{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T01:49:08Z","timestamp":1773193748978,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T00:00:00Z","timestamp":1750377600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2313062, 2319572, 2146476"],"award-info":[{"award-number":["2313062, 2319572, 2146476"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,21]]},"DOI":"10.1145\/3695053.3731106","type":"proceedings-article","created":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T16:46:17Z","timestamp":1750437977000},"page":"1140-1154","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["RAP: Reconfigurable Automata Processor"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7081-0725","authenticated-orcid":false,"given":"Ziyuan","family":"Wen","sequence":"first","affiliation":[{"name":"Rice University, Houston, Texas, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5444-5924","authenticated-orcid":false,"given":"Alexis","family":"Le Glaunec","sequence":"additional","affiliation":[{"name":"Rice University, Houston, Texas, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1209-7738","authenticated-orcid":false,"given":"Konstantinos","family":"Mamouras","sequence":"additional","affiliation":[{"name":"Rice University, Houston, Texas, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7220-9389","authenticated-orcid":false,"given":"Kaiyuan","family":"Yang","sequence":"additional","affiliation":[{"name":"Rice University, Houston, Texas, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,6,20]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","unstructured":"Junaid Arshad Muhammad\u00a0Ajmal Azad Muhammad\u00a0Mahmoud Abdeltaif and Khaled Salah. 2020. An intrusion detection framework for energy constrained IoT devices. Mechanical Systems and Signal Processing 136 (2020) 106436. 10.1016\/j.ymssp.2019.106436","DOI":"10.1016\/j.ymssp.2019.106436"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","unstructured":"Matteo Avalle Fulvio Risso and Riccardo Sisto. 2016. Scalable Algorithms for NFA Multi-striding and NFA-based Deep Packet Inspection on GPUs. IEEE\/ACM Transactions on Networking 24 3 (2016) 1704\u20131717. 10.1109\/TNET.2015.2429918","DOI":"10.1109\/TNET.2015.2429918"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","unstructured":"Ricardo Baeza-Yates and Gaston\u00a0H. Gonnet. 1992. A New Approach to Text Searching. Commun. ACM 35 10 (1992) 74\u201382. 10.1145\/135239.135243","DOI":"10.1145\/135239.135243"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2018.00068"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","unstructured":"Chunkun Bo Vinh Dang Ted Xie Jack Wadden Mircea Stan and Kevin Skadron. 2019. Automata Processing in Reconfigurable Architectures: In-the-Cloud Deployment Cross-Platform Evaluation and Fast Symbol-Only Reconfiguration. ACM Trans. Reconfigurable Technol. Syst. 12 2 (2019). 10.1145\/3314576","DOI":"10.1145\/3314576"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","unstructured":"Niccolo\u2019 Cascarano Pierluigi Rolando Fulvio Risso and Riccardo Sisto. 2010. iNFAnt: NFA Pattern Matching on GPGPU Devices. ACM SIGCOMM Computer Communication Review 40 5 (2010) 20\u201326. 10.1145\/1880153.1880157","DOI":"10.1145\/1880153.1880157"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2019.00025"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3533043"},{"key":"e_1_3_3_2_10_2","unstructured":"ClamAV. 2023. ClamAV - Open Source Antivirus Engine. Available at https:\/\/www.clamav.net\/. [Online; Accessed 6 Nov 2024]."},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","unstructured":"Paul Dlugosch Dave Brown Paul Glendenning Michael Leventhal and Harold Noyes. 2014. An Efficient and Scalable Semiconductor Architecture for Parallel Automata Processing. IEEE Transactions on Parallel and Distributed Systems 25 12 (2014) 3088\u20133098. 10.1109\/TPDS.2014.8","DOI":"10.1109\/TPDS.2014.8"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480117"},{"key":"e_1_3_3_2_13_2","unstructured":"Apache\u00a0Software Foundation. 2022. Apache SpamAssassin. Available at https:\/\/spamassassin.apache.org\/. [Online; Accessed 6 Nov 2024]."},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","unstructured":"Esteban Garz\u00f3n Roman Golman Zuher Jahshan Robert Hanhan Natan Vinshtok-Melnik Marco Lanuzza Adam Teman and Leonid Yavits. 2022. Hamming Distance Tolerant Content-Addressable Memory (HD-CAM) for DNA Classification. IEEE Access 10 (2022) 28080\u201328093. 