{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T12:39:05Z","timestamp":1764333545688,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":82,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T00:00:00Z","timestamp":1743292800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62402025, 62402024, 62221003"],"award-info":[{"award-number":["62402025, 62402024, 62221003"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,30]]},"DOI":"10.1145\/3689031.3696081","type":"proceedings-article","created":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:25:20Z","timestamp":1742970320000},"page":"818-834","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["SuperFE: A Scalable and Flexible Feature Extractor for ML-based Traffic Analysis Applications"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5274-5512","authenticated-orcid":false,"given":"Menghao","family":"Zhang","sequence":"first","affiliation":[{"name":"Beihang University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7939-7367","authenticated-orcid":false,"given":"Guanyu","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5663-0052","authenticated-orcid":false,"given":"Cheng","family":"Guo","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6334-4925","authenticated-orcid":false,"given":"Renyu","family":"Yang","sequence":"additional","affiliation":[{"name":"Beihang University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8380-9136","authenticated-orcid":false,"given":"Shicheng","family":"Wang","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3451-411X","authenticated-orcid":false,"given":"Han","family":"Bao","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-6378-3480","authenticated-orcid":false,"given":"Xiao","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4847-4585","authenticated-orcid":false,"given":"Mingwei","family":"Xu","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5331-3364","authenticated-orcid":false,"given":"Tianyu","family":"Wo","sequence":"additional","affiliation":[{"name":"Beihang University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3473-9703","authenticated-orcid":false,"given":"Chunming","family":"Hu","sequence":"additional","affiliation":[{"name":"Beihang University"}]}],"member":"320","published-online":{"date-parts":[[2025,3,30]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"15","article-title":"Fingerprinting attack on Tor anonymity using deep learning","volume":"42","author":"Abe Kota","year":"2016","unstructured":"Kota Abe and Shigeki Goto. 2016. Fingerprinting attack on Tor anonymity using deep learning. Proceedings of the Asia-Pacific Advanced Network 42 (2016), 15--20.","journal-title":"Proceedings of the Asia-Pacific Advanced Network"},{"unstructured":"Accton. 2024. Towards 800G and 1600G Ethernet. https:\/\/www.accton.com\/Technology-Brief\/towards-800g-and-1600g-ethernet\/.","key":"e_1_3_2_1_2_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1145\/2535838.2535862"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/2934872.2934892"},{"key":"e_1_3_2_1_5_1","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Arashloo Mina Tahmasbi","year":"2020","unstructured":"Mina Tahmasbi Arashloo, Alexey Lavrov, Manya Ghobadi, Jennifer Rexford, David Walker, and David Wentzlaff. 2020. Enabling Programmable Transport Protocols in {High-Speed}{NICs}. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20). 93--109."},{"unstructured":"Asterfuison. 2022. The Most Comprehensive DPU\/SmartNIC Vendors with its Product Line Summary. https:\/\/cloudswit.ch\/blogs\/the-most-complete-dpu-smartnic-vendors-with-its-product-line-summary\/.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Barradas Diogo","year":"2018","unstructured":"Diogo Barradas, Nuno Santos, and Lu\u00eds Rodrigues. 2018. Effective detection of multimedia protocol tunneling using machine learning. In 27th USENIX Security Symposium (USENIX Security 18). 169--185."},{"doi-asserted-by":"crossref","unstructured":"Diogo Barradas Nuno Santos Lu\u00eds Rodrigues Salvatore Signorello Fernando M. V. Ramos and Andr\u00e9 Madeira. 2021. FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications. In NDSS.","key":"e_1_3_2_1_8_1","DOI":"10.14722\/ndss.2021.24067"},{"key":"e_1_3_2_1_9_1","volume-title":"Chimera: A declarative language for streaming network traffic analysis. In Presented as part of the 21st USENIX Security Symposium (USENIX Security 12). 365--379.","author":"Borders Kevin","year":"2012","unstructured":"Kevin Borders, Jonathan Springer, and Matthew Burnside. 2012. Chimera: A declarative language for streaming network traffic analysis. In Presented as part of the 21st USENIX Security Symposium (USENIX Security 12). 365--379."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/1030083.1030108"},{"unstructured":"CAIDA. 2022. Passive Monitor: equinix-chicago. https:\/\/www.caida.org\/catalog\/datasets\/monitors\/passive-equinix-chicago\/.","key":"e_1_3_2_1_11_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1109\/MM.2018.022071134"},{"unstructured":"Cisco. 