{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T20:51:44Z","timestamp":1776286304861,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Swedish Foundation for Strategic Research (SSF)"},{"name":"Vinnova"},{"name":"European Community","award":["773717"],"award-info":[{"award-number":["773717"]}]},{"name":"Swedish Civil Contingencies Agency (MSB)"},{"name":"Swedish Research Council (VR)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,9]]},"DOI":"10.1145\/3359789.3359811","type":"proceedings-article","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T18:41:59Z","timestamp":1574448119000},"page":"17-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Co-evaluation of pattern matching algorithms on IoT devices with embedded GPUs"],"prefix":"10.1145","author":[{"given":"Charalampos","family":"Stylianopoulos","sequence":"first","affiliation":[{"name":"Chalmers University of Technology, Gothenburg, Sweden"}]},{"given":"Simon","family":"Kindstr\u00f6m","sequence":"additional","affiliation":[{"name":"Chalmers University of Technology, Gothenburg, Sweden"}]},{"given":"Magnus","family":"Almgren","sequence":"additional","affiliation":[{"name":"Chalmers University of Technology, Gothenburg, Sweden"}]},{"given":"Olaf","family":"Landsiedel","sequence":"additional","affiliation":[{"name":"Chalmers University of Technology, Gothenburg, Sweden"}]},{"given":"Marina","family":"Papatriantafilou","sequence":"additional","affiliation":[{"name":"Chalmers University of Technology, Gothenburg, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/360825.360855"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/974043.974078"},{"key":"e_1_3_2_1_3_1","unstructured":"Appneta. [n. d.]. Sample Captures. http:\/\/tcpreplay.appneta.com\/wiki\/captures.html\/ [Accessed: 2018-09-18]. Appneta. [n. d.]. Sample Captures. http:\/\/tcpreplay.appneta.com\/wiki\/captures.html\/ [Accessed: 2018-09-18]."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664666.2664671"},{"key":"e_1_3_2_1_5_1","unstructured":"ARM. [n. d.]. ARM Mali-T628 product page. https:\/\/www.arm.com\/products\/multimedia\/mali-cost-efficient-graphics\/mali-t628.php. Accessed: 2018-03-14. ARM. [n. d.]. ARM Mali-T628 product page. https:\/\/www.arm.com\/products\/multimedia\/mali-cost-efficient-graphics\/mali-t628.php. Accessed: 2018-03-14."},{"key":"e_1_3_2_1_6_1","unstructured":"Arm. [n. d.]. ODROID-XU3. https:\/\/developer.arm.com\/graphics\/development-platforms\/odroid-xu3. Accessed: 2018-05-25. Arm. [n. d.]. ODROID-XU3. https:\/\/developer.arm.com\/graphics\/development-platforms\/odroid-xu3. Accessed: 2018-05-25."},{"key":"e_1_3_2_1_7_1","unstructured":"ARM. 2018. ARM Mali GPU OpenCL Version 3.0 Developer Guide. https:\/\/static.docs.arm.com\/100614\/0300\/arm_mali_gpu_opencl_developer_guide_100614_0300_00_en.pdf. Accessed: 2018-03-14. ARM. 2018. ARM Mali GPU OpenCL Version 3.0 Developer Guide. https:\/\/static.docs.arm.com\/100614\/0300\/arm_mali_gpu_opencl_developer_guide_100614_0300_00_en.pdf. Accessed: 2018-03-14."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2659651.2659723"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/359842.359859"},{"key":"e_1_3_2_1_10_1","volume-title":"DFC: Accelerating String Pattern Matching for Network Applications. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16)","author":"Choi Byungkwon","year":"2016","unstructured":"Byungkwon Choi , Jongwook Chae , Muhammad Jamshed , KyoungSoo Park , and Dongsu Han . 2016 . DFC: Accelerating String Pattern Matching for Network Applications. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16) . USENIX Association, Santa Clara, CA, 551--565. Byungkwon Choi, Jongwook Chae, Muhammad Jamshed, KyoungSoo Park, and Dongsu Han. 2016. DFC: Accelerating String Pattern Matching for Network Applications. