{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T16:55:45Z","timestamp":1767372945220,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,22]],"date-time":"2022-08-22T00:00:00Z","timestamp":1661126400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Google"},{"name":"Intel"},{"name":"VMware"},{"name":"Cylab"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,22]]},"DOI":"10.1145\/3544216.3544250","type":"proceedings-article","created":{"date-parts":[[2022,8,11]],"date-time":"2022-08-11T22:58:16Z","timestamp":1660258696000},"page":"723-738","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["SurgeProtector"],"prefix":"10.1145","author":[{"given":"Nirav","family":"Atre","sequence":"first","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Hugo","family":"Sadok","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Erica","family":"Chiang","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Weina","family":"Wang","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Justine","family":"Sherry","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]}],"member":"320","published-online":{"date-parts":[[2022,8,22]]},"reference":[{"key":"e_1_3_2_2_1_1","first-page":"235","volume-title":"Proceedings of the Eighth ACM\/IEEE Symposium on Architectures for Networking and Communications Systems, ANCS '12","author":"Afek Yehuda","year":"2012","unstructured":"Yehuda Afek , Anat Bremler-Barr , Yotam Harchol , David Hay , and Yaron Koral . MCA2 : Multi-Core Architecture for Mitigating Complexity Attacks . In Proceedings of the Eighth ACM\/IEEE Symposium on Architectures for Networking and Communications Systems, ANCS '12 , page 235 -- 246 , New York, NY, USA , 2012 . Association for Computing Machinery. Yehuda Afek, Anat Bremler-Barr, Yotam Harchol, David Hay, and Yaron Koral. MCA2: Multi-Core Architecture for Mitigating Complexity Attacks. In Proceedings of the Eighth ACM\/IEEE Symposium on Architectures for Networking and Communications Systems, ANCS '12, page 235--246, New York, NY, USA, 2012. Association for Computing Machinery."},{"key":"e_1_3_2_2_2_1","first-page":"59","volume-title":"Laurent Vanbever. SP-PIFO: Approximating Push-in First-out Behaviors Using Strict-Priority Queues. In Proceedings of the 17th Usenix Conference on Networked Systems Design and Implementation, NSDI '20","author":"Alcoz Albert Gran","year":"2020","unstructured":"Albert Gran Alcoz , Alexander Dietm\u00fcller , and Laurent Vanbever. SP-PIFO: Approximating Push-in First-out Behaviors Using Strict-Priority Queues. In Proceedings of the 17th Usenix Conference on Networked Systems Design and Implementation, NSDI '20 , page 59 -- 76 , USA, 2020 . USENIX Association. Albert Gran Alcoz, Alexander Dietm\u00fcller, and Laurent Vanbever. SP-PIFO: Approximating Push-in First-out Behaviors Using Strict-Priority Queues. In Proceedings of the 17th Usenix Conference on Networked Systems Design and Implementation, NSDI '20, page 59--76, USA, 2020. USENIX Association."},{"key":"e_1_3_2_2_3_1","first-page":"162","volume-title":"E-business and Telecommunications","author":"Bar-Yosef Noa","year":"2009","unstructured":"Noa Bar-Yosef and Avishai Wool . Remote Algorithmic Complexity Attacks against Randomized Hash Tables . In Joaquim Filipe and Mohammad S. Obaidat, editors, E-business and Telecommunications , pages 162 -- 174 , Berlin, Heidelberg , 2009 . Springer Berlin Heidelberg . Noa Bar-Yosef and Avishai Wool. Remote Algorithmic Complexity Attacks against Randomized Hash Tables. In Joaquim Filipe and Mohammad S. Obaidat, editors, E-business and Telecommunications, pages 162--174, Berlin, Heidelberg, 2009. Springer Berlin Heidelberg."