{"id":"https://openalex.org/W4416298184","doi":"https://doi.org/10.1145/3772356.3772392","title":"Towards Verifiable Network Telemetry without Special Purpose Hardware","display_name":"Towards Verifiable Network Telemetry without Special Purpose Hardware","publication_year":2025,"publication_date":"2025-11-17","ids":{"openalex":"https://openalex.org/W4416298184","doi":"https://doi.org/10.1145/3772356.3772392"},"language":null,"primary_location":{"id":"doi:10.1145/3772356.3772392","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3772356.3772392","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3772356.3772392","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th ACM Workshop on Hot Topics in Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3772356.3772392","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111749303","display_name":"J.G. An","orcid":"https://orcid.org/0000-0002-7473-9663"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jaechan An","raw_affiliation_strings":["University of Maryland, College Park, MD, USA"],"raw_orcid":"https://orcid.org/0000-0002-7473-9663","affiliations":[{"raw_affiliation_string":"University of Maryland, College Park, MD, USA","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109497899","display_name":"Z. P. Zhu","orcid":"https://orcid.org/0000-0002-4413-6060"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zeying Zhu","raw_affiliation_strings":["University of Maryland, College Park, MD, USA"],"raw_orcid":"https://orcid.org/0000-0002-4413-6060","affiliations":[{"raw_affiliation_string":"University of Maryland, College Park, MD, USA","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049802912","display_name":"Ian Miers","orcid":"https://orcid.org/0000-0002-8332-2368"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ian Miers","raw_affiliation_strings":["University of Maryland, College Park, MD, USA"],"raw_orcid":"https://orcid.org/0000-0002-8332-2368","affiliations":[{"raw_affiliation_string":"University of Maryland, College Park, MD, USA","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015818714","display_name":"Zaoxing Liu","orcid":"https://orcid.org/0000-0002-9119-1679"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zaoxing Liu","raw_affiliation_strings":["University of Maryland, College Park, MD, USA"],"raw_orcid":"https://orcid.org/0000-0002-9119-1679","affiliations":[{"raw_affiliation_string":"University of Maryland, College Park, MD, USA","institution_ids":["https://openalex.org/I66946132"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5111749303"],"corresponding_institution_ids":["https://openalex.org/I66946132"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17966352,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"411","last_page":"418"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.7594000101089478,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.7594000101089478,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.040800001472234726,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.03530000150203705,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.7502999901771545},{"id":"https://openalex.org/keywords/netflow","display_name":"NetFlow","score":0.6538000106811523},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6298999786376953},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6200000047683716},{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.503000020980835},{"id":"https://openalex.org/keywords/telemetry","display_name":"Telemetry","score":0.44920000433921814},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.43309998512268066},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.42730000615119934}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7544999718666077},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.7502999901771545},{"id":"https://openalex.org/C188067584","wikidata":"https://www.wikidata.org/wiki/Q219363","display_name":"NetFlow","level":2,"score":0.6538000106811523},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6298999786376953},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6200000047683716},{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.503000020980835},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4620000123977661},{"id":"https://openalex.org/C183121708","wikidata":"https://www.wikidata.org/wiki/Q209867","display_name":"Telemetry","level":2,"score":0.44920000433921814},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.43309998512268066},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.42730000615119934},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4147000014781952},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.41449999809265137},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36239999532699585},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.35519999265670776},{"id":"https://openalex.org/C159631557","wikidata":"https://www.wikidata.org/wiki/Q1546066","display_name":"Networking