{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T12:08:05Z","timestamp":1763381285885,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2431093","2415758","2415754"],"award-info":[{"award-number":["2431093","2415758","2415754"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,17]]},"DOI":"10.1145\/3772356.3772392","type":"proceedings-article","created":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T12:02:48Z","timestamp":1763380968000},"page":"411-418","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards Verifiable Network Telemetry without Special Purpose Hardware"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7473-9663","authenticated-orcid":false,"given":"Jaechan","family":"An","sequence":"first","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4413-6060","authenticated-orcid":false,"given":"Zeying","family":"Zhu","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8332-2368","authenticated-orcid":false,"given":"Ian","family":"Miers","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9119-1679","authenticated-orcid":false,"given":"Zaoxing","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,11,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2014. T-Mobile forced to stop hiding slow speeds from throttled customers. https:\/\/arstechnica.com\/information-technology\/2014\/11\/t-mobile-forced-to-stop-hiding-slow-speeds-from-throttled-customers\/."},{"key":"e_1_3_2_1_2_1","unstructured":"2025. StarkWare sets new proving record. https:\/\/starkware.co\/blog\/starkware-new-proving-record\/"},{"key":"e_1_3_2_1_3_1","volume-title":"USENIX Symposium on Networked Systems Design and Implementation (NSDI). 719\u2013741","author":"Agarwal Anup","year":"2022","unstructured":"Anup Agarwal, Zaoxing Liu, and Srinivasan Seshan. 2022. {HeteroSketch}: Coordinating network-wide monitoring in heterogeneous and dynamic networks. In USENIX Symposium on Networked Systems Design and Implementation (NSDI). 719\u2013741."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1921168.1921170"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44381-1_16"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3651890.3672261"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.23065"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Benoit Claise. 2004. Cisco systems netflow services export version 9. Technical Report.","DOI":"10.17487\/rfc3954"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_37"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/22145.22178"},{"key":"e_1_3_2_1_12_1","volume-title":"35th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt) (Lecture Notes in Computer Science","author":"Groth Jens","unstructured":"Jens Groth. 2016. On the Size of Pairing-Based Non-interactive Arguments. In 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt) (Lecture Notes in Computer Science, Vol. 9666), Marc Fischlin and Jean-S\u00e9bastien Coron (Eds.). Springer, 305\u2013326."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366709"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.14778\/3594512.3594513"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342076"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934906"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815691"},{"key":"e_1_3_2_1_18_1","unstructured":"Srinath Setty Sebastian Angel Trinabh Gupta and Jonathan Lee. 2018. Proving the correct execution of concurrent services in zero-knowledge. Cryptology ePrint Archive Paper 2018\/907. https:\/\/eprint.iacr.org\/2018\/907"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658972"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2004.1281630"},{"key":"e_1_3_2_1_21_1","unstructured":"RISC Zero. [n. d.]. RISC Zero. https:\/\/risczero.com\/ year =2023."},{"key":"e_1_3_2_1_22_1","volume-title":"The Network and Distributed System Security Symposium (NDSS).","author":"Zhang Xin","year":"2012","unstructured":"Xin Zhang, Zongwei Zhou, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Adrian Perrig, and Patrick Tague. 2012. Shortmac: efficient data-plane fault localization.. In The Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_23_1","volume-title":"USENIX Symposium on Networked Systems Design and Implementation (NSDI).","author":"Zhang Yinda","year":"2024","unstructured":"Yinda Zhang, Peiqing Chen, and Zaoxing Liu. 2024. OctoSketch: Enabling Real-Time, Continuous Network Monitoring over Multiple Cores.. In USENIX Symposium on Networked Systems Design and Implementation (NSDI)."},{"key":"e_1_3_2_1_24_1","unstructured":"Yupeng Zhang Daniel Genkin Jonathan Katz Dimitrios Papadopoulos and Charalampos Papamanthou. 2017. A Zero-Knowledge Version of vSQL. Cryptology ePrint Archive Paper 2017\/1146. https:\/\/eprint.iacr.org\/2017\/1146"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472892"}],"event":{"name":"HotNets '25: 24th ACM Workshop on Hot Topics in Networks","location":"UMD Campus College Park MD USA","acronym":"HotNets '25","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 24th ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3772356.3772392","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T12:03:58Z","timestamp":1763381038000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3772356.3772392"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,17]]},"references-count":25,"alternative-id":["10.1145\/3772356.3772392","10.1145\/3772356"],"URL":"https:\/\/doi.org\/10.1145\/3772356.3772392","relation":{},"subject":[],"published":{"date-parts":[[2025,11,17]]},"assertion":[{"value":"2025-11-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}