuno P. Lopes , Nikolaj Bj\u00f8rner , Patrice Godefroid , Karthick Jayaraman , and George Varghese . 2015 . Checking Beliefs in Dynamic Networks. In Symp. on Networked Systems Design and Implem. Nuno P. Lopes, Nikolaj Bj\u00f8rner, Patrice Godefroid, Karthick Jayaraman, and George Varghese. 2015. Checking Beliefs in Dynamic Networks. In Symp. on Networked Systems Design and Implem."},{"key":"e_1_3_2_1_29_1","volume-title":"Debugging the Data Plane with Anteater. In ACM SIGCOMM Conf.","author":"Mai Haohui","year":"2011","unstructured":"Haohui Mai , Ahmed Khurshid , Rachit Agarwal , Matthew Caesar , P. Brighten Godfrey , and Samuel Talmadge King . 2011 . Debugging the Data Plane with Anteater. In ACM SIGCOMM Conf. Haohui Mai, Ahmed Khurshid, Rachit Agarwal, Matthew Caesar, P. Brighten Godfrey, and Samuel Talmadge King. 2011. Debugging the Data Plane with Anteater. In ACM SIGCOMM Conf."},{"key":"e_1_3_2_1_30_1","volume-title":"ClickOS and the Art of Network Function Virtualization. In Symp. on Networked Systems Design and Implem.","author":"Martins Joao","year":"2014","unstructured":"Joao Martins , Mohamed Ahmed , Costin Raiciu , Vladimir Olteanu , Michio Honda , Roberto Bifulco , and Felipe Huici . 2014 . ClickOS and the Art of Network Function Virtualization. In Symp. on Networked Systems Design and Implem. Joao Martins, Mohamed Ahmed, Costin Raiciu, Vladimir Olteanu, Michio Honda, Roberto Bifulco, and Felipe Huici. 2014. ClickOS and the Art of Network Function Virtualization. In Symp. on Networked Systems Design and Implem."},{"key":"e_1_3_2_1_31_1","volume-title":"Alembic: Automated Model Inference for Stateful Network Functions. In Symp. on Networked Systems Design and Implem.","author":"Moon Soo-Jin","year":"2019","unstructured":"Soo-Jin Moon , Jeffrey Helt , Yifei Yuan , Yves Bieri , Sujata Banerjee , Vyas Sekar , Wenfei Wu , Mihalis Yannakakis , and Ying Zhang . 2019 . Alembic: Automated Model Inference for Stateful Network Functions. In Symp. on Networked Systems Design and Implem. Soo-Jin Moon, Jeffrey Helt, Yifei Yuan, Yves Bieri, Sujata Banerjee, Vyas Sekar, Wenfei Wu, Mihalis Yannakakis, and Ying Zhang. 2019. Alembic: Automated Model Inference for Stateful Network Functions. In Symp. on Networked Systems Design and Implem."},{"key":"e_1_3_2_1_32_1","unstructured":"Moonpol 2018. Moonpol. https:\/\/github.com\/erkinkirdan\/moonpol.  Moonpol 2018. Moonpol. https:\/\/github.com\/erkinkirdan\/moonpol."},{"key":"e_1_3_2_1_33_1","volume-title":"Model Checking Large Network Protocol Implementations. In Symp. on Networked Systems Design and Implem.","author":"Musuvathi Madanlal","year":"2004","unstructured":"Madanlal Musuvathi , Dawson R Engler , 2004 . Model Checking Large Network Protocol Implementations. In Symp. on Networked Systems Design and Implem. Madanlal Musuvathi, Dawson R Engler, et al. 2004. Model Checking Large Network Protocol Implementations. In Symp. on Networked Systems Design and Implem."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132748"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209108.3209109"},{"key":"e_1_3_2_1_36_1","volume-title":"Symp. on Operating Sys. Design and Implem.","author":"Panda Aurojit","year":"2016","unstructured":"Aurojit Panda , Sangjin Han , Keon Jang , Melvin Walls , Sylvia Ratnasamy , and Scott Shenker . 2016 . NetBricks: Taking the V out of NFV . In Symp. on Operating Sys. Design and Implem. Aurojit Panda, Sangjin Han, Keon Jang, Melvin Walls, Sylvia Ratnasamy, and Scott Shenker. 2016. NetBricks: Taking the V out of NFV. In Symp. on Operating Sys. Design and Implem."},{"key":"e_1_3_2_1_37_1","volume-title":"Verifying Reachability in Networks with Mutable Datapaths. In Symp. on Networked Systems Design and Implem.","author":"Panda Aurojit","year":"2017","unstructured":"Aurojit Panda , Ori Lahav , Katerina Argyraki , Mooly Sagiv , and Scott Shenker . 2017 . Verifying Reachability in Networks with Mutable Datapaths. In Symp. on Networked Systems Design and Implem. Aurojit Panda, Ori Lahav, Katerina Argyraki, Mooly Sagiv, and Scott Shenker. 2017. Verifying Reachability in Networks with Mutable Datapaths. In Symp. on Networked Systems Design and Implem."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229538.3229540"},{"key":"e_1_3_2_1_39_1","volume-title":"Integrated Static Analysis for Linux Device Driver Verification. In Intl. Conf. on Integrated Formal Methods.","author":"Post Hendrik","year":"2007","unstructured":"Hendrik Post and Wolfgang K\u00fcchlin . 2007 . Integrated Static Analysis for Linux Device Driver Verification. In Intl. Conf. on Integrated Formal Methods. Hendrik Post and Wolfgang K\u00fcchlin. 2007. Integrated Static Analysis for Linux Device Driver Verification. In Intl. Conf. on Integrated Formal Methods."