Projects per year
Abstract
Flexible and powerful control over network flows is one of the core advantages of Software-Defined Networking (SDN). Flow rules stored in switch network flow tables contain information on packet processing and routing. Flow rules are stored in memory, in a set of data structure rules, and managed by a classifier in flow tables. Network flows are a valuable asset: they contain information about the traffic patterns between the endpoints, while network tenants may be competing for the (limited) entries in flow tables.Commodity software switches do not currently implement confidentiality or integrity protection of flow tables. An attacker can exploit software vulnerabilities to access the switch host memory and observe or modify installed flows. Observing installed flows allows an attacker to learn security-sensitive information: topology, flow patterns between endpoints, and flow priority. Modifying installed flows allows an attacker to exploit routing loopholes and avoid certain packet steps - e.g. route around a firewall or prevent mirroring packets to an intrusion detection system.
In this demo we presentOFTinSGX, an approach to protect the confidentiality and integrity of network flows installed on soft-ware switches. Our approach is based on decomposing the network switch to reduce the attack surface by isolating the OpenFlow flow tables and the flow rules from the rest of the code base. OFTinSGX allows to prevent attacks on the confidentiality and integrity of flow rules in software switches.
In this demo we presentOFTinSGX, an approach to protect the confidentiality and integrity of network flows installed on soft-ware switches. Our approach is based on decomposing the network switch to reduce the attack surface by isolating the OpenFlow flow tables and the flow rules from the rest of the code base. OFTinSGX allows to prevent attacks on the confidentiality and integrity of flow rules in software switches.
Original language | English |
---|---|
Title of host publication | ACM SIGCOMM 2019 Conference on Posters and Demos |
Publisher | Association for Computing Machinery (ACM) |
Pages | 146-147 |
ISBN (Electronic) | 9781450368865 |
DOIs | |
Publication status | Published - 2019 Aug 23 |
Event | ACM SIGCOMM 2019 - Beijing, China Duration: 2019 Aug 19 → 2019 Aug 24 |
Conference
Conference | ACM SIGCOMM 2019 |
---|---|
Country/Territory | China |
City | Beijing |
Period | 2019/08/19 → 2019/08/24 |
Subject classification (UKÄ)
- Communication Systems
Fingerprint
Dive into the research topics of 'Protecting OpenFlow Flow Tables with Intel SGX'. Together they form a unique fingerprint.Projects
- 1 Finished
-
SMARTY: Säkra mjukvaruuppdateringar för den smarta staden
Hell, M., Magnusson, B., Gehrmann, C., Paladi, N., Karlsson, L., Sönnerup, J., Johnsson, B. A., Hedin, G., Nordahl, M., Pagnin, E., Kundu, R. & Åkesson, A.
Swedish Foundation for Strategic Research, SSF
2018/03/01 → 2023/02/28
Project: Research