2023. New Cisco 800G Innovations Help to Supercharge the Internet for the Future by Improving Networking Economics and Sustainability for Service Providers and Cloud Providers. https:\/\/newsroom.cisco.com\/c\/r\/newsroom\/en\/us\/a\/y2023\/m03\/new-cisco-800g-innovations-help-to-supercharge-the-internet-for-the-future-by-improving-networking-economics-and-sustainability-for-service-providers-and-cloud-providers.html.","key":"e_1_3_2_1_13_1"},{"unstructured":"Ralph B D'Agostino and Michael A Stephens. 1986. Goodness-of-fit techniques.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Dong Yutao","year":"2023","unstructured":"Yutao Dong, Qing Li, Kaidong Wu, Ruoyu Li, Dan Zhao, Gareth Tyson, Junkun Peng, Yong Jiang, Shutao Xia, and Mingwei Xu. 2023. {HorusEye}: A Realtime {IoT} Malicious Traffic Detection Framework using Programmable Switches. In 32nd USENIX Security Symposium (USENIX Security 23). 571--588."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1145\/2815675.2815692"},{"key":"e_1_3_2_1_17_1","volume-title":"15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18)","author":"Firestone Daniel","year":"2018","unstructured":"Daniel Firestone, Andrew Putnam, Sambhrama Mundkur, Derek Chiou, Alireza Dabagh, Mike Andrewartha, Hari Angepat, Vivek Bhanu, Adrian Caulfield, Eric Chung, et al. 2018. Azure Accelerated Networking:{SmartNICs} in the Public Cloud. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18). 51--66."},{"doi-asserted-by":"crossref","unstructured":"Philippe Flajolet \u00c9ric Fusy Olivier Gandouet and Fr\u00e9d\u00e9ric Meunier. 2007. Hyperloglog: the analysis of a near-optimal cardinality estimation algorithm. In Discrete Mathematics and Theoretical Computer Science. Discrete Mathematics and Theoretical Computer Science 137--156.","key":"e_1_3_2_1_18_1","DOI":"10.46298\/dmtcs.3545"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/2034574.2034812"},{"unstructured":"Chuanpu Fu Qi Li and Ke Xu. 2023. Detecting unknown encrypted malicious traffic in real time via flow interaction graph analysis. In NDSS.","key":"e_1_3_2_1_20_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1145\/1315245.1315284"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1145\/3230543.3230555"},{"unstructured":"Gurobi. 2024. Gurobi Optimization. https:\/\/www.gurobi.com\/.","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Hayes Jamie","year":"2016","unstructured":"Jamie Hayes and George Danezis. 2016. k-fingerprinting: A robust scalable website fingerprinting technique. In 25th USENIX Security Symposium (USENIX Security 16). 1187--1203."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1145\/3460120.3484758"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1145\/3386367.3431290"},{"unstructured":"Intel. 2022. Intel Tofino: P4-programmable Ethernet switch ASIC that delivers better performance at lower power. https:\/\/www.intel.com\/content\/www\/us\/en\/products\/network-io\/programmable-ethernet-switch\/tofino-series.html.","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","volume-title":"21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24)","author":"Jafri Syed Usman","year":"2024","unstructured":"Syed Usman Jafri, Sanjay Rao, Vishal Shrivastav, and Mohit Tawarmalani. 2024. Leo: Online {ML-based} Traffic Classification at {Multi-Terabit} Line Rate. In 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). 1573--1591."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1109\/SP40000.2020.00079"},{"key":"e_1_3_2_1_30_1","volume-title":"NetChain: Scale-Free Sub-RTT Coordination. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18)","author":"Jin Xin","year":"2018","unstructured":"Xin Jin, Xiaozhou Li, Haoyu Zhang, Nate Foster, Jeongkeun Lee, Robert Soul\u00e9, Changhoon Kim, and Ion Stoica. 2018. NetChain: Scale-Free Sub-RTT Coordination. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18). USENIX Association."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1145\/3132747.3132764"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1145\/3079856.3080246"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.1145\/3132747.3132756"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1145\/2934872.2934897"},{"key":"e_1_3_2_1_35_1","volume-title":"19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22)","author":"Li Guanyu","year":"2022","unstructured":"Guanyu Li, Menghao Zhang, Cheng Guo, Han Bao, Mingwei Xu, Hongxin Hu, and Fenghua Li. 2022. {IMap}: Fast and Scalable {In-Network} Scanning with Programmable Switches. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22). 667--681."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1109\/ICNP.2019.8888057"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.1145\/3093315.3037731"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_38_1","DOI":"10.1109\/MPRV.2018.03367731"},{"key":"e_1_3_2_1_39_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Meier Roland","year":"2018","unstructured":"Roland Meier, Petar Tsankov, Vincent Lenders, Laurent Vanbever, and Martin Vechev. 