{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T08:00:36Z","timestamp":1768032036772,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":89,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T00:00:00Z","timestamp":1743292800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Provincial Key R&D Program of Zhejiang","award":["2021C01032"],"award-info":[{"award-number":["2021C01032"]}]},{"name":"Singapore Ministry of Education (MOE) Tier 1","award":["RG87\/22"],"award-info":[{"award-number":["RG87\/22"]}]},{"name":"Self-Developing Experimental Instrument and Equipment Project of Yangzhou University","award":["zzyq2023zy06"],"award-info":[{"award-number":["zzyq2023zy06"]}]},{"name":"Defence Science Organisation (DSO) National Laboratories under the AI Singapore Programme","award":["FCP-NTU-RG-2022-010 and FCP-ASTAR-TG-2022-003"],"award-info":[{"award-number":["FCP-NTU-RG-2022-010 and FCP-ASTAR-TG-2022-003"]}]},{"DOI":"10.13039\/501100006374","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["623B2090, 62172007, and 61902362"],"award-info":[{"award-number":["623B2090, 62172007, and 61902362"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Research Grants Council of Hong Kong","award":["GRF 14201523"],"award-info":[{"award-number":["GRF 14201523"]}]},{"name":"Research Project of Provincial Laboratory of Shandong, China","award":["SYS202201"],"award-info":[{"award-number":["SYS202201"]}]},{"name":"Yangzhou Science and Technology Plan Project","award":["YZ2023200"],"award-info":[{"award-number":["YZ2023200"]}]},{"name":"NTU Centre for Computational Technologies in Finance","award":["NTU-CCTF"],"award-info":[{"award-number":["NTU-CCTF"]}]},{"name":"Quan Cheng Laboratory","award":["QCLZD202304"],"award-info":[{"award-number":["QCLZD202304"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,30]]},"DOI":"10.1145\/3689031.3696077","type":"proceedings-article","created":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:25:20Z","timestamp":1742970320000},"page":"1383-1398","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Phantom: Virtualizing Switch Register Resources for Accurate Sketch-based Network Measurement"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0249-9664","authenticated-orcid":false,"given":"Xiang","family":"Chen","sequence":"first","affiliation":[{"name":"Zhejiang University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7753-0294","authenticated-orcid":false,"given":"Hongyan","family":"Liu","sequence":"additional","affiliation":[{"name":"Zhejiang University and Quan Cheng Laboratory"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0536-3196","authenticated-orcid":false,"given":"Zhengyan","family":"Zhou","sequence":"additional","affiliation":[{"name":"Zhejiang University"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3371-8734","authenticated-orcid":false,"given":"Xi","family":"Sun","sequence":"additional","affiliation":[{"name":"Zhejiang University"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-0528-8755","authenticated-orcid":false,"given":"Wenbin","family":"Zhang","sequence":"additional","affiliation":[{"name":"Zhejiang University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8220-6525","authenticated-orcid":false,"given":"Hongyang","family":"Du","sequence":"additional","affiliation":[{"name":"The University of Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6379-0244","authenticated-orcid":false,"given":"Dong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Fuzhou University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7966-4488","authenticated-orcid":false,"given":"Xuan","family":"Liu","sequence":"additional","affiliation":[{"name":"Yangzhou University and Southeast University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8008-2805","authenticated-orcid":false,"given":"Haifeng","family":"Zhou","sequence":"additional","affiliation":[{"name":"Zhejiang University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7442-7416","authenticated-orcid":false,"given":"Dusit","family":"Niyato","sequence":"additional","affiliation":[{"name":"Nanyang Technological University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2387-6131","authenticated-orcid":false,"given":"Qun","family":"Huang","sequence":"additional","affiliation":[{"name":"Peking