File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Bedrock: Programmable Network Support for Secure RDMA Systems

TitleBedrock: Programmable Network Support for Secure RDMA Systems
Authors
Issue Date2022
Citation
Proceedings of the 31st Usenix Security Symposium Security 2022, 2022, p. 2585-2600 How to Cite?
AbstractRemote direct memory access (RDMA) has gained popularity in cloud datacenters. In RDMA, clients bypass server CPUs and directly read/write remote memory. Recent findings have highlighted a host of vulnerabilities with RDMA, which give rise to attacks such as packet injection, denial of service, and side channel leakage, but RDMA defenses are still lagging behind. As the RDMA datapath bypasses CPU-based software processing, traditional defenses cannot be easily inserted without incurring performance penalty. Bedrock develops a security foundation for RDMA inside the network, leveraging programmable data planes in modern network hardware. It designs a range of defense primitives, including source authentication, access control, as well as monitoring and logging, to address RDMA-based attacks. Bedrock does not incur software overhead to the critical datapath, and delivers native RDMA performance in data transfers. Moreover, Bedrock operates transparently to legacy RDMA systems, without requiring RNIC, OS, or RDMA library changes. We present a comprehensive set of experiments on Bedrock and demonstrate its effectiveness.
Persistent Identifierhttp://hdl.handle.net/10722/363760

 

DC FieldValueLanguage
dc.contributor.authorXing, Jiarong-
dc.contributor.authorHsu, Kuo Feng-
dc.contributor.authorQiu, Yiming-
dc.contributor.authorYang, Ziyang-
dc.contributor.authorLiu, Hongyi-
dc.contributor.authorChen, Ang-
dc.date.accessioned2025-10-10T07:49:09Z-
dc.date.available2025-10-10T07:49:09Z-
dc.date.issued2022-
dc.identifier.citationProceedings of the 31st Usenix Security Symposium Security 2022, 2022, p. 2585-2600-
dc.identifier.urihttp://hdl.handle.net/10722/363760-
dc.description.abstractRemote direct memory access (RDMA) has gained popularity in cloud datacenters. In RDMA, clients bypass server CPUs and directly read/write remote memory. Recent findings have highlighted a host of vulnerabilities with RDMA, which give rise to attacks such as packet injection, denial of service, and side channel leakage, but RDMA defenses are still lagging behind. As the RDMA datapath bypasses CPU-based software processing, traditional defenses cannot be easily inserted without incurring performance penalty. Bedrock develops a security foundation for RDMA inside the network, leveraging programmable data planes in modern network hardware. It designs a range of defense primitives, including source authentication, access control, as well as monitoring and logging, to address RDMA-based attacks. Bedrock does not incur software overhead to the critical datapath, and delivers native RDMA performance in data transfers. Moreover, Bedrock operates transparently to legacy RDMA systems, without requiring RNIC, OS, or RDMA library changes. We present a comprehensive set of experiments on Bedrock and demonstrate its effectiveness.-
dc.languageeng-
dc.relation.ispartofProceedings of the 31st Usenix Security Symposium Security 2022-
dc.titleBedrock: Programmable Network Support for Secure RDMA Systems-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.scopuseid_2-s2.0-85140978460-
dc.identifier.spage2585-
dc.identifier.epage2600-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats