{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T16:37:52Z","timestamp":1770741472961,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":79,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,3]],"date-time":"2019-12-03T00:00:00Z","timestamp":1575331200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,3]]},"DOI":"10.1145\/3359989.3365431","type":"proceedings-article","created":{"date-parts":[[2019,12,5]],"date-time":"2019-12-05T14:07:37Z","timestamp":1575554857000},"page":"292-304","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Tuple space explosion"],"prefix":"10.1145","author":[{"given":"Levente","family":"Csikor","sequence":"first","affiliation":[{"name":"National University of Singapore"}]},{"given":"Dinil Mon","family":"Divakaran","sequence":"additional","affiliation":[{"name":"Trustwave"}]},{"given":"Min Suk","family":"Kang","sequence":"additional","affiliation":[{"name":"National University of Singapore"}]},{"given":"Attila","family":"K\u0151r\u00f6si","sequence":"additional","affiliation":[{"name":"Budapest University of Technology and Economics"}]},{"given":"Bal\u00e1zs","family":"Sonkoly","sequence":"additional","affiliation":[{"name":"Budapest University of Technology and Economics and MTA-BME Network Softwarization Research Group"}]},{"given":"D\u00e1vid","family":"Haja","sequence":"additional","affiliation":[{"name":"Budapest University of Technology and Economics"}]},{"given":"Dimitrios P.","family":"Pezaros","sequence":"additional","affiliation":[{"name":"University of Glasgow"}]},{"given":"Stefan","family":"Schmid","sequence":"additional","affiliation":[{"name":"University of Vienna"}]},{"given":"G\u00e1bor","family":"R\u00e9tv\u00e1ri","sequence":"additional","affiliation":[{"name":"Budapest University of Technology and Economics"}]}],"member":"320","published-online":{"date-parts":[[2019,12,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"A Linux Foundation Collaborative Project. Production Quality Multilayer Open Virtual Switch. http:\/\/www.openvswitch.org\/ Accessed: June 2019.  A Linux Foundation Collaborative Project. Production Quality Multilayer Open Virtual Switch. http:\/\/www.openvswitch.org\/ Accessed: June 2019."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2518712"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2518712"},{"key":"e_1_3_2_1_4_1","volume-title":"OpenStack Summit","author":"Ajo M.","year":"2015","unstructured":"Ajo , M. , Graf , T. , Lazzaro , I. , and Pettit , J . Taking security groups to ludicrous speed with OVS . In OpenStack Summit ( 2015 ). Ajo, M., Graf, T., Lazzaro, I., and Pettit, J. Taking security groups to ludicrous speed with OVS. In OpenStack Summit (2015)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2016.7739575"},{"key":"e_1_3_2_1_6_1","volume-title":"Accessed in Jun","author":"Amazon Web Services","year":"2019","unstructured":"Amazon Web Services . Elastic Load Balancing features. https:\/\/aws.amazon.com\/elasticloadbalancing\/features\/#Details_for_Elastic_Load_Balancing_Products , Accessed in Jun 2019 . Amazon Web Services. Elastic Load Balancing features. https:\/\/aws.amazon.com\/elasticloadbalancing\/features\/#Details_for_Elastic_Load_Balancing_Products, Accessed in Jun 2019."