{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T13:04:22Z","timestamp":1760101462929,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,6]],"date-time":"2023-12-06T00:00:00Z","timestamp":1701820800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,8]]},"DOI":"10.1145\/3630047.3630242","type":"proceedings-article","created":{"date-parts":[[2023,12,6]],"date-time":"2023-12-06T14:34:28Z","timestamp":1701873268000},"page":"41-48","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["P4EAD: Securing the In-band Control Channels on Commodity Programmable Switches"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-2722-6996","authenticated-orcid":false,"given":"Archit","family":"Bhatnagar","sequence":"first","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-8048-8556","authenticated-orcid":false,"given":"Xin Zhe","family":"Khooi","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-2041-080X","authenticated-orcid":false,"given":"Cha Hwan","family":"Song","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6563-275X","authenticated-orcid":false,"given":"Mun Choon","family":"Chan","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2023,12,6]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2023. Ascon - Lightweight Authenticated Encryption & Hashing. https:\/\/github.com\/ascon\/ascon-c [Commit: ba61330]."},{"key":"e_1_3_2_1_2_1","unstructured":"2023. DySO P4. https:\/\/github.com\/dyso-project\/dyso_p4 [Commit: 4a594eb]."},{"key":"e_1_3_2_1_3_1","volume-title":"20 stage, 4 pipelines. https:\/\/www.intel.sg\/content\/www\/xa\/en\/products\/sku\/218648\/intel-tofino-2-12-8-tbps-20-stage-4-pipelines\/specifications.html [Accessed","author":"Tbps Intel\u00ae Tofino","year":"2023","unstructured":"2023. Intel\u00ae Tofino 2 12.8 Tbps, 20 stage, 4 pipelines. https:\/\/www.intel.sg\/content\/www\/xa\/en\/products\/sku\/218648\/intel-tofino-2-12-8-tbps-20-stage-4-pipelines\/specifications.html [Accessed: May 2023]."},{"key":"e_1_3_2_1_4_1","unstructured":"2023. P4EAD GitHub repository. https:\/\/github.com\/NUS-CIR\/tofino-ascon."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2839348"},{"key":"e_1_3_2_1_6_1","volume-title":"Sameul Dick, and Jordon Cochran.","author":"Avery Jeffrey","year":"2022","unstructured":"Jeffrey Avery, Bryson Fraelich, William Duran, Andrew Lee, Sullivan Agustin, Zane Mechalke, Birrer Maj Bobby, Sameul Dick, and Jordon Cochran. 2022. Analysis of Practical Application of Lightweight Cryptographic Algorithm ASCON. (2022)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405894"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491222"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3563647.3563651"},{"key":"e_1_3_2_1_10_1","volume-title":"Programmable Forwarding Planes at Terabit\/s Speeds. https:\/\/old.hotchips.org\/hc30\/2conf\/2.02_Barefoot_Barefoot_Talk_at_HotChips_2018.pdf [Accessed","author":"Bosshart Pat","year":"2023","unstructured":"Pat Bosshart. 2018. Programmable Forwarding Planes at Terabit\/s Speeds. https:\/\/old.hotchips.org\/hc30\/2conf\/2.02_Barefoot_Barefoot_Talk_at_HotChips_2018.pdf [Accessed: Mar. 2023]."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Pat Bosshart Dan Daly Glen Gibb Martin Izzard Nick McKeown Jennifer Rexford Cole Schlesinger Dan Talayco Amin Vahdat George Varghese et al. 2014. P4: Programming protocol-independent packet processors. ACM SIGCOMM CCR 44 3 (2014).","DOI":"10.1145\/2656877.2656890"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486011"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3483247"},{"key":"e_1_3_2_1_14_1","volume-title":"The Case for Making Tight Control Plane Latency Guarantees in SDN Switches. In ACM SOSR","author":"Chen Huan","year":"2017","unstructured":"Huan Chen and Theophilus Benson. 2017. The Case for Making Tight Control Plane Latency Guarantees in SDN Switches. In ACM SOSR 2017."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3405669.3405819"},{"key":"e_1_3_2_1_16_1","volume-title":"https:\/\/www.intel.com\/content\/www\/us\/en\/products\/network-io\/programmable-ethernet-switch\/tofino-series.html [Accessed","author":"Intel Corporation","year":"2023","unstructured":"Intel Corporation. 