{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,4]],"date-time":"2025-10-04T12:13:55Z","timestamp":1759580035483,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NMICPS TiHAN"},{"name":"National Supercomputing Mission, India"},{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1145\/3542637.3542649","type":"proceedings-article","created":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T00:29:28Z","timestamp":1699403368000},"page":"76-82","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Packet Processing Algorithm Identification using Program Embeddings"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1393-7321","authenticated-orcid":false,"given":"S.","family":"VenkataKeerthy","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Indian Institute of Technology Hyderabad, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1180-4197","authenticated-orcid":false,"given":"Yashas","family":"Andaluri","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Indian Institute of Technology Hyderabad, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4115-0588","authenticated-orcid":false,"given":"Sayan","family":"Dey","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Indian Institute of Technology Hyderabad, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9823-4515","authenticated-orcid":false,"given":"Rinku","family":"Shah","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Indraprastha Institute of Information Technology Delhi, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8057-7699","authenticated-orcid":false,"given":"Praveen","family":"Tammana","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Indian Institute of Technology Hyderabad, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5290-3266","authenticated-orcid":false,"given":"Ramakrishna","family":"Upadrasta","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Indian Institute of Technology Hyderabad, India"}]}],"member":"320","published-online":{"date-parts":[[2023,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212695"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290353"},{"volume-title":"SSL Library mbed TLS\/PolarSSL. https:\/\/tls.mbed.org\/. [Online","year":"2022","key":"e_1_3_2_1_3_1","unstructured":"arm. 2009. SSL Library mbed TLS\/PolarSSL. https:\/\/tls.mbed.org\/. [Online ; accessed 16- March - 2022 ]. arm. 2009. SSL Library mbed TLS\/PolarSSL. https:\/\/tls.mbed.org\/. [Online; accessed 16-March-2022]."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 32Nd International Conference on Neural Information Processing Systems","author":"Ben-Nun Tal","year":"2018","unstructured":"Tal Ben-Nun , Alice\u00a0Shoshana Jakobovits , and Torsten Hoefler . 2018 . Neural Code Comprehension: A Learnable Representation of Code Semantics . In Proceedings of the 32Nd International Conference on Neural Information Processing Systems ( Montr\u00e9al, Canada) (NIPS\u201918). Curran Associates Inc., USA, 3589\u20133601. http:\/\/dl.acm.org\/citation.cfm?id=3327144.3327276 Tal Ben-Nun, Alice\u00a0Shoshana Jakobovits, and Torsten Hoefler. 2018. Neural Code Comprehension: A Learnable Representation of Code Semantics. In Proceedings of the 32Nd International Conference on Neural Information Processing Systems (Montr\u00e9al, Canada) (NIPS\u201918). Curran Associates Inc., USA, 3589\u20133601. http:\/\/dl.acm.org\/citation.cfm?id=3327144.3327276"},{"volume-title":"Botan: Crypto and TLS for Modern C++. https:\/\/botan.randombit.net\/. [Online","year":"2000","key":"e_1_3_2_1_5_1","unstructured":"Botan. 2000 . Botan: Crypto and TLS for Modern C++. https:\/\/botan.randombit.net\/. [Online ; accessed 16-March-2022]. Botan. 2000. Botan: Crypto and TLS for Modern C++. https:\/\/botan.randombit.net\/. [Online; accessed 16-March-2022]."},{"volume-title":"Cavium LiquidIO\u00ae Server Adapter Family. https:\/\/datasheet.octopart.com\/CN6130-110SV-G-Cavium-Networks-datasheet-26366670.pdf. [Online","year":"2022","key":"e_1_3_2_1_6_1","unstructured":"Cavium. 2013. Cavium LiquidIO\u00ae Server Adapter Family. https:\/\/datasheet.octopart.com\/CN6130-110SV-G-Cavium-Networks-datasheet-26366670.pdf. [Online ; accessed 16- March - 2022 ]. Cavium. 2013. Cavium LiquidIO\u00ae Server Adapter Family. https:\/\/datasheet.octopart.com\/CN6130-110SV-G-Cavium-Networks-datasheet-26366670.pdf. [Online; accessed 16-March-2022]."