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.49"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/510726.510728"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-013-0197-6"},{"key":"e_1_3_2_2_7_1","first-page":"465","volume-title":"2020 USENIX Annual Technical Conference (USENIX ATC 20)","author":"Boucher Sol","year":"2020","unstructured":"Sol Boucher , Anuj Kalia , David G Andersen , and Michael Kaminsky . Lightweight preemptible functions . In 2020 USENIX Annual Technical Conference (USENIX ATC 20) , pages 465 -- 477 , 2020 . Sol Boucher, Anuj Kalia, David G Andersen, and Michael Kaminsky. Lightweight preemptible functions. In 2020 USENIX Annual Technical Conference (USENIX ATC 20), pages 465--477, 2020."},{"key":"e_1_3_2_2_8_1","first-page":"85","volume-title":"2018 USENIX Annual Technical Conference (USENIX ATC 18)","author":"Bouron Justinien","year":"2018","unstructured":"Justinien Bouron , Sebastien Chevalley , Baptiste Lepers , Willy Zwaenepoel , Redha Gouicem , Julia Lawall , Gilles Muller , and Julien Sopena . The battle of the schedulers: Freebsd ULE vs. linux CFS . In 2018 USENIX Annual Technical Conference (USENIX ATC 18) , pages 85 -- 96 , Boston, MA , July 2018 . USENIX Association. Justinien Bouron, Sebastien Chevalley, Baptiste Lepers, Willy Zwaenepoel, Redha Gouicem, Julia Lawall, Gilles Muller, and Julien Sopena. The battle of the schedulers: Freebsd ULE vs. linux CFS. In 2018 USENIX Annual Technical Conference (USENIX ATC 18), pages 85--96, Boston, MA, July 2018. USENIX Association."},{"key":"e_1_3_2_2_9_1","volume-title":"Mar","author":"Caller Ben","year":"2021","unstructured":"Ben Caller . Regexploit: Dos-able regular expressions , Mar 2021 . Ben Caller. Regexploit: Dos-able regular expressions, Mar 2021."},{"key":"e_1_3_2_2_10_1","volume-title":"Hugo Sadok. Robust Heuristics: Attacks and Defenses for Job Size Estimation in WSJF Systems. In ACM SIGCOMM 2022 Conference (SIGCOMM '22 Demos and Posters). Association for Computing Machinery","author":"Chiang Erica","year":"2022","unstructured":"Erica Chiang , Nirav Atre , and Hugo Sadok. Robust Heuristics: Attacks and Defenses for Job Size Estimation in WSJF Systems. In ACM SIGCOMM 2022 Conference (SIGCOMM '22 Demos and Posters). Association for Computing Machinery , August 2022 . Erica Chiang, Nirav Atre, and Hugo Sadok. Robust Heuristics: Attacks and Defenses for Job Size Estimation in WSJF Systems. In ACM SIGCOMM 2022 Conference (SIGCOMM '22 Demos and Posters). Association for Computing Machinery, August 2022."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1287\/opre.2.1.70"},{"key":"e_1_3_2_2_12_1","volume-title":"12th USENIX Security Symposium (USENIX Security 03)","author":"Scott","year":"2003","unstructured":"Scott A. Crosby and Dan S. Wallach. Denial of Service via Algorithmic Complexity Attacks . In 12th USENIX Security Symposium (USENIX Security 03) , Washington, D.C. , August 2003 . USENIX Association. Scott A. Crosby and Dan S. Wallach. Denial of Service via Algorithmic Complexity Attacks. In 12th USENIX Security Symposium (USENIX Security 03), Washington, D.C., August 2003. USENIX Association."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359989.3365431"},{"key":"e_1_3_2_2_14_1","volume-title":"On the Feasibility and Enhancement of the Tuple Space Explosion Attack against Open vSwitch","author":"Csikor Levente","year":"2020","unstructured":"Levente Csikor , Vipul Ujawane , and Dinil Mon Divakaran . On the Feasibility and Enhancement of the Tuple Space Explosion Attack against Open vSwitch , 2020 . Levente Csikor, Vipul Ujawane, and Dinil Mon Divakaran. On the Feasibility and Enhancement of the Tuple Space Explosion Attack against Open vSwitch, 2020."