Proceedings of the 51st Annual Design Automation Conference 2014
DOI: 10.1145/2593069.2593226
|View full text |Cite
|
Sign up to set email alerts
|

System-Level Security for Network Processors with Hardware Monitors

Abstract: New attacks are emerging that target the Internet infrastructure. Modern routers use programmable network processors that may be exploited by merely sending suitably crafted data packets into a network. Hardware monitors that are co-located with processor cores can detect attacks that change processor behavior with high probability. In this paper, we present a solution to the problem of secure, dynamic installation of hardware monitoring graphs on these devices. We also address the problem of how to overcome t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(1 citation statement)
references
References 15 publications
0
1
0
Order By: Relevance
“…The symmetric key is provided by the network operator securely to the TPM by encrypting it asymmetrically with the TPM's public key. Using this approach, an attacker The details of the installation and verification process, including a detailed security analysis, are presented in [21].…”
Section: Architecture Of Scalable Hardware Monitoring Gridmentioning
confidence: 99%
“…The symmetric key is provided by the network operator securely to the TPM by encrypting it asymmetrically with the TPM's public key. Using this approach, an attacker The details of the installation and verification process, including a detailed security analysis, are presented in [21].…”
Section: Architecture Of Scalable Hardware Monitoring Gridmentioning
confidence: 99%