Generic and agile service function chain verification on cloud
暂无分享,去创建一个
Jianping Wu | Xiaoli Zhang | Qi Li | Jiahai Yang | Jiahai Yang | Qi Li | Jianping Wu | Xiaoli Zhang
[1] Tianlong Yu,et al. BUZZ: Testing Context-Dependent Policies in Stateful Networks , 2016, NSDI.
[2] Yih-Chun Hu,et al. Lightweight source authentication and path validation , 2015, SIGCOMM 2015.
[3] Yih-Chun Hu,et al. Coward attacks in vehicular networks , 2010, MOCO.
[4] Mohan Kumar,et al. S-NFV: Securing NFV states by using SGX , 2016, SDN-NFV@CODASPY.
[5] Vijay Mann,et al. SPHINX: Detecting Security Attacks in Software-Defined Networks , 2015, NDSS.
[6] Seungjoon Lee,et al. Network function virtualization: Challenges and opportunities for innovations , 2015, IEEE Communications Magazine.
[7] Minlan Yu,et al. Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions using FlowTags , 2014, NSDI.
[8] Torsten Hoefler,et al. SDNsec: Forwarding Accountability for the SDN Data Plane , 2016, 2016 25th International Conference on Computer Communication and Networks (ICCCN).
[9] Dawn Xiaodong Song,et al. Advanced and authenticated marking schemes for IP traceback , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[10] Filip De Turck,et al. Network Function Virtualization: State-of-the-Art and Research Challenges , 2015, IEEE Communications Surveys & Tutorials.
[11] Vyas Sekar,et al. Verifiable network function outsourcing: requirements, challenges, and roadmap , 2013, HotMiddlebox '13.
[12] Krishna P. Gummadi,et al. Towards Trusted Cloud Computing , 2009, HotCloud.
[13] Sylvia Ratnasamy,et al. BlindBox: Deep Packet Inspection over Encrypted Traffic , 2015, SIGCOMM.
[14] Vyas Sekar,et al. Making middleboxes someone else's problem: network processing as a cloud service , 2012, SIGCOMM '12.
[15] Carsten Lund,et al. Properties and prediction of flow statistics from sampled packet streams , 2002, IMW '02.
[16] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[17] Katerina J. Argyraki,et al. Verifying Reachability in Networks with Mutable Datapaths , 2016, NSDI.
[18] Vyas Sekar,et al. Towards verifiable resource accounting for outsourced computation , 2013, VEE '13.
[19] Andrew Warfield,et al. Split/Merge: System Support for Elastic Execution in Virtual Middleboxes , 2013, NSDI.
[20] Navendu Jain,et al. Understanding network failures in data centers: measurement, analysis, and implications , 2011, SIGCOMM.
[21] Andreas Haeberlen,et al. Accountable Virtual Machines , 2010, OSDI.
[22] Vyas Sekar,et al. Stratos: A Network-Aware Orchestration Layer for Middleboxes in the Cloud , 2013, ArXiv.
[23] Adrian Perrig,et al. High-Speed Inter-Domain Fault Localization , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[24] Emmett Witchel,et al. Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data , 2016, OSDI.
[25] Scott Shenker,et al. E2: a framework for NFV applications , 2015, SOSP.
[26] Hongseok Jeon,et al. Network service chaining challenges for VNF outsourcing in network function virtualization , 2015, 2015 International Conference on Information and Communication Technology Convergence (ICTC).
[27] Michael Walfish,et al. Verifying and enforcing network paths with icing , 2011, CoNEXT '11.
[28] Xin Zhang,et al. Network fault localization with small TCB , 2011, 2011 19th IEEE International Conference on Network Protocols.
[29] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.
[30] Katerina J. Argyraki,et al. Verifying Isolation Properties in the Presence of Middleboxes , 2014, ArXiv.
[31] Brighten Godfrey,et al. VeriFlow: verifying network-wide invariants in real time , 2012, HotSDN '12.
[32] David M. Eyers,et al. SCONE: Secure Linux Containers with Intel SGX , 2016, OSDI.
[33] George Varghese,et al. Header Space Analysis: Static Checking for Networks , 2012, NSDI.
[34] Zhi Liu,et al. Embark: Securely Outsourcing Middleboxes to the Cloud , 2016, NSDI.
[35] Navendu Jain,et al. Demystifying the dark side of the middle: a field study of middlebox failures in datacenters , 2013, Internet Measurement Conference.
[36] Anna R. Karlin,et al. Practical network support for IP traceback , 2000, SIGCOMM.
[37] Samuel T. King,et al. Debugging the data plane with anteater , 2011, SIGCOMM 2011.