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). USENIX Association, Santa Clara, CA, 551--565."},{"key":"e_1_3_2_1_11_1","unstructured":"Cisco. 2015. Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are. White Paper https:\/\/www.cisco.com\/c\/dam\/en_us\/solutions\/trends\/iot\/docs\/computing-overview.pdf. Accessed: 2018-05-07. Cisco. 2015. Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are. White Paper https:\/\/www.cisco.com\/c\/dam\/en_us\/solutions\/trends\/iot\/docs\/computing-overview.pdf. Accessed: 2018-05-07."},{"key":"e_1_3_2_1_12_1","volume-title":"UNB ISCX Intrusion Detection Evaluation DataSet","author":"Canadian Institute for Cybersecurity. 2012.","unstructured":"Canadian Institute for Cybersecurity. 2012. UNB ISCX Intrusion Detection Evaluation DataSet . http:\/\/www.unb.ca\/research\/iscx\/dataset\/iscx-IDS-dataset.html. Accessed: 2016-12-10. Canadian Institute for Cybersecurity. 2012. UNB ISCX Intrusion Detection Evaluation DataSet. http:\/\/www.unb.ca\/research\/iscx\/dataset\/iscx-IDS-dataset.html. Accessed: 2016-12-10."},{"key":"e_1_3_2_1_13_1","volume-title":"14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17)","author":"Go Younghwan","year":"2017","unstructured":"Younghwan Go , Muhammad Asim Jamshed , YoungGyoun Moon , Changho Hwang , and KyoungSoo Park . 2017 . APUNet: Revitalizing GPU as Packet Processing Accelerator . In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17) . USENIX Association, Boston, MA, 83--96. https:\/\/www.usenix.org\/conference\/nsdi17\/technical-sessions\/presentation\/go Younghwan Go, Muhammad Asim Jamshed, YoungGyoun Moon, Changho Hwang, and KyoungSoo Park. 2017. APUNet: Revitalizing GPU as Packet Processing Accelerator. In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17). USENIX Association, Boston, MA, 83--96. https:\/\/www.usenix.org\/conference\/nsdi17\/technical-sessions\/presentation\/go"},{"key":"e_1_3_2_1_14_1","volume-title":"Energy Efficient HPC on Embedded SoCs: Optimization Techniques for Mali GPU. In 2014 IEEE 28th International Parallel and Distributed Processing Symposium. 123--132","author":"Grasso I.","unstructured":"I. Grasso , P. Radojkovic , N. Rajovic , I. Gelado , and A. Ramirez . 2014 . Energy Efficient HPC on Embedded SoCs: Optimization Techniques for Mali GPU. In 2014 IEEE 28th International Parallel and Distributed Processing Symposium. 123--132 . I. Grasso, P. Radojkovic, N. Rajovic, I. Gelado, and A. Ramirez. 2014. Energy Efficient HPC on Embedded SoCs: Optimization Techniques for Mali GPU. In 2014 IEEE 28th International Parallel and Distributed Processing Symposium. 123--132."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382232"},{"key":"e_1_3_2_1_16_1","unstructured":"Khronos Group. [n. d.]. OpenCL Overview. https:\/\/www.khronos.org\/opencl\/. Accessed: 2018-03-11. Khronos Group. [n. d.]. OpenCL Overview. https:\/\/www.khronos.org\/opencl\/. Accessed: 2018-03-11."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2741948.2741969"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1137\/0206024"},{"key":"e_1_3_2_1_19_1","volume-title":"PCI'09","author":"Kouzinopoulos Charalampos S","year":"2009","unstructured":"Charalampos S Kouzinopoulos and Konstantinos G Margaritis . 2009 . String matching on a multicore GPU using CUDA. In Informatics , PCI'09 . 13th Panhellenic Con. on. IEEE. Charalampos S Kouzinopoulos and Konstantinos G Margaritis. 2009. String matching on a multicore GPU using CUDA. In Informatics, PCI'09. 13th Panhellenic Con. on. IEEE."},{"key":"e_1_3_2_1_20_1","unstructured":"Lincoln Laboratory. 