Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleApril 2024
SmartNIC Security Isolation in the Cloud with S-NIC
EuroSys '24: Proceedings of the Nineteenth European Conference on Computer SystemsApril 2024, Pages 851–869https://doi.org/10.1145/3627703.3650071Modern smart NICs provide little isolation between the network functions belonging to different tenants. These NICs also do not protect network functions from the datacenter-provided management OS which runs on the smart NIC. We describe concrete attacks ...
- opinionApril 2024
Network Digital Twin
IEEE Network: The Magazine of Global Internetworking (IEEENETW), Volume 38, Issue 1Jan. 2024, Pages 5–6https://doi.org/10.1109/MNET.2024.3352356As we navigate the ever-evolving landscape of the internet, the intricate and dynamic nature of modern communication networks presents formidable challenges in their management, operation, and optimization. The emergence of the Digital Twin paradigm, a ...
Teal: Learning-Accelerated Optimization of WAN Traffic Engineering
ACM SIGCOMM '23: Proceedings of the ACM SIGCOMM 2023 ConferenceSeptember 2023, Pages 378–393https://doi.org/10.1145/3603269.3604857The rapid expansion of global cloud wide-area networks (WANs) has posed a challenge for commercial optimization engines to efficiently solve network traffic engineering (TE) problems at scale. Existing acceleration strategies decompose TE optimization ...
-
Direct Telemetry Access
ACM SIGCOMM '23: Proceedings of the ACM SIGCOMM 2023 ConferenceSeptember 2023, Pages 832–849https://doi.org/10.1145/3603269.3604827Fine-grained network telemetry is becoming a modern datacenter standard and is the basis of essential applications such as congestion control, load balancing, and advanced troubleshooting. As network size increases and telemetry gets more fine-grained, ...
- research-articleApril 2023
Optimal Oblivious Routing With Concave Objectives for Structured Networks
- Kanatip Chitavisutthivong,
- Sucha Supittayapornpong,
- Pooria Namyar,
- Mingyang Zhang,
- Minlan Yu,
- Ramesh Govindan
IEEE/ACM Transactions on Networking (TON), Volume 31, Issue 6Pages 2669–2681https://doi.org/10.1109/TNET.2023.3264632Oblivious routing distributes traffic from sources to destinations following predefined routes with rules independent of traffic demands. While finding optimal oblivious routing with a concave objective is intractable for general topologies, we show that ...
- research-articleNovember 2022
Xatu: boosting existing DDoS detection systems using auxiliary signals
CoNEXT '22: Proceedings of the 18th International Conference on emerging Networking EXperiments and TechnologiesNovember 2022, Pages 1–17https://doi.org/10.1145/3555050.3569121Traditional DDoS attack detection monitors volumetric traffic features to detect attack onset. To reduce false positives, such detection is often conservative---raising an alert only after a sustained period of observed anomalous behavior. However, ...
- research-articleAugust 2022
SwitchV: automated SDN switch validation with P4 models
- Kinan Dak Albab,
- Jonathan DiLorenzo,
- Stefan Heule,
- Ali Kheradmand,
- Steffen Smolka,
- Konstantin Weitz,
- Muhammad Timarzi,
- Jiaqi Gao,
- Minlan Yu
SIGCOMM '22: Proceedings of the ACM SIGCOMM 2022 ConferenceAugust 2022, Pages 365–379https://doi.org/10.1145/3544216.3544220Increasing demand on computer networks continuously pushes manufacturers to incorporate novel features and capabilities into their switches at an ever-accelerating pace. However, the traditional approach to switch development relies on informal ...
- research-articleMay 2022
Optimal Oblivious Routing for Structured Networks
IEEE INFOCOM 2022 - IEEE Conference on Computer CommunicationsMay 2022, Pages 1988–1997https://doi.org/10.1109/INFOCOM48880.2022.9796682Oblivious routing distributes traffic from sources to destinations following predefined routes with rules independent of traffic demands. While finding optimal oblivious routing is intractable for general topologies, we show that it is tractable for ...
- research-articleNovember 2021
Zero-CPU Collection with Direct Telemetry Access
- Jonatan Langlet,
- Ran Ben-Basat,
- Sivaramakrishnan Ramanathan,
- Gabriele Oliaro,
- Michael Mitzenmacher,
- Minlan Yu,
- Gianni Antichi
HotNets '21: Proceedings of the 20th ACM Workshop on Hot Topics in NetworksNovember 2021, Pages 108–115https://doi.org/10.1145/3484266.3487366Programmable switches are driving a massive increase in fine-grained measurements. This puts significant pressure on telemetry collectors that have to process reports from many switches. Past research acknowledged this problem by either improving ...
