{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T00:43:47Z","timestamp":1760057027583,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,9,8]]},"DOI":"10.1145\/3750022.3750462","type":"proceedings-article","created":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T13:46:39Z","timestamp":1755611199000},"page":"52-54","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Poster: High-Performance Centralized Parallel Data-Plane Verification for Hyper-Scale DCNs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-5503-0463","authenticated-orcid":false,"given":"Peng","family":"Peng","sequence":"first","affiliation":[{"name":"School of Informatics, Xiamen University, China, ByteDance, China and ByteDance"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-3151-9231","authenticated-orcid":false,"given":"Xun","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Informatics, Xiamen University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-9751-1657","authenticated-orcid":false,"given":"Zhengtao","family":"Shen","sequence":"additional","affiliation":[{"name":"ByteDance, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-3567-6344","authenticated-orcid":false,"given":"Feiyang","family":"Ding","sequence":"additional","affiliation":[{"name":"School of Informatics, Xiamen University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-9491-2524","authenticated-orcid":false,"given":"Jiawei","family":"Chen","sequence":"additional","affiliation":[{"name":"ByteDance, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9672-7938","authenticated-orcid":false,"given":"Lizhao","family":"You","sequence":"additional","affiliation":[{"name":"School of Informatics, Xiamen University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4884-0848","authenticated-orcid":false,"given":"Weirong","family":"Jiang","sequence":"additional","affiliation":[{"name":"ByteDance, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-2855-4245","authenticated-orcid":false,"given":"Yongping","family":"Tang","sequence":"additional","affiliation":[{"name":"ByteDance, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2012-4658","authenticated-orcid":false,"given":"Feng","family":"Luo","sequence":"additional","affiliation":[{"name":"ByteDance, China"}]}],"member":"320","published-online":{"date-parts":[[2025,9,8]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"200","author":"Jayaraman K.","year":"2019","unstructured":"K. Jayaraman, N. Bj\u00f8rner, J. Padhye, A. Agrawal, A. Bhargava, P.-A. C. Bissonnette, S. Foster, A. Helwer, M. Kasten, I. Lee et al., \"Validating datacenters at scale,\" in ACM SIGCOMM, 2019, pp. 200--213.","journal-title":"ACM SIGCOMM"},{"key":"e_1_3_2_1_2_1","first-page":"81","volume-title":"Scaling data plane verification via parallelization,\" in ACM APNET","author":"Wen S.","year":"2024","unstructured":"S. Wen, A. Abhashkumar, C. Zhao, and W. Jiang, \"Scaling data plane verification via parallelization,\" in ACM APNET, 2024, pp. 81--87."},{"unstructured":"Cisco Application Policy Infrastructure Controller (APIC). https:\/\/www.cisco.com\/c\/en\/us\/products\/cloud-systems-management\/application-policy-infrastructure-controller-apic\/index.html.","key":"e_1_3_2_1_3_1"},{"issue":"1","key":"e_1_3_2_1_4_1","first-page":"423","volume":"30","author":"You L.","year":"2022","unstructured":"L. You, J. Zhang, Y. Jin, H. Tang, and X. Li, \"Fast configuration change impact analysis for network overlay data center networks,\" IEEE\/ACM Transactions on Networking, vol. 30, no. 1, pp. 423--436, 2022.","journal-title":"\"Fast configuration change impact analysis for network overlay data center networks,\" IEEE\/ACM Transactions on Networking"},{"key":"e_1_3_2_1_5_1","first-page":"2170","volume-title":"On static reachability analysis of ip networks,\" in IEEE INFOCOM","author":"Xie G.","year":"2005","unstructured":"G. Xie, J. Zhan, D. Maltz, H. Zhang, A. Greenberg, G. Hjalmtysson, and J. Rexford, \"On static reachability analysis of ip networks,\" in IEEE INFOCOM, 2005, pp. 2170--2183."