A survey on encrypted network traffic analysis applications, techniques, and countermeasures

E Papadogiannaki, S Ioannidis - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The adoption of network traffic encryption is continually growing. Popular applications use
encryption protocols to secure communications and protect the privacy of users. In addition …

Service Function Chaining security survey: Addressing security challenges and threats

M Pattaranantakul, C Vorakulpipat, T Takahashi - Computer Networks, 2023 - Elsevier
Abstract Service function chaining (SFC) is a trending paradigm and it has attracted
considerable attention from both the industry and academia because of its potential to …

E3:{Energy-Efficient} microservices on {SmartNIC-Accelerated} servers

M Liu, S Peter, A Krishnamurthy… - 2019 USENIX Annual …, 2019 - usenix.org
We investigate the use of SmartNIC-accelerated servers to execute microservice-based
applications in the data center. By offloading suitable microservices to the SmartNIC's low …

When should the network be the computer?

DRK Ports, J Nelson - Proceedings of the Workshop on Hot Topics in …, 2019 - dl.acm.org
Researchers have repurposed programmable network devices to place small amounts of
application computation in the network, sometimes yielding orders-of-magnitude …

Shieldbox: Secure middleboxes using shielded execution

B Trach, A Krohmer, F Gregor, S Arnautov… - Proceedings of the …, 2018 - dl.acm.org
Middleboxes that process confidential data cannot be securely deployed in untrusted cloud
environments. To securely outsource middleboxes to the cloud, state-of-the-art systems …

Engraft: Enclave-guarded Raft on Byzantine faulty nodes

W Wang, S Deng, J Niu, MK Reiter… - Proceedings of the 2022 …, 2022 - dl.acm.org
This paper presents the first critical analysis of building highly secure, performant, and
confidential Byzantine fault-tolerant (BFT) consensus by integrating off-the-shelf crash fault …

Zombie: Middleboxes that {Don't} Snoop

C Zhang, Z DeStefano, A Arun, J Bonneau… - … USENIX Symposium on …, 2024 - usenix.org
Zero-knowledge middleboxes (ZKMBs) are a recent paradigm in which clients get privacy
and middleboxes enforce policy: clients prove in zero knowledge that the plaintext …

Snoopy: Surpassing the scalability bottleneck of oblivious storage

E Dauterman, V Fang, I Demertzis, N Crooks… - Proceedings of the …, 2021 - dl.acm.org
Existing oblivious storage systems provide strong security by hiding access patterns, but do
not scale to sustain high throughput as they rely on a central point of coordination. To …

On sustained zero trust conceptualization security for mobile core networks in 5g and beyond

Y Bello, AR Hussein, M Ulema… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The rapid increase in data traffic is forcing mobile network operators to enhance and expand
their network infrastructure to meet the new requirements of customers' Service Level …

A survey on the programmable data plane: Abstractions, architectures, and open problems

R Bifulco, G Rétvári - 2018 IEEE 19th International Conference …, 2018 - ieeexplore.ieee.org
Programmable switches allow the packet processing behavior to be applied to transmitted
packets, including the type, sequence, and semantics of processing operations, to be …