2019
DOI: 10.1007/978-3-030-25543-5_14
|View full text |Cite
|
Sign up to set email alerts
|

Reachability Analysis for AWS-Based Networks

Abstract: Cloud services provide the ability to provision virtual networked infrastructure on demand over the Internet. The rapid growth of these virtually provisioned cloud networks has increased the demand for automated reasoning tools capable of identifying misconfigurations or security vulnerabilities. This type of automation gives customers the assurance they need to deploy sensitive workloads. It can also reduce the cost and time-to-market for regulated customers looking to establish compliance certification for c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
25
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 43 publications
(25 citation statements)
references
References 17 publications
(26 reference statements)
0
25
0
Order By: Relevance
“…Model-based tools [2,5,6,13,16] statically analyze reachability between a specified source and destination in a network or routing device. Rather than transmitting live packets, these tools use formal methods such as constraint solvers to rigorously identify feasible paths.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Model-based tools [2,5,6,13,16] statically analyze reachability between a specified source and destination in a network or routing device. Rather than transmitting live packets, these tools use formal methods such as constraint solvers to rigorously identify feasible paths.…”
Section: Related Workmentioning
confidence: 99%
“…VPC Reachability Analyzer uses the Tiros [2] formal model of AWS VPC networking semantics to identify whether a destination is reachable from a source in a given VPC configuration. If the destination is reachable, then Tiros identifies a feasible path from the source to the destination, where a path is a sequence of network components associated with incoming and/or outgoing packet header assignments (protocol, addresses, ports).…”
Section: Introductionmentioning
confidence: 99%
“…Over the course of 4 years developing code‐level proofs in Amazon Web Services (AWS), 2‐5 we have developed a proof methodology that allows us to produce proofs with reasonable and predictable effort. For example, using these techniques, one full‐time verification engineer and two interns were able to specify and verify 171 entry points over nine key modules in the AWS C Commonlibrary over a period of 24 weeks (see Section 3.3 for a more detailed description of this library).…”
Section: Introductionmentioning
confidence: 99%
“…This development is also not limited to academia. Large cloud providers, such as Alibaba [36], Amazon [2], and Microsoft [20], are developing and deploying network verification systems. However, as shown in Figure 1, each such tool today is a monolith, with its own model of the target functionality and its own analysis engine.…”
Section: Introductionmentioning
confidence: 99%