{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T12:12:40Z","timestamp":1756383160985,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,18]],"date-time":"2024-11-18T00:00:00Z","timestamp":1731888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2313998"],"award-info":[{"award-number":["2313998"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,18]]},"DOI":"10.1145\/3696348.3696874","type":"proceedings-article","created":{"date-parts":[[2024,11,11]],"date-time":"2024-11-11T00:20:52Z","timestamp":1731284452000},"page":"246-254","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["The Case for Validating Inputs in Software-Defined WANs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-2728-1898","authenticated-orcid":false,"given":"Alexander","family":"Krentsel","sequence":"first","affiliation":[{"name":"UC Berkeley and Google"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-5599-8636","authenticated-orcid":false,"given":"Rishabh","family":"Iyer","sequence":"additional","affiliation":[{"name":"UC Berkeley"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6103-6910","authenticated-orcid":false,"given":"Isaac","family":"Keslassy","sequence":"additional","affiliation":[{"name":"Technion"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0524-9425","authenticated-orcid":false,"given":"Sylvia","family":"Ratnasamy","sequence":"additional","affiliation":[{"name":"UC Berkeley and Google"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8041-4841","authenticated-orcid":false,"given":"Anees","family":"Shaikh","sequence":"additional","affiliation":[{"name":"Google"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-2528-9525","authenticated-orcid":false,"given":"Rob","family":"Shakir","sequence":"additional","affiliation":[{"name":"Google"}]}],"member":"320","published-online":{"date-parts":[[2024,11,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2022. Ethernet CFM Y.1731 Basic Concepts Configuration and Implementation. https:\/\/www.cisco.com\/c\/en\/us\/support\/docs\/asynchronous-transfer-mode-atm\/operation-administration-maintenance-oam\/117457-technote-cfm-00.html."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.016"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2578855.2535862"},{"key":"e_1_3_2_1_4_1","unstructured":"R.B. Bapat. 2014. Graphs and Matrices. Springer London. https:\/\/books.google.com\/books?id=LWCSBAAAQBAJ"},{"key":"e_1_3_2_1_5_1","volume-title":"Wen Bo Li, et al","author":"Lebsack Carl","year":"2018","unstructured":"Carl Lebsack, Marcus Hines, Paul Borman, Anees Shaikh, Rob Shakir, Wen Bo Li, et al. 2018. gNMI - gRPC Network Management Interface. https:\/\/github.com\/openconfig\/reference\/blob\/master\/rpc\/gnmi\/gnmi-specification.md."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230546"},{"key":"e_1_3_2_1_7_1","unstructured":"Cisco. 2005. Uses of the Overload Bit with IS-IS. Technical Report 24509. Cisco."},{"key":"e_1_3_2_1_8_1","unstructured":"Cisco. 2016. IP Routing: OSPF Configuration Guide. Cisco."},{"key":"e_1_3_2_1_9_1","volume-title":"Interpretable Machine Learning for Science with PySR and SymbolicRegression.jl. arXiv [astro-ph.IM] (May","author":"Cranmer Miles","year":"2023","unstructured":"Miles Cranmer. 2023. Interpretable Machine Learning for Science with PySR and SymbolicRegression.jl. arXiv [astro-ph.IM] (May 2023)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/2789770.2789803"},{"key":"e_1_3_2_1_11_1","unstructured":"Tony Fyler. 2023. Azure Outage Disconnects Thousands. https:\/\/techhq.com\/2023\/01\/azure-outage-disconnects-thousands."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Ramesh Govindan Ina Minei Mahesh Kallahalla Bikash Koley and Amin Vahdat. 2016. Evolve or Die: High-Availability Design Principles Drawn from Google's Network Infrastructure. https:\/\/dl.acm.org\/doi\/10.1145\/2934872.2934891","DOI":"10.1145\/2934872.2934891"},{"key":"e_1_3_2_1_13_1","unstructured":"Kaiming He Xinlei Chen Saining Xie Yanghao Li Piotr Doll\u00e1r and Ross Girshick. 2021. Masked Autoencoders Are Scalable Vision Learners. arXiv:2111.06377 [cs.CV] https:\/\/arxiv.org\/abs\/2111.06377"},{"key":"e_1_3_2_1_14_1","unstructured":"Marcus Hines and Alex Masi. 2021. Kubernetes Network Emulator. https:\/\/github.com\/openconfig\/kne."},{"key":"e_1_3_2_1_15_1","volume-title":"Details About The October 4 Outage. https:\/\/engineering.fb. com\/2021\/10\/05\/networking-traffic\/outage-details\/. Engineering at Meta (Oct","author":"Janardhan Santosh","year":"2021","unstructured":"Santosh Janardhan. 2021. Details About The October 4 Outage. https:\/\/engineering.fb. com\/2021\/10\/05\/networking-traffic\/outage-details\/. Engineering at Meta (Oct. 2021)."},{"key":"e_1_3_2_1_16_1","unstructured":"Juniper. 2015. L2TP drain I Juniper Networks Pathfinder Feature Explorer --- apps.juniper.net. https:\/\/apps.juniper.net\/feature-explorer\/feature-info.html?fKey=6874&fn=L2TP+drain."},{"key":"e_1_3_2_1_17_1","unstructured":"Juniper. 