{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:22:12Z","timestamp":1750220532108,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":69,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["W911NF19C0058"],"award-info":[{"award-number":["W911NF19C0058"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"name":"DFG Center","award":["1053"],"award-info":[{"award-number":["1053"]}]},{"name":"SNSF","award":["200021_192121"],"award-info":[{"award-number":["200021_192121"]}]},{"name":"ERC Consolidator","award":["617805"],"award-info":[{"award-number":["617805"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3423211.3425694","type":"proceedings-article","created":{"date-parts":[[2020,12,11]],"date-time":"2020-12-11T23:03:11Z","timestamp":1607727791000},"page":"149-162","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Consistent and Secure Network Updates Made Practical"],"prefix":"10.1145","author":[{"given":"James","family":"Lembke","sequence":"first","affiliation":[{"name":"Purdue University, Milwaukee School of Engineering"}]},{"given":"Srivatsan","family":"Ravi","sequence":"additional","affiliation":[{"name":"University of Southern California"}]},{"given":"Pierre-Louis","family":"Roman","sequence":"additional","affiliation":[{"name":"Universit\u00e0 della Svizzera italiana"}]},{"given":"Patrick","family":"Eugster","sequence":"additional","affiliation":[{"name":"Universit\u00e0 della Svizzera italiana, Purdue University, TU Darmstadt"}]}],"member":"320","published-online":{"date-parts":[[2020,12,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535771.2535791"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2377677.2377748"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2016.09.012"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249247"},{"key":"e_1_3_2_1_5_1","first-page":"1","volume-title":"Easy Flow Migration. In 2016 25th International Conference on Computer Communication and Networks (ICCCN)","author":"Foerster Klaus-Tycho","year":"2016","unstructured":"Klaus-Tycho Foerster and Roger Wattenhofer . The Power of Two in Consistent Network Updates: Hard Loop Freedom , Easy Flow Migration. In 2016 25th International Conference on Computer Communication and Networks (ICCCN) , pages 1 -- 9 , 2016 . Klaus-Tycho Foerster and Roger Wattenhofer. The Power of Two in Consistent Network Updates: Hard Loop Freedom, Easy Flow Migration. In 2016 25th International Conference on Computer Communication and Networks (ICCCN), pages 1--9, 2016."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620744"},{"key":"e_1_3_2_1_7_1","first-page":"351","volume-title":"Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI'10","author":"Koponen Teemu","year":"2010","unstructured":"Teemu Koponen , Martin Casado , Natasha Gude , Jeremy Stribling , Leon Poutievski , Min Zhu , Rajiv Ramanathan , Yuichiro Iwata , Hiroaki Inoue , Takayuki Hama , and Scott Shenker . Onix : A distributed control platform for large-scale production networks . In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI'10 , pages 351 -- 364 , 2010 . Teemu Koponen, Martin Casado, Natasha Gude, Jeremy Stribling, Leon Poutievski, Min Zhu, Rajiv Ramanathan, Yuichiro Iwata, Hiroaki Inoue, Takayuki Hama, and Scott Shenker. Onix: A distributed control platform for large-scale production networks. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI'10, pages 351--364, 2010."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2774993.2774996"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2014.2355227"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2869938"},{"key":"e_1_3_2_1_11_1","volume-title":"July","author":"Lamport Leslie","year":"1982","unstructured":"Leslie Lamport , Robert Shostak , and Marshall Pease . The byzantine generals problem. ACM Transactions Programming Languages and Systems (TOPLAS), 4(3):382--401 , July 1982 . Leslie Lamport, Robert Shostak, and Marshall Pease. The byzantine generals problem. ACM Transactions Programming Languages and Systems (TOPLAS), 4(3):382--401, July 1982."