Proceedings of the 50th Annual Design Automation Conference 2013
DOI: 10.1145/2463209.2488832
|View full text |Cite
|
Sign up to set email alerts
|

High-performance hardware monitors to protect network processors from data plane attacks

Abstract: The Internet represents an essential communication infrastructure that needs to be protected from malicious attacks. Modern network routers are typically implemented using embedded multi-core network processors that are inherently vulnerable to attack. Hardware monitor subsystems, which can verify the behavior of a router's packet processing system at runtime, can be used to identify and respond to an ever-changing range of attacks. While hardware monitors have primarily been described in the context of genera… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…Hardware monitoring has been studied extensively for embedded systems [15]- [17] and has also been proposed for use in network processors [6]. In our recent work, we describe a high-performance implementation of such a hardware monitoring system that can meet the throughput demands of a network processor with a single processing core [18].…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Hardware monitoring has been studied extensively for embedded systems [15]- [17] and has also been proposed for use in network processors [6]. In our recent work, we describe a high-performance implementation of such a hardware monitoring system that can meet the throughput demands of a network processor with a single processing core [18].…”
Section: Related Workmentioning
confidence: 99%
“…In addition, attacks on network processors have been shown both on systems that are based on von Neumann architecture [3], leading to arbitrary code execution, and on systems based on Harvard architecture [18], leading to return-to-libc attacks.…”
Section: Vulnerabilities In Networking Infrastructurementioning
confidence: 99%
See 2 more Smart Citations