{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:21:21Z","timestamp":1767183681495,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T00:00:00Z","timestamp":1721433600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"CyberExcellence project funded by the Walloon Region","award":["2110186"],"award-info":[{"award-number":["2110186"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,23]]},"DOI":"10.1145\/3673422.3674886","type":"proceedings-article","created":{"date-parts":[[2024,7,16]],"date-time":"2024-07-16T06:25:21Z","timestamp":1721111121000},"page":"60-66","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Implementing and Evaluating Ioam Integrity Protection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9561-1856","authenticated-orcid":false,"given":"Justin","family":"Iurman","sequence":"first","affiliation":[{"name":"Universit\u00e9 de Li\u00e8ge, Montefiore Institute, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0651-3398","authenticated-orcid":false,"given":"Benoit","family":"Donnet","sequence":"additional","affiliation":[{"name":"Universit\u00e9 de Li\u00e8ge, Montefiore Institute, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2024,7,20]]},"reference":[{"volume-title":"Proc. International Conference on Cryptology in India (INFOCRYPT).","author":"Aumasson J.-P.","key":"e_1_3_2_1_1_1","unstructured":"J.-P. Aumasson and D. J. Bernstein. 2012. SipHash: A Fast Short-Input PRF. In Proc. International Conference on Cryptology in India (INFOCRYPT)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"F. Brockners S. Bhandari and T. Mizrahi. 2022. Data Fields for In Situ Operations Administrations and Maintenance (Ioam). RFC 9197. Internet Engineering Task Force.","DOI":"10.17487\/RFC9197"},{"key":"e_1_3_2_1_3_1","unstructured":"F. Brockners S. Bhandari T. Mizrahi S. Dara and S. Youell. 2020. Proof of Transit. Internet Draft (Work in Progress) draft-ietf-sfc-proof-of-transit-08. Internet Engineering Task Force."},{"key":"e_1_3_2_1_4_1","unstructured":"F. Brockners S. Bhandari T. Mizrahi and J. Iurman. 2024. Integrity of In-Situ Oam Data Fields. Internet Draft (Work in Progress) draft-ietf-ippm-ioam-data-integrity-08. Internet Engineering Task Force."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"B. Carpenter and S. Jiang. 2013. Transmission and Processing of IPv6 Extension Headers. RFC 7045. Internet Engineering Task Force.","DOI":"10.17487\/rfc7045"},{"volume-title":"d.]. TRex: Realistic Traffic Generator. https:\/\/trex-tgn.cisco.com [Last Accessed: February 28th","year":"2024","key":"e_1_3_2_1_6_1","unstructured":"Cisco. [n. d.]. TRex: Realistic Traffic Generator. https:\/\/trex-tgn.cisco.com [Last Accessed: February 28th, 2024]."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"S. Deering and R. Hinden. 2017. Internet Protocol Version 6 (IPv6) Specification. RFC 8200. Internet Engineering Task Force.","DOI":"10.17487\/RFC8200"},{"volume-title":"Recommendation for Block Cipher Modes of Operation: Galois\/Counter Mode (GCM) and GMAC. Special Publication 800-38D","author":"Dworking M.","key":"e_1_3_2_1_8_1","unstructured":"M. Dworking. 2007. Recommendation for Block Cipher Modes of Operation: Galois\/Counter Mode (GCM) and GMAC. Special Publication 800-38D. National Institute of Standards and Technology."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s001459900025"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"G. Fioccola A. Capello M. Cociglio L. Castaldelli M. G. Chen L. Zheng G. Mirsky and T. Mizrahi. 2018. Alternate-Marking Method for Passive and Hybrid Performance Monitoring. RFC 8321. Internet Engineering Task Force.","DOI":"10.17487\/RFC8321"},{"key":"e_1_3_2_1_11_1","volume-title":"IOAM - Option-Type registry. https:\/\/www.iana.org\/assignments\/ioam\/ioam.xhtml#option-type [Last Accessed: April 09th","author":"Numbers Internet Assigned","year":"2024","unstructured":"Internet Assigned Numbers Authority (IANA). [n.d.]. IOAM - Option-Type registry. https:\/\/www.iana.org\/assignments\/ioam\/ioam.xhtml#option-type [Last Accessed: April 09th, 2024]."},{"key":"e_1_3_2_1_12_1","volume-title":"d.]. IPv6 IOAM: Linux Kernel implementation. https:\/\/github.com\/Advanced-Observability\/ioam-linux-kernel [Last Accessed: June 7th","author":"Iurman J.","year":"2024","unstructured":"J. Iurman. [n. d.]. IPv6 IOAM: Linux Kernel implementation. https:\/\/github.com\/Advanced-Observability\/ioam-linux-kernel [Last Accessed: June 7th, 2024]."