-
1
-
-
84876928048
-
-
Accessed: 02-06
-
[n. d.]. ROPGadget Tool. https://github.com/JonathanSalwan/ROPgadget/tree/master. ([n. d.]). Accessed: 02-06-2016.
-
(2016)
ROPGadget Tool.
-
-
-
3
-
-
84994681700
-
-
2013). Accessed: 27-01-2017
-
2013. Huawei HG8245 backdoor and remote access. http://websec.ca/advisories/view/Huawei-web-backdoor-and-remote-access. (2013). Accessed: 27-01-2017.
-
(2013)
Huawei HG8245 Backdoor and Remote Access.
-
-
-
4
-
-
85049209592
-
-
2014). Accessed: 27-01-2017
-
2014. Netis Routers Leave Wide Open Backdoor. http://blog.trendmicro.com/trendlabs-security-intelligence/netisrouters- leave-wide-open-backdoor/. (2014). Accessed: 27-01-2017.
-
(2014)
Netis Routers Leave Wide Open Backdoor.
-
-
-
5
-
-
84961331917
-
-
2014). Accessed: 27-01-2017
-
2014. Snowden: The NSA planted backdoors in Cisco products. http://www.infoworld.com/article/2608141/internet-privacy/snowden-the-nsa-planted\-backdoors-in-cisco-products.html. (2014). Accessed: 27-01-2017.
-
(2014)
Snowden: The NSA Planted Backdoors in Cisco Products.
-
-
-
6
-
-
85017515496
-
-
2016). Accessed: 27-01-2017
-
2016. OpenStack Security Guide. http://docs.openstack.org/securityguide. (2016). Accessed: 27-01-2017.
-
(2016)
OpenStack Security Guide.
-
-
-
7
-
-
85034247912
-
-
2016
-
2016. What is Openstack? https://www.openstack.org/software. (2016).
-
(2016)
What is Openstack?
-
-
-
11
-
-
84962305040
-
Enabling end-host network functions
-
Hitesh Ballani, Paolo Costa, Christos Gkantsidis, Matthew P Grosvenor, Thomas Karagiannis, Lazaros Koromilas, and Greg O'Shea. 2015. Enabling end-host network functions. In ACM Computer Communication Review (CCR), Vol. 45. 493-507.
-
(2015)
ACM Computer Communication Review (CCR)
, vol.45
, pp. 493-507
-
-
Ballani, H.1
Costa, P.2
Gkantsidis, C.3
Grosvenor, M.P.4
Karagiannis, T.5
Koromilas, L.6
O'Shea, G.7
-
12
-
-
84996437051
-
IX: A protected dataplane operating system for high throughput and low latency
-
Adam Belay, George Prekas, Ana Klimovic, Samuel Grossman, Christos Kozyrakis, and Edouard Bugnion. 2014. IX: A protected dataplane operating system for high throughput and low latency. In Proc. Usenix Symposium on Operating Systems Design and Implementation (OSDI). 49-65.
-
(2014)
Proc. Usenix Symposium on Operating Systems Design and Implementation (OSDI
, pp. 49-65
-
-
Belay, A.1
Prekas, G.2
Klimovic, A.3
Grossman, S.4
Kozyrakis, C.5
Bugnion, E.6
-
13
-
-
85056400995
-
-
BESS Comitters. 2017). Accessed: 09-05-2017
-
BESS Comitters. 2017. BESS (Berkeley Extensible Software Switch). https://github.com/NetSys/bess. (2017). Accessed: 09-05-2017.
-
(2017)
BESS (Berkeley Extensible Software Switch
-
-
-
15
-
-
84995436872
-
A systematic analysis of the juniper dual EC incident
-
Report 2016/376. (2016
-
Stephen Checkoway et al. 2016. A Systematic Analysis of the Juniper Dual EC Incident. Cryptology ePrint Archive, Report 2016/376. (2016).