10.1109\/ACCESS.2022.3158305","DOI":"10.1109\/ACCESS.2022.3158305"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","unstructured":"Esteban Garz\u00f3n Eyal Rechef Roman Golman Odem Harel Yuval Harary Paz Snapir Marco Lanuzza Adam Teman and Leonid Yavits. 2025. A 128-kbit Approximate Search-Capable Content-Addressable Memory (CAM) With Tunable Hamming Distance. IEEE Journal of Solid-State Circuits (2025) 1\u201311. 10.1109\/JSSC.2025.3529715","DOI":"10.1109\/JSSC.2025.3529715"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","unstructured":"Victor\u00a0Mikhaylovich Glushkov. 1961. The Abstract Theory of Automata. Russian Mathematical Surveys 16 5 (1961) 1\u201353. 10.1070\/RM1961v016n05ABEH004112","DOI":"10.1070\/RM1961v016n05ABEH004112"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527424"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2017.8215374"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA53966.2022.00011"},{"key":"e_1_3_3_2_20_2","unstructured":"Intel. 2023. Intel SoC. https:\/\/www.intel.com\/content\/www\/us\/en\/docs\/socwatch\/get-started-guide\/2023-1\/overview.html Accessed: Nov. 18 2024."},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3519939.3523456"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40047-6_80"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","unstructured":"Alexis Le\u00a0Glaunec Lingkun Kong and Konstantinos Mamouras. 2023. Regular Expression Matching Using Bit Vector Automata. Proceedings of the ACM on Programming Languages 7 OOPSLA1 Article 92 (2023) 30\u00a0pages. 10.1145\/3586044","DOI":"10.1145\/3586044"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","unstructured":"Alexis Le\u00a0Glaunec Lingkun Kong and Konstantinos Mamouras. 2024. HybridSA: GPU Acceleration of Multi-pattern Regex Matching using Bit Parallelism. Proc. ACM Program. Lang. 8 OOPSLA2 Article 331 (Oct. 2024). 10.1145\/3689771","DOI":"10.1145\/3689771"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","unstructured":"Dai Li and Kaiyuan Yang. 2020. A Dual-Port 8-T CAM-Based Network Intrusion Detection Engine for IoT. IEEE Solid-State Circuits Letters 3 (2020) 358\u2013361. 10.1109\/LSSC.2020.3022006","DOI":"10.1109\/LSSC.2020.3022006"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378471"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"publisher","unstructured":"Hongyuan Liu Sreepathi Pai and Adwait Jog. 2023. Asynchronous Automata Processing on GPUs. Proceedings of the ACM on Measurement and Analysis of Computing Systems 7 1 Article 27 (2023) 27\u00a0pages. 10.1145\/3579453","DOI":"10.1145\/3579453"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","unstructured":"Kai Ni Xunzhao Yin Ann\u00a0Franchesca Laguna Siddharth Joshi Stefan D\u00fcnkel Martin Trentzsch Johannes M\u00fcller Sven Beyer Michael Niemier Xiaobo\u00a0Sharon Hu and Suman Datta. 2019. Ferroelectric ternary content-addressable memory for one-shot learning. Nat Electron 2 (2019). 10.1038\/s41928-019-0321-3","DOI":"10.1038\/s41928-019-0321-3"},{"key":"e_1_3_3_2_29_2","unstructured":"NVIDIA. 2024. NVIDIA Management Library. https:\/\/docs.nvidia.com\/deploy\/nvml-api\/index.html Accessed: Nov. 18 2024."},{"key":"e_1_3_3_2_30_2","unstructured":"posix 2023. PCRE Syntax. Available at https:\/\/www.pcre.org\/original\/doc\/html\/pcrepattern.html. [Online; Accessed 18 July 2023]."},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM48280.2020.00027"},{"key":"e_1_3_3_2_32_2","unstructured":"RegexLib. 2023. Regular Expression Library. Available at https:\/\/regexlib.com\/. [Online; Accessed 6 Nov 2024]."},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","unstructured":"M.\u00a0Sadegh Riazi Mohammad Samragh and Farinaz Koushanfar. 2017. CAMsure: Secure Content-Addressable Memory for Approximate Search. ACM Trans. Embed. Comput. Syst. 16 5s Article 136 (Sept. 2017) 20\u00a0pages. 10.1145\/3126547","DOI":"10.1145\/3126547"},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.5555\/1039834.1039864"},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"publisher","unstructured":"Indranil Roy and Srinivas Aluru. 2016. Discovering Motifs in Biological Sequences Using the Micron Automata Processor. IEEE\/ACM Transactions on Computational Biology and Bioinformatics 13 1 (2016) 99\u2013111. 