},{"volume-title":"Conference Record of the Fourth Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. ACM Press","author":"Cousot P.","key":"e_1_3_2_1_7_1","unstructured":"P. Cousot and R. Cousot . 1977. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints . In Conference Record of the Fourth Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. ACM Press , New York, NY, Los Angeles, California, 238\u2013252. P. Cousot and R. Cousot. 1977. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In Conference Record of the Fourth Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. ACM Press, New York, NY, Los Angeles, California, 238\u2013252."},{"key":"e_1_3_2_1_8_1","volume-title":"https:\/\/www.cryptopp.com\/. [Online","author":"Library","year":"2022","unstructured":"Crypto++. 1995. Crypto++\u00ae Library 8.6. https:\/\/www.cryptopp.com\/. [Online ; accessed 16- March - 2022 ]. Crypto++. 1995. Crypto++\u00ae Library 8.6. https:\/\/www.cryptopp.com\/. [Online; accessed 16-March-2022]."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3476886.3477505"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 38th International Conference on Machine Learning(Proceedings of Machine Learning Research, Vol.\u00a0139)","author":"Cummins Chris","year":"2021","unstructured":"Chris Cummins , Zacharias\u00a0 V. Fisches , Tal Ben-Nun , Torsten Hoefler , Michael F\u00a0P O\u2019Boyle , and Hugh Leather . 2021 . ProGraML: A Graph-based Program Representation for Data Flow Analysis and Compiler Optimizations . In Proceedings of the 38th International Conference on Machine Learning(Proceedings of Machine Learning Research, Vol.\u00a0139) , Marina Meila and Tong Zhang (Eds.). PMLR, 2244\u20132253. Chris Cummins, Zacharias\u00a0V. Fisches, Tal Ben-Nun, Torsten Hoefler, Michael F\u00a0P O\u2019Boyle, and Hugh Leather. 2021. ProGraML: A Graph-based Program Representation for Data Flow Analysis and Compiler Optimizations. In Proceedings of the 38th International Conference on Machine Learning(Proceedings of Machine Learning Research, Vol.\u00a0139), Marina Meila and Tong Zhang (Eds.). PMLR, 2244\u20132253."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.2017.24"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/115372.115320"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/globecom46510.2021.9685551"},{"key":"e_1_3_2_1_14_1","volume-title":"VFP: A Virtual Switch Platform for Host SDN in the Public Cloud. In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17)","author":"Firestone Daniel","year":"2017","unstructured":"Daniel Firestone . 2017 . VFP: A Virtual Switch Platform for Host SDN in the Public Cloud. In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17) . USENIX Association, Boston, MA, 315\u2013328. https:\/\/www.usenix.org\/conference\/nsdi17\/technical-sessions\/presentation\/firestone Daniel Firestone. 2017. VFP: A Virtual Switch Platform for Host SDN in the Public Cloud. In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17). USENIX Association, Boston, MA, 315\u2013328. https:\/\/www.usenix.org\/conference\/nsdi17\/technical-sessions\/presentation\/firestone"},{"key":"e_1_3_2_1_15_1","volume-title":"Azure Accelerated Networking: SmartNICs in the Public Cloud. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18)","author":"Firestone Daniel","year":"2018","unstructured":"Daniel Firestone , Andrew Putnam , Sambhrama Mundkur , Derek Chiou , Alireza Dabagh , Mike Andrewartha , Hari Angepat , Vivek Bhanu , Adrian Caulfield , Eric Chung , Harish\u00a0Kumar Chandrappa , Somesh Chaturmohta , Matt Humphrey , Jack Lavier , Norman Lam , Fengfen Liu , Kalin Ovtcharov , Jitu Padhye , Gautham Popuri , Shachar Raindel , Tejas Sapre , Mark Shaw , Gabriel Silva , Madhan Sivakumar , Nisheeth Srivastava , Anshuman Verma , Qasim Zuhair , Deepak Bansal , Doug Burger , Kushagra Vaid , David\u00a0 A. Maltz , and Albert Greenberg . 2018 . Azure Accelerated Networking: SmartNICs in the Public Cloud. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18) . USENIX Association, Renton, WA, 51\u201366. https:\/\/www.usenix.org\/conference\/nsdi18\/presentation\/firestone Daniel Firestone, Andrew Putnam, Sambhrama Mundkur, Derek Chiou, Alireza Dabagh, Mike Andrewartha, Hari Angepat, Vivek Bhanu, Adrian Caulfield, Eric Chung, Harish\u00a0Kumar Chandrappa, Somesh Chaturmohta, Matt Humphrey, Jack Lavier, Norman Lam, Fengfen Liu, Kalin Ovtcharov, Jitu Padhye, Gautham Popuri, Shachar Raindel, Tejas Sapre, Mark Shaw, Gabriel Silva, Madhan Sivakumar, Nisheeth Srivastava, Anshuman Verma, Qasim Zuhair, Deepak Bansal, Doug Burger, Kushagra Vaid, David\u00a0A. Maltz, and Albert Greenberg. 2018. Azure Accelerated Networking: SmartNICs in the Public Cloud. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18). USENIX Association, Renton, WA, 51\u201366. https:\/\/www.usenix.org\/conference\/nsdi18\/presentation\/firestone"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-010-0161-2"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405879"},{"volume-title":"Flow Analysis of Computer Programs","author":"Hecht S.","key":"e_1_3_2_1_18_1","unstructured":"Matthew\u00a0 S. Hecht . 1977. Flow Analysis of Computer Programs . Elsevier Science Inc ., New York, NY, USA. Matthew\u00a0S. Hecht. 1977. Flow Analysis of Computer Programs. Elsevier Science Inc., New York, NY, USA."},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 32nd International Conference on Machine Learning(Proceedings of Machine Learning Research, Vol.\u00a037)","author":"Ioffe Sergey","year":"2015","unstructured":"Sergey Ioffe and Christian Szegedy . 2015 . Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift . In Proceedings of the 32nd International Conference on Machine Learning(Proceedings of Machine Learning Research, Vol.\u00a037) , Francis Bach and David Blei (Eds.). PMLR, Lille, France, 448\u2013456. http:\/\/proceedings.mlr.press\/v37\/ioffe15.html Sergey Ioffe and Christian Szegedy. 2015. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift. In Proceedings of the 32nd International Conference on Machine Learning(Proceedings of Machine Learning Research, Vol.\u00a037), Francis Bach and David Blei (Eds.). PMLR, Lille, France, 448\u2013456. http:\/\/proceedings.mlr.press\/v37\/ioffe15.html"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1002\/nem.2134"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/977395.977673"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342079"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2503210.2503268"},{"volume-title":"Marvell Octeon LiquidIO SmartNICs and DPUs. https:\/\/www.marvell.com\/content\/dam\/marvell\/en\/public-collateral\/embedded-processors\/marvell-octeon-10-dpu-platform-product-brief.pdf. [Online","year":"2022","key":"e_1_3_2_1_24_1","unstructured":"Marvell. 2021. Marvell Octeon LiquidIO SmartNICs and DPUs. https:\/\/www.marvell.com\/content\/dam\/marvell\/en\/public-collateral\/embedded-processors\/marvell-octeon-10-dpu-platform-product-brief.pdf. [Online ; accessed 16- March - 2022 ]. Marvell. 2021. Marvell Octeon LiquidIO SmartNICs and DPUs. https:\/\/www.marvell.com\/content\/dam\/marvell\/en\/public-collateral\/embedded-processors\/marvell-octeon-10-dpu-platform-product-brief.pdf. [Online; accessed 16-March-2022]."},{"key":"e_1_3_2_1_25_1","unstructured":"Tomas Mikolov Kai Chen Greg Corrado and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781(2013).  Tomas Mikolov Kai Chen Greg Corrado and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781(2013)."},{"key":"e_1_3_2_1_26_1","volume-title":"Nettle: a low-level cryptographic library. https:\/\/www.lysator.liu.se\/~nisse\/nettle\/nettle.html. [Online","author":"Niels M\u00f6ller","year":"2022","unstructured":"Niels M\u00f6ller 2001. Nettle: a low-level cryptographic library. https:\/\/www.lysator.liu.se\/~nisse\/nettle\/nettle.html. [Online ; accessed 16- March - 2022 ]. Niels M\u00f6ller 2001. Nettle: a low-level cryptographic library. https:\/\/www.lysator.liu.se\/~nisse\/nettle\/nettle.html. [Online; accessed 16-March-2022]."},{"volume-title":"Netronome Agilio SmartNICs. https:\/\/www.netronome.com\/media\/documents\/PB_NFP-4000-7-20.pdf. [Online","year":"2022","key":"e_1_3_2_1_27_1","unstructured":"Netronome. 2017. Netronome Agilio SmartNICs. https:\/\/www.netronome.com\/media\/documents\/PB_NFP-4000-7-20.pdf. [Online ; accessed 16- March - 2022 ]. Netronome. 2017. Netronome Agilio SmartNICs. https:\/\/www.netronome.com\/media\/documents\/PB_NFP-4000-7-20.pdf. [Online; accessed 16-March-2022]."