2018. NetHide: Secure and practical network topology obfuscation. In 27th USENIX Security Symposium (USENIX Security 18). 693--709."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_40_1","DOI":"10.1145\/3098822.3098824"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_41_1","DOI":"10.14722\/ndss.2018.23204"},{"key":"e_1_3_2_1_42_1","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Moon YoungGyoun","year":"2020","unstructured":"YoungGyoun Moon, SeungEon Lee, Muhammad Asim Jamshed, and KyoungSoo Park. 2020. {AccelTCP}: Accelerating Network Applications with Stateful {TCP} Offloading. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20). 77--92."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_43_1","DOI":"10.1109\/SPW.2014.25"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_44_1","DOI":"10.1145\/3098822.3098829"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_45_1","DOI":"10.1145\/3243734.3243824"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_46_1","DOI":"10.1145\/3133956.3134074"},{"unstructured":"Netronome. 2022. Netronome MicroC. https:\/\/cdn.open-nfp.org\/media\/documents\/the-joy-of-micro-c_fcjSfra.pdf.","key":"e_1_3_2_1_47_1"},{"unstructured":"NVIDA. 2024. NVIDIA BlueField Data Processing Units. https:\/\/www.nvidia.com\/en-us\/networking\/products\/data-processing-unit\/.","key":"e_1_3_2_1_48_1"},{"doi-asserted-by":"crossref","unstructured":"Andriy Panchenko Fabian Lanze Jan Pennekamp Thomas Engel Andreas Zinnen Martin Henze and Klaus Wehrle. 2016. Website Fingerprinting at Internet Scale.. In NDSS.","key":"e_1_3_2_1_49_1","DOI":"10.14722\/ndss.2016.23477"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_50_1","DOI":"10.1145\/3485983.3494861"},{"unstructured":"WIDE Project. [n. d.]. MAWI Working Group Traffic Archive. https:\/\/mawi.wide.ad.jp\/mawi\/.","key":"e_1_3_2_1_51_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_52_1","DOI":"10.1145\/3477132.3483583"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_53_1","DOI":"10.1007\/978-3-540-87403-4_4"},{"unstructured":"ISP review. 2023. Neos Networks Bring National 400Gbps Services to UK Businesses. https:\/\/www.ispreview.co.uk\/index.php\/2023\/08\/neos-networks-bring-national-400gbps-services-to-uk-businesses.html.","key":"e_1_3_2_1_54_1"},{"key":"e_1_3_2_1_55_1","volume-title":"Tom Van Goethem, and Wouter Joosen","author":"Rimmer Vera","year":"2018","unstructured":"Vera Rimmer, Davy Preuveneers, Marc Juarez, Tom Van Goethem, and Wouter Joosen. 2018. Automated website fingerprinting through deep learning. In NDSS."},{"unstructured":"SDXcentral. 2022. AT&T Picks Barefoot Networks for Programmable Switches. https:\/\/www.sdxcentral.com\/articles\/news\/att-picks-barefoot- networks-programmable- switches\/2017\/04\/.","key":"e_1_3_2_1_56_1"},{"unstructured":"SDXcentral. 2022. Barefoot Scores Tofino Deals with Alibaba Baidu and Tencent. https:\/\/www.sdxcentral.com\/articles\/news\/barefoot-scores-tofino-deals-with-alibaba-baidu-and-tencent\/2017\/05\/.","key":"e_1_3_2_1_57_1"},{"key":"e_1_3_2_1_58_1","volume-title":"19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22)","author":"Shashidhara Rajath","year":"2022","unstructured":"Rajath Shashidhara, Tim Stamler, Antoine Kaufmann, and Simon Peter. 2022. {FlexTOE}: Flexible {TCP} Offload with {Fine-Grained} Parallelism. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22). 87--102."},{"key":"e_1_3_2_1_59_1","volume-title":"Re-architecting Traffic Analysis with Neural Network Interface Cards. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22)","author":"Siracusano Giuseppe","year":"2022","unstructured":"Giuseppe Siracusano, Salvator Galea, Davide Sanvito, Mohammad Malekzadeh, Gianni Antichi, Paolo Costa, Hamed Haddadi, and Roberto Bifulco. 2022. Re-architecting Traffic Analysis with Neural Network Interface Cards. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22). 513--533."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_60_1","DOI":"10.1145\/3243734.3243768"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_61_1","DOI":"10.1145\/3319535.3354217"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_62_1","DOI":"10.1145\/3190508.3190558"},{"key":"e_1_3_2_1_63_1","volume-title":"2018 USENIX Annual Technical Conference USENIX ATC 18)","author":"Sonchack John","year":"2018","unstructured":"John Sonchack, Oliver Michel, Adam J Aviv, Eric Keller, and Jonathan M Smith. 2018. Scaling Hardware Accelerated Network Monitoring to Concurrent and Dynamic Queries With* Flow. In 2018 USENIX Annual Technical Conference USENIX ATC 18). USENIX Association."