2023. Intel Tofino. https:\/\/www.intel.com\/content\/www\/us\/en\/products\/network-io\/programmable-ethernet-switch\/tofino-series.html [Accessed: Mar. 2023]."},{"key":"e_1_3_2_1_17_1","unstructured":"Intel Corporation. 2023. Intel Tofino 2. https:\/\/www.intel.com\/content\/www\/us\/en\/products\/network-io\/programmable-ethernet-switch\/tofino-2-series.html"},{"key":"e_1_3_2_1_18_1","volume-title":"Ascon v1. 2: Lightweight authenticated encryption and hashing. Journal of Cryptology 34","author":"Dobraunig Christoph","year":"2021","unstructured":"Christoph Dobraunig, Maria Eichlseder, Florian Mendel, and Martin Schl\u00e4ffer. 2021. Ascon v1. 2: Lightweight authenticated encryption and hashing. Journal of Cryptology 34 (2021)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Morris Dworkin (NIST). 2007. Recommendation for Block Cipher Modes of Operation: Galois\/Counter Mode (GCM) and GMAC. https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800--38d\/final. (2007).","DOI":"10.6028\/NIST.SP.800-38d"},{"key":"e_1_3_2_1_20_1","volume-title":"Measuring Control Plane Latency in SDN-Enabled Switches. In ACM SOSR","author":"He Keqiang","year":"2015","unstructured":"Keqiang He, Junaid Khalid, Aaron Gember-Jacobson, Sourav Das, Chaithan Prakash, Aditya Akella, Li Erran Li, and Marina Thottan. 2015. Measuring Control Plane Latency in SDN-Enabled Switches. In ACM SOSR 2015."},{"key":"e_1_3_2_1_21_1","volume-title":"USENIX NSDI","author":"Hsu Kuo-Feng","year":"2020","unstructured":"Kuo-Feng Hsu, Ryan Beckett, Ang Chen, Jennifer Rexford, and David Walker. 2020. Contra: A programmable system for performance-aware routing. In USENIX NSDI 2020."},{"key":"e_1_3_2_1_22_1","volume-title":"4 pipelines. https:\/\/www.intel.sg\/content\/www\/xa\/en\/products\/sku\/218643\/intel-tofino-6-4-tbps-4-pipelines\/specifications.html [Accessed","author":"Tbps Intel\u00ae Tofino","year":"2023","unstructured":"Intel. 2023. Intel\u00ae Tofino 6.4 Tbps, 4 pipelines. https:\/\/www.intel.sg\/content\/www\/xa\/en\/products\/sku\/218643\/intel-tofino-6-4-tbps-4-pipelines\/specifications.html [Accessed: May 2023]."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132764"},{"key":"e_1_3_2_1_24_1","volume-title":"USENIX NSDI","author":"Kannan Pravein Govindan","year":"2021","unstructured":"Pravein Govindan Kannan, Nishant Budhdev, Raj Joshi, and Mun Choon Chan. 2021. Debugging Transient Faults in Data Centers using Synchronized Network-wide Packet Histories. In USENIX NSDI 2021."},{"key":"e_1_3_2_1_25_1","volume-title":"Precise Time-Synchronization in the Data-Plane Using Programmable Switching ASICs. In ACM SOSR","author":"Kannan Pravein Govindan","year":"2019","unstructured":"Pravein Govindan Kannan, Raj Joshi, and Mun Choon Chan. 2019. Precise Time-Synchronization in the Data-Plane Using Programmable Switching ASICs. In ACM SOSR 2019."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2890955.2890968"},{"key":"e_1_3_2_1_27_1","volume-title":"Dinil Mon Divakaran, and Min Suk Kang","author":"Khooi Xin Zhe","year":"2020","unstructured":"Xin Zhe Khooi, Levente Csikor, Dinil Mon Divakaran, and Min Suk Kang. 2020. DIDA: Distributed In-Network Defense Architecture Against Amplified Reflection DDoS Attacks. In IEEE NetSoft 2020."},{"key":"e_1_3_2_1_28_1","volume-title":"Min Suk Kang, and Dinil Mon Divakaran","author":"Khooi Xin Zhe","year":"2021","unstructured":"Xin Zhe Khooi, Levente Csikor, Jialin Li, Min Suk Kang, and Dinil Mon Divakaran. 2021. Revisiting Heavy-Hitter Detection on Commodity Programmable Switches. In IEEE NetSoft 2021."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472905"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3570361.3613267"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3482898.3483358"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"David McGrew. 2008. An Interface and Algorithms for Authenticated Encryption. RFC 5116.","DOI":"10.17487\/rfc5116"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098824"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Yoav Nir and Adam Langley. 