Abstract:
Network middleboxes provide the first line of defense for enterprise networks. Many of them typically inspect packet payload to filter malicious attack patterns. However,...Show MoreMetadata
Abstract:
Network middleboxes provide the first line of defense for enterprise networks. Many of them typically inspect packet payload to filter malicious attack patterns. However, the widespread use of end-to-end cryptographic protocols designed to promote security and privacy, either inhibits deep packet inspection in the network or forces enterprises to use solutions that are not secure. This article introduces a complete framework for building secure and practical network middleboxes, called EVE, which enables visibility over encrypted traffic. EVE securely processes encrypted traffic using a combination of hardware-based trusted execution and software security technology. For enhanced programmability and security, EVE provides a high-level programming interface based on the Rust language. The high-level APIs of EVE provide security and significantly ease the development effort by hiding the details of cryptographic operations, enclave processing, TCP reassembly, and out-of-band key sharing. Our evaluation shows EVE supports diverse use cases with multiple encryption protocols in a secure fashion while delivering high performance.
Published in: IEEE/ACM Transactions on Networking ( Volume: 28, Issue: 6, December 2020)
Funding Agency:
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Middleboxes ,
- Encryption ,
- Protocols ,
- Programming ,
- Servers
- Index Terms
- Security Protocols ,
- Multiple Protocols ,
- Middlebox ,
- Multiple Encryption ,
- First Line Of Defense ,
- Application Programming Interface ,
- Enterprise Network ,
- Internet Of Things ,
- Coded Based ,
- Pattern Matching ,
- Side-channel ,
- Potential Vulnerability ,
- Incoming Flow ,
- Threat Model ,
- Engineering Efforts ,
- Deployment Model ,
- Flow Management ,
- Preprocessing Phase ,
- Secure Channel ,
- Performance Overhead ,
- Session Key ,
- Third-party Libraries ,
- End-to-end Encryption ,
- Component Of Security ,
- Key Agreement ,
- Packet Processing ,
- Decryption Key ,
- Security Vulnerabilities ,
- Functional Networks ,
- Cryptographic Schemes
- Author Keywords
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Middleboxes ,
- Encryption ,
- Protocols ,
- Programming ,
- Servers
- Index Terms
- Security Protocols ,
- Multiple Protocols ,
- Middlebox ,
- Multiple Encryption ,
- First Line Of Defense ,
- Application Programming Interface ,
- Enterprise Network ,
- Internet Of Things ,
- Coded Based ,
- Pattern Matching ,
- Side-channel ,
- Potential Vulnerability ,
- Incoming Flow ,
- Threat Model ,
- Engineering Efforts ,
- Deployment Model ,
- Flow Management ,
- Preprocessing Phase ,
- Secure Channel ,
- Performance Overhead ,
- Session Key ,
- Third-party Libraries ,
- End-to-end Encryption ,
- Component Of Security ,
- Key Agreement ,
- Packet Processing ,
- Decryption Key ,
- Security Vulnerabilities ,
- Functional Networks ,
- Cryptographic Schemes
- Author Keywords