• Publications
  • Influence
Making middleboxes someone else's problem: network processing as a cloud service
Modern enterprises almost ubiquitously deploy middlebox processing services to improve security and performance in their networks. Despite this, we find that today's middlebox infrastructure isExpand
  • 658
  • 73
Rollback-Recovery for Middleboxes
Network middleboxes must offer high availability, with automatic failover when a device fails. Achieving high availability is challenging because failover must correctly restore lost state (e.g.,Expand
  • 111
  • 20
Embark: Securely Outsourcing Middleboxes to the Cloud
It is increasingly common for enterprises and other organizations to outsource network processing to the cloud. For example, enterprises may outsource firewalling, caching, and deep packetExpand
  • 73
  • 17
BlindBox: Deep Packet Inspection over Encrypted Traffic
Many network middleboxes perform deep packet inspection (DPI), a set of useful tasks which examine packet payloads. These tasks include intrusion detection (IDS), exfiltration detection, and parentalExpand
  • 110
  • 14
Silo: Predictable Message Latency in the Cloud
Many cloud applications can benefit from guaranteed latency for their network messages, however providing such predictability is hard, especially in multi-tenant datacenters. We identify three keyExpand
  • 98
  • 14
Low latency via redundancy
Low latency is critical for interactive networked applications. But while we know how to scale systems to increase capacity, reducing latency --- especially the tail of the latency distribution ---Expand
  • 168
  • 13
BlindBox: Deep Packet Inspection over Encrypted Traffic
  • 88
  • 11
Elastic Scaling of Stateful Network Functions
Elastic scaling is a central promise of NFV but has been hard to realize in practice. The difficulty arises because most Network Functions (NFs) are stateful and this state need to be shared acrossExpand
  • 59
  • 11
Reverse traceroute
Traceroute is the most widely used Internet diagnostic tool today. Network operators use it to help identify routing failures, poor performance, and router misconfigurations. Researchers use it toExpand
  • 154
  • 8
Using the Middle to Meddle with Mobile
Researchers and mobile users have little visibility into the network traffic generated by mobile devices and have poor control over how, when, and where that traffic is sent and handled. This paperExpand
  • 26
  • 8