{DR}.{CHECKER}: A soundy analysis for linux kernel drivers
While kernel drivers have long been know to poses huge security risks, due to their
privileged access and lower code quality, bug-finding tools for drivers are still greatly lacking …
privileged access and lower code quality, bug-finding tools for drivers are still greatly lacking …
Control of multiple packet schedulers for improving QoS on OpenFlow/SDN networking
Packet scheduling is essential to properly support applications on Software-Defined
Networking (SDN) model. However, on OpenFlow/SDN, QoS is only performed with …
Networking (SDN) model. However, on OpenFlow/SDN, QoS is only performed with …
Cloud Security Using Fine-Grained Efficient Information Flow Tracking
This study provides a comprehensive review and comparative analysis of existing
Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data …
Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data …
{I/O} Passthru: Upstreaming a flexible and efficient {I/O} Path in Linux
New storage interfaces continue to emerge fast on Non-Volatile Memory Express (NVMe)
storage. Fitting these innovations in the general-purpose I/O stack of operating systems has …
storage. Fitting these innovations in the general-purpose I/O stack of operating systems has …
Prototy** the recursive internet architecture: the IRATI project approach
In recent years, many new Internet architectures are being proposed to solve shortcomings
in the current Internet. A lot of these new architectures merely extend the current TCP/IP …
in the current Internet. A lot of these new architectures merely extend the current TCP/IP …
Partially oblivious congestion control for the internet via reinforcement learning
Despite years of research on transport protocols, the tussle between in-network and end-to-
end congestion control has not been solved. This debate is due to the variance of conditions …
end congestion control has not been solved. This debate is due to the variance of conditions …
Virtual battery: An energy reserve abstraction for embedded sensor networks
This paper introduces the abstraction of energy reserves for sensor networks that virtualizes
energy sources. It gives each of several applications sharing a platform the illusion of having …
energy sources. It gives each of several applications sharing a platform the illusion of having …
Impacts of Replace Venerable Iptables and Embrace Nftables in a new futuristic Linux firewall framework
P Likhar, RS Yadav - 2021 5th International Conference on …, 2021 - ieeexplore.ieee.org
Firewall is a cardinal element in network security paradigm, where it is a measure for
providing network access control. Iptables/netfilter is the most popular Linux firewall and …
providing network access control. Iptables/netfilter is the most popular Linux firewall and …
[PDF][PDF] Linux traffic control classifier-action subsystem architecture
JH Salim - Proceedings of Netdev 0.1, 2015 - netdevconf.org
This paper describes the Linux Traffic Control (TC) Classifier-Action (CA) subsystem
architecture. The subsystem has been around for over a decade (long before OF or P4) in …
architecture. The subsystem has been around for over a decade (long before OF or P4) in …
A Hierarchical Namespace Approach for Multi-Tenancy in Distributed Clouds
The micro cloud model offers cloud behavior at the edge of the network. It allows dynamic
organization of the resources, closer to the users and the data. One of the crucial problems …
organization of the resources, closer to the users and the data. One of the crucial problems …