},{"key":"e_1_3_2_2_15_1","volume-title":"On the Feasibility and Enhancement of the Tuple Space Explosion Attack against Open vSwitch","author":"Csikor Levente","year":"2020","unstructured":"Levente Csikor , Vipul Ujawane , and Dinil Mon Divakaran . On the Feasibility and Enhancement of the Tuple Space Explosion Attack against Open vSwitch , 2020 . Levente Csikor, Vipul Ujawane, and Dinil Mon Divakaran. On the Feasibility and Enhancement of the Tuple Space Explosion Attack against Open vSwitch, 2020."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236027"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/75247.75248"},{"key":"e_1_3_2_2_18_1","first-page":"5","volume-title":"Dharmapurikar and Vern Paxson. Robust TCP Stream Reassembly in the Presence of Adversaries. In Proceedings of the 14th Conference on USENIX Security Symposium-Volume 14, SSYM '05","author":"Sarang","year":"2005","unstructured":"Sarang Dharmapurikar and Vern Paxson. Robust TCP Stream Reassembly in the Presence of Adversaries. In Proceedings of the 14th Conference on USENIX Security Symposium-Volume 14, SSYM '05 , page 5 , USA, 2005 . USENIX Association. Sarang Dharmapurikar and Vern Paxson. Robust TCP Stream Reassembly in the Presence of Adversaries. In Proceedings of the 14th Conference on USENIX Security Symposium-Volume 14, SSYM '05, page 5, USA, 2005. USENIX Association."},{"key":"e_1_3_2_2_19_1","volume-title":"https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/netdev\/net.git\/commit\/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e","author":"Dumazet Eric","year":"2018","unstructured":"Eric Dumazet . Merge Branch 'tcp-robust-ooo'. https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/netdev\/net.git\/commit\/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e , 2018 . Eric Dumazet. Merge Branch 'tcp-robust-ooo'. https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/netdev\/net.git\/commit\/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e, 2018."},{"key":"e_1_3_2_2_20_1","volume-title":"Proc. ACM Meas. Anal. Comput. Syst., 3(3)","author":"Xinzhe","year":"2019","unstructured":"Xinzhe Fu and Eytan Modiano. Fundamental Limits of Volume-Based Network DoS Attacks . Proc. ACM Meas. Anal. Comput. Syst., 3(3) , December 2019 . Xinzhe Fu and Eytan Modiano. Fundamental Limits of Volume-Based Network DoS Attacks. Proc. ACM Meas. Anal. Comput. Syst., 3(3), December 2019."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342358"},{"key":"e_1_3_2_2_22_1","first-page":"323","volume-title":"Ion Stoica. Dominant Resource Fairness: Fair Allocation of Multiple Resource Types. In Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation, NSDI '11","author":"Ghodsi Ali","year":"2011","unstructured":"Ali Ghodsi , Matei Zaharia , Benjamin Hindman , Andy Konwinski , Scott Shenker , and Ion Stoica. Dominant Resource Fairness: Fair Allocation of Multiple Resource Types. In Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation, NSDI '11 , page 323 -- 336 , USA, 2011 . USENIX Association. Ali Ghodsi, Matei Zaharia, Benjamin Hindman, Andy Konwinski, Scott Shenker, and Ion Stoica. Dominant Resource Fairness: Fair Allocation of Multiple Resource Types. In Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation, NSDI '11, page 323--336, USA, 2011. USENIX Association."},{"key":"e_1_3_2_2_23_1","volume-title":"Expected length of the longest probe sequence in hash code searching. Journal of the ACM (JACM), 28(2):289--304","author":"Gonnet Gaston H","year":"1981","unstructured":"Gaston H Gonnet . Expected length of the longest probe sequence in hash code searching. Journal of the ACM (JACM), 28(2):289--304 , 1981 . Gaston H Gonnet. Expected length of the longest probe sequence in hash code searching. Journal of the ACM (JACM), 28(2):289--304, 1981."