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098583.3098590"},{"key":"e_1_3_2_1_41_1","unstructured":"Rust 2019. Rust Language. https:\/\/www.rust-lang.org\/.  Rust 2019. Rust Language. https:\/\/www.rust-lang.org\/."},{"key":"e_1_3_2_1_42_1","volume-title":"Symp. on Networked Systems Design and Implem.","author":"Ryzhyk Leonid","year":"2017","unstructured":"Leonid Ryzhyk , Nikolaj Bj\u00f8rner , Marco Canini , Jean-Baptiste Jeannin , Cole Schlesinger , Douglas B. Terry , and George Varghese . 2017 . Correct by Construction Networks Using Stepwise Refinement . In Symp. on Networked Systems Design and Implem. Leonid Ryzhyk, Nikolaj Bj\u00f8rner, Marco Canini, Jean-Baptiste Jeannin, Cole Schlesinger, Douglas B. Terry, and George Varghese. 2017. Correct by Construction Networks Using Stepwise Refinement. In Symp. on Networked Systems Design and Implem."},{"key":"e_1_3_2_1_43_1","volume-title":"Symp. on Operating Sys. Design and Implem.","author":"Sigurbjarnarson Helgi","year":"2016","unstructured":"Helgi Sigurbjarnarson , James Bornholt , Emina Torlak , and Xi Wang . 2016 . Push-Button Verification of File Systems via Crash Refinement . In Symp. on Operating Sys. Design and Implem. Helgi Sigurbjarnarson, James Bornholt, Emina Torlak, and Xi Wang. 2016. Push-Button Verification of File Systems via Crash Refinement. In Symp. on Operating Sys. Design and Implem."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"P. Srisuresh and K. Egevang. 2001. Traditional IP Network Address Translator. RFC 3022. Internet Engineering Task Force.  P. Srisuresh and K. Egevang. 2001. Traditional IP Network Address Translator. RFC 3022. Internet Engineering Task Force.","DOI":"10.17487\/rfc3022"},{"key":"e_1_3_2_1_45_1","volume-title":"Compositional CompCert. In Symp. on Principles of Programming Languages.","author":"Stewart Gordon","year":"2015","unstructured":"Gordon Stewart , Lennart Beringer , Santiago Cuellar , and Andrew W Appel . 2015 . Compositional CompCert. In Symp. on Principles of Programming Languages. Gordon Stewart, Lennart Beringer, Santiago Cuellar, and Andrew W Appel. 2015. Compositional CompCert. In Symp. on Principles of Programming Languages."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934881"},{"key":"e_1_3_2_1_47_1","unstructured":"Vigor 2019. Source code repository. https:\/\/github.com\/vigor-nf\/vigor.  Vigor 2019. Source code repository. https:\/\/github.com\/vigor-nf\/vigor."},{"key":"e_1_3_2_1_48_1","volume-title":"On Static Reachability Analysis of IP Networks. In Intl. Conf. on Computer Communications.","author":"Xie Geoffrey G.","year":"2005","unstructured":"Geoffrey G. Xie , Jibin Zhan , David A. Maltz , Hui Zhang , Albert Greenberg , Gisli Hjalmtysson , and Jennifer Rexford . 2005 . On Static Reachability Analysis of IP Networks. In Intl. Conf. on Computer Communications. Geoffrey G. Xie, Jibin Zhan, David A. Maltz, Hui Zhang, Albert Greenberg, Gisli Hjalmtysson, and Jennifer Rexford. 2005. On Static Reachability Analysis of IP Networks. In Intl. Conf. on Computer Communications."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098833"},{"key":"e_1_3_2_1_50_1","volume-title":"Gravel: Automated Software Middlebox Verification. Technical Report CSE-18-09-03","author":"Zhang Kaiyuan","year":"2018","unstructured":"Kaiyuan Zhang , Danyang Zhuo , Aditya Akella , Arvind Krishnamurthy , and Wang Xi . 2018 . Gravel: Automated Software Middlebox Verification. Technical Report CSE-18-09-03 . University of Washington. Kaiyuan Zhang, Danyang Zhuo, Aditya Akella, Arvind Krishnamurthy, and Wang Xi. 2018. Gravel: Automated Software Middlebox Verification. Technical Report CSE-18-09-03. University of Washington."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134043"}],"event":{"name":"SOSP '19: ACM SIGOPS 27th Symposium on Operating Systems Principles","location":"Huntsville Ontario Canada","acronym":"SOSP '19","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","USENIX Assoc USENIX Assoc"]},"container-title":["Proceedings of the 27th ACM Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341301.3359647","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341301.3359647","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:56Z","timestamp":1750201976000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341301.3359647"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,27]]},"references-count":50,"alternative-id":["10.1145\/3341301.3359647","10.1145\/3341301"],"URL":"https:\/\/doi.org\/10.1145\/3341301.3359647","relation":{},"subject":[],"published":{"date-parts":[[2019,10,27]]},"assertion":[{"value":"2019-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}