Full control over a Wi-Fi chip for research purposes is often limited by its firmware, which makes it hard to evolve communication protocols and test schemes in practical environments.
Other Computer Science
Nevertheless, the challenge discussed in the paper is the issue of network connectivity for such solutions.
It is well-known that static analysis does not rely on any input packets and can achieve high coverage by scanning every piece of code.
Cryptography and Security Programming Languages
As another contribution of this paper, we provide technological background of P4 and IPsec and give a comprehensive review of security applications in P4, IPsec in SDN, and IPsec data plane implementations.
Networking and Internet Architecture
Virtualized multi-tenant programmable switches enable on-demand support of different users’ protocols and programs.
The Chromium open-source project has become a fundamental piece of the Web as we know it today, with multiple vendors offering browsers based on its codebase.
Cryptography and Security
Multi-agent reinforcement learning has recently shown great promise as an approach to networked system control.