University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7958-9687","authenticated-orcid":false,"given":"Chunming","family":"Wu","sequence":"additional","affiliation":[{"name":"Quan Cheng Laboratory and Zhejiang University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3441-6277","authenticated-orcid":false,"given":"Kui","family":"Ren","sequence":"additional","affiliation":[{"name":"Zhejiang University"}]}],"member":"320","published-online":{"date-parts":[[2025,3,30]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","volume-title":"IEEE Hot Chips 32","author":"Agrawal A.","year":"2020","unstructured":"A. Agrawal and C. Kim. Intel tofino2-a 12.9 tbps p4-programmable ethernet switch. In IEEE Hot Chips 32, pages 1--32, 2020."},{"key":"e_1_3_2_1_2_1","first-page":"59","volume-title":"USENIX NSDI","author":"Alcoz A. G.","year":"2020","unstructured":"A. G. Alcoz, A. Dietm\u00fcller, and L. Vanbever. Sp-pifo: Approximating push-in first-out behaviors using strict-priority queues. In USENIX NSDI, pages 59--76, 2020."},{"key":"e_1_3_2_1_3_1","first-page":"1","volume-title":"USENIX NSDI","author":"Anup A.","year":"2022","unstructured":"A. Anup, L. Zaoxing, and S. Srinivasan. Heterosketch: Coordinating network-wide monitoring in heterogeneous and dynamic networks. In USENIX NSDI, pages 1--23, 2022."},{"key":"e_1_3_2_1_4_1","unstructured":"Barefoot Tofino. https:\/\/www.barefootnetworks.com\/technology\/#tofino."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.2982739"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486011"},{"key":"e_1_3_2_1_8_1","unstructured":"Broadcom Trident4. https:\/\/www.broadcom.com\/products\/ethernet-connectivity\/switching\/strataxgs\/bcm56880-series."},{"key":"e_1_3_2_1_9_1","unstructured":"Buffer sizes of commodity switches. https:\/\/people.ucsc.edu\/~warner\/buffer.html."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/646255.684566"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488732"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP49622.2020.9259414"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP49622.2020.9259384"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.3045293"},{"issue":"1","key":"e_1_3_2_1_15_1","first-page":"1","article-title":"Network monitoring on multi-pipe switches","volume":"7","author":"Chiesa M.","year":"2023","unstructured":"M. Chiesa and F. L. Verdi. Network monitoring on multi-pipe switches. ACM SIGMETRICS, 7(1):1--31, 2023.","journal-title":"ACM SIGMETRICS"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098823"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.664262"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"e_1_3_2_1_19_1","volume-title":"Broadcom White Paper","author":"Das S.","year":"2012","unstructured":"S. Das and R. Sankar. Broadcom smart-buffer technology in data center switches for cost-effective performance scaling of cloud applications. Broadcom White Paper, 2012."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3603269.3604865"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405879"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3422604.3425928"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230555"},{"key":"e_1_3_2_1_24_1","unstructured":"Gurobi Optimizer. http:\/\/www.gurobi.com."},{"key":"e_1_3_2_1_25_1","first-page":"35","volume-title":"ACM CoNEXT","author":"Hancock D.","year":"2016","unstructured":"D. Hancock and J. van der Merwe. Hyper4: Using p4 to virtualize the programmable data plane. In ACM CoNEXT, pages 35--49, 2016."},{"key":"e_1_3_2_1_26_1","first-page":"71","volume-title":"USENIX NSDI","author":"Handigol N.","year":"2014","unstructured":"N. Handigol, B. Heller, V. Jeyakumar, D. Mazi\u00e8res, and N. McKeown. I know what your packet did last hop: Using packet histories to troubleshoot networks. In USENIX NSDI, pages 71--85, 2014."},{"key":"e_1_3_2_1_27_1","first-page":"1","volume-title":"USENIX NSDI","author":"Hogan M.","year":"2022","unstructured":"M. Hogan, S. Landau-Feibish, M. T. Arashloo, J. Rexford, and D. Walker. Modular switch programming under resource constraints. In USENIX NSDI, pages 1--15, 2022."