Proceedings of the 6th ACM/IEEE Symposium on Architectures for Networking and Communications Systems 2010
DOI: 10.1145/1872007.1872011
|View full text |Cite
|
Sign up to set email alerts
|

Design of a secure packet processor

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
7
1

Relationship

4
4

Authors

Journals

citations
Cited by 18 publications
(12 citation statements)
references
References 22 publications
0
12
0
Order By: Relevance
“…We show this vulnerability for two specific systems, a Click modular router [2] and a custom packet processor [3] based on the NetFPGA platform [4], as representatives for the broad class of routers with programmable packet processors. We also show that processor monitoring techniques developed in prior and related work [5] can help in identifying and mitigating these attacks.…”
Section: Introductionmentioning
confidence: 90%
“…We show this vulnerability for two specific systems, a Click modular router [2] and a custom packet processor [3] based on the NetFPGA platform [4], as representatives for the broad class of routers with programmable packet processors. We also show that processor monitoring techniques developed in prior and related work [5] can help in identifying and mitigating these attacks.…”
Section: Introductionmentioning
confidence: 90%
“…A hardware monitor operates in parallel with a processor core and verifies that the core operates within certain constraints (e.g., not accessing certain memory locations, executing certain sequences of instructions, etc.). Hardware monitoring has been studied extensively for embedded systems [15]- [17] and has also been proposed for use in network processors [6]. In our recent work, we describe a high-performance implementation of such a hardware monitoring system that can meet the throughput demands of a network processor with a single processing core [18].…”
Section: Related Workmentioning
confidence: 99%
“…Additionally, network intrusion detection systems (e.g., snort [4] or Bro [5]) are often only positioned on the ingress side of campus networks and thus do not protect the Internet core. In response to this need, hardware monitors for network processor cores have been introduced to provide runtime execution protection [6]. A hardware monitor operates in concert with an embedded network processor core to assess runtime behavior.…”
Section: Introductionmentioning
confidence: 99%
“…• Hardware monitors: Monitoring with hardware monitors requires dedicated hardware logic to be co-located with each processor core. The hardware monitor tracks the operation of the processor and reports unusual events [20], [21]. Hardware monitors are often used in a security context, where malicious attacks need to be detected.…”
Section: ) Existing Detection Techniquesmentioning
confidence: 99%