Zombie: Middleboxes that {Don't} Snoop

C Zhang, Z DeStefano, A Arun, J Bonneau… - … USENIX Symposium on …, 2024 - usenix.org
Zero-knowledge middleboxes (ZKMBs) are a recent paradigm in which clients get privacy
and middleboxes enforce policy: clients prove in zero knowledge that the plaintext …

{Zero-Knowledge} Middleboxes

P Grubbs, A Arun, Y Zhang, J Bonneau… - 31st USENIX Security …, 2022 - usenix.org
This paper initiates research on zero-knowledge middleboxes (ZKMBs). A ZKMB is a
network middlebox that enforces network usage policies on encrypted traffic. Clients send …

Did we miss anything?: Towards privacy-preserving decentralized id architecture

S Huh, M Shim, J Lee, SS Woo… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Decentralized Identity (DID) is emerging as a new digital identity management scheme that
promises users complete control of their personal data and identification without central …

A survey of sketches in traffic measurement: Design, optimization, application and implementation

S Li, L Luo, D Guo, Q Zhang, P Fu - arXiv preprint arXiv:2012.07214, 2020 - arxiv.org
Network measurement probes the underlying network to support upper-level decisions such
as network management, network update, network maintenance, network defense and …

[PDF][PDF] TRUSTSKETCH: Trustworthy Sketch-based Telemetry on Cloud Hosts

Z Cheng, M Apostolaki, Z Liu… - The Network and …, 2024 - netsyn.princeton.edu
Cloud providers deploy telemetry tools in software to perform end-host network analytics.
Recent efforts show that sketches, a kind of approximate data structure, are a promising …

Practical encrypted network traffic pattern matching for secure middleboxes

S Lai, X Yuan, SF Sun, JK Liu… - … on Dependable and …, 2021 - ieeexplore.ieee.org
Network Function Virtualisation (NFV) advances the adoption of composable software
middleboxes. Accordingly, cloud data centres become major NFV vendors for enterprise …

SGX-Stream: A Secure Stream Analytics Framework In SGX-enabled Edge Cloud

K Bagher, S Lai - Journal of Information Security and Applications, 2023 - Elsevier
This paper introduces SGX-Stream, a secure and efficient data analytics framework for data
streams using Intel SGX. SGX-Stream employs sketch algorithms in a cloud–edge …

OblivCDN: A Practical Privacy-preserving CDN with Oblivious Content Access

V Vo, S Lai, X Yuan, S Nepal, Q Li - arXiv preprint arXiv:2501.07262, 2025 - arxiv.org
Content providers increasingly utilise Content Delivery Networks (CDNs) to enhance users'
content download experience. However, this deployment scenario raises significant security …

Privacy-Preserving Content-Based Similarity Detection Over in-the-Cloud Middleboxes

J Yao, X Meng, Y Zheng, C Wang - IEEE Transactions on Cloud …, 2022 - ieeexplore.ieee.org
It is increasingly popular for cloud providers to offer middlebox service that supports content-
based similarity detection for enterprises. However, redirecting network traffic to the cloud for …

RUSPATCH: Towards Timely and Effectively Patching Rust Applications

Y Wu, B Hua - 2023 IEEE 23rd International Conference on …, 2023 - ieeexplore.ieee.org
Despite the fact that Rust is designed to be a secure programming language for system
programming, it is still vulnerable and exploitable due to its inclusion of an unsafe sub …