Making Edge Computing Reliable
The introduction of computational resources at the network edge allows us to offload computation from clients and/or servers, thereby...
Secure and Fault-Tolerant Key Management
Security network protocols such as TLS and SSH use public key cryptography for client authentication. Clients are responsible for storing...
Make network functions software-defined
Large-scale networks contain a massive amount and variety of appliances, usually referred to as network functions (NFs) or middleboxes....
Complexity DDoS Prevention with Multicore Processors
By sending just a few carefully crafted packets, an attacker could launch an algorithmic complexity denial of service attack on a Deep...
Nearest-Neighbor Search in Real Time
Similarity search, and specifically the nearest-neighbor search (NN) problem is widely used in many fields of computer science such as...
Deep Packet Inspection as a Service
Almost all middleboxes that deal with L7 protocols do Deep Packet Inspection (DPI). Today, traffic is inspected from scratch by all the...