{"id":"https://openalex.org/W4289655071","doi":"https://doi.org/10.1109/netsoft54395.2022.9844121","title":"Investigating the Vulnerability of Programmable Data Planes to Static Analysis-Guided Attacks","display_name":"Investigating the Vulnerability of Programmable Data Planes to Static Analysis-Guided Attacks","publication_year":2022,"publication_date":"2022-06-27","ids":{"openalex":"https://openalex.org/W4289655071","doi":"https://doi.org/10.1109/netsoft54395.2022.9844121"},"language":"en","primary_location":{"id":"doi:10.1109/netsoft54395.2022.9844121","is_oa":false,"landing_page_url":"https://doi.org/10.1109/netsoft54395.2022.9844121","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://pureadmin.qub.ac.uk/ws/files/347181543/m85621_black_final.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017191569","display_name":"Conor Black","orcid":"https://orcid.org/0000-0002-2145-121X"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Conor Black","raw_affiliation_strings":["Queen&#x2019;s University Belfast,Centre for Secure Information Technologies,Belfast,N. Ireland"],"affiliations":[{"raw_affiliation_string":"Queen&#x2019;s University Belfast,Centre for Secure Information Technologies,Belfast,N. Ireland","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084587519","display_name":"Sandra Scott-Hayward","orcid":"https://orcid.org/0000-0002-0330-1963"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Sandra Scott-Hayward","raw_affiliation_strings":["Queen&#x2019;s University Belfast,Centre for Secure Information Technologies,Belfast,N. Ireland"],"affiliations":[{"raw_affiliation_string":"Queen&#x2019;s University Belfast,Centre for Secure Information Technologies,Belfast,N. Ireland","institution_ids":["https://openalex.org/I126231945"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5017191569"],"corresponding_institution_ids":["https://openalex.org/I126231945"],"apc_list":null,"apc_paid":null,"fwci":0.2846,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.57091959,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"411","last_page":"419"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8690221905708313},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.7351023554801941},{"id":"https://openalex.org/keywords/bytecode","display_name":"Bytecode","score":0.7338243722915649},{"id":"https://openalex.org/keywords/forwarding-plane","display_name":"Forwarding plane","score":0.6114848256111145},{"id":"https://openalex.org/keywords/program-analysis","display_name":"Program analysis","score":0.5870614051818848},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.5729238986968994},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.5666907429695129},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5179585218429565},{"id":"https://openalex.org/keywords/stateful-firewall","display_name":"Stateful firewall","score":0.5175547003746033},{"id":"https://openalex.org/keywords/compile-time","display_name":"Compile time","score":0.4968090355396271},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.49030616879463196},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4640599489212036},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.35970279574394226},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.326781690120697},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3085063099861145},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.11798614263534546},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11114436388015747}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8690221905708313},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.7351023554801941},{"id":"https://openalex.org/C2779818221","wikidata":"https://www.wikidata.org/wiki/Q837330","display_name":"Bytecode","level":3,"score":0.7338243722915649},{"id":"https://openalex.org/C10597312","wikidata":"https://www.wikidata.org/wiki/Q5473302","display_name":"Forwarding plane","level":3,"score":0.6114848256111145},{"id":"https://openalex.org/C98183937","wikidata":"https://www.wikidata.org/wiki/Q2112188","display_name":"Program analysis","level":2,"score":0.5870614051818848},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.5729238986968994},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.5666907429695129},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5179585218429565},{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.5175547003746033},{"id":"https://openalex.org/C200833197","wikidata":"https://www.wikidata.org/wiki/Q333707","display_name":"Compile time","level":3,"score":0.4968090355396271},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.49030616879463196},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4640599489212036},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.35970279574394226},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.326781690120697},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3085063099861145},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.11798614263534546},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11114436388015747}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/netsoft54395.2022.9844121","is_oa":false,"landing_page_url":"https://doi.org/10.1109/netsoft54395.2022.9844121","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.qub.ac.uk/portal:publications/924f37dc-8f06-44f7-8dc4-d2e321863962","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/924f37dc-8f06-44f7-8dc4-d2e321863962","pdf_url":"https://pureadmin.qub.ac.uk/ws/files/347181543/m85621_black_final.pdf","source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Black, C & Scott-Hayward, S 2022, Investigating the vulnerability of programmable data planes to static analysis-guided attacks. in Proceedings of the 8th IEEE International Conference on Network Softwarization, NetSoft 2022. International Conference on Network Softwarization (NetSoft): Proceedings, Institute of Electrical and Electronics Engineers Inc., Milan, IEEE International Conference on Network Softwarization 2022, Milan, Italy, 