-
(2016)
Cryptology ePrint Archive
-
-
Checkoway, S.1
-
16
-
-
85019011239
-
PVPP: A programmable vector packet processor
-
ACM
-
Sean Choi, Xiang Long, Muhammad Shahbaz, Skip Booth, Andy Keep, John Marshall, and Changhoon Kim. 2017. PVPP: A Programmable Vector Packet Processor. In Proc. ACM Symposium on Software Defined Networking Research (SOSR). ACM, 197-198.
-
(2017)
Proc. ACM Symposium on Software Defined Networking Research (SOSR)
, pp. 197-198
-
-
Choi, S.1
Long, X.2
Shahbaz, M.3
Booth, S.4
Keep, A.5
Marshall, J.6
Kim, C.7
-
17
-
-
84966309009
-
All your cluster-grids are belong to us: Monitoring the (in)security of infrastructure monitoring systems
-
Andrei Costin. 2015. All your cluster-grids are belong to us: Monitoring the (in)security of infrastructure monitoring systems. In Proc. IEEE Communications and Network Security (CNS). 550-558. https://doi.org/10.1109/CNS.2015.7346868
-
(2015)
Proc. IEEE Communications and Network Security (CNS
, pp. 550-558
-
-
Costin, A.1
-
18
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
Crispin Cowan et al. 1998. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-overflow Attacks. In Proc. Usenix Security Symp. 5-5.
-
(1998)
Proc. Usenix Security Symp
, pp. 5
-
-
Cowan, C.1
-
22
-
-
85049400374
-
Cloud-trust - A security assessment model for infrastructure as a service (IaaS) clouds
-
2017)
-
Dan Gonzales et al. 2017. Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds. Proc. IEEE Conference on Cloud Computing PP, 99 (2017), 1-1.
-
(2017)
Proc. IEEE Conference on Cloud Computing
, vol.99
, pp. 1
-
-
Gonzales, D.1
-
23
-
-
84891773625
-
The road to SDN
-
December 2013
-
Nick Feamster, Jennifer Rexford, and Ellen Zegura. 2013. The Road to SDN. Queue 11, 12 (December 2013).
-
(2013)
Queue
, vol.11
, pp. 12
-
-
Feamster, N.1
Rexford, J.2
Zegura, E.3
-
24
-
-
84994626816
-
NetCo: Reliable routing with unreliable routers
-
Anja Feldmann, Philipp Heyder, Michael Kreutzer, Stefan Schmid, Jean- Pierre Seifert, Haya Shulman, Kashyap Thimmaraju, Michael Waidner, and Jens Sieberg. 2016. NetCo: Reliable Routing With Unreliable Routers. In IEEE Workshop on Dependability Issues on SDN and NFV.
-
(2016)
IEEE Workshop on Dependability Issues on SDN and NFV
-
-
Feldmann, A.1
Heyder, P.2
Kreutzer, M.3
Schmid, S.4
Seifert, J.-P.5
Shulman, H.6
Thimmaraju, K.7
Waidner, M.8
Sieberg, J.9
-
25
-
-
85045133087
-
-
Tobias Fiebig, Franziska Lichtblau, Florian Streibelt, Thorben Krueger, Pieter Lexis, Randy Bush, and Anja Feldmann. 2016. SoK: An Analysis of Protocol Design: Avoiding Traps for Implementation and Deployment. arXiv preprint arXiv:1610.05531 (2016).
