BlindBox: Deep packet inspection over encrypted traffic Sherry et al. SIGCOMM 2015 This is the final paper from the inaugural Research for Practice selections, and the third of Justine Sherry's three picks. The fundamental problem addressed is the same as we looked at yesterday: how do you accommodate middleboxes in HTTPS traffic? More specifically, this … Continue reading BlindBox: Deep packet inspection over encrypted traffic
Year: 2016
Multi-context TLS (mcTLS): Enabling secure in-network functionality in TLS
Multi-Context TLS (mcTLS): Enabling secure in-network functionality in TLS Naylor et al. SIGCOMM 2015 We're rushing to deploy HTTPS everywhere - and about time - but this has interesting implications for middleboxes since it's hard for them to do their job when traffic is encrypted end-to-end. Say you want to add caching, compression, an intrusion … Continue reading Multi-context TLS (mcTLS): Enabling secure in-network functionality in TLS
E2: A framework for NFV applications
E2: A Framework for NFV Applications Palkar et al. SOSP 2015 Today we move into the second part of the Research for Practice article, which is a selection of papers from Justine Sherry on Network Function Virtualization. We start with 'E2,' which seeks to address the proliferation and duplication of network function (NF) specific management … Continue reading E2: A framework for NFV applications
Shielding applications from an untrusted cloud with Haven
Shielding applications from an untrusted cloud with Haven Baumann et al. OSDI 2014 Our objective is to run existing server applications in the cloud with a level of trust and security roughly equivalent to a user operating their own hardware in a locked cage at a colocation facility. We're all familiar with the idea of … Continue reading Shielding applications from an untrusted cloud with Haven
IX: A protected dataplane operating system for high throughput and low latency
IX: A Protected Dataplane Operating System for High Throughput and Low Latency Belay et al. OSDI 2014 This is the second of Simon Peter's recommended papers in the 'Data Center OS Design' Research for Practice guide. Like Arrakis, IX splits the operating system into a control plane and data plane for networking. To quote Simon … Continue reading IX: A protected dataplane operating system for high throughput and low latency
Arrakis: the operating system is the control plane
Arrakis: The Operating System is the Control Plane - Peter et al. OSDI 2014 ACM Queue just introduced their "Research for Practice" series with Peter Bailis. Each edition contains 'expert curated guides to the best of CS research,' and in the first instalment Simon Peter selects a set of papers on data-center operating system trends, … Continue reading Arrakis: the operating system is the control plane
Identifying and quantifying architectural debt
Identifying and quantifying architectural debt - Xiao et al., ICSE 2016 (Update: thanks to Lu Xiao for providing an open access version of this paper, the link above has now been updated to point to it.) So finally we have arrived at Xiao et al.'s 2016 ICSE paper (see the write-ups on Design Rule Spaces … Continue reading Identifying and quantifying architectural debt
Hotspot Patterns: The formal definition and automatic detection of architecture smells
Hotspot Patterns: The formal definition and automatic detection of architecture smells - Mo et al. International Conference on Software Architecture, 2015 Yesterday we looked at Design Rule Spaces (DRSpaces) and how some design rule spaces seem to account for large numbers of the error-prone files within a project. Today's paper brings us up to date … Continue reading Hotspot Patterns: The formal definition and automatic detection of architecture smells
Design Rule Spaces: A new form of architectural insight
Design Rule Spaces: A new form of architectural insight - Xiao et al. ICSE '14 Continuing the theme of looking at ICSE 2016 papers, I want to share with you some interesting work by Xiao et al. on "Identifying and quantifying architectural debt." That paper however draws heavily on two previous works that it makes … Continue reading Design Rule Spaces: A new form of architectural insight
On the “naturalness” of buggy code
On the 'naturalness' of buggy code - Ray, Hellendoorn, et al. ICSE 2016 Last week we looked at a simpler approach to building static code checkers that by understanding less about the overall code structure and just focusing in on the things that really mattered was able to produce competitive results from very small checker … Continue reading On the “naturalness” of buggy code