{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T14:31:46Z","timestamp":1763389906680,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,18]],"date-time":"2024-11-18T00:00:00Z","timestamp":1731888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,18]]},"DOI":"10.1145\/3696348.3696892","type":"proceedings-article","created":{"date-parts":[[2024,11,11]],"date-time":"2024-11-11T00:20:52Z","timestamp":1731284452000},"page":"142-149","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["If Layering is useful, why not Sublayering?"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-9146-1342","authenticated-orcid":false,"given":"Rathin","family":"Singha","sequence":"first","affiliation":[{"name":"UCLA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-5599-8636","authenticated-orcid":false,"given":"Rishabh","family":"Iyer","sequence":"additional","affiliation":[{"name":"UC Berkeley"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-9409-6501","authenticated-orcid":false,"given":"Charles","family":"Liu","sequence":"additional","affiliation":[{"name":"UCLA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-8011-444X","authenticated-orcid":false,"given":"Caleb","family":"Terrill","sequence":"additional","affiliation":[{"name":"UCLA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2031-1514","authenticated-orcid":false,"given":"Todd","family":"Millstein","sequence":"additional","affiliation":[{"name":"UCLA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1357-7533","authenticated-orcid":false,"given":"Scott","family":"Shenker","sequence":"additional","affiliation":[{"name":"UC Berkeley"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8218-5701","authenticated-orcid":false,"given":"George","family":"Varghese","sequence":"additional","affiliation":[{"name":"UCLA"}]}],"member":"320","published-online":{"date-parts":[[2024,11,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472912"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3371934.3371963"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev51306.2021.00028"},{"key":"e_1_3_2_1_4_1","unstructured":"GL communications. 2024. HDLC Protocol Overview. https:\/\/www.gl.com\/Presentations\/HDLC-Protocol-Overview-Presentation.pdf."},{"key":"e_1_3_2_1_5_1","volume-title":"Modelling and verification of end-to-end transport protocols. Computer Networks (1976) 2, 4--5","author":"Danthine Andre","year":"1978","unstructured":"Andre Danthine and Joseph Bremer. 1978. Modelling and verification of end-to-end transport protocols. Computer Networks (1976) 2, 4--5 (1978), 381--395."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00039"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/363095.363143"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2823400"},{"key":"e_1_3_2_1_9_1","volume-title":"Design and Implementation of the lwIP TCP\/IP Stack","author":"Dunkels Adam","year":"2001","unstructured":"Adam Dunkels. 2001. Design and Implementation of the lwIP TCP\/IP Stack. Swedish Institute of Computer Science 2, 77 (2001)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282421"},{"key":"e_1_3_2_1_11_1","unstructured":"Bryan Ford and Janardhan R Iyengar. 2008. Breaking Up the Transport Logjam.. In HotNets. 85--90."},{"key":"e_1_3_2_1_12_1","volume-title":"John Day, Ibrahim Matta, Lubomir T Chitkushev, and Steve Bunch.","author":"Grasa Eduard","year":"2011","unstructured":"Eduard Grasa, Eleni Trouva, Patrick Phelan, Miguel Ponce de Leon, John Day, Ibrahim Matta, Lubomir T Chitkushev, and Steve Bunch. 2011. Design principles of the recursive internetwork architecture (RINA)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2462178"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815428"},{"key":"e_1_3_2_1_15_1","unstructured":"INRIA. 2024. The Coq Proof Assistant. https:\/\/coq.inria.fr\/."},{"key":"e_1_3_2_1_16_1","first-page":"493","article-title":"An Efficient Architecture for a TCP Offload Engine Based on Hardware\/Software Co-design","volume":"27","author":"Jang Hankook","year":"2011","unstructured":"Hankook Jang, Sang-Hwa Chung, Dong Kyue Kim, and Yun-Sung Lee. 2011. An Efficient Architecture for a TCP Offload Engine Based on Hardware\/Software Co-design. J. Inf. Sci. Eng. 27, 2 (2011), 493--509.","journal-title":"J. Inf. Sci. Eng."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302424.3303985"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/316188.316200"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098842"},{"key":"e_1_3_2_1_21_1","unstructured":"The Rust Programming Language. 2024. Understanding Ownership. https:\/\/doc.rust-lang.org\/book\/ch04-00-understanding-ownership.html."},{"key":"e_1_3_2_1_22_1","unstructured":"Rustan Leino and et al. 2024. The Dafny Programming and Verification Language. https:\/\/dafny.org\/."