Data-plane security applications in adversarial settings
نویسندگان
چکیده
High-speed programmable switches have emerged as a promising building block for developing performant data-plane applications. In this paper, we argue that the resource constraints and programming model of hardware led to developers adopting problematic design patterns, whose security implications are not widely understood. We bridge gap by identifying major challenges common pitfalls in switch-based applications adversarial settings. Examining five recently-proposed applications, find adversaries can exploit these completely bypass protection were designed provide, or disrupt system operations introducing collateral damage.
منابع مشابه
Multiagent Communication Security in Non-Zero Sum Adversarial Settings
In future battlefields and other emerging multiagent applications, agents must communicate in an inherently hostile environment in which an adversary has strong incentives to disrupt or intercept communication. Intelligent agents must balance network performance with possible harm suffered from the adversary’s attacks, given that the adversary is actively and rationally balancing his own costs ...
متن کاملOn Security and Sparsity of Linear Classifiers for Adversarial Settings
Machine-learning techniques are widely used in security-related applications, like spam and malware detection. However, in such settings, they have been shown to be vulnerable to adversarial attacks, including the deliberate manipulation of data at test time to evade detection. In this work, we focus on the vulnerability of linear classifiers to evasion attacks. This can be considered a relevan...
متن کاملAsymmetric abstractions for adversarial settings
In multiagent domains, an agent’s beliefs about how other agents will or could act plays a significant role in their own behaviour. In large domains where it is infeasible to uniquely represent every possible decision an agent will face, abstraction is often used to collapse the state and action space to make the problem tractable. By abstracting other agents’ views of the environment, the agen...
متن کاملData Mining in Security Applications
In recent years, research in many security areas has gained a lot of interest among scientists in academia, industry, military and governmental organizations. Researchers have been investigating many advanced technologies to effectively solve acute security problems. Data mining has certainly been one of the most explored technologies successfully applied in many security applications ranging f...
متن کاملOptimal randomized classification in adversarial settings
The problem of learning to distinguish good inputs from malicious has come to be known as adversarial classification emphasizing the fact that, unlike traditional classification, the adversary can manipulate input instances to avoid being so classified. We offer the first general theoretical analysis of the problem of adversarial classification, resolving several important open questions in the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Communication Review
سال: 2022
ISSN: ['0146-4833', '1943-5819']
DOI: https://doi.org/10.1145/3544912.3544914