{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T12:07:57Z","timestamp":1763381277250,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-1942219","CNS-2106751","CNS-2107147","CNS-2214272"],"award-info":[{"award-number":["CNS-1942219","CNS-2106751","CNS-2107147","CNS-2214272"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100016682","name":"VMware","doi-asserted-by":"publisher","award":["Early Career Faculty Grant"],"award-info":[{"award-number":["Early Career Faculty Grant"]}],"id":[{"id":"10.13039\/100016682","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,17]]},"DOI":"10.1145\/3772356.3772397","type":"proceedings-article","created":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T12:02:48Z","timestamp":1763380968000},"page":"300-307","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Remote Direct Code Execution"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9215-4298","authenticated-orcid":false,"given":"Yibo","family":"Huang","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-9328-3205","authenticated-orcid":false,"given":"Yiming","family":"Qiu","sequence":"additional","affiliation":[{"name":"The University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-3365-1333","authenticated-orcid":false,"given":"Daqian","family":"Ding","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4944-8706","authenticated-orcid":false,"given":"Patrick Tser Jern","family":"Kon","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9312-9353","authenticated-orcid":false,"given":"Yiwen","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-7578-3137","authenticated-orcid":false,"given":"Yuzhou","family":"Mao","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-2722-6996","authenticated-orcid":false,"given":"Archit","family":"Bhatnagar","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0884-6740","authenticated-orcid":false,"given":"Mosharaf","family":"Chowdhury","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8253-7714","authenticated-orcid":false,"given":"Srinivas","family":"Devadas","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, Massachusetts, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-6163-0569","authenticated-orcid":false,"given":"Jiarong","family":"Xing","sequence":"additional","affiliation":[{"name":"Rice University, Houston, Texas, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-8326-8124","authenticated-orcid":false,"given":"Ang","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, Michigan, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,11,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"BPF selftest notes. https:\/\/github.com\/torvalds\/linux\/tree\/master\/tools\/testing\/selftests\/bpf\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Envoy circuit breaker. https:\/\/www.envoyproxy.io\/docs\/envoy\/latest\/api-v3\/config\/cluster\/v3\/circuit_breaker.proto\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Envoy filter dependency. https:\/\/www.envoyproxy.io\/docs\/envoy\/latest\/api-v3\/extensions\/filters\/common\/dependency\/v3\/dependency.proto\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Envoy resource updates. https:\/\/www.envoyproxy.io\/docs\/envoy\/latest\/api-docs\/xds_protocol\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Envoy update issue. https:\/\/github.com\/envoyproxy\/envoy\/issues\/13009\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Gcp canary update. https:\/\/cloud.google.com\/service-mesh\/docs\/revisions-overview."},{"key":"e_1_3_2_1_7_1","unstructured":"Istio pilot agent. https:\/\/istio.io\/latest\/docs\/reference\/commands\/pilot-agent\/."},{"key":"e_1_3_2_1_8_1","unstructured":"Istio traffic management. https:\/\/istio.io\/latest\/docs\/ops\/best-practices\/traffic-management."},{"key":"e_1_3_2_1_9_1","unstructured":"Kubernetes. https:\/\/kubernetes.io\/."},{"key":"e_1_3_2_1_10_1","unstructured":"Istio sidecar consuming high cpu istio 1.30-1.3.3 2019. https:\/\/github.com\/istio\/istio\/issues\/18229."