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/296806.296824"},{"key":"e_1_3_2_1_13_1","first-page":"355","volume-title":"Eduardo EP Alchieri. State Machine Replication for the Masses with BFT-SMaRt. In 44th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","author":"Bessani Alysson","year":"2014","unstructured":"Alysson Bessani , Jo\u00e3o Sousa , and Eduardo EP Alchieri. State Machine Replication for the Masses with BFT-SMaRt. In 44th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN) , pages 355 -- 362 , 2014 . Alysson Bessani, Jo\u00e3o Sousa, and Eduardo EP Alchieri. State Machine Replication for the Masses with BFT-SMaRt. In 44th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pages 355--362, 2014."},{"key":"e_1_3_2_1_14_1","first-page":"701","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Hsu Kuo-Feng","year":"2020","unstructured":"Kuo-Feng Hsu , Ryan Beckett , Ang Chen , Jennifer Rexford , and David Walker . Contra : A programmable system for performance-aware routing . In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20) , pages 701 -- 721 , 2020 . Kuo-Feng Hsu, Ryan Beckett, Ang Chen, Jennifer Rexford, and David Walker. Contra: A programmable system for performance-aware routing. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20), pages 701--721, 2020."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626307"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2935634.2935638"},{"key":"e_1_3_2_1_17_1","unstructured":"Aniket Kate. Distributed Key Generator. https:\/\/crysp.uwaterloo.ca\/software\/DKG\/.  Aniket Kate. Distributed Key Generator. https:\/\/crysp.uwaterloo.ca\/software\/DKG\/."},{"key":"e_1_3_2_1_18_1","unstructured":"Ryu SDN Framework. https:\/\/ryu-sdn.org\/.  Ryu SDN Framework. https:\/\/ryu-sdn.org\/."},{"key":"e_1_3_2_1_19_1","unstructured":"James Lembke Srivatsan Ravi Pierre-Louis Roman and Patrick Eugster. Consistent and Secure Network Updates Made Practical (project website). https:\/\/gitlab.com\/robust-sdn\/cicero.  James Lembke Srivatsan Ravi Pierre-Louis Roman and Patrick Eugster. Consistent and Secure Network Updates Made Practical (project website). https:\/\/gitlab.com\/robust-sdn\/cicero."},{"key":"e_1_3_2_1_20_1","volume-title":"March","author":"Foundation Open Networking","year":"2015","unstructured":"Open Networking Foundation . OpenFlow Switch Specification , March 2015 . v1.5.1. Open Networking Foundation. OpenFlow Switch Specification, March 2015. v1.5.1."},{"key":"e_1_3_2_1_21_1","first-page":"1","volume-title":"Chandrasekaran and Theophilus Benson. Tolerating SDN Application Failures with LegoSDN. In Proceedings of the 13th ACM Workshop on Hot Topics in Networks, HotNets-XIII","author":"Balakrishnan","year":"2014","unstructured":"Balakrishnan Chandrasekaran and Theophilus Benson. Tolerating SDN Application Failures with LegoSDN. In Proceedings of the 13th ACM Workshop on Hot Topics in Networks, HotNets-XIII , pages 1 -- 7 , 2014 . Balakrishnan Chandrasekaran and Theophilus Benson. Tolerating SDN Application Failures with LegoSDN. In Proceedings of the 13th ACM Workshop on Hot Topics in Networks, HotNets-XIII, pages 1--7, 2014."},{"key":"e_1_3_2_1_22_1","first-page":"78","volume-title":"Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14","author":"Shin Seungwon","year":"2014","unstructured":"Seungwon Shin , Yongjoo Song , Taekyung Lee , Sangho Lee , Jaewoong Chung , Phillip Porras , Vinod Yegneswaran , Jiseong Noh , and Brent Byunghoon Kang . Rosemary : A Robust, Secure, and High-Performance Network Operating System . In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14 , pages 78 -- 89 , 2014 . Seungwon Shin, Yongjoo Song, Taekyung Lee, Sangho Lee, Jaewoong Chung, Phillip Porras, Vinod Yegneswaran, Jiseong Noh, and Brent Byunghoon Kang. Rosemary: A Robust, Secure, and High-Performance Network Operating System. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pages 78--89, 2014."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2890955.2890958"},{"key":"e_1_3_2_1_24_1","unstructured":"Mark Dargin. Secure your SDN controller. https:\/\/www.networkworld.com\/article\/3245173\/secure-your-sdn-controller.html.  Mark Dargin. Secure your SDN controller. https:\/\/www.networkworld.com\/article\/3245173\/secure-your-sdn-controller.html."},{"key":"e_1_3_2_1_25_1","unstructured":"Scott Hogg. SDN Security Attack Vectors and SDN Hardening. https:\/\/www.networkworld.com\/article\/2840273\/sdn-security-attack-vectors-and-sdn-hardening.html.  Scott Hogg. SDN Security Attack Vectors and SDN Hardening. https:\/\/www.networkworld.com\/article\/2840273\/sdn-security-attack-vectors-and-sdn-hardening.html."