2000. DARPA Intrusion Detection Data Sets. https:\/\/www.ll.mit.edu\/r-d\/datasets\/2000-darpa-intrusion-detection-scenario-specific-data-sets. Accessed: 2018-09-20. Lincoln Laboratory. 2000. DARPA Intrusion Detection Data Sets. https:\/\/www.ll.mit.edu\/r-d\/datasets\/2000-darpa-intrusion-detection-scenario-specific-data-sets. Accessed: 2018-09-20."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.254"},{"key":"e_1_3_2_1_22_1","volume-title":"2013 International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS). 1--10","author":"Maghazeh A.","unstructured":"A. Maghazeh , U. D. Bordoloi , P. Eles , and Z. Peng . 2013. General purpose computing on low-power embedded GPUs: Has it come of age? . In 2013 International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS). 1--10 . A. Maghazeh, U. D. Bordoloi, P. Eles, and Z. Peng. 2013. General purpose computing on low-power embedded GPUs: Has it come of age?. In 2013 International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS). 1--10."},{"key":"e_1_3_2_1_23_1","volume-title":"Int. Workshop on Recent Advances in Intrusion Detection. Springer.","author":"Mahoney Matthew V","unstructured":"Matthew V Mahoney and Philip K Chan .2003. An analysis of the 1999 DARPA\/Lincoln Laboratory evaluation data for network anomaly detection . In Int. Workshop on Recent Advances in Intrusion Detection. Springer. Matthew V Mahoney and Philip K Chan.2003. An analysis of the 1999 DARPA\/Lincoln Laboratory evaluation data for network anomaly detection. In Int. Workshop on Recent Advances in Intrusion Detection. Springer."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382923"},{"key":"e_1_3_2_1_25_1","volume-title":"Gather Scatter Operations","author":"S.","unstructured":"Michael S. 2015. Gather Scatter Operations . http:\/\/insidehpc.com\/2015\/05\/gather-scatter-operations\/. Accessed: 2016-12-10. MichaelS. 2015. Gather Scatter Operations. http:\/\/insidehpc.com\/2015\/05\/gather-scatter-operations\/. Accessed: 2016-12-10."},{"issue":"4","key":"e_1_3_2_1_26_1","article-title":"Exact Pattern Matching with Feedforward Bloom Filters","volume":"3","author":"Moraru Iulian","year":"2012","unstructured":"Iulian Moraru and David G. Andersen . 2012 . Exact Pattern Matching with Feedforward Bloom Filters . J. Exp. Algorithmics 17, Article 3 . 4 ( Sept. 2012), 1.08 pages. http:\/\/doi.acm.org.proxy.lib.chalmers.se\/10.1145\/2133803.2330085 Iulian Moraru and David G. Andersen. 2012. Exact Pattern Matching with Feedforward Bloom Filters. J. Exp. Algorithmics 17, Article 3.4 (Sept. 2012), 1.08 pages. http:\/\/doi.acm.org.proxy.lib.chalmers.se\/10.1145\/2133803.2330085","journal-title":"J. Exp. Algorithmics 17, Article"},{"key":"e_1_3_2_1_28_1","unstructured":"Nvidia. [n. d.]. About CUDA. https:\/\/developer.nvidia.com\/about-cuda. Accessed: 2018-03-11. Nvidia. [n. d.]. About CUDA. https:\/\/developer.nvidia.com\/about-cuda. Accessed: 2018-03-11."},{"key":"e_1_3_2_1_29_1","unstructured":"NVIDIA. [n. d.]. Jetson Nano Brings AI Computing to Everyone. https:\/\/devblogs.nvidia.com\/jetson-nano-ai-computing\/. Accessed: 2019-04-17. NVIDIA. [n. d.]. Jetson Nano Brings AI Computing to Everyone. https:\/\/devblogs.nvidia.com\/jetson-nano-ai-computing\/. Accessed: 2019-04-17."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2642338"},{"key":"e_1_3_2_1_31_1","volume-title":"Sanger and Nicole Perlroth","author":"David","year":"2016","unstructured":"David E. Sanger and Nicole Perlroth . 2016 . A New Era of Internet Attacks Powered by Everyday Devices. https:\/\/nytimes.com\/2016\/10\/23\/us\/politics\/a-new-era-of-internet-attacks-powered-by-everyday-devices.html. Accessed : 2018-03-04. David E. Sanger and Nicole Perlroth. 