{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:47:47Z","timestamp":1750225667038,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,4]],"date-time":"2021-11-04T00:00:00Z","timestamp":1635984000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the National Natural Science Foundation of China","award":["92038302 and 61625203"],"award-info":[{"award-number":["92038302 and 61625203"]}]},{"name":"the National Key R&D Program of China","award":["2019YFB1802504"],"award-info":[{"award-number":["2019YFB1802504"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,10]]},"DOI":"10.1145\/3484266.3487368","type":"proceedings-article","created":{"date-parts":[[2021,11,4]],"date-time":"2021-11-04T22:31:15Z","timestamp":1636065075000},"page":"77-83","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Switches are Scanners Too!"],"prefix":"10.1145","author":[{"given":"Guanyu","family":"Li","sequence":"first","affiliation":[{"name":"Tsinghua University"}]},{"given":"Menghao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Tsinghua &amp; Kuaishou"}]},{"given":"Cheng","family":"Guo","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Han","family":"Bao","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Mingwe","family":"Xu","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Hongxin","family":"Hu","sequence":"additional","affiliation":[{"name":"University at Buffalo, SUNY"}]}],"member":"320","published-online":{"date-parts":[[2021,11,4]]},"reference":[{"volume-title":"8th {USENIX} Workshop on Offensive Technologies ({WOOT} 14)","author":"Adrian David","key":"e_1_3_2_1_1_1","unstructured":"David Adrian , Zakir Durumeric , Gulshan Singh , and J Alex Halderman . 2014. Zippier zmap: internet-wide scanning at 10 gbps . In 8th {USENIX} Workshop on Offensive Technologies ({WOOT} 14) . USENIX , San Diego, CA . David Adrian, Zakir Durumeric, Gulshan Singh, and J Alex Halderman. 2014. Zippier zmap: internet-wide scanning at 10 gbps. In 8th {USENIX} Workshop on Offensive Technologies ({WOOT} 14). USENIX, San Diego, CA."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131401"},{"key":"e_1_3_2_1_3_1","unstructured":"Nimrod Aviram Sebastian Schinzel Juraj Somorovsky Nadia Heninger Maik Dankel Jens Steube Luke Valenta David Adrian J Alex Halderman Viktor Dukhovni etal 2016. {DROWN}: Breaking {TLS} Using SSLv2. In 25th {USENIX} Security Symposium ({USENIX} Security 16). USENIX Austin TX 689--706.  Nimrod Aviram Sebastian Schinzel Juraj Somorovsky Nadia Heninger Maik Dankel Jens Steube Luke Valenta David Adrian J Alex Halderman Viktor Dukhovni et al. 2016. {DROWN}: Breaking {TLS} Using SSLv2. In 25th {USENIX} Security Symposium ({USENIX} Security 16). USENIX Austin TX 689--706."},{"key":"e_1_3_2_1_4_1","unstructured":"AVSystem. 2021. 5G IoT: What does 5G mean for IoT? https:\/\/www.avsystem.com\/blog\/5g-iot\/. (2021).  AVSystem. 2021. 5G IoT: What does 5G mean for IoT? https:\/\/www.avsystem.com\/blog\/5g-iot\/. (2021)."},{"key":"e_1_3_2_1_5_1","unstructured":"D. J. Bernstein. 2021. SYN cookies. https:\/\/cr.yp.to\/syncookies.html. (2021).  D. J. Bernstein. 2021. SYN cookies. https:\/\/cr.yp.to\/syncookies.html. (2021)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.39"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486011"},{"volume-title":"23rd {USENIX} Security Symposium ({USENIX} Security 14)","author":"Checkoway Stephen","key":"e_1_3_2_1_9_1","unstructured":"Stephen Checkoway , Ruben Niederhagen , Adam Everspaugh , Matthew Green , Tanja Lange , Thomas Ristenpart , Daniel J Bernstein , Jake Maskiewicz , Hovav Shacham , and Matthew Fredrikson . 2014. On the practical exploitability of dual {EC} in {TLS} implementations . In 23rd {USENIX} Security Symposium ({USENIX} Security 14) . USENIX , San Diego, CA , 319--335. Stephen Checkoway, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja Lange, Thomas Ristenpart, Daniel J Bernstein, Jake Maskiewicz, Hovav Shacham, and Matthew Fredrikson. 