},{"key":"e_1_3_2_1_11_1","unstructured":"Istio 1.5 proxy sidecar crash on wasm filters that made a httpcall to an endpoint without response body 2020. https:\/\/github.com\/istio\/istio\/issues\/23890."},{"key":"e_1_3_2_1_12_1","volume-title":"clusters","year":"2022","unstructured":"Proxy startup stalled by warming eds clusters, 2022. https:\/\/github.com\/istio\/istio\/issues\/38709."},{"key":"e_1_3_2_1_13_1","volume-title":"Enhancing application performance","year":"2024","unstructured":"Exploring webassembly (wasm): Enhancing application performance, 2024. https:\/\/medium.com\/@harsh.manvar111\/exploring-webassembly-wasm-enhancing-application-performance-3233018b85e3."},{"key":"e_1_3_2_1_14_1","unstructured":"Kata containers 2024. https:\/\/github.com\/kata-containers\/kata-containers."},{"key":"e_1_3_2_1_15_1","volume-title":"observability, security","year":"2025","unstructured":"ebpf-based networking, observability, security. 2025. https:\/\/cilium.io\/."},{"key":"e_1_3_2_1_16_1","unstructured":"Userspace\/gpu ebpf vm with llvm jit\/aot compiler 2025. https:\/\/github.com\/eunomia-bpf\/llvmbpf."},{"key":"e_1_3_2_1_17_1","volume-title":"Platform support","year":"2025","unstructured":"Wasmtime: Platform support, 2025. https:\/\/docs.wasmtime.dev\/stability-platform-support.html."},{"key":"e_1_3_2_1_18_1","volume-title":"Improving istio propagation delay: A case study in service mesh performance optimization","year":"2023","unstructured":"Airbnb. Improving istio propagation delay: A case study in service mesh performance optimization, 2023. https:\/\/medium.com\/airbnb-engineering\/improving-istio-propagation-delay-d4da9b5b9f90."},{"key":"e_1_3_2_1_19_1","volume-title":"User-defined functions in polardb","year":"2023","unstructured":"Alibaba. User-defined functions in polardb, 2023. https:\/\/www.alibabacloud.com\/help\/en\/polardb\/polardb-for-xscale\/udfs."},{"key":"e_1_3_2_1_20_1","first-page":"67","volume-title":"20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23)","author":"Bai W.","year":"2023","unstructured":"W. Bai, S. S. Abdeen, A. Agrawal, K. K. Attre, P. Bahl, A. Bhagat, G. Bhaskara, T. Brokhman, L. Cao, A. Cheema, et al. Empowering azure storage with {RDMA}. In 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23), pages 49\u201367, 2023."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3651890.3672227"},{"key":"e_1_3_2_1_22_1","first-page":"328","volume-title":"2023 USENIX Annual Technical Conference (USENIX ATC 23)","author":"Brooker M.","year":"2023","unstructured":"M. Brooker, M. Danilov, C. Greenwood, and P. Piwonka. On-demand container loading in {AWS} lambda. In 2023 USENIX Annual Technical Conference (USENIX ATC 23), pages 315\u2013328, 2023."},{"key":"e_1_3_2_1_23_1","volume-title":"User-defined functions in google bigquery","author":"Cloud G.","year":"2024","unstructured":"G. Cloud. User-defined functions in google bigquery, 2024. https:\/\/cloud.google.com\/bigquery\/docs\/user-defined-functions."},{"key":"e_1_3_2_1_24_1","volume-title":"community. Proxy readiness probe failurethreshold is too high","author":"I.","year":"2021","unstructured":"I. community. Proxy readiness probe failurethreshold is too high, 2021. https:\/\/github.com\/istio\/istio\/issues\/29727."},{"key":"e_1_3_2_1_25_1","volume-title":"community. Userspace ebpf vm","author":"I.","year":"2025","unstructured":"I. community. Userspace ebpf vm, 2025. https:\/\/github.com\/iovisor\/ubpf."},{"key":"e_1_3_2_1_26_1","volume-title":"100x faster bridge between apache spark and r with user-defined functions on databricks","year":"2018","unstructured":"Databricks. 100x faster bridge between apache spark and r with user-defined functions on databricks, 2018. https:\/\/www.databricks.com\/blog\/2018\/08\/15\/100x-faster-bridge-between-spark-and-r-with-user-defined-functions-on-databricks.html."},{"key":"e_1_3_2_1_27_1","volume-title":"Introducing sql user-defined functions","year":"2021","unstructured":"Databricks. Introducing sql user-defined functions, 2021. https:\/\/www.databricks.com\/blog\/2021\/10\/20\/introducing-sql-user-defined-functions.html."