},{"key":"e_1_3_2_2_24_1","volume-title":"https:\/\/support.google.com\/a\/answer\/172541","author":"Drive Google","year":"2021","unstructured":"Google. Google Drive . https:\/\/support.google.com\/a\/answer\/172541 , 2021 . Google. Google Drive. https:\/\/support.google.com\/a\/answer\/172541, 2021."},{"key":"e_1_3_2_2_25_1","volume-title":"KTH","author":"Granlund Torbj\u00f6rn","year":"2012","unstructured":"Torbj\u00f6rn Granlund . Instruction latencies and throughput for amd and intel x86 processors. Technical report , KTH , 2012 . Torbj\u00f6rn Granlund. Instruction latencies and throughput for amd and intel x86 processors. Technical report, KTH, 2012."},{"key":"e_1_3_2_2_26_1","unstructured":"Nathan Hauke and David Renardy. Denial of Service with a Fistful of Packets: Exploiting Algorithmic Complexity Vulnerabilities. https:\/\/www.blackhat.com\/us-19\/briefings\/schedule\/#denial-of-service-with-a-fistful-of-packets-exploiting-algorithmic-complexity-vulnerabilities-16445 2019.  Nathan Hauke and David Renardy. Denial of Service with a Fistful of Packets: Exploiting Algorithmic Complexity Vulnerabilities. https:\/\/www.blackhat.com\/us-19\/briefings\/schedule\/#denial-of-service-with-a-fistful-of-packets-exploiting-algorithmic-complexity-vulnerabilities-16445 2019."},{"key":"e_1_3_2_2_27_1","volume-title":"8th USENIX Symposium on Networked Systems Design and Implementation (NSDI 11)","author":"Hindman Benjamin","year":"2011","unstructured":"Benjamin Hindman , Andy Konwinski , Matei Zaharia , Ali Ghodsi , Anthony D. Joseph , Randy Katz , Scott Shenker , and Ion Stoica . Mesos : A platform for fine-grained resource sharing in the data center . In 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI 11) , Boston, MA , March 2011 . USENIX Association. Benjamin Hindman, Andy Konwinski, Matei Zaharia, Ali Ghodsi, Anthony D. Joseph, Randy Katz, Scott Shenker, and Ion Stoica. Mesos: A platform for fine-grained resource sharing in the data center. In 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI 11), Boston, MA, March 2011. USENIX Association."},{"key":"e_1_3_2_2_28_1","first-page":"266","volume-title":"Khan and Issa Traore. Queue-based Analysis of DoS Attacks. In Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","author":"Suraiya","year":"2005","unstructured":"Suraiya Khan and Issa Traore. Queue-based Analysis of DoS Attacks. In Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop , pages 266 -- 273 , 2005 . Suraiya Khan and Issa Traore. Queue-based Analysis of DoS Attacks. In Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop, pages 266--273, 2005."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213874"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.1011"},{"key":"e_1_3_2_2_31_1","first-page":"1099","volume-title":"Yifeng Geng. H-PFSP: Efficient Hybrid Parallel PFSP Protected Scheduling for MapReduce System. In 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","author":"Li Yin","year":"2013","unstructured":"Yin Li , Chuang Lin , Fengyuan Ren , and Yifeng Geng. H-PFSP: Efficient Hybrid Parallel PFSP Protected Scheduling for MapReduce System. In 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications , pages 1099 -- 1106 , 2013 . Yin Li, Chuang Lin, Fengyuan Ren, and Yifeng Geng. H-PFSP: Efficient Hybrid Parallel PFSP Protected Scheduling for MapReduce System. In 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pages 1099--1106, 2013."},{"key":"e_1_3_2_2_32_1","volume-title":"https:\/\/www.kernel.org\/doc\/html\/latest\/scheduler\/sched-design-CFS.html","author":"Kernel Linux","year":"2021","unstructured":"Linux Kernel . CFS Scheduler . https:\/\/www.kernel.org\/doc\/html\/latest\/scheduler\/sched-design-CFS.html , 2021 . Linux Kernel. CFS Scheduler. https:\/\/www.kernel.org\/doc\/html\/latest\/scheduler\/sched-design-CFS.html, 2021."