- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources2
- Resource Type
-
0001000001000000
- More
- Availability
-
20
- Author / Contributor
- Filter by Author / Creator
-
-
McKeown, Nick (2)
-
Balakrishnan, Hari (1)
-
Banerjee, Sujata (1)
-
Cascone, Carmelo (1)
-
Chan, Charles (1)
-
Cidon, Israel (1)
-
Culler, David (1)
-
Estrin, Deborah (1)
-
Foster, Nate (1)
-
Katz-Bassett, Ethan (1)
-
Kim, Hyojoon (1)
-
Krishnamurthy, Arvind (1)
-
McCauley, Murphy (1)
-
Moro, Daniele (1)
-
Panda, Aurojit (1)
-
Ratnasamy, Sylvia (1)
-
Renganathan, Sundararajan (1)
-
Rexford, Jennifer (1)
-
Rubin, Benny (1)
-
Schapira, Michael (1)
-
- Filter by Editor
-
-
null (1)
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
It is notoriously difficult to verify that a network is behaving as intended, especially at scale. This paper presents Hydra, a system that uses ideas from runtime verification to check that every packet is correctly processed with respect to a specification in real time. We propose a domain-specific language for writing properties, called Indus, and we develop a compiler that turns properties thus specified into executable P4 code that runs alongside the forwarding code at line rate. To evaluate our approach, we used Indus to model a range of properties, showing that it is expressive enough to capture examples studied in prior work. We also deployed Hydra checkers for validating paths in source routing and for enforcing slice isolation in Aether, an open-source cellular platform. We confirmed a subtle bug in Aether's 5G mobile core that would have been hard to detect using static techniques. We also evaluated the overheads of Hydra on hardware, finding that it does not significantly increase latency and often does not require additional pipeline stages.more » « less
-
Balakrishnan, Hari; Banerjee, Sujata; Cidon, Israel; Culler, David; Estrin, Deborah; Katz-Bassett, Ethan; Krishnamurthy, Arvind; McCauley, Murphy; McKeown, Nick; Panda, Aurojit; et al (, ACM SIGCOMM Computer Communication Review)null (Ed.)There is now a significant and growing functional gap between the public Internet, whose basic architecture has remained unchanged for several decades, and a new generation of more sophisticated private networks. To address this increasing divergence of functionality and overcome the Internet's architectural stagnation, we argue for the creation of an Extensible Internet (EI) that supports in-network services that go beyond best-effort packet delivery. To gain experience with this approach, we hope to soon deploy both an experimental version (for researchers) and a prototype version (for early adopters) of EI. In the longer term, making the Internet extensible will require a community to initiate and oversee the effort; this paper is the first step in creating such a community.more » « less
An official website of the United States government
