{"id":"https://openalex.org/W3203306599","doi":"https://doi.org/10.1145/3472456.3473512","title":"Teddy: An Efficient SIMD-based Literal Matching Engine for Scalable Deep Packet Inspection","display_name":"Teddy: An Efficient SIMD-based Literal Matching Engine for Scalable Deep Packet Inspection","publication_year":2021,"publication_date":"2021-08-09","ids":{"openalex":"https://openalex.org/W3203306599","doi":"https://doi.org/10.1145/3472456.3473512","mag":"3203306599"},"language":"en","primary_location":{"id":"doi:10.1145/3472456.3473512","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3472456.3473512","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"50th International Conference on Parallel Processing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040278378","display_name":"Kun Qiu","orcid":"https://orcid.org/0000-0002-4121-3665"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Kun Qiu","raw_affiliation_strings":["Intel APAC, China"],"affiliations":[{"raw_affiliation_string":"Intel APAC, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071050392","display_name":"Harry Chang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Harry Chang","raw_affiliation_strings":["Intel APAC, China"],"affiliations":[{"raw_affiliation_string":"Intel APAC, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101950117","display_name":"Yang Hong","orcid":"https://orcid.org/0000-0003-0221-4750"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yang Hong","raw_affiliation_strings":["Intel APAC, China"],"affiliations":[{"raw_affiliation_string":"Intel APAC, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103092835","display_name":"Wenjun Zhu","orcid":"https://orcid.org/0009-0002-1893-0014"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wenjun Zhu","raw_affiliation_strings":["Intel APAC, China"],"affiliations":[{"raw_affiliation_string":"Intel APAC, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100389037","display_name":"Xiang Wang","orcid":"https://orcid.org/0000-0002-6148-6329"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiang Wang","raw_affiliation_strings":["Intel APAC, China"],"affiliations":[{"raw_affiliation_string":"Intel APAC, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080405170","display_name":"LI Bao-qian","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Baoqian Li","raw_affiliation_strings":["Intel APAC, China"],"affiliations":[{"raw_affiliation_string":"Intel APAC, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5040278378"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.1514,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.77327233,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/literal","display_name":"Literal (mathematical logic)","score":0.8718605041503906},{"id":"https://openalex.org/keywords/simd","display_name":"SIMD","score":0.8335404396057129},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.810179591178894},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7911648750305176},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5273498296737671},{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep packet inspection","score":0.5170367360115051},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5168364644050598},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.4678443372249603},{"id":"https://openalex.org/keywords/scale","display_name":"Scale (ratio)","score":0.4398787021636963},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.3416234850883484},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2461424171924591},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.2032100260257721},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.14113208651542664},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.07222476601600647}],"concepts":[{"id":"https://openalex.org/C2780882242","wikidata":"https://www.wikidata.org/wiki/Q14235582","display_name":"Literal (mathematical logic)","level":2,"score":0.8718605041503906},{"id":"https://openalex.org/C150552126","wikidata":"https://www.wikidata.org/wiki/Q339387","display_name":"SIMD","level":2,"score":0.8335404396057129},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.810179591178894},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7911648750305176},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5273498296737671},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.5170367360115051},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5168364644050598},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.4678443372249603},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.4398787021636963},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.3416234850883484},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2461424171924591},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.2032100260257721},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.14113208651542664},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.07222476601600647},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3472456.3473512","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3472456.3473512","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"50th International Conference on Parallel Processing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W95608104","https://openalex.org/W1491450013","https://openalex.org/W1971703394","https://openalex.org/W1981409766","https://openalex.org/W1995917424","https://openalex.org/W2030102079","https://openalex.org/W2099964107","https://openalex.org/W2113425091","https://openalex.org/W2114312434","https://openalex.org/W2115345034","https://openalex.org/W2139325411","https://openalex.org/W2990585298"],"related_works":["https://openalex.org/W2354228963","https://openalex.org/W2353470215","https://openalex.org/W2368065130","https://openalex.org/W2079547420","https://openalex.org/W3151122335","https://openalex.org/W4226031521","https://openalex.org/W3160314615","https://openalex.org/W2381288267","https://openalex.org/W2155469080","https://openalex.org/W2299887038"],"abstract_inverted_index":{"Deep":[0],"Packet":[1],"Inspection":[2],"(DPI),":[3],"which":[4,44,50],"is":[5,39,57,95,122],"one":[6],"of":[7,25,61,97,187],"the":[8,23,58,62,92,109,136],"most":[9,200],"important":[10],"network":[11],"techniques,":[12],"has":[13,81,86],"been":[14,82],"widely":[15],"utilized":[16],"in":[17,55,76,108,138,165,173,199],"current":[18],"networking":[19],"systems.":[20],"By":[21],"comparing":[22],"payloads":[24],"traffic":[26,36],"to":[27,43,153,162],"an":[28,66,119],"existing":[29],"signature":[30,93],"database,":[31],"DPI":[32,167],"can":[33,69,149],"identify":[34],"whether":[35],"or":[37,41],"packet":[38],"harmful,":[40],"belong":[42],"application.":[45],"The":[46,178],"literal":[47,99,127,140],"matching":[48],"engine,":[49],"plays":[51],"a":[52,71,87,145,185],"key":[53],"role":[54],"DPI,":[56],"primary":[59],"determinant":[60],"system":[63],"performance.":[64],"FDR,":[65,132],"engine":[67,120],"that":[68,121,148,182],"match":[70,151],"character":[72],"with":[73,131,156,175],"multiple":[74],"literals":[75],"only":[77,157],"3":[78],"SIMD":[79,159],"operations,":[80],"developed.":[83],"However,":[84],"FDR":[85,198],"significant":[88],"performance":[89,189,195],"drop-off":[90],"when":[91],"database":[94],"composed":[96],"small-scale":[98,126,139],"rule":[100,128,141],"sets,":[101],"whose":[102],"occupations":[103],"are":[104],"larger":[105],"than":[106,191,197],"90%":[107],"modern":[110],"database.":[111],"In":[112],"this":[113],"paper,":[114],"we":[115,169],"have":[116,170],"designed":[117],"Teddy,":[118],"highly":[123],"optimized":[124],"for":[125],"sets.":[129],"Comparing":[130],"Teddy":[133,164,172,183],"significantly":[134],"increases":[135,190,196],"efficiency":[137],"sets":[142],"by":[143],"designing":[144],"novel":[146],"algorithm":[147],"parallelly":[150],"up":[152],"64":[154],"characters":[155],"16":[158],"operations.":[160],"Meanwhile,":[161],"evaluate":[163],"real-world":[166],"systems,":[168],"implemented":[171],"Hyperscan":[174],"AVX512":[176],"platforms.":[177],"evaluation":[179],"results":[180],"show":[181],"achieves":[184],"maximum":[186],"35.29x":[188],"Aho-corasick":[192],"(AC),":[193],"2.16x":[194],"cases.":[201]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
