Proceedings of the SIGCOMM Posters and Demos 2017
DOI: 10.1145/3123878.3132016
|View full text |Cite
|
Sign up to set email alerts
|

Safeguarding VNF Credentials with Intel SGX

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…IDS will perform deep packet inspection to confirm whether the packet is malicious. The network setup not only can process HTTP web traffic, when the NVF support TLS [23,40], it can also process HTTPS traffic. As most privacy preserving NFV platforms [23,27,54], we use TLS as secure transmission protocol between enterprise gateway and privacy-preserving NFV platform.…”
Section: Methodsmentioning
confidence: 99%
“…IDS will perform deep packet inspection to confirm whether the packet is malicious. The network setup not only can process HTTP web traffic, when the NVF support TLS [23,40], it can also process HTTPS traffic. As most privacy preserving NFV platforms [23,27,54], we use TLS as secure transmission protocol between enterprise gateway and privacy-preserving NFV platform.…”
Section: Methodsmentioning
confidence: 99%
“…Applying TruSDN to virtual network functions (VNFs) A prototype applying the TruSDN approach to VNFs in an SDN deployment was described in [29]. Future challenges include designing an integrated prototype with component integrity attestation on the data plane, controller plane and management plane as well as leveraging TruSDN to secure communications throughout the deployment.…”
Section: Enabling Practical Deploymentsmentioning
confidence: 99%
“…Earlier research addressed SDN security through additional services [48,53,21], formal verification [6] and isolated execution using Intel Software Guard Extensions (SGX) [52,43,28,44], and most popular network element implementation support communication over transport layer security (TLS) [15]. Despite these efforts, the confidentiality and integrity of authentication credentials of network elements in SDN remain unaddressed.…”
Section: Introductionmentioning
confidence: 99%
“…Our evaluation results show a negligible impact on run-time performance and only a moderate performance impact at the deployment stage. arXiv:1806.07302v1 [cs.NI] 19 Jun 2018 directly (by intercepting or modifying traffic), or indirectly through horizontal attacks aimed to leak authentication credentials and encryption keys [54].Earlier research addressed SDN security through additional services [48,53,21], formal verification [6] and isolated execution using Intel Software Guard Extensions (SGX) [52,43,28,44], and most popular network element implementation support communication over transport layer security (TLS) [15]. Despite these efforts, the confidentiality and integrity of authentication credentials of network elements in SDN remain unaddressed.…”
mentioning
confidence: 99%