{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T14:23:14Z","timestamp":1769264594961,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,9]],"date-time":"2021-08-09T00:00:00Z","timestamp":1628467200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,9]]},"DOI":"10.1145\/3472456.3473512","type":"proceedings-article","created":{"date-parts":[[2021,10,5]],"date-time":"2021-10-05T18:46:04Z","timestamp":1633459564000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Teddy: An Efficient SIMD-based Literal Matching Engine for Scalable Deep Packet Inspection"],"prefix":"10.1145","author":[{"given":"Kun","family":"Qiu","sequence":"first","affiliation":[{"name":"Intel APAC, China"}]},{"given":"Harry","family":"Chang","sequence":"additional","affiliation":[{"name":"Intel APAC, China"}]},{"given":"Yang","family":"Hong","sequence":"additional","affiliation":[{"name":"Intel APAC, China"}]},{"given":"Wenjun","family":"Zhu","sequence":"additional","affiliation":[{"name":"Intel APAC, China"}]},{"given":"Xiang","family":"Wang","sequence":"additional","affiliation":[{"name":"Intel APAC, China"}]},{"given":"Baoqian","family":"Li","sequence":"additional","affiliation":[{"name":"Intel APAC, China"}]}],"member":"320","published-online":{"date-parts":[[2021,10,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2021. ModSecurity Rule Sets. https:\/\/owasp.org\/www-project-modsecurity-core-rule-set\/  2021. ModSecurity Rule Sets. https:\/\/owasp.org\/www-project-modsecurity-core-rule-set\/"},{"key":"e_1_3_2_1_2_1","unstructured":"2021. ModSecurity Web Application Firewall. https:\/\/www.modsecurity.org\/  2021. ModSecurity Web Application Firewall. https:\/\/www.modsecurity.org\/"},{"key":"e_1_3_2_1_3_1","unstructured":"2021. Snort Intrusion Detection System. https:\/\/snort.org  2021. Snort Intrusion Detection System. https:\/\/snort.org"},{"key":"e_1_3_2_1_4_1","unstructured":"2021. Suricata Open Source IDS. http:\/\/suricata-ids.org\/  2021. Suricata Open Source IDS. http:\/\/suricata-ids.org\/"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/360825.360855"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/135239.135243"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1364654.1364656"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2445572.2445576"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674984"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2011.6157418"},{"key":"e_1_3_2_1_11_1","volume-title":"13th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 16). 551\u2013565.","author":"Choi Byungkwon","unstructured":"Byungkwon Choi , Jongwook Chae , Muhammad Jamshed , Kyoungsoo Park , and Dongsu Han . 2016. {DFC} : Accelerating String Pattern Matching for Network Applications . In 13th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 16). 551\u2013565. Byungkwon Choi, Jongwook Chae, Muhammad Jamshed, Kyoungsoo Park, and Dongsu Han. 2016. {DFC}: Accelerating String Pattern Matching for Network Applications. In 13th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 16). 551\u2013565."},{"key":"e_1_3_2_1_12_1","volume-title":"International Colloquium on Automata, Languages, and Programming","author":"Commentz-Walter Beate","unstructured":"Beate Commentz-Walter . 1979. A string matching algorithm fast on the average . In International Colloquium on Automata, Languages, and Programming . Springer , 118\u2013132. Beate Commentz-Walter. 1979. A string matching algorithm fast on the average. In International Colloquium on Automata, Languages, and Programming. Springer, 118\u2013132."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382232"},{"key":"e_1_3_2_1_14_1","volume-title":"Efficient randomized pattern-matching algorithms. IBM journal of research and development 31, 2","author":"Karp M","year":"1987","unstructured":"Richard\u00a0 M Karp and Michael\u00a0 O Rabin . 1987. Efficient randomized pattern-matching algorithms. IBM journal of research and development 31, 2 ( 1987 ), 249\u2013260. Richard\u00a0M Karp and Michael\u00a0O Rabin. 1987. Efficient randomized pattern-matching algorithms. IBM journal of research and development 31, 2 (1987), 249\u2013260."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-51486-4_90"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3360468.3368184"},{"key":"e_1_3_2_1_17_1","volume-title":"16th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 19). 631\u2013648.","author":"Wang Xiang","unstructured":"Xiang Wang , Yang Hong , Harry Chang , KyoungSoo Park , Geoff Langdale , Jiayu Hu , and Heqing Zhu . 2019. Hyperscan: a fast multi-pattern regex matcher for modern cpus . In 16th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 19). 631\u2013648. Xiang Wang, Yang Hong, Harry Chang, KyoungSoo Park, Geoff Langdale, Jiayu Hu, and Heqing Zhu. 2019. Hyperscan: a fast multi-pattern regex matcher for modern cpus. In 16th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 19). 631\u2013648."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1185347.1185360"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2358840"}],"event":{"name":"ICPP 2021: 50th International Conference on Parallel Processing","location":"Lemont IL USA","acronym":"ICPP 2021"},"container-title":["50th International Conference on Parallel Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3472456.3473512","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3472456.3473512","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:23Z","timestamp":1750191443000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3472456.3473512"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,9]]},"references-count":19,"alternative-id":["10.1145\/3472456.3473512","10.1145\/3472456"],"URL":"https:\/\/doi.org\/10.1145\/3472456.3473512","relation":{},"subject":[],"published":{"date-parts":[[2021,8,9]]},"assertion":[{"value":"2021-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}