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11599-3_14"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/AIEEE.2015.7367309"},{"key":"e_1_3_2_1_9_1","volume-title":"WORLD SCIENTIFIC","author":"Auger A.","year":"2011","unstructured":"Auger , A. , and Doerr , B . Theory of Randomized Search Heuristics . WORLD SCIENTIFIC , 2011 . Auger, A., and Doerr, B. Theory of Randomized Search Heuristics. WORLD SCIENTIFIC, 2011."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208658"},{"key":"e_1_3_2_1_11_1","volume-title":"OVS Orbit podcast. https:\/\/ovsorbit.org\/episode-67.mp3","author":"Ben Pfaff","year":"2018","unstructured":"Ben Pfaff . OVS Orbit podcast. https:\/\/ovsorbit.org\/episode-67.mp3 , 2018 . Ben Pfaff. OVS Orbit podcast. https:\/\/ovsorbit.org\/episode-67.mp3, 2018."},{"key":"e_1_3_2_1_12_1","volume-title":"Mailing list archive, https:\/\/mail.openvswitch.org\/pipermail\/ovs-discuss\/2019-June\/048887.html","author":"Ben Pfaff","year":"2019","unstructured":"Ben Pfaff . [ovs-discuss] ovs-dpctl del-flow works strange. Mailing list archive, https:\/\/mail.openvswitch.org\/pipermail\/ovs-discuss\/2019-June\/048887.html , 2019 June. Ben Pfaff. [ovs-discuss] ovs-dpctl del-flow works strange. Mailing list archive, https:\/\/mail.openvswitch.org\/pipermail\/ovs-discuss\/2019-June\/048887.html, 2019 June."},{"key":"e_1_3_2_1_13_1","volume-title":"HotNets","author":"Casado M.","year":"2008","unstructured":"Casado , M. , Koponen , T. , Moon , D. , and Shenker , S . Rethinking packet forwarding hardware . In HotNets ( 2008 ). Casado, M., Koponen, T., Moon, D., and Shenker, S. Rethinking packet forwarding hardware. In HotNets (2008)."},{"key":"e_1_3_2_1_14_1","volume-title":"Regular expression Denial of Service: ReDoS","author":"CheckMarx","year":"2017","unstructured":"CheckMarx . Regular expression Denial of Service: ReDoS , 2017 . https:\/\/www.owasp.org\/index.php\/Regular_expression_Denial_of_Service_-_ReDoS. CheckMarx. Regular expression Denial of Service: ReDoS, 2017. https:\/\/www.owasp.org\/index.php\/Regular_expression_Denial_of_Service_-_ReDoS."},{"key":"e_1_3_2_1_15_1","unstructured":"Cloud Native Computing Foundation. Network Policies. https:\/\/kubernetes.io\/docs\/concepts\/services-networking\/network-policies.  Cloud Native Computing Foundation. Network Policies. https:\/\/kubernetes.io\/docs\/concepts\/services-networking\/network-policies."},{"key":"e_1_3_2_1_16_1","first-page":"3","volume-title":"USENIX Security","author":"Crosby S. A.","year":"2003","unstructured":"Crosby , S. A. , and Wallach , D. S . Denial of service via algorithmic complexity attacks . In USENIX Security ( 2003 ), pp. 3 -- 3 . Crosby, S. A., and Wallach, D. S. Denial of service via algorithmic complexity attacks. In USENIX Security (2003), pp. 3--3."},{"key":"e_1_3_2_1_17_1","volume-title":"Tuple Space Explosion: A Denial-of-Service Attack Against a Software Packet Classifier. Blog post. https:\/\/ovsdos.comp.nus.edu.sg\/","author":"Csikor L.","year":"2019","unstructured":"Csikor , L. , Divakaran , D. M. , and Kang , M. S . Tuple Space Explosion: A Denial-of-Service Attack Against a Software Packet Classifier. Blog post. https:\/\/ovsdos.comp.nus.edu.sg\/ , 2019 . Csikor, L., Divakaran, D. M., and Kang, M. S. Tuple Space Explosion: A Denial-of-Service Attack Against a Software Packet Classifier. Blog post. https:\/\/ovsdos.comp.nus.edu.sg\/, 2019."