Vulnerabilities and Attacks of Inter-device Coordination in Programmable Networks
Author:
Liu Hongyan1,
Chen Xiang1,
Shen Yi1,
Huang Qun2,
Zhou Zhengyan1,
Zhang Dong3,
Wu Chunming1
Affiliation:
1. Zhejiang University
2. Peking University
3. Fuzhou University
Reference61 articles.
1. Implementing aes encryption on programmable switches via scrambled lookup tables;chen;SPIN,2020
2. Planck
3. SABRE: Protecting Bitcoin against Routing Attacks
4. Tracking P4 Program Execution in the Data Plane
5. RedPlane
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. CardSketch: Shift Attention for Network-wide Cardinality Telemetry;2024 IEEE 49th Conference on Local Computer Networks (LCN);2024-10-08
2. Anomaly Detection in In-Network Fast ReRoute Systems;2024 IFIP Networking Conference (IFIP Networking);2024-06-03