},{"key":"e_1_3_2_2_33_1","first-page":"238","volume-title":"High-Responsive Scheduling with MapReduce Performance Prediction on Hadoop YARN. In 2016 IEEE 22nd International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA)","author":"Liu Yang","year":"2016","unstructured":"Yang Liu , Yukun Zeng , and Xuefeng Piao . High-Responsive Scheduling with MapReduce Performance Prediction on Hadoop YARN. In 2016 IEEE 22nd International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA) , pages 238 -- 247 , 2016 . Yang Liu, Yukun Zeng, and Xuefeng Piao. High-Responsive Scheduling with MapReduce Performance Prediction on Hadoop YARN. In 2016 IEEE 22nd International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA), pages 238--247, 2016."},{"key":"e_1_3_2_2_34_1","first-page":"289","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Mahajan Kshiteej","year":"2020","unstructured":"Kshiteej Mahajan , Arjun Balasubramanian , Arjun Singhvi , Shivaram Venkataraman , Aditya Akella , Amar Phanishayee , and Shuchi Chawla . Themis : Fair and efficient GPU cluster scheduling . In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20) , pages 289 -- 304 , Santa Clara, CA , February 2020 . USENIX Association. Kshiteej Mahajan, Arjun Balasubramanian, Arjun Singhvi, Shivaram Venkataraman, Aditya Akella, Amar Phanishayee, and Shuchi Chawla. Themis: Fair and efficient GPU cluster scheduling. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20), pages 289--304, Santa Clara, CA, February 2020. USENIX Association."},{"key":"e_1_3_2_2_35_1","first-page":"372","volume-title":"Katerina Argyraki. Automated Synthesis of Adversarial Workloads for Network Functions. In Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication, SIGCOMM '18","author":"Pedrosa Luis","year":"2018","unstructured":"Luis Pedrosa , Rishabh Iyer , Arseniy Zaostrovnykh , Jonas Fietz , and Katerina Argyraki. Automated Synthesis of Adversarial Workloads for Network Functions. In Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication, SIGCOMM '18 , page 372 -- 385 , New York, NY, USA , 2018 . Luis Pedrosa, Rishabh Iyer, Arseniy Zaostrovnykh, Jonas Fietz, and Katerina Argyraki. Automated Synthesis of Adversarial Workloads for Network Functions. In Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication, SIGCOMM '18, page 372--385, New York, NY, USA, 2018."},{"key":"e_1_3_2_2_36_1","first-page":"2155","volume-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS '17","author":"Petsios Theofilos","year":"2017","unstructured":"Theofilos Petsios , Jason Zhao , Angelos D. Keromytis , and Suman Jana . Slowfuzz : Automated domain-independent detection of algorithmic complexity vulnerabilities . In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS '17 , page 2155 -- 2168 , New York, NY, USA , 2017 . Theofilos Petsios, Jason Zhao, Angelos D. Keromytis, and Suman Jana. Slowfuzz: Automated domain-independent detection of algorithmic complexity vulnerabilities. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS '17, page 2155--2168, New York, NY, USA, 2017."},{"key":"e_1_3_2_2_37_1","volume-title":"Composite DoS Attack Model\/Jungtinis DoS Ataku Modelis. Mokslas-Lietuvos ateitis\/Science-Future of Lithuania, 4(1):20--26","author":"Ramanauskaite Simona","year":"2012","unstructured":"Simona Ramanauskaite and Antanas \u010cenys . Composite DoS Attack Model\/Jungtinis DoS Ataku Modelis. Mokslas-Lietuvos ateitis\/Science-Future of Lithuania, 4(1):20--26 , 2012 . Simona Ramanauskaite and Antanas \u010cenys. Composite DoS Attack Model\/Jungtinis DoS Ataku Modelis. Mokslas-Lietuvos ateitis\/Science-Future of Lithuania, 4(1):20--26, 2012."