-
(2016)
SoK: An Analysis of Protocol Design: Avoiding Traps for Implementation and Deployment
-
-
Fiebig, T.1
Lichtblau, F.2
Streibelt, F.3
Krueger, T.4
Lexis, P.5
Bush, R.6
Feldmann, A.7
-
28
-
-
79953657305
-
Understanding cloud computing vulnerabilities
-
(March 2011)
-
Bernd Grobauer, Tobias Walloschek, and Elmar Stocker. 2011. Understanding Cloud Computing Vulnerabilities. Proc. IEEE Security & Privacy (S&P) 9, 2 (March 2011), 50-57. https://doi.org/10.1109/MSP.2010.115
-
(2011)
Proc. IEEE Security & Privacy (S&P)
, vol.9
, Issue.2
, pp. 50-57
-
-
Grobauer, B.1
Walloschek, T.2
Stocker, E.3
-
29
-
-
84962086565
-
Switch: A highly-scalable, modular software switch
-
Michio Honda, Felipe Huici, Giuseppe Lettieri, and Luigi Rizzo. 2015. mSwitch: A highly-scalable, modular software switch. In Proc. ACM Symposium on Software Defined Networking Research (SOSR). 1.
-
(2015)
Proc. ACM Symposium on Software Defined Networking Research (SOSR
, vol.1
-
-
Honda, M.1
Huici, F.2
Lettieri, G.3
Rizzo, L.4
-
32
-
-
85049405938
-
-
Intel. 2015
-
Intel. 2015. Enabling NFV to Deliver on its Promise. https://www-ssl.intel.com/content/www/us/en/communications/nfv-packet-processing-brief .html. (2015).
-
(2015)
Enabling NFV to Deliver on its Promise.
-
-
-
33
-
-
85014838358
-
Softflow: A middlebox architecture for open vswitch
-
Ethan J Jackson et al. 2016. Softflow: A middlebox architecture for open vswitch. In Usenix Annual Technical Conference (ATC). 15-28.
-
(2016)
Usenix Annual Technical Conference (ATC
, pp. 15-28
-
-
Jackson, E.J.1
-
34
-
-
85013623251
-
Congestion avoidance and control
-
Van Jacobson
-
Van Jacobson. 1988. Congestion avoidance and control. In ACM Computer Communication Review (CCR), Vol. 18. 314-329.
-
(1988)
ACM Computer Communication Review (CCR)
, vol.18
, pp. 314-329
-
-
-
35
-
-
84891618095
-
B4: Experience with a globally-deployed software defined wan
-
Sushant Jain et al. 2013. B4: Experience with a Globally-deployed Software Defined Wan. In Proc. ACM SIGCOMM. 3-14.
-
(2013)
Proc. ACM SIGCOMM
, pp. 3-14
-
-
Jain, S.1
-
38
-
-
85049393223
-
-
Version 0. Rev. 0.1. Apr 23 (2010)
-
Daya Kamath et al. 2010. Edge virtual Bridge Proposal, Version 0. Rev. 0.1. Apr 23 (2010), 1-72.
-
(2010)
Edge Virtual Bridge Proposal
, pp. 1-72
-
-
Kamath, D.1
-
43
-
-
0040291388
-
The click modular router
-
2000)
-
Eddie Kohler, Robert Morris, Benjie Chen, John Jannotti, and M Frans Kaashoek. 2000. The Click modular router. ACM Trans. Computer Systems 18, 3 (2000), 263-297.
-
(2000)
ACM Trans. Computer Systems
, vol.18
, Issue.3
, pp. 263-297
-
-
Kohler, E.1
Morris, R.2
Chen, B.3
Jannotti, J.4
Frans Kaashoek, M.5
-
49
-
-
85049406001
-
Time for an SDN sequel?
-
Version 2. 2014). Accessed: 27-01-2017
-
Craig Matsumoto. 2014. Time for an SDN Sequel? Scott Shenker Preaches SDN Version 2. https://www.sdxcentral.com/articles/news/scott-shenker-preaches-revised-sdn-sdnv2/2014/10/. (2014). Accessed: 27-01-2017.
-
(2014)
Scott Shenker Preaches SDN
-
-
Matsumoto, C.1
-
51
-
-
68649129121
-
OpenFlow: Enabling innovation in campus networks
-
2008)
-
Nick McKeown et al. 2008. OpenFlow: Enabling innovation in campus networks. ACM Computer Communication Review (CCR) 38, 2 (2008), 69-74.
