메뉴 건너뛰기




Volumn , Issue , 2016, Pages 121-132

SDNShield: Reconciliating configurable application permissions for SDN App markets

Author keywords

Access control; SDN Security; Software defined networks

Indexed keywords

ACCESS CONTROL; CONTROLLERS; FLIGHT CONTROL SYSTEMS; SECURITY SYSTEMS; SOFTWARE DEFINED NETWORKING;

EID: 84994324058     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DSN.2016.20     Document Type: Conference Paper
Times cited : (41)

References (43)
  • 2
    • 84994380369 scopus 로고    scopus 로고
    • Mike lynn's 'exploit', in plain (non-technical) english Accessed: 7/30/2015
    • Mike lynn's 'exploit', in plain (non-technical) english. http://bit.ly/10zx5ou. Accessed: 7/30/2015.
  • 5
    • 84994219013 scopus 로고    scopus 로고
    • OpenDaylight Platform Accessed: 7/30/2015
    • OpenDaylight Platform. http://bit.ly/1HJi57D. Accessed: 7/30/2015.
  • 6
    • 84994295635 scopus 로고    scopus 로고
    • ONOS Accessed: 7/30/2015
    • ONOS. http://bit.ly/1KrvSl9. Accessed: 7/30/2015.
  • 7
    • 84994331192 scopus 로고    scopus 로고
    • HP SDN App Store Accessed: 7/30/2015
    • HP SDN App Store. https://hpn.hpwsportal.com/catalog.html. Accessed: 7/30/2015.
  • 9
    • 84883723129 scopus 로고    scopus 로고
    • Towards a secure controller platform for openflow applications
    • Xitao Wen, Yan Chen, Chengchen Hu, Chao Shi, and Yi Wang. Towards a secure controller platform for openflow applications. In HotSDN'13.
    • HotSDN'13
    • Wen, X.1    Chen, Y.2    Hu, C.3    Shi, C.4    Wang, Y.5
  • 10
    • 84994371068 scopus 로고    scopus 로고
    • Rosemary: A robust, secure, and high-performance network operating system
    • etc
    • Seungwon Shin, Yongjoo Song, Taekyung Lee, and etc. Rosemary: A robust, secure, and high-performance network operating system. In CCS '14.
    • CCS , vol.14
    • Shin, S.1    Song, Y.2    Lee, T.3
  • 11
    • 85049403057 scopus 로고    scopus 로고
    • Securing the software-defined network control layer
    • Phillip Porras, Steven Cheung, et al. Securing the Software-Defined Network Control Layer. In NDSS, 2015.
    • (2015) NDSS
    • Porras, P.1    Cheung, S.2
  • 13
    • 84994219000 scopus 로고    scopus 로고
    • CoVisor: A compositional hypervisor for software-defined networks
    • Xin Jin, Jennifer Gossels, Jennifer Rexford, and David Walker. CoVisor: A Compositional Hypervisor for Software-Defined Networks. In USENIX NSDI'15.
    • USENIX NSDI'15
    • Jin, X.1    Gossels, J.2    Rexford, J.3    Walker, D.4
  • 14
    • 84994279970 scopus 로고    scopus 로고
    • Flood Light Open Flow controller Accessed: 7/30/2015
    • Flood Light Open Flow controller. http://bit.ly/UIL73z. Accessed: 7/30/2015.
  • 17
    • 84866899589 scopus 로고    scopus 로고
    • Analysis of android applications' permissions
    • Ryan Johnson, Zhaohui Wang, Corey Gagnon, and Angelos Stavrou. Analysis of android applications' permissions. In SERE-C 2012.
    • (2012) SERE-C
    • Johnson, R.1    Wang, Z.2    Gagnon, C.3    Stavrou, A.4
  • 18
    • 84869388345 scopus 로고    scopus 로고
    • Pscout: Analyzing the android permission specification
    • ACM
    • Kathy Wain Yee Au, Yi Fan Zhou, Zhen Huang, and David Lie. Pscout: analyzing the android permission specification. In CCS 2012. ACM.
    • (2012) CCS
    • Wain Yee Au, K.1    Fan Zhou, Y.2    Huang, Z.3    Lie, D.4
  • 19
    • 84893330207 scopus 로고    scopus 로고
    • Permlyzer: Analyzing permission usage in android applications
    • IEEE
    • Wei Xu, Fangfang Zhang, and Sencun Zhu. Permlyzer: Analyzing permission usage in android applications. In ISSRE 2013. IEEE.
    • (2013) ISSRE
    • Xu, W.1    Zhang, F.2    Zhu, S.3
  • 20
    • 84994227609 scopus 로고    scopus 로고
    • AirWatch Accessed: 7/30/2015
    • AirWatch. http://www.air-watch.com/. Accessed: 7/30/2015.
  • 21
    • 84994230121 scopus 로고    scopus 로고
    • Citrix XenMobile Accessed: 7/30/2015
    • Citrix XenMobile. https://www.citrix.com/xenmobile/. Accessed: 7/30/2015.
  • 22
    • 79551600395 scopus 로고    scopus 로고
    • Nettle: Taking the sting out of programming network routers
    • Andreas Voellmy and Paul Hudak. Nettle: Taking the sting out of programming network routers. In PADL, pages 235-249, 2011.
    • (2011) PADL , pp. 235-249
    • Voellmy, A.1    Hudak, P.2
  • 23
    • 84866510736 scopus 로고    scopus 로고
    • Procera: A language for high-level reactive network control
    • Andreas Voellmy, Hyojoon Kim, and Nick Feamster. Procera: a language for high-level reactive network control. In Proceedings of HotSDN 2012.