},{"key":"e_1_3_2_2_38_1","first-page":"229","volume-title":"Roesch. Snort - Lightweight Intrusion Detection for Networks. In Proceedings of the 13th USENIX Conference on System Administration, LISA '99","author":"Martin","year":"1999","unstructured":"Martin Roesch. Snort - Lightweight Intrusion Detection for Networks. In Proceedings of the 13th USENIX Conference on System Administration, LISA '99 , page 229 -- 238 , USA, 1999 . USENIX Association. Martin Roesch. Snort - Lightweight Intrusion Detection for Networks. In Proceedings of the 13th USENIX Conference on System Administration, LISA '99, page 229--238, USA, 1999. USENIX Association."},{"key":"e_1_3_2_2_39_1","first-page":"17","volume-title":"16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19)","author":"Saeed Ahmed","year":"2019","unstructured":"Ahmed Saeed , Yimeng Zhao , Nandita Dukkipati , Ellen Zegura , Mostafa Ammar , Khaled Harras , and Amin Vahdat . Eiffel : Efficient and flexible software packet scheduling . In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19) , pages 17 -- 32 , Boston, MA , February 2019 . USENIX Association. Ahmed Saeed, Yimeng Zhao, Nandita Dukkipati, Ellen Zegura, Mostafa Ammar, Khaled Harras, and Amin Vahdat. Eiffel: Efficient and flexible software packet scheduling. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19), pages 17--32, Boston, MA, February 2019. USENIX Association."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781420035179.ch8"},{"key":"e_1_3_2_2_41_1","first-page":"685","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Sharma Naveen Kr.","year":"2020","unstructured":"Naveen Kr. Sharma , Chenxingyu Zhao , Ming Liu , Pravein G Kannan , Changhoon Kim , Arvind Krishnamurthy , and Anirudh Sivaraman . Programmable calendar queues for high-speed packet scheduling . In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20) , pages 685 -- 699 , Santa Clara, CA , February 2020 . USENIX Association. Naveen Kr. Sharma, Chenxingyu Zhao, Ming Liu, Pravein G Kannan, Changhoon Kim, Arvind Krishnamurthy, and Anirudh Sivaraman. Programmable calendar queues for high-speed packet scheduling. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20), pages 685--699, Santa Clara, CA, February 2020. USENIX Association."},{"key":"e_1_3_2_2_42_1","first-page":"225","volume-title":"Jian Lu. ReScue: Crafting Regular Expression DoS Attacks. In Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, ASE 2018","author":"Shen Yuju","year":"2018","unstructured":"Yuju Shen , Yanyan Jiang , Chang Xu , Ping Yu , Xiaoxing Ma , and Jian Lu. ReScue: Crafting Regular Expression DoS Attacks. In Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, ASE 2018 , page 225 -- 235 , New York, NY, USA , 2018 . Association for Computing Machinery. Yuju Shen, Yanyan Jiang, Chang Xu, Ping Yu, Xiaoxing Ma, and Jian Lu. ReScue: Crafting Regular Expression DoS Attacks. In Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, ASE 2018, page 225--235, New York, NY, USA, 2018. Association for Computing Machinery."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36883-7_11"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2015.12"},{"key":"e_1_3_2_2_45_1","volume-title":"Burstiness with Flowlet Switching. In Proc. 3rd ACM Workshop on Hot Topics in Networks (Hotnets-III). Citeseer","author":"Sinha Shan","year":"2004","unstructured":"Shan Sinha , Srikanth Kandula , and Dina Katabi . Harnessing TC P's Burstiness with Flowlet Switching. In Proc. 3rd ACM Workshop on Hot Topics in Networks (Hotnets-III). Citeseer , 2004 . Shan Sinha, Srikanth Kandula, and Dina Katabi. Harnessing TCP's Burstiness with Flowlet Switching. In Proc. 3rd ACM Workshop on Hot Topics in Networks (Hotnets-III). Citeseer, 2004."