A survey on encrypted network traffic analysis applications, techniques, and countermeasures

E Papadogiannaki, S Ioannidis - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The adoption of network traffic encryption is continually growing. Popular applications use
encryption protocols to secure communications and protect the privacy of users. In addition …

Blindbox: Deep packet inspection over encrypted traffic

J Sherry, C Lan, RA Popa, S Ratnasamy - Proceedings of the 2015 ACM …, 2015 - dl.acm.org
Many network middleboxes perform deep packet inspection (DPI), a set of useful tasks
which examine packet payloads. These tasks include intrusion detection (IDS), exfiltration …

Service Function Chaining security survey: Addressing security challenges and threats

M Pattaranantakul, C Vorakulpipat, T Takahashi - Computer Networks, 2023 - Elsevier
Abstract Service function chaining (SFC) is a trending paradigm and it has attracted
considerable attention from both the industry and academia because of its potential to …

[PDF][PDF] The Security Impact of HTTPS Interception.

Z Durumeric, Z Ma, D Springall, R Barnes, N Sullivan… - NDSS, 2017 - git.safemobile.org
As HTTPS deployment grows, middlebox and antivirus products are increasingly
intercepting TLS connections to retain visibility into network traffic. In this work, we present a …

When should the network be the computer?

DRK Ports, J Nelson - Proceedings of the Workshop on Hot Topics in …, 2019 - dl.acm.org
Researchers have repurposed programmable network devices to place small amounts of
application computation in the network, sometimes yielding orders-of-magnitude …

{SafeBricks}: shielding network functions in the cloud

R Poddar, C Lan, RA Popa, S Ratnasamy - 15th USENIX Symposium on …, 2018 - usenix.org
With the advent of network function virtualization (NFV), outsourcing network processing to
the cloud is growing in popularity amongst enterprises and organizations. Such outsourcing …

Privacy-preserving encrypted traffic inspection with symmetric cryptographic techniques in IoT

D Chen, H Wang, N Zhang, X Nie… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
To ensure the security of Internet of Things (IoT) communications, one can use deep packet
inspection (DPI) on network middleboxes to detect and mitigate anomalies and suspicious …

Shieldbox: Secure middleboxes using shielded execution

B Trach, A Krohmer, F Gregor, S Arnautov… - Proceedings of the …, 2018 - dl.acm.org
Middleboxes that process confidential data cannot be securely deployed in untrusted cloud
environments. To securely outsource middleboxes to the cloud, state-of-the-art systems …

Splinter: Practical private queries on public data

F Wang, C Yun, S Goldwasser… - … USENIX Symposium on …, 2017 - usenix.org
Many online services let users query public datasets such as maps, flight prices, or
restaurant reviews. Unfortunately, the queries to these services reveal highly sensitive …

Zombie: Middleboxes that {Don't} Snoop

C Zhang, Z DeStefano, A Arun, J Bonneau… - … USENIX Symposium on …, 2024 - usenix.org
Zero-knowledge middleboxes (ZKMBs) are a recent paradigm in which clients get privacy
and middleboxes enforce policy: clients prove in zero knowledge that the plaintext …