2020. BGP - Delay Route Advertisments - Wait for KRT Drain. https:\/\/apps.juniper.net\/feature-explorer\/feature-info.html?fKey=10427&fn=BGP+-+Delay+Route+Advertisments+-+Wait+for+KRT+Drain."},{"key":"e_1_3_2_1_18_1","volume-title":"Header Space Analysis: Static Checking for Networks. In 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12)","author":"Kazemian Peyman","year":"2012","unstructured":"Peyman Kazemian, George Varghese, and Nick McKeown. 2012. Header Space Analysis: Static Checking for Networks. In 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12). 113--126."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3651890.3672257"},{"key":"e_1_3_2_1_20_1","unstructured":"Umesh Krishnaswamy Rachee Singh Nikolaj Bj\u00f8rner and Himanshu Raj. 2021. Decentralized cloud wide-area network traffic engineering with BlastShield. Technical Report MSR-TR-2021-31. Microsoft. https:\/\/www.microsoft.com\/en-us\/research\/publication\/decentralized-cloud-wide-area-network-traffic-engineering-with-blastshield\/"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787478"},{"key":"e_1_3_2_1_22_1","volume-title":"IBM Cloud suffers prolonged outage. TechCrunch (June","author":"Lardinois Frederic","year":"2020","unstructured":"Frederic Lardinois. 2020. IBM Cloud suffers prolonged outage. TechCrunch (June 2020)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229584.3229585"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132759"},{"key":"e_1_3_2_1_25_1","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Mogul Jeffrey C","year":"2020","unstructured":"Jeffrey C Mogul, Drago Goricanec, Martin Pool, Anees Shaikh, Douglas Turk, Bikash Koley, Google Llc Xiaoxue Zhao, and Alibaba Group Inc. 2020. Experiences with Modeling Network Topologies at Multiple Levels of Abstraction. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20) (Santa Clara, CA). USENIX Association, 403--418."},{"key":"e_1_3_2_1_26_1","unstructured":"OpenConfig Project. 2015. OpenConfig. https:\/\/www.openconfig.net\/."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1002\/net.20371"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.02.001"},{"key":"e_1_3_2_1_29_1","unstructured":"Rob Shakir Xiao Wang Nathaniel Flath et al. 2017. gRIBI - gRPC Routing Information Base Interface. https:\/\/github.com\/openconfig\/gribi."},{"key":"e_1_3_2_1_30_1","unstructured":"Ratul Mahajan Ryan Beckett. 2020. Capturing the state of research on network verification. https:\/\/netverify.fun\/2-current-state-of-research\/."},{"key":"e_1_3_2_1_31_1","volume-title":"Netcastle: Network Infrastructure Testing At Scale. In 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24)","author":"Sherwood Rob","year":"2024","unstructured":"Rob Sherwood, Jinghao Shi, Ying Zhang, Neil Spring, Srikanth Sundaresan, Jasmeet Bagga, Prathyusha Peddi, Vineela Kukkadapu, Rashmi Shrivastava, Manikantan KR, Pavan Patil, Srikrishna Gopu, Varun Varadan, Ethan Shi, Hany Morsy, Yuting Bu, Renjie Yang, Rasmus J\u00f6nsson, Wei Zhang, Jesus Jussepen Arredondo, Diana Saha, and Sean Choi. 2024. Netcastle: Network Infrastructure Testing At Scale. In 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). USENIX Association, Santa Clara, CA, 993--10008. https:\/\/www.usenix.org\/conference\/nsdi24\/presentation\/sherwood"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2014.6974044"},{"key":"e_1_3_2_1_33_1","unstructured":"Richard Speed. 2021. AWS runs into IT Problems. https:\/\/www.theregister.com\/2021\/12\/15\/aws_down."},{"key":"e_1_3_2_1_34_1","unstructured":"Ronald C Suich and Richard L Patterson. 1990. How much redundancy: Some cost considerations including examples for spacecraft systems. Technical Report E-5592."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934874"},{"key":"e_1_3_2_1_36_1","unstructured":"Paul Tune and Matthew Roughan. 2013. Internet Traffic Matrices: A Primer. https:\/\/matthew.roughan.info\/papers\/traffic_matrix_sigcomm.pdf."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983990.2984012"},{"key":"e_1_3_2_1_38_1","unstructured":"WIRED. 2019. The Catch-22 that Broke the Internet. https:\/\/arstechnica.com\/information-technology\/2019\/06\/the-catch-22-that-broke-the-internet\/."}],"event":{"name":"HotNets '24: The 23rd ACM Workshop on Hot Topics in Networks","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Irvine CA USA","acronym":"HotNets '24"},"container-title":["Proceedings of the 23rd ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696348.3696874","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696348.3696874","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:07:21Z","timestamp":1755878841000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696348.3696874"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,18]]},"references-count":38,"alternative-id":["10.1145\/3696348.3696874","10.1145\/3696348"],"URL":"https:\/\/doi.org\/10.1145\/3696348.3696874","relation":{},"subject":[],"published":{"date-parts":[[2024,11,18]]},"assertion":[{"value":"2024-11-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}