Towards verifiable outsourced middleboxes

Xingliang Yuan, Huayi Duan, Cong Wang

Research output: Chapter in Book/Report/Conference proceedingConference PaperOther


Outsourced middlebox services have drawn broad attentions recently from both industry and academia [1]. Despite benefiting enterprises from reduced cost and increased service scalability, such services also introduce acute security concerns, because these boxes are no longer under direct control of enterprises. Among others, one fundamental and immediate requirement is to ensure that those middleboxes always perform network functions truthfully and correctly [2]. Fulfilling this requirement will extend enterprises' visibility into remote middleboxes and promote further adoption of middlebox outsourcing services. Unfortunately, to our best knowledge, little work investigates the above problem, i.e., making network functions executed by middleboxes verifiable.

Original languageEnglish
Title of host publication2016 IEEE 24th International Conference on Network Protocols (ICNP)
Subtitle of host publication8-11 November 2016 Singapore
EditorsLili Qiu, Prashant Shenoy
Place of PublicationPiscataway NJ USA
PublisherIEEE, Institute of Electrical and Electronics Engineers
Number of pages2
ISBN (Electronic)9781509032815
ISBN (Print)9781509032822
Publication statusPublished - 2016
Externally publishedYes
EventInternational Conference on Network Protocols 2016 - Singapore, Singapore
Duration: 8 Nov 201611 Nov 2016
Conference number: 24th


ConferenceInternational Conference on Network Protocols 2016
Abbreviated titleICNP 2016

Cite this