2014. On the practical exploitability of dual {EC} in {TLS} implementations. In 23rd {USENIX} Security Symposium ({USENIX} Security 14). USENIX, San Diego, CA, 319--335."},{"key":"e_1_3_2_1_10_1","unstructured":"Cisco. 2021. Best Practices in Core Network Capacity Planning White Paper. https:\/\/www.cisco.com\/c\/en\/us\/products\/collateral\/routers\/ wan-automation-engine\/white_paper_c11-728551.html. (2021).  Cisco. 2021. Best Practices in Core Network Capacity Planning White Paper. https:\/\/www.cisco.com\/c\/en\/us\/products\/collateral\/routers\/ wan-automation-engine\/white_paper_c11-728551.html. (2021)."},{"key":"e_1_3_2_1_11_1","unstructured":"Intel DPDK. 2021. Learn How To Get Involved With DPDK. https:\/\/www.dpdk.org\/. (2021).  Intel DPDK. 2021. Learn How To Get Involved With DPDK. https:\/\/www.dpdk.org\/. (2021)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815695"},{"volume-title":"22nd {USENIX} Security Symposium ({ USENIX} Security 13). USENIX, Washington, D.C., USA, 605--620.","author":"Durumeric Zakir","key":"e_1_3_2_1_13_1","unstructured":"Zakir Durumeric , Eric Wustrow , and J Alex Halderman . 2013. ZMap: Fast Internet-wide scanning and its security applications . In 22nd {USENIX} Security Symposium ({ USENIX} Security 13). USENIX, Washington, D.C., USA, 605--620. Zakir Durumeric, Eric Wustrow, and J Alex Halderman. 2013. ZMap: Fast Internet-wide scanning and its security applications. In 22nd {USENIX} Security Symposium ({ USENIX} Security 13). USENIX, Washington, D.C., USA, 605--620."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230555"},{"volume-title":"21st {USENIX} Security Symposium ({USENIX} Security 12)","author":"Heninger Nadia","key":"e_1_3_2_1_15_1","unstructured":"Nadia Heninger , Zakir Durumeric , Eric Wustrow , and J Alex Halderman . 2012. Mining your Ps and Qs: Detection of widespread weak keys in network devices . In 21st {USENIX} Security Symposium ({USENIX} Security 12) . USENIX , Bellevue, WA , 205--220. Nadia Heninger, Zakir Durumeric, Eric Wustrow, and J Alex Halderman. 2012. Mining your Ps and Qs: Detection of widespread weak keys in network devices. In 21st {USENIX} Security Symposium ({USENIX} Security 12). USENIX, Bellevue, WA, 205--220."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23055"},{"key":"e_1_3_2_1_17_1","unstructured":"IMapScanner. 2021. IMap. https:\/\/github.com\/IMapScanner\/IMap.git. (2021).  IMapScanner. 2021. IMap. https:\/\/github.com\/IMapScanner\/IMap.git. (2021)."},{"key":"e_1_3_2_1_18_1","unstructured":"Intel. 2021. Intel Tofino: P4-programmable Ethernet switch ASIC that delivers better performance at lower power. https:\/\/www.intel.com\/content\/www\/us\/en\/products\/network-io\/programmable-ethernet-switch\/tofino-series.html. (2021).  Intel. 2021. Intel Tofino: P4-programmable Ethernet switch ASIC that delivers better performance at lower power. https:\/\/www.intel.com\/content\/www\/us\/en\/products\/network-io\/programmable-ethernet-switch\/tofino-series.html. (2021)."},{"key":"e_1_3_2_1_19_1","unstructured":"Google Ipv6. 2021. IPv6 Adoption. https:\/\/www.google.com\/intl\/en\/ipv6\/statistics.html. (2021).  Google Ipv6. 2021. IPv6 Adoption. https:\/\/www.google.com\/intl\/en\/ipv6\/statistics.html. (2021)."},{"key":"e_1_3_2_1_20_1","volume-title":"Netchain: Scale-free subrtt coordination. In 15th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 18)","author":"Jin Xin","year":"2018","unstructured":"Xin Jin , Xiaozhou Li , Haoyu Zhang , Nate Foster , Jeongkeun Lee , Robert Soul\u00e9 , Changhoon Kim , and Ion Stoica . 2018 . Netchain: Scale-free subrtt coordination. In 15th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 18) . USENIX , Renton, WA, USA , 35--49. Xin Jin, Xiaozhou Li, Haoyu Zhang, Nate Foster, Jeongkeun Lee, Robert Soul\u00e9, Changhoon Kim, and Ion Stoica. 