},{"key":"e_1_3_2_1_26_1","unstructured":"Diego Asturias. 9 Types of Software Defined Network attacks and how to protect from them. https:\/\/www.routerfreak.com\/9-types-software-defined-network-attacks-protect\/.  Diego Asturias. 9 Types of Software Defined Network attacks and how to protect from them. https:\/\/www.routerfreak.com\/9-types-software-defined-network-attacks-protect\/."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808062.2808073"},{"key":"e_1_3_2_1_28_1","volume-title":"A denial of service attack against the Open Floodlight SDN controller","author":"Dover Jeremy M","year":"2013","unstructured":"Jeremy M Dover . A denial of service attack against the Open Floodlight SDN controller . Dover Networks LCC , Edgewater, MD, USA , 2013 . Jeremy M Dover. A denial of service attack against the Open Floodlight SDN controller. Dover Networks LCC, Edgewater, MD, USA, 2013."},{"key":"e_1_3_2_1_29_1","unstructured":"OpenFlow PacketOut. http:\/\/flowgrammable.org\/sdn\/openflow\/message-layer\/packetout\/.  OpenFlow PacketOut. http:\/\/flowgrammable.org\/sdn\/openflow\/message-layer\/packetout\/."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2876019.2876024"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2018.8406229"},{"key":"e_1_3_2_1_32_1","unstructured":"Policy Framework for ONOS. https:\/\/wiki.onosproject.org\/display\/ONOS\/POLICY+FRAMEWORK+FOR+ONOS.  Policy Framework for ONOS. https:\/\/wiki.onosproject.org\/display\/ONOS\/POLICY+FRAMEWORK+FOR+ONOS."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"e_1_3_2_1_34_1","unstructured":"OpenDaylight Group Based Policy. https:\/\/docs.opendaylight.org\/en\/stable-fluorine\/user-guide\/group-based-policy-user-guide.html.  OpenDaylight Group Based Policy. https:\/\/docs.opendaylight.org\/en\/stable-fluorine\/user-guide\/group-based-policy-user-guide.html."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.11.017"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2013.6614121"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787472"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1384609.1384625"},{"key":"e_1_3_2_1_39_1","unstructured":"Cisco Open SDN Controller. http:\/\/www.cisco.com\/c\/en\/us\/products\/cloud-systems-management\/open-sdn-controller\/index.html.  Cisco Open SDN Controller. http:\/\/www.cisco.com\/c\/en\/us\/products\/cloud-systems-management\/open-sdn-controller\/index.html."},{"key":"e_1_3_2_1_40_1","unstructured":"OpenDaylight. https:\/\/www.opendaylight.org.  OpenDaylight. https:\/\/www.opendaylight.org."},{"key":"e_1_3_2_1_41_1","unstructured":"Central Office Re-architected as a Datacenter (CORD). https:\/\/opencord.org\/.  Central Office Re-architected as a Datacenter (CORD). https:\/\/opencord.org\/."},{"key":"e_1_3_2_1_42_1","unstructured":"Packet-Optical. https:\/\/wiki.onosproject.org\/display\/ONOS\/Packet+Optical+Convergence.  Packet-Optical. https:\/\/wiki.onosproject.org\/display\/ONOS\/Packet+Optical+Convergence."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2016.12"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2986959"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2980983.2908097"},{"key":"e_1_3_2_1_46_1","first-page":"114","volume-title":"International Symposium on Distributed Computing (DISC)","author":"\u010cerny Pavol","year":"2016","unstructured":"Pavol \u010cerny , Nate Foster , Nilesh Jagnik , and Jedidiah McClurg . Optimal consistent network updates in polynomial time . In International Symposium on Distributed Computing (DISC) , pages 114 -- 128 . Springer , 2016 . Pavol \u010cerny, Nate Foster, Nilesh Jagnik, and Jedidiah McClurg. Optimal consistent network updates in polynomial time. In International Symposium on Distributed Computing (DISC), pages 114--128. Springer, 2016."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3050224"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.7125\/APAN.35.2"},{"key":"e_1_3_2_1_49_1","first-page":"560","volume-title":"OpenFlow Communications and TLS Security in Software-Defined Networks. In 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications","author":"Agborubere Belema","year":"2017","unstructured":"Belema Agborubere and Erika Sanchez-Velazquez . OpenFlow Communications and TLS Security in Software-Defined Networks. In 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pages 560 -- 566 . IEEE , 2017 . Belema Agborubere and Erika Sanchez-Velazquez. OpenFlow Communications and TLS Security in Software-Defined Networks. In 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pages 560--566. IEEE, 2017."