27/06/2022. https://doi.org/10.1109/NetSoft54395.2022.9844121","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":{"id":"pmh:oai:pure.qub.ac.uk/portal:publications/924f37dc-8f06-44f7-8dc4-d2e321863962","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/924f37dc-8f06-44f7-8dc4-d2e321863962","pdf_url":"https://pureadmin.qub.ac.uk/ws/files/347181543/m85621_black_final.pdf","source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Black, C & Scott-Hayward, S 2022, Investigating the vulnerability of programmable data planes to static analysis-guided attacks. in Proceedings of the 8th IEEE International Conference on Network Softwarization, NetSoft 2022. International Conference on Network Softwarization (NetSoft): Proceedings, Institute of Electrical and Electronics Engineers Inc., Milan, IEEE International Conference on Network Softwarization 2022, Milan, Italy, 27/06/2022. https://doi.org/10.1109/NetSoft54395.2022.9844121","raw_type":"info:eu-repo/semantics/conferenceObject"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2241406505","display_name":null,"funder_award_id":"EP/R007187/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G5334834590","display_name":null,"funder_award_id":"EP/H049606/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G5445011987","display_name":null,"funder_award_id":"EP/K004379/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G6577499357","display_name":null,"funder_award_id":"EP/N508664/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G745166385","display_name":null,"funder_award_id":"EP/G034303/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4289655071.pdf","grobid_xml":"https://content.openalex.org/works/W4289655071.grobid-xml"},"referenced_works_count":36,"referenced_works":["https://openalex.org/W1480909796","https://openalex.org/W1994926493","https://openalex.org/W2007121005","https://openalex.org/W2027422213","https://openalex.org/W2052897520","https://openalex.org/W2057086403","https://openalex.org/W2308109111","https://openalex.org/W2501070846","https://openalex.org/W2790865812","https://openalex.org/W2799226481","https://openalex.org/W2816958343","https://openalex.org/W2910711617","https://openalex.org/W2952638909","https://openalex.org/W2954549386","https://openalex.org/W2963566160","https://openalex.org/W2978019044","https://openalex.org/W2987742706","https://openalex.org/W3015985777","https://openalex.org/W3032442097","https://openalex.org/W3110628190","https://openalex.org/W3126864803","https://openalex.org/W3130460901","https://openalex.org/W3150918613","https://openalex.org/W3160031425","https://openalex.org/W3163277373","https://openalex.org/W3165851208","https://openalex.org/W3179664675","https://openalex.org/W3213449269","https://openalex.org/W4235670058","https://openalex.org/W4288267719","https://openalex.org/W6698042110","https://openalex.org/W6766381578","https://openalex.org/W6779049171","https://openalex.org/W6790746595","https://openalex.org/W6795334056","https://openalex.org/W6998775028"],"related_works":["https://openalex.org/W2110769762","https://openalex.org/W2739943756","https://openalex.org/W2305888825","https://openalex.org/W3092554548","https://openalex.org/W2208656644","https://openalex.org/W2238733810","https://openalex.org/W2404333426","https://openalex.org/W4293433340","https://openalex.org/W3138786180","https://openalex.org/W2587652520"],"abstract_inverted_index":{"Programmable":[0],"network":[1],"data":[2,31],"planes":[3],"are":[4,180,207],"paving":[5],"the":[6,12,97,152,161,186,220],"way":[7],"for":[8,60,122,151,198],"networking":[9],"innovations,":[10],"with":[11,63],"ability":[13],"to":[14,49,65,69,75,112,143,154,160,167,209,214],"perform":[15],"complex,":[16],"stateful":[17],"tasks":[18],"defined":[19],"in":[20,203,212],"high-level":[21],"languages":[22],"such":[23,44,88],"as":[24,45],"P4.":[25],"The":[26],"enhanced":[27],"capabilities":[28],"of":[29,37,81,96,108,139,185,222],"programmable":[30],"plane":[32],"devices":[33],"has":[34,55],"made":[35],"verification":[36],"their":[38],"runtime":[39],"behaviour,":[40],"using":[41],"established":[42],"methods":[43],"probe":[46],"packets,":[47,82],"impossible":[48],"scale":[50],"beyond":[51],"probabilistic":[52,84],"detection.":[53,85],"This":[54,146],"created":[56],"a":[57,66,78,105,136,192],"potential":[58],"opportunity":[59],"an":[61,123],"attacker,":[62],"access":[64],"compromised":[67],"device,":[68],"subtly":[70],"alter":[71],"its":[72,216],"forwarding":[73,98],"program":[74,178,223],"mishandle":[76],"only":[77],"small":[79],"subset":[80],"evading":[83],"In":[86,127],"practice,":[87],"subtle":[89],"binary":[90],"instrumentation":[91],"attacks":[92],"require":[93],"extensive":[94],"knowledge":[95,115],"program,":[99],"yet":[100],"it":[101],"is":[102,196],"unclear":[103],"whether":[104],"static":[106,137],"analysis":[107,138,147,172,187,211],"compiled":[109,142],"P4":[110,140],"programs":[111,141,205],"obtain":[113],"this":[114,128,132],"can":[116],"be":[117],"fast":[118],"and":[119],"accurate":[120,174],"enough":[121],"on-device":[124],"attack":[125],"scenario.":[126],"work,":[129],"we":[130],"investigate":[131],"possibility":[133],"by":[134],"implementing":[135],"BPF":[144],"bytecode.":[145],"gathers":[148],"sufficient":[149],"information":[150],"attacker":[153],"identify":[155],"appropriate":[156],"(reliably":[157],"correct)":[158],"edits":[159],"program.":[162],"We":[163],"found":[164],"that,":[165,190],"due":[166],"predictable":[168],"compiler":[169],"behaviours,":[170],"our":[171],"remains":[173],"even":[175],"when":[176],"several":[177],"behaviours":[179],"abstracted":[181],"away.":[182],"Our":[183],"evaluation":[184],"requirements":[188],"shows":[189],"from":[191],"defensive":[193],"perspective,":[194],"there":[195],"scope":[197],"selectively":[199],"manipulating":[200],"those":[201],"instructions":[202],"P4-BPF":[204],"that":[206],"critical":[208],"attack-focused":[210],"order":[213],"increase":[215],"difficulty,":[217],"without":[218],"increasing":[219],"number":[221],"instructions.":[224]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