2018. Netchain: Scale-free subrtt coordination. In 15th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 18). USENIX, Renton, WA, USA, 35--49."},{"key":"e_1_3_2_1_21_1","unstructured":"Redis Labs. 2021. Redis. https:\/\/redis.io\/. (2021).  Redis Labs. 2021. Redis. https:\/\/redis.io\/. (2021)."},{"volume-title":"Masscan: Mass IP port scanner. https:\/\/github.com\/robertdavidgraham\/masscan.","year":"2021","key":"e_1_3_2_1_22_1","unstructured":"Masscan. 2021 . Masscan: Mass IP port scanner. https:\/\/github.com\/robertdavidgraham\/masscan. (2021). Masscan. 2021. Masscan: Mass IP port scanner. https:\/\/github.com\/robertdavidgraham\/masscan. (2021)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098824"},{"key":"e_1_3_2_1_24_1","unstructured":"NMAP.ORG. 2021. Nmap. https:\/\/nmap.org\/. (2021).  NMAP.ORG. 2021. Nmap. https:\/\/nmap.org\/. (2021)."},{"volume-title":"12th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 16). 203--216.","author":"Panda Aurojit","key":"e_1_3_2_1_25_1","unstructured":"Aurojit Panda , Sangjin Han , Keon Jang , Melvin Walls , Sylvia Ratnasamy , and Scott Shenker . 2016. NetBricks: Taking the V out of {NFV} . In 12th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 16). 203--216. Aurojit Panda, Sangjin Han, Keon Jang, Melvin Walls, Sylvia Ratnasamy, and Scott Shenker. 2016. NetBricks: Taking the V out of {NFV}. In 12th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 16). 203--216."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987473"},{"key":"e_1_3_2_1_27_1","unstructured":"Vybint. 2021. 15 Alarming Cyber Security Facts and Stats. https:\/\/www.cybintsolutions.com\/cyber-security-facts-stats\/. (2021).  Vybint. 2021. 15 Alarming Cyber Security Facts and Stats. https:\/\/www.cybintsolutions.com\/cyber-security-facts-stats\/. (2021)."},{"key":"e_1_3_2_1_28_1","unstructured":"W3Techs. 2021. Usage statistics of IPv6 for websites. https:\/\/w3techs.com\/technologies\/details\/ce-ipv6. (2021).  W3Techs. 2021. Usage statistics of IPv6 for websites. https:\/\/w3techs.com\/technologies\/details\/ce-ipv6. (2021)."},{"key":"e_1_3_2_1_29_1","volume-title":"Hypertester: high-performance network testing driven by programmable switches","author":"Zhang Dai","year":"2021","unstructured":"Dai Zhang , Yu Zhou , Zhaowei Xi , Yangyang Wang , Mingwei Xu , and Jianping Wu. 2021. Hypertester: high-performance network testing driven by programmable switches . IEEE\/ACM Transactions on Networking ( 2021 ). Dai Zhang, Yu Zhou, Zhaowei Xi, Yangyang Wang, Mingwei Xu, and Jianping Wu. 2021. Hypertester: high-performance network testing driven by programmable switches. IEEE\/ACM Transactions on Networking (2021)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2894189"},{"key":"e_1_3_2_1_31_1","unstructured":"ZMap. 2021. ZMap: The Internet Scanner. https:\/\/github.com\/zmap\/zmap. (2021).  ZMap. 2021. ZMap: The Internet Scanner. https:\/\/github.com\/zmap\/zmap. (2021)."}],"event":{"name":"HotNets '21: The 20th ACM Workshop on Hot Topics in Networks","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Virtual Event United Kingdom","acronym":"HotNets '21"},"container-title":["Proceedings of the Twentieth ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3484266.3487368","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3484266.3487368","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:13Z","timestamp":1750191433000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3484266.3487368"}},"subtitle":["A Fast and Scalable In-Network Scanner with Programmable Switches"],"short-title":[],"issued":{"date-parts":[[2021,11,4]]},"references-count":31,"alternative-id":["10.1145\/3484266.3487368","10.1145\/3484266"],"URL":"https:\/\/doi.org\/10.1145\/3484266.3487368","relation":{},"subject":[],"published":{"date-parts":[[2021,11,4]]},"assertion":[{"value":"2021-11-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}