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620747"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2737980"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.5555\/866693"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4460050407"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68339-9_31"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1985.64"},{"key":"e_1_3_2_1_57_1","volume-title":"Distributed Key Generation in the Wild. IACR Cryptology ePrint Archive","author":"Kate Aniket","year":"2012","unstructured":"Aniket Kate , Yizhou Huang , and Ian Goldberg . Distributed Key Generation in the Wild. IACR Cryptology ePrint Archive , 2012 :377, 2012. Aniket Kate, Yizhou Huang, and Ian Goldberg. Distributed Key Generation in the Wild. IACR Cryptology ePrint Archive, 2012:377, 2012."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48046-3_3"},{"key":"e_1_3_2_1_59_1","volume-title":"Unreliable failure detectors for reliable distributed systems. Journal of the ACM (JACM), 43(2):225--267","author":"Chandra Tushar Deepak","year":"1996","unstructured":"Tushar Deepak Chandra and Sam Toueg . Unreliable failure detectors for reliable distributed systems. Journal of the ACM (JACM), 43(2):225--267 , 1996 . Tushar Deepak Chandra and Sam Toueg. Unreliable failure detectors for reliable distributed systems. Journal of the ACM (JACM), 43(2):225--267, 1996."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.2002.1180218"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-004-0314-9"},{"key":"e_1_3_2_1_62_1","unstructured":"Ben Lynn. The Pairing Based Cryptography Library. https:\/\/crypto.stanford.edu\/pbc\/.  Ben Lynn. The Pairing Based Cryptography Library. https:\/\/crypto.stanford.edu\/pbc\/."},{"key":"e_1_3_2_1_63_1","unstructured":"OpenFlow Role Request Messages. https:\/\/ryu.readthedocs.io\/en\/latest\/ofproto_v1_3_ref.html#role-request-message.  OpenFlow Role Request Messages. https:\/\/ryu.readthedocs.io\/en\/latest\/ofproto_v1_3_ref.html#role-request-message."},{"key":"e_1_3_2_1_64_1","unstructured":"About DETERLab. https:\/\/deter-project.org\/about_deterlab.  About DETERLab. https:\/\/deter-project.org\/about_deterlab."},{"key":"e_1_3_2_1_65_1","unstructured":"DETERLab PC3000 Node Information. https:\/\/www.isi.deterlab.net\/shownodetype.php?node_type=pc3000.  DETERLab PC3000 Node Information. https:\/\/www.isi.deterlab.net\/shownodetype.php?node_type=pc3000."},{"key":"e_1_3_2_1_66_1","unstructured":"OpenVz. https:\/\/openvz.org\/.  OpenVz. https:\/\/openvz.org\/."},{"key":"e_1_3_2_1_67_1","unstructured":"Introducing data center fabric the next-generation Facebook data center network. https:\/\/code.fb.com\/production-engineering\/introducing-data-center-fabric-the-next-generation-facebook-data-center-network\/.  Introducing data center fabric the next-generation Facebook data center network. https:\/\/code.fb.com\/production-engineering\/introducing-data-center-fabric-the-next-generation-facebook-data-center-network\/."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620752"},{"key":"e_1_3_2_1_69_1","unstructured":"The Internet Topology Zoo. http:\/\/www.topology-zoo.org\/.  The Internet Topology Zoo. http:\/\/www.topology-zoo.org\/."}],"event":{"name":"Middleware '20: 21st International Middleware Conference","sponsor":["ACM Association for Computing Machinery","IFIP"],"location":"Delft Netherlands","acronym":"Middleware '20"},"container-title":["Proceedings of the 21st International Middleware Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3423211.3425694","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3423211.3425694","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3423211.3425694","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:57Z","timestamp":1750195497000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3423211.3425694"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":69,"alternative-id":["10.1145\/3423211.3425694","10.1145\/3423211"],"URL":"https:\/\/doi.org\/10.1145\/3423211.3425694","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}