-
(2008)
ACM Computer Communication Review (CCR)
, vol.38
, Issue.2
, pp. 69-74
-
-
Nick McKeown1
-
52
-
-
84967218989
-
-
Microsoft. 2013). Accessed: 27-01-2017
-
Microsoft. 2013. Hyper-V Virtual Switch Overview. https://technet.microsoft.com/en-us/library/hh831823(v=ws.11) .aspx. (2013). Accessed: 27-01-2017.
-
(2013)
Hyper-V Virtual Switch Overview.
-
-
-
53
-
-
84986586970
-
Dataplane specialization for high-performance openflow software switching
-
László Molnár, Gergely Pongrácz, Gábor Enyedi, Zoltán Lajos Kis, Levente Csikor, Ferenc Juhász, Attila Korösi, and Gábor Rétvári. 2016. Dataplane Specialization for High-performance OpenFlow Software Switching. In Proc. ACM SIGCOMM. 539-552.
-
(2016)
Proc. ACM SIGCOMM
, pp. 539-552
-
-
Molnár, L.1
Pongrácz, G.2
Enyedi, G.3
Kis, Z.L.4
Csikor, L.5
Juhász, F.6
Korösi, A.7
Rétvári, G.8
-
54
-
-
85033567481
-
Scalable highperformance elastic software OpenFlow switch in userspace for widearea network
-
2014)
-
Yoshihiro Nakajima, Tomoya Hibi, Hirokazu Takahashi, Hitoshi Masutani, Katsuhiro Shimano, and Masaki Fukui. 2014. Scalable highperformance elastic software OpenFlow switch in userspace for widearea network. USENIX Open Networking Summit (2014), 1-2.
-
(2014)
USENIX Open Networking Summit
, pp. 1-2
-
-
Nakajima, Y.1
Hibi, T.2
Takahashi, H.3
Masutani, H.4
Shimano, K.5
Fukui, M.6
-
57
-
-
84876916044
-
-
2012). Accessed: 27-01-2017
-
Mathias Payer. 2012. Too much PIE is bad for performance. http://e-collection.library.ethz.ch/eserv/eth:5699/eth-5699-01.pdf. (2012). Accessed: 27-01-2017.
-
(2012)
Too much PIE is bad for performance.
-
-
Payer, M.1
-
59
-
-
85076880509
-
Arrakis: The operating system is the control plane
-
Simon Peter, Jialin Li, Irene Zhang, Dan R. K. Ports, DougWoos, Arvind Krishnamurthy, Thomas Anderson, and Timothy Roscoe. 2014. Arrakis: The Operating System is the Control Plane. In Proc. Usenix Symposium on Operating Systems Design and Implementation (OSDI). 1-16.
-
(2014)
Proc. Usenix Symposium on Operating Systems Design and Implementation (OSDI
, pp. 1-16
-
-
Peter, S.1
Li, J.2
Zhang, I.3
Ports, D.R.K.4
Woos, D.5
Krishnamurthy, A.6
Anderson, T.7
Roscoe, T.8
-
65
-
-
85049400945
-
Abusing software defined networks
-
Gregory Pickett. 2014. Abusing software defined networks. Black Hat EU (2014).
-
(2014)
Black Hat EU (2014)
-
-
Pickett, G.1
-
68
-
-
85077207185
-
Hyper-switch: A scalable software virtual switching architecture
-
Kaushik Kumar Ram, Alan L Cox, Mehul Chadha, Scott Rixner, and TW Barr. 2013. Hyper-Switch: A Scalable Software Virtual Switching Architecture.. In Usenix Annual Technical Conference (ATC). 13-24.
-
(2013)
Usenix Annual Technical Conference (ATC
, pp. 13-24
-
-
Ram, K.K.1
Cox, A.L.2
Chadha, M.3
Rixner, S.4
Barr, T.W.5
-
70
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage. 2009. Hey, You, Get off of My Cloud: Exploring Information Leakage in Third-party Compute Clouds. In Proc. ACM Conference on Computer and Communications Security (CCS). 199-212.