},{"key":"e_1_3_2_1_18_1","volume-title":"Open vSwitch Fall Conference (Club Auto Sport","author":"Csikor L.","year":"2018","unstructured":"Csikor , L. , and R\u00e9tv\u00e1ri , G . The discrepancy of the megaflow cache in ovs . In Open vSwitch Fall Conference (Club Auto Sport , Santa Clara , CA , 2018 ). Csikor, L., and R\u00e9tv\u00e1ri, G. The discrepancy of the megaflow cache in ovs. In Open vSwitch Fall Conference (Club Auto Sport, Santa Clara, CA, 2018)."},{"key":"e_1_3_2_1_19_1","first-page":"147","volume-title":"Proceedings of the ACM SIGCOMM 2018 Conference on Posters and Demos (New York, NY, USA, 2018), SIGCOMM '18, ACM","author":"Csikor L.","unstructured":"Csikor , L. , Rothenberg , C. , Pezaros , D. P. , Schmid , S. , Toka , L. , and R\u00e9tv\u00e1ri , G . Policy injection: A cloud dataplane dos attack . In Proceedings of the ACM SIGCOMM 2018 Conference on Posters and Demos (New York, NY, USA, 2018), SIGCOMM '18, ACM , pp. 147 -- 149 . Csikor, L., Rothenberg, C., Pezaros, D. P., Schmid, S., Toka, L., and R\u00e9tv\u00e1ri, G. Policy injection: A cloud dataplane dos attack. In Proceedings of the ACM SIGCOMM 2018 Conference on Posters and Demos (New York, NY, USA, 2018), SIGCOMM '18, ACM, pp. 147--149."},{"key":"e_1_3_2_1_20_1","first-page":"17","volume-title":"NFPA: Network function performance analyzer","author":"Csikor L.","year":"2015","unstructured":"Csikor , L. , Szalay , M. , Sonkoly , B. , and Toka , L . NFPA: Network function performance analyzer . In IEEE NFV-SDN , Demo Track ( 2015 ), pp. 17 -- 19 . Csikor, L., Szalay, M., Sonkoly, B., and Toka, L. NFPA: Network function performance analyzer. In IEEE NFV-SDN, Demo Track (2015), pp. 17--19."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46586-9_7"},{"key":"e_1_3_2_1_22_1","first-page":"373","volume-title":"USENIX NSDI","author":"Dalton M.","year":"2018","unstructured":"Dalton , M. , Andromeda : Performance, isolation, and velocity at scale in cloud network virtualization . In USENIX NSDI ( 2018 ), pp. 373 -- 387 . Dalton, M., et al. Andromeda: Performance, isolation, and velocity at scale in cloud network virtualization. In USENIX NSDI (2018), pp. 373--387."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3037697.3037703"},{"key":"e_1_3_2_1_24_1","unstructured":"DPDK. Membership Library. https:\/\/doc.dpdk.org\/guides\/prog_guide\/member_lib.html.  DPDK. Membership Library. https:\/\/doc.dpdk.org\/guides\/prog_guide\/member_lib.html."},{"key":"e_1_3_2_1_25_1","first-page":"203","volume-title":"NSDI","year":"2014","unstructured":"Network virtualization in multi-tenant datacenters . In NSDI ( 2014 ), pp. 203 -- 216 . et al., T. K. Network virtualization in multi-tenant datacenters. In NSDI (2014), pp. 203--216."},{"key":"e_1_3_2_1_26_1","unstructured":"FD.io. Contiv\/VPP Kubernetes Network Plugin. https:\/\/fdio-vpp.readthedocs.io\/en\/latest\/usecases\/contiv\/K8s_Overview.html.  FD.io. Contiv\/VPP Kubernetes Network Plugin. https:\/\/fdio-vpp.readthedocs.io\/en\/latest\/usecases\/contiv\/K8s_Overview.html."},{"key":"e_1_3_2_1_27_1","unstructured":"FD.io. VPP - Vector Packet Processing. https:\/\/docs.fd.io\/vpp\/19.01\/index.html.  FD.io. VPP - Vector Packet Processing. https:\/\/docs.fd.io\/vpp\/19.01\/index.html."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832493"},{"key":"e_1_3_2_1_29_1","first-page":"51","volume-title":"USENIX NSDI","author":"Firestone D.","year":"2018","unstructured":"Firestone , D. , Azure accelerated networking: SmartNICs in the public cloud . In USENIX NSDI ( 2018 ), pp. 51 -- 66 . Firestone, D., et al. Azure accelerated networking: SmartNICs in the public cloud. In USENIX NSDI (2018), pp. 51--66."