    • (2012) Proceedings of HotSDN
    • Voellmy, A.1    Kim, H.2    Feamster, N.3
  • 25
    • 84873907522 scopus 로고    scopus 로고
    • Languages for software-defined networks
    • Nate Foster, Arjun Guha, et al. Languages for software-defined networks. Communications Magazine, IEEE, 51(2):128-134, 2013.
    • (2013) Communications Magazine IEEE , vol.51 , Issue.2 , pp. 128-134
    • Foster, N.1    Guha, A.2
  • 27
    • 84994224040 scopus 로고    scopus 로고
    • Netkat: Semantic foundations for networks
    • Carolyn Jane Anderson, Nate Foster, et al. Netkat: Semantic foundations for networks. In POPL '14.
    • POPL , vol.14
    • Jane Anderson, C.1    Foster, N.2
  • 28
    • 84994380313 scopus 로고    scopus 로고
    • Cbench controller benchmarker Accessed: 7/30/2015
    • Cbench controller benchmarker. http://bit.ly/YyICCs. Accessed: 7/30/2015.
  • 30
    • 84907010648 scopus 로고    scopus 로고
    • OpenVirteX: Make your virtual SDNs programmable
    • Ali Al-Shabibi, Marc De Leenheer, et al. OpenVirteX: Make Your Virtual SDNs Programmable. HotSDN '14.
    • HotSDN '14
    • Al-Shabibi, A.1    De Leenheer, M.2
  • 31
    • 85051175818 scopus 로고    scopus 로고
    • Network virtualization in multi-tenant datacenters
    • Teemu Koponen, Keith Amidon, et al. Network virtualization in multi-tenant datacenters. In NSDI, 2014.
    • (2014) NSDI
    • Koponen, T.1    Amidon, K.2
  • 32
    • 84872237738 scopus 로고    scopus 로고
    • Vertigo: Network virtualization and beyond
    • Roberto Doriguzzi Corin, Matteo Gerola, et al. Vertigo: network virtualization and beyond. In EWSDN. IEEE, 2012.
    • (2012) EWSDN. IEEE
    • Doriguzzi Corin, R.1    Gerola, M.2
  • 34
    • 85076709056 scopus 로고    scopus 로고
    • Real time network policy checking using header space analysis
    • etc
    • Peyman Kazemian, Michael Chan, and etc. Real time network policy checking using header space analysis. In NSDI, pages 99-111, 2013.
    • (2013) NSDI , pp. 99-111
    • Kazemian, P.1    Chan, M.2
  • 35
    • 0003262137 scopus 로고    scopus 로고
    • The inevitability of failure: The flawed assumption of security in modern computing environments
    • etc
    • Peter A Loscocco, Stephen D Smalley, and etc. The inevitability of failure: The flawed assumption of security in modern computing environments. In NISSC, 1998.
    • (1998) NISSC
    • Loscocco, P.A.1    Smalley, S.D.2
  • 36
    • 0028513932 scopus 로고
    • Access control: Principle and practice
    • Ravi S Sandhu and Pierangela Samarati. Access control: principle and practice. Communications Magazine, IEEE, 32(9):40-48, 1994.
    • (1994) Communications Magazine IEEE , vol.32 , Issue.9 , pp. 40-48
    • Sandhu, R.S.1    Samarati, P.2
  • 38
    • 85091276968 scopus 로고    scopus 로고
    • Security Enhanced (SE) Android: Bringing Flexible MAC to Android
    • Stephen Smalley and Robert Craig. Security Enhanced (SE) Android: Bringing Flexible MAC to Android. In NDSS, volume 310, pages 20-38, 2013.
    • (2013) NDSS , vol.310 , pp. 20-38
    • Smalley, S.1    Craig, R.2
  • 39
    • 84887367827 scopus 로고    scopus 로고
    • Dr. Android and mr. Hide: Fine-grained permissions in android applications
    • ACM
    • Jinseong Jeon, Kristopher K Micinski, et al. Dr. android and mr. hide: fine-grained permissions in android applications. In SPSM 2012. ACM.
    • (2012) SPSM
    • Jeon, J.1    Micinski, K.K.2
  • 40
    • 85180547159 scopus 로고    scopus 로고
    • What's in your dongle and bank account? Mandatory and discretionary protection of android external resources
    • Soteris Demetriou, Xiaoyong Zhou, et al. What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources. In NDSS, 2015.
    • (2015) NDSS
    • Demetriou, S.1    Zhou, X.2
  • 41
    • 80755172898 scopus 로고    scopus 로고
    • The effectiveness of application permissions
    • A.P. Felt, K Greenwood, and D. Wagner. The effectiveness of application permissions. In WebApps, 2011.
    • (2011) WebApps
    • Felt, A.P.1    Greenwood, K.2    Wagner, D.3
  • 42
  • 43
    • 84857889275 scopus 로고    scopus 로고
    • A compiler and run-time system for network programming languages
    • ACM
    • Christopher Monsanto, Nate Foster, Rob Harrison, and David Walker. A compiler and run-time system for network programming languages. In ACM SIGPLAN Notices, volume 47, pages 217-230. ACM, 2012.
    • (2012) ACM SIGPLAN Notices , vol.47 , pp. 217-230
    • Monsanto, C.1    Foster, N.2    Harrison, R.3    Walker, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.