{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T00:43:49Z","timestamp":1760057029811,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","funder":[{"name":"Hunan Provincial Natural Science Foundation for Outstanding Youth","award":["No.2023JJ20055"],"award-info":[{"award-number":["No.2023JJ20055"]}]},{"DOI":"10.13039\/501100006374","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No.62472433\/No.62302510"],"award-info":[{"award-number":["No.62472433\/No.62302510"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,9,8]]},"DOI":"10.1145\/3750022.3750453","type":"proceedings-article","created":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T13:46:39Z","timestamp":1755611199000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Forwarding-Path-Aware Sampling Strategy for Config2Spec"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9783-388X","authenticated-orcid":false,"given":"Shangsen","family":"Li","sequence":"first","affiliation":[{"name":"National Key Laboratory of Information Systems, Engineering, National University of Defense Technology, Changsha, Hunan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4886-9974","authenticated-orcid":false,"given":"Lailong","family":"Luo","sequence":"additional","affiliation":[{"name":"National Key Laboratory of Information Systems, Engineering, National University of Defense Technology, Changsha, Hunan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-2810-5017","authenticated-orcid":false,"given":"Changhao","family":"Qiu","sequence":"additional","affiliation":[{"name":"National Key Laboratory of Information Systems, Engineering, National University of Defense Technology, Changsha, Hunan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0355-0545","authenticated-orcid":false,"given":"Bangbang","family":"Ren","sequence":"additional","affiliation":[{"name":"National Key Laboratory of Information Systems, Engineering, National University of Defense Technology, Changsha, Hunan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4894-5540","authenticated-orcid":false,"given":"Deke","family":"Guo","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, Guangdong, China"}]}],"member":"320","published-online":{"date-parts":[[2025,9,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"On-Device Verification. In Proc. of SIGCOMM","author":"Xiang Qiao","year":"2023","unstructured":"Qiao Xiang, Chenyang Huang, Ridi Wen, Yuxin Wang, Xiwen Fan, Zaoxing Liu, Linghe Kong, Dennis Duan, Franck Le, and Wei Sun. 2023. Beyond a Centralized Verifier: Scaling Data Plane Checking via Distributed, On-Device Verification. In Proc. of SIGCOMM, New York, NY, USA, 10-14 September 2023. ACM, 152--166."},{"key":"e_1_3_2_1_2_1","volume-title":"NetComplete: Practical Network-Wide Configuration Synthesis with Autocompletion. In Proc. of USENIX NSDI","author":"El-Hassany Ahmed","year":"2018","unstructured":"Ahmed El-Hassany, Petar Tsankov, Laurent Vanbever, and Martin T. Vechev. 2018. NetComplete: Practical Network-Wide Configuration Synthesis with Autocompletion. In Proc. of USENIX NSDI, Renton, WA, USA, April 9-11, 2018. USENIX Association, 579--594."},{"key":"e_1_3_2_1_3_1","volume-title":"Proc. of USENIX NSDI","author":"Liu Jianmin","year":"2025","unstructured":"Jianmin Liu, Li Chen, Dan Li, and Yukai Miao. 2025. CEGS: Configuration Example Generalizing Synthesizer. In Proc. of USENIX NSDI, Philadelphia, PA, USA, April 28-30, 2025. USENIX Association, 1327--1347."},{"key":"e_1_3_2_1_4_1","volume-title":"Diagnosing and Repairing Distributed Routing Configurations Using Selective Symbolic Simulation. CoRR abs\/2409.20306","author":"Yang Rulan","year":"2024","unstructured":"Rulan Yang, Hanyang Shao, Gao Han, Ziyi Wang, Xing Fang, Lizhao You, Qiao Xiang, Linghe Kong, Ruiting Zhou, and Jiwu Shu. 2024. Diagnosing and Repairing Distributed Routing Configurations Using Selective Symbolic Simulation. CoRR abs\/2409.20306 (2024)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3696348.3696895"},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. of USENIX NSDI","author":"Zhang Peng","year":"2022","unstructured":"Peng Zhang, Aaron Gember-Jacobson, Yueshang Zuo, Yuhao Huang, Xu Liu, and Hao Li. 2022. Differential Network Analysis. In Proc. of USENIX NSDI, Renton, WA, USA, April 4-6, 2022. USENIX Association, 601--615."},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. of 17th USENIX NSDI","author":"Birkner R\u00fcdiger","year":"2020","unstructured":"R\u00fcdiger Birkner, Dana Drachsler-Cohen, Laurent Vanbever, and Martin T. Vechev. 