},{"key":"e_1_3_2_1_28_1","volume-title":"User-defined functions (udfs) in unity catalog","year":"2025","unstructured":"Databricks. User-defined functions (udfs) in unity catalog, 2025. https:\/\/docs.databricks.com\/aws\/en\/udf\/unity-catalog."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3609021.3609306"},{"key":"e_1_3_2_1_30_1","volume-title":"Envoy filter chain mismatch","year":"2025","unstructured":"DrDroid. Envoy filter chain mismatch, 2025. https:\/\/drdroid.io\/stack-diagnosis\/envoy-filter-chain-mismatch."},{"key":"e_1_3_2_1_31_1","volume-title":"Dynamically program the kernel for efficient networking, observability, tracing, and security","year":"2025","unstructured":"eBPF.io authors. Dynamically program the kernel for efficient networking, observability, tracing, and security, 2025. https:\/\/ebpf.io\/."},{"key":"e_1_3_2_1_32_1","first-page":"649","volume-title":"19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22)","author":"Feng Y.","year":"2022","unstructured":"Y. Feng, Z. Chen, H. Song, W. Xu, J. Li, Z. Zhang, T. Yun, Y. Wan, and B. Liu. Enabling in-situ programmability in network data plane: From architecture to language. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22), pages 635\u2013649, 2022."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134037"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.14778\/3704965.3704966"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3588195.3592995"},{"key":"e_1_3_2_1_36_1","volume-title":"What is v8?","year":"2025","unstructured":"Google. What is v8?, 2025. https:\/\/v8.dev\/."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3281411.3281443"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.06.048"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2948009"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555050.3569128"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3735358.3735359"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3725783.3764389"},{"key":"e_1_3_2_1_43_1","volume-title":"context deadline exceeded (client.timeout exceeded while awaiting headers)","year":"2022","unstructured":"Istio. context deadline exceeded (client.timeout exceeded while awaiting headers), 2022. https:\/\/github.com\/istio\/istio\/issues\/40758."},{"key":"e_1_3_2_1_44_1","volume-title":"Why choose istio?","year":"2025","unstructured":"Istio. Why choose istio?, 2025. https:\/\/istio.io\/latest\/docs\/overview\/why-choose-istio\/."},{"key":"e_1_3_2_1_45_1","volume-title":"Programmable system call security with ebpf. arXiv preprint arXiv:2302.10366","author":"Jia J.","year":"2023","unstructured":"J. Jia, Y. Zhu, D. Williams, A. Arcangeli, C. Canella, H. Franke, T. Feldman-Fitzthum, D. Skarlatos, D. Gruss, and T. Xu. Programmable system call security with ebpf. arXiv preprint arXiv:2302.10366, 2023."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446701"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626299"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3603269.3604827"},{"key":"e_1_3_2_1_49_1","first-page":"6060","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Liu H.","year":"2023","unstructured":"H. Liu, J. Xing, Y. Huang, D. Zhuo, S. Devadas, and A. Chen. Remote direct memory introspection. In 32nd USENIX Security Symposium (USENIX Security 23), pages 6043\u20136060, 2023."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3472883.3487003"},{"key":"e_1_3_2_1_51_1","volume-title":"User-defined functions (udfs) in unity catalog","year":"2023","unstructured":"Microsoft. User-defined functions (udfs) in unity catalog, 2023. https:\/\/docs.azure.cn\/en-us\/cosmos-db\/nosql\/query\/udfs."},{"key":"e_1_3_2_1_52_1","unstructured":"Q. Monnet. Rust virtual machine and jit compiler for ebpf programs 2025. https:\/\/github.com\/qmonnet\/rbpf."},{"key":"e_1_3_2_1_53_1","volume-title":"Doca argus service guide","year":"2025","unstructured":"Nvidia. Doca argus service guide, 2025. https:\/\/docs.nvidia.com\/doca\/sdk\/doca+argus+service+guide\/index.html."