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934899"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.17"},{"key":"e_1_3_2_2_48_1","volume-title":"SNORT Users Manual. https:\/\/www.snort.org\/documents\/snort-users-manual","author":"Project Snort","year":"2020","unstructured":"Snort Project . SNORT Users Manual. https:\/\/www.snort.org\/documents\/snort-users-manual , 2020 . Snort Project. SNORT Users Manual. https:\/\/www.snort.org\/documents\/snort-users-manual, 2020."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/316188.316216"},{"key":"e_1_3_2_2_50_1","volume-title":"CVE-2018-5390: Linux Kernel TCP Reassembly Algorithm Lets Remote Users Consume Excessive CPU Resources on the Target System. https:\/\/ubuntu.com\/security\/cve-2018-5390","author":"Tilli Juha-Matti","year":"2018","unstructured":"Juha-Matti Tilli . CVE-2018-5390: Linux Kernel TCP Reassembly Algorithm Lets Remote Users Consume Excessive CPU Resources on the Target System. https:\/\/ubuntu.com\/security\/cve-2018-5390 , 2018 . Juha-Matti Tilli. CVE-2018-5390: Linux Kernel TCP Reassembly Algorithm Lets Remote Users Consume Excessive CPU Resources on the Target System. https:\/\/ubuntu.com\/security\/cve-2018-5390, 2018."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523616.2523633"},{"key":"e_1_3_2_2_52_1","volume-title":"The caida anonymized 2019 internet traces","author":"Walsworth Colby","year":"2019","unstructured":"Colby Walsworth , Emile Aben , K Claffy , and D Andersen . The caida anonymized 2019 internet traces , 2019 . Colby Walsworth, Emile Aben, K Claffy, and D Andersen. The caida anonymized 2019 internet traces, 2019."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.236"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848131"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.02.011"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54580-5_1"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080120"},{"key":"e_1_3_2_2_58_1","first-page":"1083","volume-title":"14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20)","author":"Zhao Zhipeng","year":"2020","unstructured":"Zhipeng Zhao , Hugo Sadok , Nirav Atre , James C. Hoe , Vyas Sekar , and Justine Sherry . Achieving 100 Gbps Intrusion Prevention on a Single Server . In 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20) , pages 1083 -- 1100 . USENIX Association , November 2020 . Zhipeng Zhao, Hugo Sadok, Nirav Atre, James C. Hoe, Vyas Sekar, and Justine Sherry. Achieving 100Gbps Intrusion Prevention on a Single Server. In 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20), pages 1083--1100. USENIX Association, November 2020."}],"event":{"name":"SIGCOMM '22: ACM SIGCOMM 2022 Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Amsterdam Netherlands","acronym":"SIGCOMM '22"},"container-title":["Proceedings of the ACM SIGCOMM 2022 Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544216.3544250","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544216.3544250","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:54Z","timestamp":1750186974000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544216.3544250"}},"subtitle":["mitigating temporal algorithmic complexity attacks using adversarial scheduling"],"short-title":[],"issued":{"date-parts":[[2022,8,22]]},"references-count":58,"alternative-id":["10.1145\/3544216.3544250","10.1145\/3544216"],"URL":"https:\/\/doi.org\/10.1145\/3544216.3544250","relation":{},"subject":[],"published":{"date-parts":[[2022,8,22]]},"assertion":[{"value":"2022-08-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}