2016. A New Era of Internet Attacks Powered by Everyday Devices. https:\/\/nytimes.com\/2016\/10\/23\/us\/politics\/a-new-era-of-internet-attacks-powered-by-everyday-devices.html. Accessed: 2018-03-04."},{"key":"e_1_3_2_1_32_1","volume-title":"Mauro Conti, and Jens-Matthias Bohli.","author":"Sforzin Alessandro","year":"2016","unstructured":"Alessandro Sforzin , F\u00e9lix G\u00f3mez M\u00e1rmol , Mauro Conti, and Jens-Matthias Bohli. 2016 . RPiDS: Raspberry Pi IDS - A Fruitful Intrusion Detection System for IoT. In UIC\/ATC\/ScalCom\/CBDCom\/IoP\/SmartWorld, Toulouse, France, July 18--21, 2016. 440--448. Alessandro Sforzin, F\u00e9lix G\u00f3mez M\u00e1rmol, Mauro Conti, and Jens-Matthias Bohli. 2016. RPiDS: Raspberry Pi IDS - A Fruitful Intrusion Detection System for IoT. In UIC\/ATC\/ScalCom\/CBDCom\/IoP\/SmartWorld, Toulouse, France, July 18--21, 2016. 440--448."},{"key":"e_1_3_2_1_33_1","volume-title":"Ghorbani","author":"Shiravi Ali","year":"2012","unstructured":"Ali Shiravi , Hadi Shiravi , Mahbod Tavallaee , and Ali A . Ghorbani . 2012 . Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Computers & Security 31, 3 (2012). Ali Shiravi, Hadi Shiravi, Mahbod Tavallaee, and Ali A. Ghorbani. 2012. Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Computers & Security 31, 3 (2012)."},{"key":"e_1_3_2_1_34_1","unstructured":"Snort. [n. d.]. Snort++. https:\/\/github.com\/snort3\/snort3. Accessed: 2018-12-21. Snort. [n. d.]. Snort++. https:\/\/github.com\/snort3\/snort3. Accessed: 2018-12-21."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Snort [n. d.]. Snort Network Intrusion Detection and Prevention System. https:\/\/www.snort.org. Accessed: 2018-09-21. Snort [n. d.]. Snort Network Intrusion Detection and Prevention System. https:\/\/www.snort.org. Accessed: 2018-09-21.","DOI":"10.5120\/ijca2018918280"},{"key":"e_1_3_2_1_36_1","volume-title":"Large-Scale String Match for a 10Gbps FPGA-Based Network Intrusion Detection System","author":"Sourdis Ioannis","unstructured":"Ioannis Sourdis and Dionisios Pnevmatikatos . 2003. Fast , Large-Scale String Match for a 10Gbps FPGA-Based Network Intrusion Detection System . In Field Programmable Logic and Application, Peter Y. K. Cheung and George A. Constantinides (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 880--889. Ioannis Sourdis and Dionisios Pnevmatikatos. 2003. Fast, Large-Scale String Match for a 10Gbps FPGA-Based Network Intrusion Detection System. In Field Programmable Logic and Application, Peter Y. K. Cheung and George A. Constantinides (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 880--889."},{"key":"e_1_3_2_1_37_1","volume-title":"2017 46th International Conference on Parallel Processing (ICPP). 472--482","author":"Stylianopoulos C.","unstructured":"C. Stylianopoulos , M. Almgren , O. Landsiedel , and M. Papatriantafilou . 2017. Multiple Pattern Matching for Network Security Applications: Acceleration through Vectorization . In 2017 46th International Conference on Parallel Processing (ICPP). 472--482 . C. Stylianopoulos, M. Almgren, O. Landsiedel, and M. Papatriantafilou. 2017. Multiple Pattern Matching for Network Security Applications: Acceleration through Vectorization. In 2017 46th International Conference on Parallel Processing (ICPP). 472--482."},{"key":"e_1_3_2_1_38_1","volume-title":"Gnort: High Performance Network Intrusion Detection Using Graphics Processors. In Recent Advances in Intrusion Detection","author":"Vasiliadis Giorgos","year":"2008","unstructured":"Giorgos Vasiliadis , Spiros Antonatos , Michalis Polychronakis , Evangelos P. Markatos , and Sotiris Ioannidis . 