},{"volume-title":"Proc. Technical Conference on Linux Networking (Netdev 0x14)","author":"Iurman J.","key":"e_1_3_2_1_13_1","unstructured":"J. Iurman, B. Donnet, and F. Brockners. 2020. Implementation of IPv6 IOAM in Linux Kernel. In Proc. Technical Conference on Linux Networking (Netdev 0x14)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"D. Katz and D. Ward. 2010. Bidirectional Forwarding Detection (BFD). RFC 5880. Internet Engineering Task Force.","DOI":"10.17487\/rfc5880"},{"volume-title":"In Proc. ACM SIGCOMM Conference Posters and Demos.","author":"Kim C.","key":"e_1_3_2_1_15_1","unstructured":"C. Kim, A. Sivaraman, N. Katta, A. Bas, A. Dixit, and L. J. Wobker. 2015. In-Band Network Telemetry via Programmable Dataplanes. In In Proc. ACM SIGCOMM Conference Posters and Demos."},{"volume-title":"Proc. IEEE\/ACM International Symposium on Quality of Service (IWQoS).","author":"Kong D.","key":"e_1_3_2_1_16_1","unstructured":"D. Kong, Z. Zhou, Y. Shen, X. Chen, Q. Cheng, D. Zhang, and C. Wu. 2023. In-Band Network Telemetry Manipulation Attacks and Counter-measures in Programmable Networks. In Proc. IEEE\/ACM International Symposium on Quality of Service (IWQoS)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"D. McGrew and J. Viega. 2006. The Use of Galois Message Authentication Code (GMAC) in IPsec ESP and AH. RFC 4543. Internet Engineering Task Force.","DOI":"10.17487\/rfc4543"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"T. Mizrahi N. Sprecher E. Bellagamba and Y. Weingarten. 2014. An Overview of Operations Administration and Maintenance (OAM) Tools. RFC 7276. Internet Engineering Task Force.","DOI":"10.17487\/rfc7276"},{"volume-title":"Proc. IEEE INFOCOM.","author":"Pan T.","key":"e_1_3_2_1_19_1","unstructured":"T. Pan, E. Song, Z. Bian, X. Lin, X. Peng, J. Zhang, T. Huang, B. Liu, and Y. Liu. 2019. INT-Path: Towards Optimal Path Planning for In-Band Network-Wide Telemetry. In Proc. IEEE INFOCOM."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2020.3007491"},{"key":"e_1_3_2_1_21_1","volume-title":"d.]. Scapy. https:\/\/scapy.net [Last Accessed: April 20th","author":"Community Scapy","year":"2024","unstructured":"Scapy Community. [n. d.]. Scapy. https:\/\/scapy.net [Last Accessed: April 20th, 2024]."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"H. Song B. Gafni F. Brockners S. Bhandari and T. Mizrahi. 2022. In-Situ Operations Administration and Maintenance (Ioam) Direct Exporting. RFC 9326. Internet Engineering Task Force.","DOI":"10.17487\/RFC9326"},{"key":"e_1_3_2_1_23_1","volume-title":"In-Band Telemetry: A Survey. Computer Networks 186 (February","author":"Tan L.","year":"2021","unstructured":"L. Tan, W. Su, W. Zhang, J. Lv, Z. Zhang, J. Miao, X. Liu, and N Li. 2021. In-Band Telemetry: A Survey. Computer Networks 186 (February 2021)."},{"volume-title":"Proc. ACM Conference on Intelligent Computing and Its Emerging Applications (ICEA).","author":"Wang R.","key":"e_1_3_2_1_24_1","unstructured":"R. Wang, Z. Wang, D. Wang, and Y. Liu. 2021. In-Band Network Telemetry Based Fine-Grained Traceability Against IP Address Spooling Attack. In Proc. ACM Conference on Intelligent Computing and Its Emerging Applications (ICEA)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314212.3314215"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3269891"}],"event":{"name":"ANRW '24: Applied Networking Research Workshop","sponsor":["Internet Society Internet Society","SIGCOMM ACM Special Interest Group on Data Communication","IRTF Internet Research Task Force"],"location":"Vancouver AA Canada","acronym":"ANRW '24"},"container-title":["Proceedings of the Applied Networking Research Workshop on zzz"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3673422.3674886","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3673422.3674886","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:25:05Z","timestamp":1756236305000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3673422.3674886"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,20]]},"references-count":26,"alternative-id":["10.1145\/3673422.3674886","10.1145\/3673422"],"URL":"https:\/\/doi.org\/10.1145\/3673422.3674886","relation":{},"subject":[],"published":{"date-parts":[[2024,7,20]]},"assertion":[{"value":"2024-07-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}