},{"key":"e_1_3_2_1_30_1","volume-title":"Open vSwitch Fall Conference","author":"Gobriel S.","year":"2016","unstructured":"Gobriel , S. , and Tai , C . OvS Lookup Optimization Using Two-Layer Table Lookup . In Open vSwitch Fall Conference ( 2016 ). Gobriel, S., and Tai, C. OvS Lookup Optimization Using Two-Layer Table Lookup. In Open vSwitch Fall Conference (2016)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/316188.316217"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.912717"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.912717"},{"key":"e_1_3_2_1_34_1","unstructured":"Intel. Network function virtualization: Quality of Service in Broadband Remote Access Servers with Linux and Intel architecture. https:\/\/networkbuilders.intel.com\/docs\/Network_Builders_RA_NFV_QoS_Aug2014.pdf.  Intel. Network function virtualization: Quality of Service in Broadband Remote Access Servers with Linux and Intel architecture. https:\/\/networkbuilders.intel.com\/docs\/Network_Builders_RA_NFV_QoS_Aug2014.pdf."},{"key":"e_1_3_2_1_35_1","volume-title":"eXpress Data Path","author":"Visor","year":"2016","unstructured":"io Visor . eXpress Data Path , 2016 . https:\/\/www.iovisor.org\/technology\/xdp. ioVisor. eXpress Data Path, 2016. https:\/\/www.iovisor.org\/technology\/xdp."},{"key":"e_1_3_2_1_36_1","unstructured":"Istio. Authentication Policy 2018. https:\/\/istio.io\/docs\/reference\/config\/istio.authentication.v1alpha1.  Istio. Authentication Policy 2018. https:\/\/istio.io\/docs\/reference\/config\/istio.authentication.v1alpha1."},{"key":"e_1_3_2_1_37_1","unstructured":"Istio. Ingress Controller 2018. https:\/\/istio.io\/docs\/tasks\/traffic-management\/ingress.html.  Istio. Ingress Controller 2018. https:\/\/istio.io\/docs\/tasks\/traffic-management\/ingress.html."},{"key":"e_1_3_2_1_38_1","unstructured":"Istio. Traffic Routing 2018. https:\/\/istio.io\/docs\/reference\/config\/istio.networking.v1alpha3.  Istio. Traffic Routing 2018. https:\/\/istio.io\/docs\/reference\/config\/istio.networking.v1alpha3."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/11506881_10"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00975-4_1"},{"key":"e_1_3_2_1_41_1","volume-title":"Spectre Attacks: Exploiting Speculative Execution. ArXiv e-prints (Jan","author":"Kocher P.","year":"2018","unstructured":"Kocher , P. , Genkin , D. , Gruss , D. , Haas , W. , Hamburg , M. , Lipp , M. , Mangard , S. , Prescher , T. , Schwarz , M. , and Yarom , Y . Spectre Attacks: Exploiting Speculative Execution. ArXiv e-prints (Jan . 2018 ). Kocher, P., Genkin, D., Gruss, D., Haas, W., Hamburg, M., Lipp, M., Mangard, S., Prescher, T., Schwarz, M., and Yarom, Y. Spectre Attacks: Exploiting Speculative Execution. ArXiv e-prints (Jan. 2018)."},{"key":"e_1_3_2_1_42_1","first-page":"15","volume-title":"SIGCOMM","author":"Kogan K.","year":"2014","unstructured":"Kogan , K. , : scalable and expressive packet classification . In SIGCOMM ( 2014 ), pp. 15 -- 26 . Kogan, K., et al. SAX-PAC: scalable and expressive packet classification. In SIGCOMM (2014), pp. 15--26."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863966"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5573\/IEIESPC.2017.6.1.027"},{"key":"e_1_3_2_1_45_1","volume-title":"ArXiv e-prints (Jan","author":"Lipp M.","year":"2018","unstructured":"Lipp , M. , Schwarz , M. , Gruss , D. , Prescher , T. , Haas , W. , Mangard , S. , Kocher , P. , Genkin , D. , Yarom , Y. , and Hamburg , M. Meltdown . ArXiv e-prints (Jan . 