-
(2009)
Proc. ACM Conference on Computer and Communications Security (CCS
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
72
-
-
85077130189
-
Netmap: A novel framework for fast packet I/O
-
Luigi Rizzo. 2012. Netmap: A novel framework for fast packet I/O. In Usenix Annual Technical Conference (ATC). 101-112.
-
(2012)
Usenix Annual Technical Conference (ATC
, pp. 101-112
-
-
Rizzo, L.1
-
73
-
-
84871992801
-
VALE, a switched ethernet for virtual machines
-
Luigi Rizzo and Giuseppe Lettieri. 2012. VALE, a Switched Ethernet for Virtual Machines. In Proc. ACM CoNEXT. 61-72.
-
(2012)
Proc. ACM CoNEXT
, pp. 61-72
-
-
Rizzo, L.1
Lettieri, G.2
-
74
-
-
85049410740
-
-
2016). Accessed: 27-01-2017
-
Robin G. 2016. Open vSwitch with DPDK Overview. https://software.intel.com/en-us/articles/open-vswitch-withdpdk- overview. (2016). Accessed: 27-01-2017.
-
(2016)
Open vSwitch with DPDK Overview.
-
-
Robin, G.1
-
75
-
-
84859457954
-
Return-oriented programming: Systems, languages, and applications
-
(March 2012)
-
Ryan Roemer, Erik Buchanan, Hovav Shacham, and Stefan Savage. 2012. Return-Oriented Programming: Systems, Languages, and Applications. ACM Trans. on Information and System Security (TISSEC) 15, 1, Article 2 (March 2012), 34 pages.
-
(2012)
ACM Trans. on Information and System Security (TISSEC)
, vol.15
, Issue.1
, pp. 34
-
-
Roemer, R.1
Buchanan, E.2
Shacham, H.3
Savage, S.4
-
76
-
-
0003666575
-
-
January 2001). Updated by RFCs 3443, 4182, 5332, 3270, 5129, 5462, 5586, 7274
-
E. Rosen, D. Tappan, G. Fedorkow, Y. Rekhter, D. Farinacci, T. Li, and A. Conta. 2001. MPLS Label Stack Encoding. RFC 3032 (Proposed Standard). (January 2001). http://www.ietf .org/rfc/rfc3032.txt Updated by RFCs 3443, 4182, 5332, 3270, 5129, 5462, 5586, 7274.
-
(2001)
MPLS Label Stack Encoding. RFC 3032 (Proposed Standard
-
-
Rosen, E.1
Tappan, D.2
Fedorkow, G.3
Rekhter, Y.4
Farinacci, D.5
Li, T.6
Conta, A.7
-
79
-
-
84880540238
-
-
(Sept 2013)
-
Len Sassaman, M. L. Patterson, S. Bratus, and M. E. Locasto. 2013. Security Applications of Formal Language Theory. 7, 3 (Sept 2013), 489-500.
-
(2013)
Security Applications of Formal Language Theory
, vol.7
, Issue.3
, pp. 489-500
-
-
Sassaman, L.1
Patterson, M.L.2
Bratus, S.3
Locasto, M.E.4
-
80
-
-
84986627816
-
Pisces: A programmable, protocol-independent software switch
-
Muhammad Shahbaz, Sean Choi, Ben Pfaff, Changhoon Kim, Nick Feamster, Nick McKeown, and Jennifer Rexford. 2016. Pisces: A programmable, protocol-independent software switch. In Proc. ACM SIGCOMM. 525-538.