},{"key":"e_1_3_2_1_6_1","first-page":"290","volume-title":"Debugging the data plane with anteater,\" in ACM SIGCOMM","author":"Mai H.","year":"2011","unstructured":"H. Mai, A. Khurshid, R. Agarwal, M. Caesar, P. B. Godfrey, and S. T. King, \"Debugging the data plane with anteater,\" in ACM SIGCOMM, 2011, pp. 290--301."},{"key":"e_1_3_2_1_7_1","first-page":"113","author":"Kazemian P.","year":"2012","unstructured":"P. Kazemian, G. Varghese, and N. McKeown, \"Header space analysis: Static checking for networks.\" in USENIX NSDI, 2012, pp. 113--126.","journal-title":"USENIX NSDI"},{"key":"e_1_3_2_1_8_1","first-page":"15","volume-title":"Veriflow: Verifying network-wide invariants in real time,\" in USENIX NSDI","author":"Khurshid A.","year":"2013","unstructured":"A. Khurshid, X. Zou, W. Zhou, M. Caesar, and P. B. Godfrey, \"Veriflow: Verifying network-wide invariants in real time,\" in USENIX NSDI, 2013, pp. 15--27."},{"issue":"2","key":"e_1_3_2_1_9_1","first-page":"887","volume":"24","author":"Yang H.","year":"2015","unstructured":"H. Yang and S. S. Lam, \"Real-time verification of network properties using atomic predicates,\" IEEE\/ACM Transactions on Networking, vol. 24, no. 2, pp. 887--900, 2015.","journal-title":"\"Real-time verification of network properties using atomic predicates,\" IEEE\/ACM Transactions on Networking"},{"key":"e_1_3_2_1_10_1","first-page":"99","volume-title":"Real time network policy checking using header space analysis,\" in USENIX NSDI","author":"Kazemian P.","year":"2013","unstructured":"P. Kazemian, M. Chang, H. Zeng, G. Varghese, N. McKeown, and S. Whyte, \"Real time network policy checking using header space analysis,\" in USENIX NSDI, 2013, pp. 99--111."},{"key":"e_1_3_2_1_11_1","first-page":"469","volume-title":"A general approach to network configuration analysis,\" in USENIX NSDI","author":"Fogel A.","year":"2015","unstructured":"A. Fogel, S. Fung, L. Pedrosa, M. Walraed-Sullivan, R. Govindan, R. Mahajan, and T. Millstein, \"A general approach to network configuration analysis,\" in USENIX NSDI, 2015, pp. 469--483."},{"unstructured":"Batfish. https:\/\/github.com\/batfish\/batfish.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","first-page":"49","volume-title":"ddnf: An efficient data structure for header spaces,\" in HVC","author":"Bj\u00f8rner N.","year":"2016","unstructured":"N. Bj\u00f8rner, G. Juniwal, R. Mahajan, S. A. Seshia, and G. Varghese, \"ddnf: An efficient data structure for header spaces,\" in HVC, 2016, pp. 49--64."},{"key":"e_1_3_2_1_14_1","first-page":"735","volume-title":"Delta-net: Real-time network verification using atoms,\" in USENIX NSDI","author":"Horn A.","year":"2017","unstructured":"A. Horn, A. Kheradmand, and M. Prasad, \"Delta-net: Real-time network verification using atoms,\" in USENIX NSDI, 2017, pp. 735--749."},{"key":"e_1_3_2_1_15_1","first-page":"1","volume-title":"A precise and expressive lattice-theoretical framework for efficient network verification,\" in IEEE ICNP","author":"Horn A.","year":"2019","unstructured":"A. Horn, A. Kheradmand, and M. R. Prasad, \"A precise and expressive lattice-theoretical framework for efficient network verification,\" in IEEE ICNP, 2019, pp. 1--12."