2018 ). Lipp, M., Schwarz, M., Gruss, D., Prescher, T., Haas, W., Mangard, S., Kocher, P., Genkin, D., Yarom, Y., and Hamburg, M. Meltdown. ArXiv e-prints (Jan. 2018)."},{"key":"e_1_3_2_1_46_1","first-page":"29","volume-title":"WISA (03","author":"Liu X.","year":"2017","unstructured":"Liu , X. , Cho , B. , and Kim , J . Sd-ovs: Syn flooding attack defending open vswitch for sdn . In WISA (03 2017 ), pp. 29 -- 41 . Liu, X., Cho, B., and Kim, J. Sd-ovs: Syn flooding attack defending open vswitch for sdn. In WISA (03 2017), pp. 29--41."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2427036.2427039"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934887"},{"key":"e_1_3_2_1_50_1","volume-title":"Whitepaper","author":"Netronome","year":"2018","unstructured":"Netronome . Agilio OVS Software Architecture for Server-based Networking . Whitepaper , 2018 . https:\/\/www.netronome.com\/media\/documents\/WP_Agilio_SW.pdf. Netronome. Agilio OVS Software Architecture for Server-based Networking. Whitepaper, 2018. https:\/\/www.netronome.com\/media\/documents\/WP_Agilio_SW.pdf."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.664261"},{"key":"e_1_3_2_1_52_1","volume-title":"Black Hat","author":"Nicholas Gray","year":"2017","unstructured":"Nicholas Gray , Manuel Sommer, T. Z., and Tran-Gia , P. FlowFuzz: a framework for fuzzing openflow-enabled software and hardware switches . In Black Hat ( 2017 ). Nicholas Gray, Manuel Sommer, T. Z., and Tran-Gia, P. FlowFuzz: a framework for fuzzing openflow-enabled software and hardware switches. In Black Hat (2017)."},{"key":"e_1_3_2_1_53_1","volume-title":"OpenFlow Switch Specifications v.1.4.0","author":"The Open Networking Foundation","year":"2013","unstructured":"The Open Networking Foundation . OpenFlow Switch Specifications v.1.4.0 , 2013 . The Open Networking Foundation. OpenFlow Switch Specifications v.1.4.0, 2013."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2431211.2431216"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134073"},{"key":"e_1_3_2_1_56_1","volume-title":"Accelerating Open vSwitch to \"Ludicrous Speed. Blog post: Network Heresy - Talses of the network reformation","author":"Pettit J.","year":"2014","unstructured":"Pettit , J. Accelerating Open vSwitch to \"Ludicrous Speed. Blog post: Network Heresy - Talses of the network reformation , 2014 . https:\/\/networkheresy.com\/2014\/11\/13\/accelerating-open-vswitch-to-ludicrous-speed\/. Pettit, J. Accelerating Open vSwitch to \"Ludicrous Speed. Blog post: Network Heresy - Talses of the network reformation, 2014. https:\/\/networkheresy.com\/2014\/11\/13\/accelerating-open-vswitch-to-ludicrous-speed\/."},{"key":"e_1_3_2_1_57_1","first-page":"7047","article-title":"The Open vSwitch database management protocol","author":"Pfaff B.","year":"2013","unstructured":"Pfaff , B. , and Davie , B . The Open vSwitch database management protocol . RFC 7047 , 2013 . Pfaff, B., and Davie, B. The Open vSwitch database management protocol. RFC 7047, 2013.","journal-title":"RFC"},{"key":"e_1_3_2_1_58_1","first-page":"117","volume-title":"NSDI","author":"Pfaff B.","year":"2015","unstructured":"Pfaff , B. , Pettit , J. , Koponen , T. , Jackson , E. , Zhou , A. , Rajahalme , J. , Gross , J. , Wang , A. , Stringer , J. , Shelar , P. , Amidon , K. , and Casado , M . The design and implementation of Open vSwitch . In NSDI ( 2015 ), pp. 117 -- 130 . Pfaff, B., Pettit, J., Koponen, T., Jackson, E., Zhou, A., Rajahalme, J., Gross, J., Wang, A., Stringer, J., Shelar, P., Amidon, K., and Casado, M. The design and implementation of Open vSwitch. In NSDI (2015), pp. 117--130."