Data-plane security applications in adversarial settings

نویسندگان

چکیده

High-speed programmable switches have emerged as a promising building block for developing performant data-plane applications. In this paper, we argue that the resource constraints and programming model of hardware led to developers adopting problematic design patterns, whose security implications are not widely understood. We bridge gap by identifying major challenges common pitfalls in switch-based applications adversarial settings. Examining five recently-proposed applications, find adversaries can exploit these completely bypass protection were designed provide, or disrupt system operations introducing collateral damage.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multiagent Communication Security in Non-Zero Sum Adversarial Settings

In future battlefields and other emerging multiagent applications, agents must communicate in an inherently hostile environment in which an adversary has strong incentives to disrupt or intercept communication. Intelligent agents must balance network performance with possible harm suffered from the adversary’s attacks, given that the adversary is actively and rationally balancing his own costs ...

متن کامل

On Security and Sparsity of Linear Classifiers for Adversarial Settings

Machine-learning techniques are widely used in security-related applications, like spam and malware detection. However, in such settings, they have been shown to be vulnerable to adversarial attacks, including the deliberate manipulation of data at test time to evade detection. In this work, we focus on the vulnerability of linear classifiers to evasion attacks. This can be considered a relevan...

متن کامل

Asymmetric abstractions for adversarial settings

In multiagent domains, an agent’s beliefs about how other agents will or could act plays a significant role in their own behaviour. In large domains where it is infeasible to uniquely represent every possible decision an agent will face, abstraction is often used to collapse the state and action space to make the problem tractable. By abstracting other agents’ views of the environment, the agen...

متن کامل

Data Mining in Security Applications

In recent years, research in many security areas has gained a lot of interest among scientists in academia, industry, military and governmental organizations. Researchers have been investigating many advanced technologies to effectively solve acute security problems. Data mining has certainly been one of the most explored technologies successfully applied in many security applications ranging f...

متن کامل

Optimal randomized classification in adversarial settings

The problem of learning to distinguish good inputs from malicious has come to be known as adversarial classification emphasizing the fact that, unlike traditional classification, the adversary can manipulate input instances to avoid being so classified. We offer the first general theoretical analysis of the problem of adversarial classification, resolving several important open questions in the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computer Communication Review

سال: 2022

ISSN: ['0146-4833', '1943-5819']

DOI: https://doi.org/10.1145/3544912.3544914