10.1109\/TCBB.2015.2430313","DOI":"10.1109\/TCBB.2015.2430313"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378459"},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA47549.2020.00017"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358324"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/3079079.3079084"},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"publisher","unstructured":"Christian J.\u00a0A. Sigrist Lorenzo Cerutti Edouard de Castro Petra\u00a0S. Langendijk-Genevaux Virginie Bulliard Amos Bairoch and Nicolas Hulo. 2009. PROSITE A Protein Domain Database for Functional Characterization and Annotation. Nucleic Acids Research 38 suppl_1 (2009) D161\u2013D166. 10.1093\/nar\/gkp885","DOI":"10.1093\/nar\/gkp885"},{"key":"e_1_3_3_2_41_2","unstructured":"Snort. 2023. Snort - Network Intrusion Detection & Prevention System. Available at https:\/\/www.snort.org\/. [Online; Accessed 6 Nov 2024]."},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/3123939.3123986"},{"key":"e_1_3_3_2_43_2","unstructured":"Suricata. 2023. Suricata - Open Source Intrusion Detection and Prevention Engine. Available at https:\/\/suricata.io\/. [Online; Accessed 6 Nov 2024]."},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"publisher","unstructured":"Ken Thompson. 1968. Programming Techniques: Regular Expression Search Algorithm. Commun. ACM 11 6 (1968) 419\u2013422. 10.1145\/363347.363387","DOI":"10.1145\/363347.363387"},{"key":"e_1_3_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2011.6114181"},{"key":"e_1_3_3_2_46_2","unstructured":"VirusTotal. 2023. YARA: The pattern matching swiss knife for malware researchers. Available at https:\/\/virustotal.github.io\/yara\/. [Online; Accessed 6 Nov 2024]."},{"key":"e_1_3_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2016.7581271"},{"key":"e_1_3_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2018.8573482"},{"key":"e_1_3_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2011.107"},{"key":"e_1_3_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/3543622.3573190"},{"key":"e_1_3_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1145\/3543622.3573190"},{"key":"e_1_3_3_2_52_2","first-page":"631","volume-title":"16th USENIX Symposium on Networked Systems Design and Implementation (NSDI \u201919)","author":"Wang Xiang","year":"2019","unstructured":"Xiang Wang, Yang Hong, Harry Chang, KyoungSoo Park, Geoff Langdale, Jiayu Hu, and Heqing Zhu. 2019. Hyperscan: A Fast Multi-Pattern Regex Matcher for Modern CPUs. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI \u201919). USENIX Association, Boston, MA, 631\u2013648. https:\/\/www.usenix.org\/conference\/nsdi19\/presentation\/wang-xiang"},{"key":"e_1_3_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/3620665.3640412"},{"key":"e_1_3_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.23919\/FPL.2017.8056759"},{"key":"e_1_3_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/1185347.1185360"},{"key":"e_1_3_3_2_56_2","doi-asserted-by":"publisher","DOI":"10.1145\/2482767.2482791"},{"key":"e_1_3_3_2_57_2","first-page":"1083","volume-title":"14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20)","author":"Zhao Zhipeng","year":"2020","unstructured":"Zhipeng Zhao, Hugo Sadok, Nirav Atre, James\u00a0C. Hoe, Vyas Sekar, and Justine Sherry. 2020. Achieving 100Gbps Intrusion Prevention on a Single Server. In 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20). USENIX Association, 1083\u20131100. https:\/\/www.usenix.org\/conference\/osdi20\/presentation\/zhao-zhipeng"},{"key":"e_1_3_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.1145\/2145816.2145833"}],"event":{"name":"ISCA '25: Proceedings of the 52nd Annual International Symposium on Computer Architecture","location":"Tokyo Japan","acronym":"SIGARCH '25","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 52nd Annual International Symposium on Computer Architecture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3695053.3731106","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3695053.3731106","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T11:02:12Z","timestamp":1750503732000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3695053.3731106"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,20]]},"references-count":57,"alternative-id":["10.1145\/3695053.3731106","10.1145\/3695053"],"URL":"https:\/\/doi.org\/10.1145\/3695053.3731106","relation":{},"subject":[],"published":{"date-parts":[[2025,6,20]]},"assertion":[{"value":"2025-06-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}