},{"key":"e_1_3_2_1_59_1","volume-title":"USENIX Annual Technical Conference","author":"Pong F.","year":"2009","unstructured":"Pong , F. , and Tzeng , N . -F. Hashing round-down prefixes for rapid packet classification . In USENIX Annual Technical Conference ( 2009 ). Pong, F., and Tzeng, N.-F. Hashing round-down prefixes for rapid packet classification. In USENIX Annual Technical Conference (2009)."},{"key":"e_1_3_2_1_60_1","first-page":"12","volume-title":"Hyper-Switch: A Scalable Software Virtual Switching Architecture. In Usenix ATC","author":"Ram K. K.","year":"2013","unstructured":"Ram , K. K. , Cox , A. L. , Chadha , M. , and Rixner , S . Hyper-Switch: A Scalable Software Virtual Switching Architecture. In Usenix ATC ( 2013 ), p. 12 . Ram, K. K., Cox, A. L., Chadha, M., and Rixner, S. Hyper-Switch: A Scalable Software Virtual Switching Architecture. In Usenix ATC (2013), p. 12."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"e_1_3_2_1_62_1","volume-title":"Taking routers off their meds: Unstable routers and the buggy bgp implementations that cause them. Tech. rep., tech. rep","author":"Schuchard M.","year":"2011","unstructured":"Schuchard , M. , Thompson , C. , Hopper , N. , and Kim , Y . Taking routers off their meds: Unstable routers and the buggy bgp implementations that cause them. Tech. rep., tech. rep ., University of Minnesota , 2011 . Schuchard, M., Thompson, C., Hopper, N., and Kim, Y. Taking routers off their meds: Unstable routers and the buggy bgp implementations that cause them. Tech. rep., tech. rep., University of Minnesota, 2011."},{"key":"e_1_3_2_1_63_1","volume-title":"CSA's cloud adoption, practices and priorities survey report","author":"SecuritytWeek","year":"2015","unstructured":"SecuritytWeek . CSA's cloud adoption, practices and priorities survey report , 2015 . http:\/\/www.securityweek.com\/data-security-concerns-still-challenge. SecuritytWeek. CSA's cloud adoption, practices and priorities survey report, 2015. http:\/\/www.securityweek.com\/data-security-concerns-still-challenge."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620755"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/316188.316216"},{"key":"e_1_3_2_1_66_1","unstructured":"The Calico project. https:\/\/www.projectcalico.org\/.  The Calico project. https:\/\/www.projectcalico.org\/."},{"key":"e_1_3_2_1_67_1","volume-title":"a multiplexed stream transport over UDP. https:\/\/www.chromium.org\/quic","author":"The Chromium Projects QUIC","year":"2019","unstructured":"The Chromium Projects . QUIC , a multiplexed stream transport over UDP. https:\/\/www.chromium.org\/quic , 2019 . The Chromium Projects. QUIC, a multiplexed stream transport over UDP. https:\/\/www.chromium.org\/quic, 2019."},{"key":"e_1_3_2_1_68_1","unstructured":"The ONOS project. Security Group. https:\/\/wiki.onosproject.org\/display\/ONOS\/Security+Group.  The ONOS project. Security Group. https:\/\/wiki.onosproject.org\/display\/ONOS\/Security+Group."},{"key":"e_1_3_2_1_69_1","unstructured":"The Open vSwitch project. Kubernetes integration for OVN. https:\/\/github.com\/openvswitch\/ovn-kubernetes.  