A survey on encrypted network traffic analysis applications, techniques, and countermeasures

E Papadogiannaki, S Ioannidis - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The adoption of network traffic encryption is continually growing. Popular applications use
encryption protocols to secure communications and protect the privacy of users. In addition …

Intel software guard extensions applications: A survey

NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …

When should the network be the computer?

DRK Ports, J Nelson - Proceedings of the Workshop on Hot Topics in …, 2019 - dl.acm.org
Researchers have repurposed programmable network devices to place small amounts of
application computation in the network, sometimes yielding orders-of-magnitude …

Shieldstore: Shielded in-memory key-value storage with sgx

T Kim, J Park, J Woo, S Jeon, J Huh - Proceedings of the Fourteenth …, 2019 - dl.acm.org
The shielded computation of hardware-based trusted execution environments such as Intel
Software Guard Extensions (SGX) can provide secure cloud computing on remote systems …

{SafeBricks}: shielding network functions in the cloud

R Poddar, C Lan, RA Popa, S Ratnasamy - 15th USENIX Symposium on …, 2018 - usenix.org
With the advent of network function virtualization (NFV), outsourcing network processing to
the cloud is growing in popularity amongst enterprises and organizations. Such outsourcing …

Sok: Content moderation for end-to-end encryption

S Scheffler, J Mayer - arxiv preprint arxiv:2303.03979, 2023 - arxiv.org
Popular messaging applications now enable end-to-end-encryption (E2EE) by default, and
E2EE data storage is becoming common. These important advances for security and privacy …

Zombie: Middleboxes that {Don't} Snoop

C Zhang, Z DeStefano, A Arun, J Bonneau… - … USENIX Symposium on …, 2024 - usenix.org
Zero-knowledge middleboxes (ZKMBs) are a recent paradigm in which clients get privacy
and middleboxes enforce policy: clients prove in zero knowledge that the plaintext …

{SPEICHER}: Securing {LSM-based}{Key-Value} Stores using Shielded Execution

M Bailleu, J Thalheim, P Bhatotia, C Fetzer… - … USENIX Conference on …, 2019 - usenix.org
We introduce Speicher, a secure storage system that not only provides strong confidentiality
and integrity properties, but also ensures data freshness to protect against rollback/forking …

{Zero-Knowledge} Middleboxes

P Grubbs, A Arun, Y Zhang, J Bonneau… - 31st USENIX Security …, 2022 - usenix.org
This paper initiates research on zero-knowledge middleboxes (ZKMBs). A ZKMB is a
network middlebox that enforces network usage policies on encrypted traffic. Clients send …

Avocado: A secure {In-Memory} distributed storage system

M Bailleu, D Giantsidi, V Gavrielatos… - 2021 USENIX Annual …, 2021 - usenix.org
We introduce Avocado, a secure in-memory distributed storage system that provides strong
security, fault-tolerance, consistency (linearizability) and performance for untrusted cloud …