},{"key":"e_1_3_2_1_54_1","volume-title":"Blueguard: Accelerated host and guest introspection using dpus","author":"Orenbach M.","year":"2025","unstructured":"M. Orenbach, R. Ailabouni, N. Masalha, T. Nguyen, A. Saleh, F. Block, F. Alder, O. Arkin, and A. Atamli. Blueguard: Accelerated host and guest introspection using dpus. 2025."},{"key":"e_1_3_2_1_55_1","volume-title":"Open source kubernetes observability for developers","year":"2018","unstructured":"Pixie. Open source kubernetes observability for developers, 2018. https:\/\/px.dev\/."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3186728.3164140"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3696410.3714696"},{"key":"e_1_3_2_1_58_1","first-page":"654","volume-title":"2022 USENIX Annual Technical Conference (USENIX ATC 22)","author":"Wang Z.","year":"2022","unstructured":"Z. Wang, T. Ma, L. Kong, Z. Wen, J. Li, Z. Song, Y. Lu, G. Chen, and W. Cao. Zero overhead monitoring for cloud-native infrastructure using {RDMA}. In 2022 USENIX Annual Technical Conference (USENIX ATC 22), pages 639\u2013654, 2022."},{"key":"e_1_3_2_1_59_1","unstructured":"WAVM. Webassembly virtual machine 2025. https:\/\/github.com\/WAVM\/WAVM."},{"key":"e_1_3_2_1_60_1","first-page":"136","volume-title":"2022 USENIX Annual Technical Conference (USENIX ATC 22)","author":"Wei X.","year":"2022","unstructured":"X. Wei, F. Lu, R. Chen, and H. Chen. {KRCORE}: A microsecond-scale {RDMA} control plane for elastic computing. In 2022 USENIX Annual Technical Conference (USENIX ATC 22), pages 121\u2013136, 2022."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3196890"},{"key":"e_1_3_2_1_62_1","volume-title":"Swift: Rethinking rdma control plane for elastic computing. arXiv preprint arXiv:2501.19051","author":"Zhang J.","year":"2025","unstructured":"J. Zhang, H. Tian, X. Huang, W. Li, K. Xu, D. Shen, Y. Wang, and K. Chen. Swift: Rethinking rdma control plane for elastic computing. arXiv preprint arXiv:2501.19051, 2025."},{"key":"e_1_3_2_1_63_1","first-page":"68","volume-title":"20th USENIX Conference on File and Storage Technologies (FAST 22)","author":"Zhang M.","year":"2022","unstructured":"M. Zhang, Y. Hua, P. Zuo, and L. Liu. {FORD}: Fast one-sided {RDMA-based} distributed transactions for disaggregated persistent memory. In 20th USENIX Conference on File and Storage Technologies (FAST 22), pages 51\u201368, 2022."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.14778\/3397230.3397249"},{"key":"e_1_3_2_1_65_1","volume-title":"bpftime: userspace ebpf runtime for uprobe, syscall and kernel-user interactions","author":"Zheng Y.","year":"2023","unstructured":"Y. Zheng, T. Yu, Y. Yang, Y. Hu, X. Lai, and A. Quinn. bpftime: userspace ebpf runtime for uprobe, syscall and kernel-user interactions, 2023."},{"key":"e_1_3_2_1_66_1","first-page":"393","volume-title":"16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22)","author":"Zhong Y.","year":"2022","unstructured":"Y. Zhong, H. Li, Y. J. Wu, I. Zarkadas, J. Tao, E. Mesterhazy, M. Makris, J. Yang, A. Tai, R. Stutsman, et al. {XRP}:{In-Kernel} storage functions with {eBPF}. In 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22), pages 375\u2013393, 2022."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3620678.3624652"}],"event":{"name":"HotNets '25: 24th ACM Workshop on Hot Topics in Networks","location":"UMD Campus College Park MD USA","acronym":"HotNets '25","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 24th ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3772356.3772397","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T12:03:30Z","timestamp":1763381010000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3772356.3772397"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,17]]},"references-count":67,"alternative-id":["10.1145\/3772356.3772397","10.1145\/3772356"],"URL":"https:\/\/doi.org\/10.1145\/3772356.3772397","relation":{},"subject":[],"published":{"date-parts":[[2025,11,17]]},"assertion":[{"value":"2025-11-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}