2020. Config2Spec: Mining Network Specifications from Network Configurations. In Proc. of 17th USENIX NSDI, Santa Clara, CA, USA, February 25-27, 2020. USENIX Association, 969--984."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP59255.2023.10355598"},{"key":"e_1_3_2_1_9_1","volume-title":"Proc. of USENIX NSDI 2020","author":"Abhashkumar Anubhavnidhi","year":"2020","unstructured":"Anubhavnidhi Abhashkumar, Aaron Gember-Jacobson, and Aditya Akella. 2020. Tiramisu: Fast Multilayer Network Verification. In Proc. of USENIX NSDI 2020, Santa Clara, CA, USA, February 25-27, 2020. USENIX Association, 201--219."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544264"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-27481-7_7"},{"key":"e_1_3_2_1_12_1","volume-title":"Proc. of USENIX NSDI","author":"Fogel Ari","year":"2015","unstructured":"Ari Fogel, Stanley Fung, Luis Pedrosa, Meg Walraed-Sullivan, Ramesh Govindan, Ratul Mahajan, and Todd D. Millstein. 2015. A General Approach to Network Configuration Analysis. In Proc. of USENIX NSDI, Oakland, CA, USA, May 4-6, 2015. USENIX Association, 469--483."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098834"},{"key":"e_1_3_2_1_14_1","unstructured":"nsg-ethz. 2019. config2spec Mining Network Specifications from Network Configurations. https:\/\/github.com\/nsg-ethz\/config2spec Last accessed on 2025-6-20."},{"key":"e_1_3_2_1_15_1","first-page":"1","article-title":"OSPF Version 2","volume":"2328","author":"Moy John","year":"1998","unstructured":"John Moy. 1998. OSPF Version 2. RFC 2328 (1998), 1--244.","journal-title":"RFC"},{"key":"e_1_3_2_1_16_1","first-page":"1","article-title":"A Border Gateway Protocol 4 (BGP-4)","volume":"4271","author":"Rekhter Yakov","year":"2006","unstructured":"Yakov Rekhter, Tony Li, and Susan Hares. 2006. A Border Gateway Protocol 4 (BGP-4). RFC 4271 (2006), 1--104.","journal-title":"RFC"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM52122.2024.10621215"},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. of USENIX NSDI","author":"Li Zechun","year":"2025","unstructured":"Zechun Li, Peng Zhang, Yichi Zhang, and Hongkun Yang. 2025. NDD: A Decision Diagram for Network Verification. In Proc. of USENIX NSDI, Philadelphia, PA, USA, April 28-30, 2025. USENIX Association, 237--258."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373360.3380831"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft51509.2021.9492552"},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. of USENIX NSDI","author":"Siva Kesava","year":"2020","unstructured":"Siva Kesava Reddy K., Alan Tang, Ryan Beckett, Karthick Jayaraman, Todd D. Millstein, Yuval Tamir, and George Varghese. 2020. Finding Network Misconfigurations by Automatic Template Inference. In Proc. of USENIX NSDI, Santa Clara, CA, USA, February 25-27, 2020. USENIX Association, 999--1013."},{"key":"e_1_3_2_1_22_1","volume-title":"Proc. of NetVerify@lCNP","author":"Chauhan Jyotirmay","year":"2021","unstructured":"Jyotirmay Chauhan, Devon Lee, Emily Yu, and Aaron Gember-Jacobson. 2021. Detecting Configuration Errors Via Pattern Mining. In Proc. of NetVerify@lCNP, Dallas, TX, USA. IEEE."},{"key":"e_1_3_2_1_23_1","volume-title":"Proc. of the IMC","author":"Benson Theophilus","year":"2009","unstructured":"Theophilus Benson, Aditya Akella, and David A. Maltz. 2009. Mining policies from enterprise network configuration. In Proc. of the IMC, Chicago, Illinois, USA, November 4-6, 2009. ACM, 136--142."},{"key":"e_1_3_2_1_24_1","volume-title":"Proc. of NSDI","author":"Birkner R\u00fcdiger","year":"2018","unstructured":"R\u00fcdiger Birkner, Dana Drachsler-Cohen, Laurent Vanbever, and Martin T. Vechev. 2018. Net2Text: Query-Guided Summarization of Network Forwarding Behaviors. In Proc. of NSDI, Renton, WA, USA, April 9-11, 2018. USENIX Association, 609--623."}],"event":{"name":"SIGCOMM '25: ACM SIGCOMM 2025 Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Coimbra Portugal","acronym":"SIGCOMM '25"},"container-title":["Proceedings of the 2nd Workshop on Formal Methods Aided Network Operation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3750022.3750453","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T14:12:01Z","timestamp":1760019121000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3750022.3750453"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,8]]},"references-count":24,"alternative-id":["10.1145\/3750022.3750453","10.1145\/3750022"],"URL":"https:\/\/doi.org\/10.1145\/3750022.3750453","relation":{},"subject":[],"published":{"date-parts":[[2025,9,8]]},"assertion":[{"value":"2025-09-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}