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098831"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230559"},{"key":"e_1_3_2_1_30_1","first-page":"1027","volume-title":"USENIX NSDI","author":"Huang Q.","year":"2021","unstructured":"Q. Huang, S. Sheng, X. Chen, Y. Bao, R. Zhang, Y. Xu, and G. Zhang. Toward nearly-zero-error sketching via compressive sensing. In USENIX NSDI, pages 1027--1044, 2021."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405877"},{"key":"e_1_3_2_1_32_1","unstructured":"Intel Corporation. Data Plane Development Kit. http:\/\/dpdk.org."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626292"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132764"},{"key":"e_1_3_2_1_35_1","first-page":"103","volume-title":"USENIX NSDI","author":"Jose L.","year":"2015","unstructured":"L. Jose, L. Yan, G. Varghese, and N. McKeown. Compiling packet programs to reconfigurable switches. In USENIX NSDI, pages 103--115, 2015."},{"key":"e_1_3_2_1_36_1","volume-title":"USENIX Hot-ICE","author":"Jose L.","year":"2011","unstructured":"L. Jose, M. Yu, and J. Rexford. Online measurement of large traffic aggregates on commodity switches. In USENIX Hot-ICE, 2011."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405855"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472905"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3603269.3604827"},{"key":"e_1_3_2_1_40_1","first-page":"371","volume-title":"USENIX NSDI","author":"Li Y.","year":"2022","unstructured":"Y. Li, J. Gao, E. Zhai, M. Liu, K. Liu, and H. H. Liu. Cetus: Releasing p4 programmers from the chore of trial and error compiling. In USENIX NSDI, pages 371--385, 2022."},{"key":"e_1_3_2_1_41_1","first-page":"311","volume-title":"USENIX NSDI","author":"Li Y.","year":"2016","unstructured":"Y. Li, R. Miao, C. Kim, and M. Yu. Flowradar: a better netflow for data centers. In USENIX NSDI, pages 311--324, 2016."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934906"},{"key":"e_1_3_2_1_43_1","volume-title":"USENIX Security","author":"Liu Z.","year":"2021","unstructured":"Z. Liu, H. Namkung, G. Nikolaidis, J. Lee, C. Kim, X. Jin, V. Braverman, M. Yu, and V. Sekar. Jaqen: A high-performance switch-native approach for detecting and mitigating volumetric ddos attacks with programmable switches. In USENIX Security, 2021."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098824"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230564"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2716281.2836099"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3482898.3483359"},{"key":"e_1_3_2_1_48_1","first-page":"1","volume-title":"USENIX NSDI","author":"Namkung H.","year":"2022","unstructured":"H. Namkung, Z. Liu, D. Kim, V. Sekar, and P. Steenkiste. Sketchlib: Enabling efficient sketch-based monitoring on programmable switches. In USENIX NSDI, pages 1--17, 2022."},{"key":"e_1_3_2_1_49_1","first-page":"1273","volume-title":"USENIX NSDI","author":"Namkung H.","year":"2023","unstructured":"H. Namkung, Z. Liu, D. Kim, V. Sekar, and P. Steenkiste. Sketchovsky: Enabling ensembles of sketches on programmable switches. In USENIX NSDI, pages 1273--1292, 2023."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098829"},{"key":"e_1_3_2_1_51_1","unstructured":"NVIDIA MELLANOX SPECTRUM. https:\/\/network.nvidia.com\/files\/doc-2020\/pb-spectrum-switch.pdf."},{"key":"e_1_3_2_1_52_1","unstructured":"E. Opsasnick. Buffer management and flow control mechanism including packet-based dynamic thresholding May 31 2011. US Patent 7 953 002."},{"key":"e_1_3_2_1_53_1","unstructured":"P4C. https:\/\/github.com\/p4lang\/p4c."},{"key":"e_1_3_2_1_54_1","unstructured":"PktGen. https:\/\/pktgen-dpdk.readthedocs.io\/."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626310"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787472"},{"key":"e_1_3_2_1_57_1","first-page":"785","volume-title":"USENIX NSDI","author":"Sapio A.","year":"2021","unstructured":"A. Sapio, M. Canini, C.-Y. Ho, J. Nelson, P. Kalnis, C. Kim, A. Krishnamurthy, M. Moshref, D. Ports, and P. Richt\u00e1rik. Scaling distributed machine learning with in-network aggregation. In USENIX NSDI, pages 785--808, 2021."