},{"volume-title":"Nvidia Bluefield Data Processing Units. https:\/\/www.nvidia.com\/content\/dam\/en-zz\/Solutions\/Data-Center\/documents\/datasheet-nvidia-bluefield-3-dpu.pdf. [Online","year":"2022","key":"e_1_3_2_1_28_1","unstructured":"Nvidia. 2022. Nvidia Bluefield Data Processing Units. https:\/\/www.nvidia.com\/content\/dam\/en-zz\/Solutions\/Data-Center\/documents\/datasheet-nvidia-bluefield-3-dpu.pdf. [Online ; accessed 16- March - 2022 ]. Nvidia. 2022. Nvidia Bluefield Data Processing Units. https:\/\/www.nvidia.com\/content\/dam\/en-zz\/Solutions\/Data-Center\/documents\/datasheet-nvidia-bluefield-3-dpu.pdf. [Online; accessed 16-March-2022]."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908812.2908918"},{"key":"e_1_3_2_1_30_1","unstructured":"OpenSSL. 1998. The Open Source Toolkit for SSL\/TLS. http:\/\/openssl.org\/. [Online; accessed 16-March-2022].  OpenSSL. 1998. The Open Source Toolkit for SSL\/TLS. http:\/\/openssl.org\/. [Online; accessed 16-March-2022]."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485983.3494861"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"volume-title":"Pensando DSC-100 Distributed Services Card. https:\/\/pensando.io\/wp-content\/uploads\/2020\/03\/DSC-100-ProductBrief-v06.pdf. [Online","year":"2022","key":"e_1_3_2_1_33_1","unstructured":"Pensando. 2020. Pensando DSC-100 Distributed Services Card. https:\/\/pensando.io\/wp-content\/uploads\/2020\/03\/DSC-100-ProductBrief-v06.pdf. [Online ; accessed 16- March - 2022 ]. Pensando. 2020. Pensando DSC-100 Distributed Services Card. https:\/\/pensando.io\/wp-content\/uploads\/2020\/03\/DSC-100-ProductBrief-v06.pdf. [Online; accessed 16-March-2022]."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483583"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9947-1953-0053041-6"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373360.3380839"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428301"},{"key":"e_1_3_2_1_38_1","volume-title":"18th USENIX Symposium on Networked Systems Design and Implementation (NSDI 21)","author":"Sultana Nik","year":"2021","unstructured":"Nik Sultana , John Sonchack , Hans Giesen , Isaac Pedisich , Zhaoyang Han , Nishanth Shyamkumar , Shivani Burad , Andr\u00e9 DeHon , and Boon\u00a0Thau Loo . 2021 . Flightplan: Dataplane Disaggregation and Placement for P4 Programs . In 18th USENIX Symposium on Networked Systems Design and Implementation (NSDI 21) . USENIX Association, 571\u2013592. https:\/\/www.usenix.org\/conference\/nsdi21\/presentation\/sultana Nik Sultana, John Sonchack, Hans Giesen, Isaac Pedisich, Zhaoyang Han, Nishanth Shyamkumar, Shivani Burad, Andr\u00e9 DeHon, and Boon\u00a0Thau Loo. 2021. Flightplan: Dataplane Disaggregation and Placement for P4 Programs. In 18th USENIX Symposium on Networked Systems Design and Implementation (NSDI 21). USENIX Association, 571\u2013592. https:\/\/www.usenix.org\/conference\/nsdi21\/presentation\/sultana"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3418463"},{"key":"e_1_3_2_1_40_1","volume-title":"wolfCrypt Embedded Crypto Engine. https:\/\/www.wolfssl.com\/products\/wolfcrypt-2\/. [Online","author":"SSL.","year":"2022","unstructured":"wolf SSL. 2006. wolfCrypt Embedded Crypto Engine. https:\/\/www.wolfssl.com\/products\/wolfcrypt-2\/. [Online ; accessed 16- March - 2022 ]. wolfSSL. 2006. wolfCrypt Embedded Crypto Engine. https:\/\/www.wolfssl.com\/products\/wolfcrypt-2\/. [Online; accessed 16-March-2022]."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321408.3323087"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405869"}],"event":{"name":"APNet 2022: 6th Asia-Pacific Workshop on Networking","acronym":"APNet 2022","location":"Fuzhou China"},"container-title":["Proceedings of the 6th Asia-Pacific Workshop on Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3542637.3542649","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3542637.3542649","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:22Z","timestamp":1750186942000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3542637.3542649"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7]]},"references-count":42,"alternative-id":["10.1145\/3542637.3542649","10.1145\/3542637"],"URL":"https:\/\/doi.org\/10.1145\/3542637.3542649","relation":{},"subject":[],"published":{"date-parts":[[2022,7]]},"assertion":[{"value":"2023-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}