},{"key":"e_1_3_2_1_16_1","first-page":"241","volume-title":"Apkeep: Realtime verification for real networks,\" in USENIX NSDI","author":"Zhang P.","year":"2020","unstructured":"P. Zhang, X. Liu, H. Yang, N. Kang, Z. Gu, and H. Li, \"Apkeep: Realtime verification for real networks,\" in USENIX NSDI, 2020, pp. 241--255."},{"key":"e_1_3_2_1_17_1","first-page":"314","volume-title":"Flash: fast, consistent data plane verification for large-scale network settings,\" in ACM SIGCOMM","author":"Guo D.","year":"2022","unstructured":"D. Guo, S. Chen, K. Gao, Q. Xiang, Y. Zhang, and Y. R. Yang, \"Flash: fast, consistent data plane verification for large-scale network settings,\" in ACM SIGCOMM, 2022, pp. 314--335."},{"key":"e_1_3_2_1_18_1","first-page":"122","volume-title":"Lessons from the evolution of the batfish configuration analysis tool,\" in ACM SIGCOMM","author":"Brown M.","year":"2023","unstructured":"M. Brown, A. Fogel, D. Halperin, V. Heorhiadi, R. Mahajan, and T. Millstein, \"Lessons from the evolution of the batfish configuration analysis tool,\" in ACM SIGCOMM, 2023, pp. 122--135."},{"key":"e_1_3_2_1_19_1","first-page":"87","volume-title":"Libra: Divide and conquer to verify forwarding tables in huge networks,\" in USENIX NSDI","author":"Zeng H.","year":"2014","unstructured":"H. Zeng, S. Zhang, F. Ye, V. Jeyakumar, M. Ju, J. Liu, N. McKeown, and A. Vahdat, \"Libra: Divide and conquer to verify forwarding tables in huge networks,\" in USENIX NSDI, 2014, pp. 87--99."},{"key":"e_1_3_2_1_20_1","volume-title":"Fine-grained distributed data plane verification with intent-based slicing,\" arXiv preprint arXiv:2405.20982","author":"Chou K.-Y.","year":"2024","unstructured":"K.-Y. Chou, S. Prabhu, G. Subramanian, W. Zhou, A. Nayyar, B. Godfrey, and M. Caesar, \"Fine-grained distributed data plane verification with intent-based slicing,\" arXiv preprint arXiv:2405.20982, 2024."},{"key":"e_1_3_2_1_21_1","first-page":"152","volume-title":"Beyond a centralized verifier: Scaling data plane checking via distributed, on-device verification,\" in ACM SIGCOMM","author":"Xiang Q.","year":"2023","unstructured":"Q. Xiang, C. Huang, R. Wen, Y. Wang, X. Fan, Z. Liu, L. Kong, D. Duan, F. Le, and W. Sun, \"Beyond a centralized verifier: Scaling data plane checking via distributed, on-device verification,\" in ACM SIGCOMM, 2023, pp. 152--166."},{"key":"e_1_3_2_1_22_1","first-page":"1350","author":"Ma M.","year":"2025","unstructured":"M. Ma, Y. Zhang, J. Wang, B. He, C. Zhao, Q. Qi, Z. Zhuang, H. Sun, L. Guo, Y. Guo et al., \"Atlas: Towards real-time verification in large-scale networks via a native distributed architecture,\" in ACM EuroSys, 2025, pp. 1350--1364.","journal-title":"ACM EuroSys"},{"unstructured":"Sybila\/biodivine-lib-bdd. https:\/\/github.com\/sybila\/biodivine-lib-bdd.","key":"e_1_3_2_1_23_1"},{"unstructured":"JDD: Java BDD package. https:\/\/bitbucket.org\/vahidi\/jdd\/src\/master\/.","key":"e_1_3_2_1_24_1"}],"event":{"sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"acronym":"SIGCOMM '25","name":"SIGCOMM '25: ACM SIGCOMM 2025 Conference","location":"Coimbra Portugal"},"container-title":["Proceedings of the 2nd Workshop on Formal Methods Aided Network Operation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3750022.3750462","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T14:12:02Z","timestamp":1760019122000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3750022.3750462"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,8]]},"references-count":24,"alternative-id":["10.1145\/3750022.3750462","10.1145\/3750022"],"URL":"https:\/\/doi.org\/10.1145\/3750022.3750462","relation":{},"subject":[],"published":{"date-parts":[[2025,9,8]]},"assertion":[{"value":"2025-09-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}