},{"key":"e_1_3_2_1_23_1","volume-title":"ERTS 2016: Embedded Real Time Software and Systems, 8th European Congress.","author":"Leroy Xavier","year":"2016","unstructured":"Xavier Leroy, Sandrine Blazy, Daniel K\u00e4stner, Bernhard Schommer, Markus Pister, and Christian Ferdinand. 2016. CompCert-a formally verified optimizing compiler. In ERTS 2016: Embedded Real Time Software and Systems, 8th European Congress."},{"key":"e_1_3_2_1_24_1","unstructured":"Jonathan Looney. 2019. CVE-2019-11478: TCP retransmission queue implementation in the Linux kernel can be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-11478."},{"key":"e_1_3_2_1_25_1","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Moon YoungGyoun","year":"2020","unstructured":"YoungGyoun Moon, SeungEon Lee, Muhammad Asim Jamshed, and KyoungSoo Park. 2020. {AccelTCP}: Accelerating network applications with stateful {TCP} offloading. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20). 77--92."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230553"},{"key":"e_1_3_2_1_27_1","volume-title":"9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12)","author":"Nowlan Michael F","year":"2012","unstructured":"Michael F Nowlan, Nabin Tiwari, Janardhan Iyengar, Syed Obaid Amin, and Bryan Ford. 2012. Fitting Square Pegs Through Round Pipes: Unordered Delivery {Wire-Compatible} with {TCP} and {TLS}. In 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12). 383--398."},{"key":"e_1_3_2_1_28_1","unstructured":"Larry L Peterson and Bruce S Davie. 2007. Computer networks: a systems approach. Morgan Kaufmann."},{"key":"e_1_3_2_1_29_1","unstructured":"J Postel. 1981. RFC 793. https:\/\/www.ietf.org\/rfc\/rfc793.txt."},{"volume-title":"Formal verification of TCP and T\/TCP. Ph. D. Dissertation","author":"Shawn Smith Mark Anthony","key":"e_1_3_2_1_30_1","unstructured":"Mark Anthony Shawn Smith. 1997. Formal verification of TCP and T\/TCP. Ph. D. Dissertation. Massachusetts Institute of Technology."},{"key":"e_1_3_2_1_31_1","volume-title":"Connection management in transport protocols. Computer Networks (1976) 2, 6","author":"Sunshine Carl A","year":"1978","unstructured":"Carl A Sunshine and Yogen K Datal. 1978. Connection management in transport protocols. Computer Networks (1976) 2, 6 (1978), 454--473."},{"key":"e_1_3_2_1_32_1","volume-title":"Timer-based mechanisms in reliable transport protocol connection management. Computer Networks (1976) 5, 1","author":"Watson Richard W","year":"1981","unstructured":"Richard W Watson. 1981. Timer-based mechanisms in reliable transport protocol connection management. Computer Networks (1976) 5, 1 (1981), 47--56."},{"key":"e_1_3_2_1_33_1","first-page":"2","article-title":"Fibre channel fundamentals","volume":"25","author":"Weimer Tom","year":"2003","unstructured":"Tom Weimer. 2003. Fibre channel fundamentals. Feb 25 (2003), 2.","journal-title":"Feb"},{"volume-title":"The implementation","author":"Wright Gary R","key":"e_1_3_2_1_34_1","unstructured":"Gary R Wright and W Richard Stevens. 1995. TCP\/IP illustrated, volume 2: The implementation. Addison-Wesley Professional."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2006.286280"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359647"},{"volume-title":"The Real Internet Architecture: Past, Present, and Future Evolution","author":"Zave Pamela","key":"e_1_3_2_1_37_1","unstructured":"Pamela Zave and Jennifer Rexford. 2024. The Real Internet Architecture: Past, Present, and Future Evolution. Princeton University Press."},{"key":"e_1_3_2_1_38_1","volume-title":"TCP-Fuzz: Detecting Memory and Semantic Bugs in TCP Stacks with Fuzzing. In 2021 USENIX Annual Technical Conference, USENIX ATC 2021","author":"Zou Yong-Hao","year":"2021","unstructured":"Yong-Hao Zou, Jia-Ju Bai, Jielong Zhou, Jianfeng Tan, Chenggang Qin, and Shi-Min Hu. 2021. TCP-Fuzz: Detecting Memory and Semantic Bugs in TCP Stacks with Fuzzing. In 2021 USENIX Annual Technical Conference, USENIX ATC 2021, July 14-16, 2021."}],"event":{"name":"HotNets '24: The 23rd ACM Workshop on Hot Topics in Networks","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Irvine CA USA","acronym":"HotNets '24"},"container-title":["Proceedings of the 23rd ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696348.3696892","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696348.3696892","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:07:33Z","timestamp":1755878853000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696348.3696892"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,18]]},"references-count":38,"alternative-id":["10.1145\/3696348.3696892","10.1145\/3696348"],"URL":"https:\/\/doi.org\/10.1145\/3696348.3696892","relation":{},"subject":[],"published":{"date-parts":[[2024,11,18]]},"assertion":[{"value":"2024-11-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}