A survey on encrypted network traffic analysis applications, techniques, and countermeasures
The adoption of network traffic encryption is continually growing. Popular applications use
encryption protocols to secure communications and protect the privacy of users. In addition …
encryption protocols to secure communications and protect the privacy of users. In addition …
Service Function Chaining security survey: Addressing security challenges and threats
Abstract Service function chaining (SFC) is a trending paradigm and it has attracted
considerable attention from both the industry and academia because of its potential to …
considerable attention from both the industry and academia because of its potential to …
E3:{Energy-Efficient} microservices on {SmartNIC-Accelerated} servers
We investigate the use of SmartNIC-accelerated servers to execute microservice-based
applications in the data center. By offloading suitable microservices to the SmartNIC's low …
applications in the data center. By offloading suitable microservices to the SmartNIC's low …
When should the network be the computer?
Researchers have repurposed programmable network devices to place small amounts of
application computation in the network, sometimes yielding orders-of-magnitude …
application computation in the network, sometimes yielding orders-of-magnitude …
Shieldbox: Secure middleboxes using shielded execution
B Trach, A Krohmer, F Gregor, S Arnautov… - Proceedings of the …, 2018 - dl.acm.org
Middleboxes that process confidential data cannot be securely deployed in untrusted cloud
environments. To securely outsource middleboxes to the cloud, state-of-the-art systems …
environments. To securely outsource middleboxes to the cloud, state-of-the-art systems …
Engraft: Enclave-guarded Raft on Byzantine faulty nodes
This paper presents the first critical analysis of building highly secure, performant, and
confidential Byzantine fault-tolerant (BFT) consensus by integrating off-the-shelf crash fault …
confidential Byzantine fault-tolerant (BFT) consensus by integrating off-the-shelf crash fault …
Zombie: Middleboxes that {Don't} Snoop
Zero-knowledge middleboxes (ZKMBs) are a recent paradigm in which clients get privacy
and middleboxes enforce policy: clients prove in zero knowledge that the plaintext …
and middleboxes enforce policy: clients prove in zero knowledge that the plaintext …
Snoopy: Surpassing the scalability bottleneck of oblivious storage
Existing oblivious storage systems provide strong security by hiding access patterns, but do
not scale to sustain high throughput as they rely on a central point of coordination. To …
not scale to sustain high throughput as they rely on a central point of coordination. To …
On sustained zero trust conceptualization security for mobile core networks in 5g and beyond
The rapid increase in data traffic is forcing mobile network operators to enhance and expand
their network infrastructure to meet the new requirements of customers' Service Level …
their network infrastructure to meet the new requirements of customers' Service Level …
A survey on the programmable data plane: Abstractions, architectures, and open problems
Programmable switches allow the packet processing behavior to be applied to transmitted
packets, including the type, sequence, and semantics of processing operations, to be …
packets, including the type, sequence, and semantics of processing operations, to be …