2008 . Gnort: High Performance Network Intrusion Detection Using Graphics Processors. In Recent Advances in Intrusion Detection , Richard Lippmann, Engin Kirda, and Ari Trachtenberg (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 116--134. Giorgos Vasiliadis, Spiros Antonatos, Michalis Polychronakis, Evangelos P. Markatos, and Sotiris Ioannidis. 2008. Gnort: High Performance Network Intrusion Detection Using Graphics Processors. In Recent Advances in Intrusion Detection, Richard Lippmann, Engin Kirda, and Ari Trachtenberg (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 116--134."},{"key":"e_1_3_2_1_39_1","volume-title":"GASPP: A GPU-Accelerated Stateful Packet Processing Framework. In 2014 USENIX Annual Technical Conference (USENIX ATC 14)","author":"Vasiliadis Giorgos","year":"2014","unstructured":"Giorgos Vasiliadis , Lazaros Koromilas , Michalis Polychronakis , and Sotiris Ioannidis . 2014 . GASPP: A GPU-Accelerated Stateful Packet Processing Framework. In 2014 USENIX Annual Technical Conference (USENIX ATC 14) . USENIX Association, Philadelphia, PA, 321--332. https:\/\/www.usenix.org\/conference\/atc14\/technical-sessions\/presentation\/vasiliadis Giorgos Vasiliadis, Lazaros Koromilas, Michalis Polychronakis, and Sotiris Ioannidis. 2014. GASPP: A GPU-Accelerated Stateful Packet Processing Framework. In 2014 USENIX Annual Technical Conference (USENIX ATC 14). USENIX Association, Philadelphia, PA, 321--332. https:\/\/www.usenix.org\/conference\/atc14\/technical-sessions\/presentation\/vasiliadis"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046741"},{"key":"e_1_3_2_1_41_1","volume-title":"Hyperscan: A Fast Multi-pattern Regex Matcher for Modern CPUs. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19)","author":"Wang Xiang","year":"2019","unstructured":"Xiang Wang , Yang Hong , Harry Chang , KyoungSoo Park , Geoff Langdale , Jiayu Hu , and Heqing Zhu . 2019 . Hyperscan: A Fast Multi-pattern Regex Matcher for Modern CPUs. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19) . USENIX Association, Boston, MA, 631--648. https:\/\/www.usenix.org\/conference\/nsdi19\/presentation\/wang-xiang Xiang Wang, Yang Hong, Harry Chang, KyoungSoo Park, Geoff Langdale, Jiayu Hu, and Heqing Zhu. 2019. Hyperscan: A Fast Multi-pattern Regex Matcher for Modern CPUs. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19). USENIX Association, Boston, MA, 631--648. https:\/\/www.usenix.org\/conference\/nsdi19\/presentation\/wang-xiang"},{"key":"e_1_3_2_1_42_1","unstructured":"Wang Wei. 2018. Casino Gets Hacked Through Its Internet-Connected Fish Tank Thermometer. https:\/\/thehackernews.com\/2018\/04\/iot-hacking-thermometer.html. Accessed: 2019-01-16. Wang Wei. 2018. Casino Gets Hacked Through Its Internet-Connected Fish Tank Thermometer. https:\/\/thehackernews.com\/2018\/04\/iot-hacking-thermometer.html. Accessed: 2019-01-16."}],"event":{"name":"ACSAC '19: 2019 Annual Computer Security Applications Conference","location":"San Juan Puerto Rico USA","acronym":"ACSAC '19"},"container-title":["Proceedings of the 35th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359811","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359811","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:45:04Z","timestamp":1750203904000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359811"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"references-count":41,"alternative-id":["10.1145\/3359789.3359811","10.1145\/3359789"],"URL":"https:\/\/doi.org\/10.1145\/3359789.3359811","relation":{},"subject":[],"published":{"date-parts":[[2019,12,9]]},"assertion":[{"value":"2019-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}