The Open vSwitch project. Kubernetes integration for OVN. https:\/\/github.com\/openvswitch\/ovn-kubernetes."},{"key":"e_1_3_2_1_70_1","unstructured":"The OpenDaylight project. OVSDB:Security Groups. https:\/\/wiki.opendaylight.org\/view\/OVSDB:Security_Groups.  The OpenDaylight project. OVSDB:Security Groups. https:\/\/wiki.opendaylight.org\/view\/OVSDB:Security_Groups."},{"key":"e_1_3_2_1_71_1","unstructured":"The OpenStack project. Manage project security. https:\/\/docs.openstack.org\/nova\/pike\/admin\/security-groups.html.  The OpenStack project. Manage project security. https:\/\/docs.openstack.org\/nova\/pike\/admin\/security-groups.html."},{"key":"e_1_3_2_1_72_1","unstructured":"The OpenStack project. Networking-vpp. https:\/\/wiki.openstack.org\/wiki\/Networking-vpp.  The OpenStack project. Networking-vpp. https:\/\/wiki.openstack.org\/wiki\/Networking-vpp."},{"key":"e_1_3_2_1_73_1","unstructured":"The OpenStack project. OpenStack Neutron integration with OVN. https:\/\/docs.openstack.org\/networking-ovn\/latest.  The OpenStack project. OpenStack Neutron integration with OVN. https:\/\/docs.openstack.org\/networking-ovn\/latest."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3185467.3185468"},{"key":"e_1_3_2_1_75_1","volume-title":"FOSDEM","author":"Tollet J.","year":"2018","unstructured":"Tollet , J. Networking-VPP: A fast forwarding vSwitch\/vRouter for OpenStack . In FOSDEM ( 2018 ). Tollet, J. Networking-VPP: A fast forwarding vSwitch\/vRouter for OpenStack. In FOSDEM (2018)."},{"key":"e_1_3_2_1_76_1","first-page":"913","volume-title":"USENIX Security","author":"Varadarajan V.","year":"2015","unstructured":"Varadarajan , V. , Zhang , Y. , Ristenpart , T. , and Swift , M . A placement vulnerability study in multi-tenant public clouds . In USENIX Security ( 2015 ), pp. 913 -- 928 . Varadarajan, V., Zhang, Y., Ristenpart, T., and Swift, M. A placement vulnerability study in multi-tenant public clouds. In USENIX Security (2015), pp. 913--928."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674990"},{"key":"e_1_3_2_1_78_1","volume-title":"Algorithmic complexity attacks and the linux networking code","author":"Weimer F.","year":"2003","unstructured":"Weimer , F. Algorithmic complexity attacks and the linux networking code , 2003 . http:\/\/www.enyo.de\/fw\/security\/notes\/linux-dst-cache-dos.html. Weimer, F. Algorithmic complexity attacks and the linux networking code, 2003. http:\/\/www.enyo.de\/fw\/security\/notes\/linux-dst-cache-dos.html."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535372.2535379"}],"event":{"name":"CoNEXT '19: The 15th International Conference on emerging Networking EXperiments and Technologies","location":"Orlando Florida","acronym":"CoNEXT '19","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359989.3365431","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359989.3365431","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:28Z","timestamp":1750202008000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359989.3365431"}},"subtitle":["a denial-of-service attack against a software packet classifier"],"short-title":[],"issued":{"date-parts":[[2019,12,3]]},"references-count":79,"alternative-id":["10.1145\/3359989.3365431","10.1145\/3359989"],"URL":"https:\/\/doi.org\/10.1145\/3359989.3365431","relation":{},"subject":[],"published":{"date-parts":[[2019,12,3]]},"assertion":[{"value":"2019-12-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}