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_64_1","DOI":"10.1109\/SECPRI.1995.398921"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_65_1","DOI":"10.1016\/j.comnet.2020.107763"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_66_1","DOI":"10.1145\/3544216.3544227"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_67_1","DOI":"10.1145\/2810103.2813715"},{"key":"e_1_3_2_1_68_1","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Wang Tao","year":"2014","unstructured":"Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, and Ian Goldberg. 2014. Effective attacks and provable defenses for website fingerprinting. In 23rd USENIX Security Symposium (USENIX Security 14). 143--157."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_69_1","DOI":"10.1080\/00401706.1962.10490022"},{"unstructured":"George Winslow. 2022. Comcast Reports 400 Gbps Internet Speeds in Hollowcore Fiber Test. https:\/\/www.tvtechnology.com\/news\/comcast-reports-400-gbps-internet-speeds-in-hollowcore-fiber-test.","key":"e_1_3_2_1_70_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_71_1","DOI":"10.1109\/INFOCOM48880.2022.9796936"},{"key":"e_1_3_2_1_72_1","volume-title":"Decentralized Link-Flooding Defense Against Adaptive Adversaries. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Xing Jiarong","year":"2021","unstructured":"Jiarong Xing, Wenqing Wu, and Ang Chen. 2021. Ripple: A Programmable, Decentralized Link-Flooding Defense Against Adaptive Adversaries. In 30th USENIX Security Symposium (USENIX Security 21). 3865--3881."},{"key":"e_1_3_2_1_73_1","volume-title":"21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24)","author":"Yan Jinzhu","year":"2024","unstructured":"Jinzhu Yan, Haotian Xu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu, and Jianping Wu. 2024. {Brain-on-Switch}: Towards Advanced Intelligent Network Data Plane via {NN-Driven} Traffic Analysis at {Line-Speed}. In 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). 419--440."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_74_1","DOI":"10.5555\/646648.699353"},{"key":"e_1_3_2_1_75_1","volume-title":"Michael P Collins, Vyas Sekar, and Srinivasan Seshan.","author":"Yu Tianlong","year":"2017","unstructured":"Tianlong Yu, Seyed Kaveh Fayaz, Michael P Collins, Vyas Sekar, and Srinivasan Seshan. 2017. PSI: Precise Security Instrumentation for Enterprise Networks.. In NDSS."},{"key":"e_1_3_2_1_76_1","volume-title":"Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing. In 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12)","author":"Zaharia Matei","year":"2012","unstructured":"Matei Zaharia, Mosharaf Chowdhury, Tathagata Das, Ankur Dave, Justin Ma, Murphy McCauly, Michael J Franklin, Scott Shenker, and Ion Stoica. 2012. Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing. In 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12). 15--28."},{"key":"e_1_3_2_1_77_1","volume-title":"19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22)","author":"Zeng Chaoliang","year":"2022","unstructured":"Chaoliang Zeng, Layong Luo, Teng Zhang, Zilong Wang, Luyang Li, Wenchen Han, Nan Chen, Lebing Wan, Lichao Liu, Zhipeng Ding, et al. 2022. Tiara: A scalable and efficient hardware acceleration architecture for stateful layer-4 load balancing. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22). 1345--1358."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_78_1","DOI":"10.14722\/ndss.2020.24007"},{"key":"e_1_3_2_1_79_1","volume-title":"USENIX Security Symposium","volume":"171","author":"Zhang Yin","year":"2000","unstructured":"Yin Zhang and Vern Paxson. 2000. Detecting stepping stones.. In USENIX Security Symposium, Vol. 171. 184."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_80_1","DOI":"10.1016\/j.comnet.2019.107049"},{"key":"e_1_3_2_1_81_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Zhou Guangmeng","year":"2023","unstructured":"Guangmeng Zhou, Zhuotao Liu, Chuanpu Fu, Qi Li, and Ke Xu. 2023. An efficient design of intelligent network data plane. In 32nd USENIX Security Symposium (USENIX Security 23). 6203--6220."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_82_1","DOI":"10.1145\/3359989.3365406"}],"event":{"sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"acronym":"EuroSys '25","name":"EuroSys '25: Twentieth European Conference on Computer Systems","location":"Rotterdam Netherlands"},"container-title":["Proceedings of the Twentieth European Conference on Computer Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3689031.3696081","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3689031.3696081","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T11:20:39Z","timestamp":1755775239000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3689031.3696081"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,30]]},"references-count":82,"alternative-id":["10.1145\/3689031.3696081","10.1145\/3689031"],"URL":"https:\/\/doi.org\/10.1145\/3689031.3696081","relation":{},"subject":[],"published":{"date-parts":[[2025,3,30]]},"assertion":[{"value":"2025-03-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}