},{"key":"e_1_3_2_1_58_1","first-page":"367","volume-title":"ACM SIGCOMM","author":"Shrivastav. Fast V.","year":"2019","unstructured":"V. Shrivastav. Fast, scalable, and programmable packet scheduler in hardware. In ACM SIGCOMM, pages 367--379. 2019."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544266"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544269"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934900"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934899"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3063772"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190558"},{"key":"e_1_3_2_1_65_1","first-page":"823","volume-title":"USENIX ATC","author":"Sonchack J.","year":"2018","unstructured":"J. Sonchack, O. Michel, A. J. Aviv, E. Keller, and J. M. Smith. Scaling hardware accelerated network monitoring to concurrent and dynamic queries with *flow. In USENIX ATC, pages 823--835, 2018."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3426744.3431329"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3603269.3604847"},{"key":"e_1_3_2_1_68_1","unstructured":"The CAIDA Anonymized Internet Traces. http:\/\/www.caida.org\/data\/overview\/."},{"key":"e_1_3_2_1_69_1","unstructured":"Tomahawk 5 \/ BCM78900 Series. https:\/\/www.broadcom.com\/products\/ethernet-connectivity\/switching\/strataxgs\/bcm78900-series."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP49622.2020.9259415"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3365609.3365849"},{"key":"e_1_3_2_1_72_1","first-page":"651","volume-title":"USENIX NSDI","author":"Xing J.","year":"2022","unstructured":"J. Xing, K.-F. Hsu, M. Kadosh, A. Lo, Y. Piasetzky, A. Krishnamurthy, and A. Chen. Runtime programmable switches. In USENIX NSDI, pages 651--665, 2022."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544262"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230544"},{"key":"e_1_3_2_1_75_1","first-page":"29","volume-title":"USENIX NSDI","author":"Yu M.","year":"2013","unstructured":"M. Yu, L. Jose, and R. Miao. Software defined traffic measurement with opensketch. In USENIX NSDI, pages 29--42, 2013."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472887"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2017.8038396"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24007"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131375"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472892"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2010.5447825"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544239"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3281411.3281436"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3343180.3343188"},{"key":"e_1_3_2_1_85_1","first-page":"91","volume-title":"IEEE\/IFIP Networking","author":"Zheng P.","year":"2020","unstructured":"P. Zheng et al. Nfv performance profiling on multi-core servers. In IEEE\/IFIP Networking, pages 91--99, 2020."},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3406214"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359989.3365406"},{"key":"e_1_3_2_1_88_1","first-page":"155","volume-title":"USENIX NSDI","author":"Zhu H.","year":"2022","unstructured":"H. Zhu, T. Wang, Y. Hong, D. R. Ports, A. Sivaraman, and X. Jin. Netvrm: Virtual register memory for programmable networks. In USENIX NSDI, pages 155--170, 2022."},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787483"}],"event":{"name":"EuroSys '25: Twentieth European Conference on Computer Systems","location":"Rotterdam Netherlands","acronym":"EuroSys '25","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the Twentieth European Conference on Computer Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3689031.3696077","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3689031.3696077","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T11:18:52Z","timestamp":1755775132000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3689031.3696077"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,30]]},"references-count":89,"alternative-id":["10.1145\/3689031.3696077","10.1145\/3689031"],"URL":"https:\/\/doi.org\/10.1145\/3689031.3696077","relation":{},"subject":[],"published":{"date-parts":[[2025,3,30]]},"assertion":[{"value":"2025-03-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}