hardware","level":2,"score":0.3278999924659729},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3244999945163727},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.31529998779296875},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.30390000343322754},{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.2854999899864197},{"id":"https://openalex.org/C81877898","wikidata":"https://www.wikidata.org/wiki/Q1965787","display_name":"Network monitoring","level":2,"score":0.28380000591278076},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.27889999747276306},{"id":"https://openalex.org/C172173386","wikidata":"https://www.wikidata.org/wiki/Q79984","display_name":"Ethernet","level":2,"score":0.26499998569488525},{"id":"https://openalex.org/C114809511","wikidata":"https://www.wikidata.org/wiki/Q1412924","display_name":"Flow network","level":2,"score":0.2621999979019165}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3772356.3772392","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3772356.3772392","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3772356.3772392","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th ACM Workshop on Hot Topics in Networks","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3772356.3772392","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3772356.3772392","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3772356.3772392","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th ACM Workshop on Hot Topics in Networks","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3443962958","display_name":null,"funder_award_id":"2431093","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4484760718","display_name":null,"funder_award_id":"2415754","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7269604863","display_name":null,"funder_award_id":"2415758","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4416298184.pdf","grobid_xml":"https://content.openalex.org/works/W4416298184.grobid-xml"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W4180724","https://openalex.org/W40890042","https://openalex.org/W2027293237","https://openalex.org/W2043007983","https://openalex.org/W2097364154","https://openalex.org/W2144752539","https://openalex.org/W2149013991","https://openalex.org/W2162595007","https://openalex.org/W2487095677","https://openalex.org/W2529173666","https://openalex.org/W2967106834","https://openalex.org/W3189127798","https://openalex.org/W4238172360","https://openalex.org/W4381621966","https://openalex.org/W4391724734","https://openalex.org/W4401176475"],"related_works":[],"abstract_inverted_index":{"Verifiable":[0],"network":[1,11,82,118],"telemetry":[2,14,83],"is":[3],"crucial":[4],"for":[5],"ensuring":[6],"transparency":[7],"and":[8,47,60,136],"trust":[9],"in":[10,75,140],"measurements.":[12],"However,":[13,50],"logs":[15,89],"(e.g.,":[16],"NetFlow":[17,110],"records)":[18],"often":[19],"contain":[20],"sensitive":[21,88],"data,":[22,111],"making":[23],"public":[24],"verification":[25],"challenging.":[26],"Recent":[27],"work":[28],"has":[29],"attempted":[30],"to":[31,44,54,79,105,114,117],"address":[32],"this":[33,64],"problem":[34],"using":[35],"Trusted":[36],"Execution":[37],"Environments":[38],"(TEEs),":[39],"such":[40],"as":[41],"Intel":[42],"SGX,":[43],"provide":[45],"confidentiality":[46],"integrity":[48],"guarantees.":[49],"TEEs":[51],"are":[52],"known":[53],"suffer":[55],"from":[56],"complex":[57],"deployment":[58,135],"requirements":[59],"limited":[61],"scalability.":[62],"In":[63],"paper,":[65],"we":[66],"introduce":[67],"a":[68,98,130],"software-based":[69],"approach":[70],"utilizing":[71],"the":[72,86,141],"latest":[73],"advances":[74],"Zero-knowledge":[76],"Proofs":[77],"(ZKPs)":[78],"enable":[80],"verifiable":[81],"without":[84],"revealing":[85],"underlying":[87],"or":[90],"relying":[91],"on":[92],"special-purpose":[93,145],"hardware.":[94,146],"Our":[95,121],"system":[96],"employs":[97],"general-purpose":[99],"ZKP":[100],"virtual":[101],"machine":[102],"(RISC":[103],"Zero)":[104],"generate":[106],"cryptographic":[107],"proofs":[108],"over":[109],"enabling":[112],"operators":[113],"securely":[115],"attest":[116],"flow":[119],"metrics.":[120],"preliminary":[122],"results":[123],"indicate":[124],"that":[125,143],"our":[126],"ZKP-based":[127],"design":[128],"offers":[129],"viable":[131],"path":[132],"toward":[133],"overcoming":[134],"scalability":[137],"limitations":[138],"inherent":[139],"solutions":[142],"require":[144]},"counts_by_year":[],"updated_date":"2026-03-14T06:41:57.775601","created_date":"2025-11-17T00:00:00"}