- research-articleAugust 2021
Aquila: a practically usable verification system for production-scale programmable data planes
- Bingchuan Tian,
- Jiaqi Gao,
- Mengqi Liu,
- Ennan Zhai,
- Yanqing Chen,
- Yu Zhou,
- Li Dai,
- Feng Yan,
- Mengjing Ma,
- Ming Tang,
- Jie Lu,
- Xionglie Wei,
- Hongqiang Harry Liu,
- Ming Zhang,
- Chen Tian,
- Minlan Yu
SIGCOMM '21: Proceedings of the 2021 ACM SIGCOMM 2021 ConferenceAugust 2021, Pages 17–32https://doi.org/10.1145/3452296.3472937This paper presents Aquila, the first practically usable verification system for Alibaba's production-scale programmable data planes. Aquila addresses four challenges in building a practically usable verification: (1) specification complexity; (2) ...
A throughput-centric view of the performance of datacenter topologies
SIGCOMM '21: Proceedings of the 2021 ACM SIGCOMM 2021 ConferenceAugust 2021, Pages 349–369https://doi.org/10.1145/3452296.3472913While prior work has explored many proposed datacenter designs, only two designs, Clos-based and expander-based, are generally considered practical because they can scale using commodity switching chips. Prior work has used two different metrics, ...
- short-paperNovember 2020
Detecting routing loops in the data plane
CoNEXT '20: Proceedings of the 16th International Conference on emerging Networking EXperiments and TechnologiesNovember 2020, Pages 466–473https://doi.org/10.1145/3386367.3431303Routing loops can harm network operation. Existing loop detection mechanisms, including mirroring packets, storing state on switches, or encoding the path onto packets, impose significant overheads on either the switches or the network.
We present ...
- research-articleNovember 2020
Sundial: fault-tolerant clock synchronization for datacenters
- Yuliang Li,
- Gautam Kumar,
- Hema Hariharan,
- Hassan Wassel,
- Peter Hochschild,
- Dave Platt,
- Simon Sabato,
- Minlan Yu,
- Nandita Dukkipati,
- Prashant Chandra,
- Amin Vahdat
OSDI'20: Proceedings of the 14th USENIX Conference on Operating Systems Design and ImplementationNovember 2020, Article No.: 66, Pages 1171–1186Clock synchronization is critical for many datacenter applications such as distributed transactional databases, consistent snapshots, and network telemetry. As applications have increasing performance requirements and datacenter networks get into ultra-...
- research-articleNovember 2020
Challenging the Stateless Quo of Programmable Switches
HotNets '20: Proceedings of the 19th ACM Workshop on Hot Topics in NetworksNovember 2020, Pages 153–159https://doi.org/10.1145/3422604.3425928Programmable switches based on the Protocol Independent Switch Architecture (PISA) have greatly enhanced the flexibility of today's networks by allowing new packet protocols to be deployed without any hardware changes. They have also been instrumental ...
- research-articleOctober 2020
Quantifying the Impact of Blocklisting in the Age of Address Reuse
IMC '20: Proceedings of the ACM Internet Measurement ConferenceOctober 2020, Pages 360–369https://doi.org/10.1145/3419394.3423657Blocklists, consisting of known malicious IP addresses, can be used as a simple method to block malicious traffic. However, blocklists can potentially lead to unjust blocking of legitimate users due to IP address reuse, where more users could be blocked ...
- research-articleJuly 2020
PINT: Probabilistic In-band Network Telemetry
SIGCOMM '20: Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communicationJuly 2020, Pages 662–680https://doi.org/10.1145/3387514.3405894Commodity network devices support adding in-band telemetry measurements into data packets, enabling a wide range of applications, including network troubleshooting, congestion control, and path tracing. However, including such information on packets ...
- research-articleJuly 2020
Lyra: A Cross-Platform Language and Compiler for Data Plane Programming on Heterogeneous ASICs
- Jiaqi Gao,
- Ennan Zhai,
- Hongqiang Harry Liu,
- Rui Miao,
- Yu Zhou,
- Bingchuan Tian,
- Chen Sun,
- Dennis Cai,
- Ming Zhang,
- Minlan Yu
SIGCOMM '20: Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communicationJuly 2020, Pages 435–450https://doi.org/10.1145/3387514.3405879Programmable data plane has been moving towards deployments in data centers as mainstream vendors of switching ASICs enable programmability in their newly launched products, such as Broadcom's Trident-4, Intel/Barefoot's Tofino, and Cisco's Silicon One. ...
- research-articleJuly 2020
Microscope: Queue-based Performance Diagnosis for Network Functions
SIGCOMM '20: Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communicationJuly 2020, Pages 390–403https://doi.org/10.1145/3387514.3405876By moving monolithic network appliances to software running on commodity hardware, network function virtualization allows flexible resource sharing among network functions and achieves scalability with low cost. However, due to resource contention, ...