MINOS: regulating router dataplane actions in dynamic runtime environments
暂无分享,去创建一个
Ke Xu | Lei Xu | Kui Ren | Wenlong Chen | Meng Shen | Jingyuan Fan | Chaowen Guan
[1] EDDIE KOHLER,et al. The click modular router , 2000, TOCS.
[2] Martín Abadi,et al. Control-flow integrity , 2005, CCS '05.
[3] Vern Paxson,et al. End-to-end routing behavior in the Internet , 1996, TNET.
[4] Yin Zhang,et al. Detecting Backdoors , 2000, USENIX Security Symposium.
[5] Aurélien Francillon,et al. A Large-Scale Analysis of the Security of Embedded Firmwares , 2014, USENIX Security Symposium.
[6] Qi Li,et al. Guarantee IP lookup performance with FIB explosion , 2014, SIGCOMM.
[7] David A. Maltz,et al. Routing design in operational networks: a look from the inside , 2004, SIGCOMM.
[8] Úlfar Erlingsson,et al. Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM , 2014, USENIX Security Symposium.
[9] Ke Xu,et al. Toward a practical reconfigurable router: a software component development approach , 2014, IEEE Network.
[10] Guido Appenzeller,et al. Sizing router buffers , 2004, SIGCOMM '04.
[11] Peter Steenkiste,et al. Balancing accountability and privacy in the network , 2014, SIGCOMM.
[12] Yih-Chun Hu,et al. Lightweight source authentication and path validation , 2015, SIGCOMM 2015.
[13] Albert G. Greenberg,et al. Structure preserving anonymization of router configuration data , 2009, IEEE J. Sel. Areas Commun..
[14] Gargi Dasgupta,et al. Anomaly Detection Using Program Control Flow Graph Mining From Execution Logs , 2016, KDD.
[15] Katerina J. Argyraki,et al. Software dataplane verification , 2014, NSDI.
[16] Franck Le,et al. Shedding light on the glue logic of the internet routing architecture , 2008, SIGCOMM '08.
[17] Cliff Changchun Zou,et al. A chipset level network backdoor: bypassing host-based firewall & IDS , 2009, ASIACCS '09.
[18] Vikram S. Adve,et al. KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels , 2014, 2014 IEEE Symposium on Security and Privacy.