Making Network Configuration Human Friendly

C Wang, M Scazzariello, A Farshin, D Kostic… - arXiv preprint arXiv …, 2023 - arxiv.org
This paper explores opportunities to utilize Large Language Models (LLMs) to make network
configuration human-friendly, simplifying the configuration of network devices and …

P4Testgen: An extensible test oracle for P4

F Ruffy, J Liu, P Kotikalapudi, V Havel… - Proceedings of the …, 2023 - dl.acm.org
We present P4Testgen, a test oracle for the P416 language. P4Testgen supports automatic
test generation for any P4 target and is designed to be extensible to many P4 targets. It …

Hydra: Effective Runtime Network Verification

S Renganathan, B Rubin, H Kim, PL Ventre… - Proceedings of the …, 2023 - dl.acm.org
It is notoriously difficult to verify that a network is behaving as intended, especially at scale.
This paper presents Hydra, a system that uses ideas from runtime verification to check that …

Pinolo: Detecting Logical Bugs in Database Management Systems with Approximate Query Synthesis

Z Hao, Q Huang, C Wang, J Wang, Y Zhang… - 2023 USENIX Annual …, 2023 - usenix.org
DBMSs (Database Management Systems) are essential in modern enterprise software.
Thus, ensuring the correctness of DBMSs is critical for enterprise applications. Among …

P4Cub: A Little Language for Big Routers

R Peterson, EH Campbell, J Chen, N Isak… - Proceedings of the 12th …, 2023 - dl.acm.org
P4Cub is a new intermediate representation (IR) for the P4 programming language. It has
been designed with the goal of facilitating development of certified tools. To achieve this …

Vermont: Towards an in-band telemetry-based approach for live network property verification

G Vassoler, JA Marques… - NOMS 2023-2023 IEEE …, 2023 - ieeexplore.ieee.org
The verification of network properties is often an exhaustive and time-consuming effort. The
number of configurations needed to be analyzed by static verification increases as the …

Computing Precise Control Interface Specifications

EH Campbell, H Hojjat, N Foster - Proceedings of the ACM on …, 2024 - dl.acm.org
Verifying network programs is challenging because of how they divide labor: the control
plane computes high level routes through the network and compiles them to device …

rDefender: A Lightweight and Robust Defense Against Flow Table Overflow Attacks in SDN

D Kong, X Chen, C Wu, Y Shen, Z Zhou… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
The flow table is a critical component of Software-Defined Networking (SDN). However, flow
tables' limited capacity makes them highly vulnerable to flow table overflow attacks (FTOAs) …

NetConfEval: Can LLMs Facilitate Network Configuration?

C Wang, M Scazzariello, A Farshin, S Ferlin… - Proceedings of the …, 2024 - dl.acm.org
This paper explores opportunities to utilize Large Language Models (LLMs) to make network
configuration human-friendly, simplifying the configuration of network devices & …

Scaling Data Plane Verification with Intent-based Slicing

KY Chou, S Prabhu, G Subramanian, W Zhou… - arXiv preprint arXiv …, 2024 - arxiv.org
Data plane verification has grown into a powerful tool to ensure network correctness.
However, existing monolithic data plane models have high memory requirements with large …