MY RESEARCH BLOG

June 8, 2018

The introduction of computational resources at the network edge allows us to offload computation from clients and/or servers, thereby reducing response latency, backbone bandwidth, and computational requirements on clients. More fundamentally, edge-computing moves us f...

July 1, 2017

Security network protocols such as TLS and SSH use public key cryptography for client authentication. Clients are responsible for storing and handling their private keys, but such private keys are prone to leakage and theft. In fact, many recent infamous attacks exploi...

February 1, 2016

Large-scale networks contain a massive amount and variety of appliances, usually referred to as network functions (NFs) or middleboxes. These appliances are usually extremely expensive, hard to manage, to scale and to provision, and allow no multi-tenancy. Moreover, as...

January 22, 2016

By sending just a few carefully crafted packets, an attacker could launch an algorithmic complexity denial of service attack on a Deep Packet Inspection (DPI) engine. Such engines are at the core of security devices, thus, they expose a weakness in the first line of de...

June 1, 2015

Similarity search, and specifically the nearest-neighbor search (NN) problem is widely used in many fields of computer science such as machine learning, computer vision and databases. However, in many settings such searches are known to suffer from the notorious curse...

December 1, 2014

Almost all middleboxes that deal with L7 protocols do Deep Packet Inspection (DPI). Today, traffic is inspected from scratch by all the middleboxes on its route. In this paper, we propose to treat DPI as a service to the middleboxes, implying that traffic should be sca...

Please reload

  • github
  • gscholar
  • LinkedIn Clean Grey

© 2016 Yotam Harchol

This site was designed with the
.com
website builder. Create your website today.
Start Now