当前位置: X-MOL 学术ACM SIGCOMM Comput. Commun. Rev. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
The April 2022 issue
ACM SIGCOMM Computer Communication Review ( IF 2.8 ) Pub Date : 2022-06-20 , DOI: 10.1145/3544912.3544913
Steve Uhlig 1
Affiliation  

This April 2022 issue contains five technical papers and two editorial notes.

The first technical paper, Data-Plane Security Applications in Adversarial Settings, by Liang Wang and colleagues, investigates security issues that may arise when creating and running data-plane applications for programmable switches. This work moves security analysis and design forward in this particular area. This paper also calls for a more thorough rethinking of security for data-plane applications for programmable switches.

The second technical paper, One Bad Apple Can Spoil Your IPv6 Privacy, by Said Jawad Saidi and colleagues, leverages IPv6 passive measurements to pinpoint that a non-negligible portion of devices encodes their MAC address in their IPv6 address. This threatens users' privacy, allowing content providers and CDNs to consistently track users and their devices across multiple sessions and locations. Overall, the paper is an excellent contribution toward privacy-by-design solutions and a nicely executed measurements study that clarifies the problem and provides solid suggestions to mitigate the problem.

The third technical paper, Hyper-Specific Prefixes: Gotta Enjoy the Little Things in Interdomain Routing, by Khwaja Zubair Sediqi and colleagues, investigates the presence of high-specific prefixes (HSP) on the BGP Internet routing during the last decade. These prefixes are more-specific than /24 (/48) for IPv4 (IPv6) and are commonly filtered by Autonomous Systems operators. Overall this paper offers a nice contribution to the understanding of the BGP universe, with a clear message and a nice quantification of the phenomenon. The authors clearly present and motivate the work, offering also to not experts a nice view of the routing complexity of the nowadays internet.

The fourth technical paper, Programming Socket-Independent Network Functions with Nethuns, by Nicola Bonelli and colleagues, proposes a new solution to transparently develop packet-processing programs on top of different network I/O frameworks. The authors design and develop an open-source library, nethuns, serving as a unified programming abstraction for network functions that natively supports multi-core programming. Not only is this work very relevant to our community, but also the code is released open-source through a BSD license, which can be used to foster more research in the area, towards unifying programming mechanisms of end-host networking.

The fifth technical paper, Measuring DNS over TCP in the Era of Increasing DNS Response Sizes: A View from the Edge, by Mike Kosek and colleagues, studies one of the foundations of today's Internet: the Domain Name Service (DNS). The original RFC document of DNS instructs to send queries either over UDP (DoUDP) or TCP (DoTCP). This paper presents a measurement study on DoTCP focusing on two perspectives: failure rates and response times.

Finally, we have two editorial notes. A Case for an Open Customizable Cloud Network, by Dean H. Lorenz and his colleagues, argues for the desirability of the new ecosystem of managed network solutions to connect to the Cloud, outlines the main requirements and sketches possible solutions. Recommendations for Designing Hybrid Conferences, by Vaibhav Bajpai and colleagues, presents guidelines and considerations-spanning technology, organization and social factors-for organizing successful hybrid conferences.

I hope that you will enjoy reading this new issue and welcome comments and suggestions on CCR Online (https://ccronline.sigcomm.org) or by email at ccr-editor at sigcomm.org.



中文翻译:

2022年4月号

这期 2022 年 4 月的问题包含五篇技术论文和两篇社论。

Liang Wang 及其同事的第一篇技术论文《对抗性设置中的数据平面安全应用程序》调查了在为可编程交换机创建和运行数据平面应用程序时可能出现的安全问题。这项工作推动了这一特定领域的安全分析和设计。本文还呼吁对可编程交换机的数据平面应用的安全性进行更彻底的重新思考。

Said Jawad Saidi 及其同事的第二篇技术论文One Bad Apple Can Spoil Your IPv6 Privacy,利用 IPv6 被动测量来确定设备的不可忽略部分在其 IPv6 地址中编码其 MAC 地址。这威胁到用户的隐私,允许内容提供商和 CDN 跨多个会话和位置持续跟踪用户及其设备。总体而言,该论文是对隐私设计解决方案和执行良好的测量研究的出色贡献,它澄清了问题并提供了缓解问题的可靠建议。

第三篇技术论文Hyper-Specific Prefixes: Gotta enjoy the Little Things in Interdomain Routing由 Khwaja Zubair Sediqi 及其同事撰写,调查了过去十年中 BGP Internet 路由中高特定前缀 (HSP) 的存在。这些前缀比 IPv4 (IPv6) 的 /24 (/48) 更具体,并且通常由自治系统操作员过滤。总的来说,这篇论文为理解 BGP 世界做出了很好的贡献,其中包含明确的信息和对现象的良好量化。作者清楚地展示和激励了这项工作,也为非专家提供了一个很好的视角来了解当今互联网的路由复杂性。

Nicola Bonelli 及其同事的第四篇技术论文《使用 Nethuns 编程独立于套接字的网络功能》提出了一种新的解决方案,可以在不同的网络 I/O 框架之上透明地开发数据包处理程序。作者设计和开发了一个开源库 nethuns,作为网络功能的统一编程抽象,本机支持多核编程。这项工作不仅与我们的社区非常相关,而且代码通过 BSD 许可证开源,可用于促进该领域的更多研究,以统一终端主机网络的编程机制。

Mike Kosek 及其同事的第五篇技术论文《在 DNS 响应大小增加的时代通过 TCP 测量 DNS:从边缘的观点》研究了当今 Internet 的基础之一:域名服务 (DNS)。DNS 的原始 RFC 文档指示通过 UDP (DoUDP) 或 TCP (DoTCP) 发送查询。本文提出了关于 DoTCP 的测量研究,重点关注两个方面:故障率和响应时间。

最后,我们有两个编辑说明。由 Dean H. Lorenz 及其同事撰写的开放式可定制云网络案例论证了托管网络解决方案的新生态系统连接到云的可取性,概述了主要要求并勾勒出了可能的解决方案。设计混合会议的建议,由 Vaibhav Bajpai 及其同事撰写,提出了组织成功混合会议的指南和考虑因素——跨越技术、组织和社会因素。

我希望您会喜欢阅读这个新问题,并欢迎对 CCR Online (https://ccronline.sigcomm.org) 或通过电子邮件发送至sigcomm.orgccr-editor 提出意见和建议。

更新日期:2022-06-21
down
wechat
bug