2018. ChaCha20 and Poly1305 for IETF Protocols. RFC 8439.","DOI":"10.17487\/RFC8439"},{"key":"e_1_3_2_1_35_1","volume-title":"Lightweight Cryptography Standardization Process: NIST Selects Ascon. https:\/\/csrc.nist.gov\/News\/2023\/lightweight-cryptography-nist-selects-ascon [Accessed","author":"NIST.","year":"2023","unstructured":"NIST. 2022. Lightweight Cryptography Standardization Process: NIST Selects Ascon. https:\/\/csrc.nist.gov\/News\/2023\/lightweight-cryptography-nist-selects-ascon [Accessed: May 2023]."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472889"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2019.8888055"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586125"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Yaron Sheffer Peter Saint-Andre and Thomas Fossati. 2022. Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). RFC 9325.","DOI":"10.17487\/RFC9325"},{"key":"e_1_3_2_1_40_1","volume-title":"Jonatan Langlet, Andreas Kassler, P\u00e9ter V\u00f6r\u00f6s, S\u00e1ndor Laki, and Gergely Pongr\u00e1cz.","author":"Singh Suneet Kumar","year":"2022","unstructured":"Suneet Kumar Singh, Christian Esteve Rothenberg, Jonatan Langlet, Andreas Kassler, P\u00e9ter V\u00f6r\u00f6s, S\u00e1ndor Laki, and Gergely Pongr\u00e1cz. 2022. Hybrid P4 Programmable Pipelines for 5G gNodeB and User Plane Functions. IEEE Transactions on Mobile Computing (2022)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109607"},{"key":"e_1_3_2_1_42_1","volume-title":"Network Load Balancing with In-network Reordering Support for RDMA. In ACM SIGCOMM","author":"Song Cha Hwan","year":"2023","unstructured":"Cha Hwan Song, Xin Zhe Khooi, Raj Joshi, Inho Choi, Jialin Li, and Mun Choon Chan. 2023. Network Load Balancing with In-network Reordering Support for RDMA. In ACM SIGCOMM 2023."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.23919\/IFIPNetworking57963.2023.10186439"},{"key":"e_1_3_2_1_44_1","volume-title":"Yunfan Li, and Jialin Li.","author":"Sun Guangda","year":"2023","unstructured":"Guangda Sun, Mingliang Jiang, Xin Zhe Khooi, Yunfan Li, and Jialin Li. 2023. NeoBFT: Accelerating Byzantine Fault Tolerance Using Authenticated In-Network Ordering. In ACM SIGCOMM 2023."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507726"},{"key":"e_1_3_2_1_46_1","unstructured":"The P4.org API Working Group. [n.d.]. P4Runtime Specification version 1.3."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3472873.3472881"},{"key":"e_1_3_2_1_48_1","volume-title":"USENIX Security","author":"Yoo Sophia","year":"2024","unstructured":"Sophia Yoo, Xiaoqi Chen, and Jennifer Rexford. 2024. SmartCookie: Blocking Large-Scale SYN Floods with a Split-Proxy Defense on Programmable Data Planes. In USENIX Security 2024."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3565475.3569073"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405870"},{"key":"e_1_3_2_1_51_1","volume-title":"USENIX NSDI","author":"Zeng Chaoliang","year":"2022","unstructured":"Chaoliang Zeng, Layong Luo, Teng Zhang, Zilong Wang, Luyang Li, Wenchen Han, Nan Chen, Lebing Wan, Lichao Liu, Zhipeng Ding, et al. 2022. Tiara: A scalable and efficient hardware acceleration architecture for stateful layer-4 load balancing. In USENIX NSDI 2022."},{"key":"e_1_3_2_1_52_1","volume-title":"The Slow Path Needs an Accelerator Too! ACM SIGCOMM CCR (April","author":"Zulfiqar Annus","year":"2023","unstructured":"Annus Zulfiqar, Ben Pfaff, William Tu, Gianni Antichi, and Muhammad Shahbaz. 2023. The Slow Path Needs an Accelerator Too! ACM SIGCOMM CCR (April 2023)."}],"event":{"name":"CoNEXT 2023: The 19th International Conference on emerging Networking EXperiments and Technologies","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Paris France","acronym":"CoNEXT 2023"},"container-title":["Proceedings of the 6th on European P4 Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3630047.3630242","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3630047.3630242","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:36:01Z","timestamp":1755974161000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3630047.3630242"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,6]]},"references-count":52,"alternative-id":["10.1145\/3630047.3630242","10.1145\/3630047"],"URL":"https:\/\/doi.org\/10.1145\/3630047.3630242","relation":{},"subject":[],"published":{"date-parts":[[2023,12,6]]},"assertion":[{"value":"2023-12-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}