-
(2016)
Proc. ACM SIGCOMM
, pp. 525-538
-
-
Shahbaz, M.1
Choi, S.2
Pfaff, B.3
Kim, C.4
Feamster, N.5
Nick McKeown6
Rexford, J.7
-
81
-
-
85049408511
-
-
2017). Accessed: 29-01-2018
-
Bhargava Shastry. 2017. Fuzzing Open vSwitch. https://bshastry.github.io/2017/07/24/Fuzzing-OpenvSwitch.html. (2017). Accessed: 29-01-2018.
-
(2017)
Fuzzing Open vSwitch.
-
-
Shastry, B.1
-
82
-
-
85049396028
-
Static program analysis as a fuzzing aid
-
Bhargava Shastry, Markus Leutner, Tobias Fiebig, Kashyap Thimmaraju, Fabian Yamaguchi, Konrad Rieck, Jean-Pierre Seifert Stefan Schmid, and Anja Feldmann. 2017. Static Program Analysis as a Fuzzing Aid. In Proc. RAID Recent Advances in Intrusion Detection.
-
(2017)
Proc. RAID Recent Advances in Intrusion Detection
-
-
Shastry, B.1
Leutner, M.2
Fiebig, T.3
Thimmaraju, K.4
Yamaguchi, F.5
Rieck, K.6
Seifert, J.-P.7
Schmid, S.8
Feldmann, A.9
-
84
-
-
84921062083
-
Towards unified programmability of cloud and carrier infrastructure
-
Pontus Sköldström, Balázs Sonkoly, András Gulyás, Felicián Németh, Mario Kind, Fritz-Joachim Westphal, Wolfgang John, Jokin Garay, Eduardo Jacob, Dávid Jocha, et al. 2014. Towards Unified Programmability of Cloud and Carrier Infrastructure. In European Workshop on Software Defined Networking. 55-60.
-
(2014)
European Workshop on Software Defined Networking
, pp. 55-60
-
-
Sköldström, P.1
Sonkoly, B.2
Gulyás, A.3
Németh, F.4
Kind, M.5
Westphal, F.-J.6
John, W.7
Garay, J.8
Jacob, E.9
Dávid Jocha10
-
86
-
-
84888378420
-
A primitive for revealing stealthy peripheralbased attacks on the computing platform's main memory
-
Springer
-
Patrick Stewin. 2013. A primitive for revealing stealthy peripheralbased attacks on the computing platform's main memory. In Proc. RAID Recent Advances in Intrusion Detection. Springer, 1-20.
-
(2013)
Proc. RAID Recent Advances in Intrusion Detection.
, pp. 1-20
-
-
Stewin, P.1
-
89
-
-
85037037507
-
The vAMP attack: Taking control of cloud systems via the unified packet parser
-
Kashyap Thimmaraju et al. 2017. The vAMP Attack: Taking Control of Cloud Systems via the Unified Packet Parser. In Proc. ACM Workshop on Cloud Computing Security (CCSW).
-
(2017)
Proc. ACM Workshop on Cloud Computing Security (CCSW
-
-
Thimmaraju, K.1
-
91
-
-
85037036625
-
A snapshot of Openstack users' attitudes and deployments
-
Apr(Apr 2016
-
Heidi Joy Tretheway et al. Apr 2016. A snapshot of Openstack users' attitudes and deployments. Openstack User Survey (Apr 2016).
-
(2016)
Openstack User Survey
-
-
Tretheway, H.J.1
-
94
-
-
85049410488
-
-
VMware.Update 1 Release Notes.2009). Accessed: 27-01-2017
-
VMware. 2009. VMware ESX 4.0 Update 1 Release Notes. https://www.vmware.com/support/vsphere4/doc/vspesx40u1relnotes.html. (2009). Accessed: 27-01-2017.
-
(2009)
VMware ESX 4.0
-
-
-
95
-
-
85049409444
-
-
VPP Comitters.2017). Accessed: 09-05-2017
-
VPP Comitters. 2017. What is VPP? https://wiki.fd.io/view/VPP/WhatisVPP%3F. (2017). Accessed: 09-05-2017.
-
(2017)
What is VPP?
-
-
|