We present a minimal extension to the BSD socket layer that can improve the performance of application-level security protocols, such as SSH or SSL/TLS, by 10%, when hardware cryptographic accelerators are available in the system. Applications specify what cryptographic transforms must be applied to incoming and outgoing data frames, and such processing is applied by the operating system itself (exploiting hardware accelerators) when the application sends or receives data. Under this scheme, we can reduce the number of system calls and context switches by 50%, and the amount of data copying by 66%. We describe our prototype implementation for the openBSD system and quantify its performance implications. We conclude with a discussion of furt...
Automated runtime security adaptation has great potential in providing timely and fine grained secur...
The IP security protocols are sufficiently mature to benefit from multiple independent implementatio...
With more than 2 billion people connected to the Internet, information security has become a top pri...
Separation of control and data plane is a principle increasingly used to improve the performance of ...
Abstract Separation of control and data plane is a principle increasingly used to improve the perfor...
Separation of control and data plane is a principle increasingly used to improve the performance of ...
Separation of control and data plane is a principle increasingly used to improve the performance of ...
Cryptographic transformations are a fundamental building block in many security applications and pro...
Along with the explosive growth of network data, security is becoming increasingly important for web...
Sending documents containing sensitive information is commonly performed on distributed systems. To ...
The Internet is an insecure medium. The Secure Socket Layer (SSL) protocol and its successor Transpo...
Secure end-to-end communication is becoming increas-ingly important as more private and sensitive da...
Information security, including integrity and privacy, is an important concern among today’s compute...
Much of today’s distributed computing takes place in a client /server model. Despite advances in fau...
Information security, including integrity and privacy, is an important concern among today's compute...
Automated runtime security adaptation has great potential in providing timely and fine grained secur...
The IP security protocols are sufficiently mature to benefit from multiple independent implementatio...
With more than 2 billion people connected to the Internet, information security has become a top pri...
Separation of control and data plane is a principle increasingly used to improve the performance of ...
Abstract Separation of control and data plane is a principle increasingly used to improve the perfor...
Separation of control and data plane is a principle increasingly used to improve the performance of ...
Separation of control and data plane is a principle increasingly used to improve the performance of ...
Cryptographic transformations are a fundamental building block in many security applications and pro...
Along with the explosive growth of network data, security is becoming increasingly important for web...
Sending documents containing sensitive information is commonly performed on distributed systems. To ...
The Internet is an insecure medium. The Secure Socket Layer (SSL) protocol and its successor Transpo...
Secure end-to-end communication is becoming increas-ingly important as more private and sensitive da...
Information security, including integrity and privacy, is an important concern among today’s compute...
Much of today’s distributed computing takes place in a client /server model. Despite advances in fau...
Information security, including integrity and privacy, is an important concern among today's compute...
Automated runtime security adaptation has great potential in providing timely and fine grained secur...
The IP security protocols are sufficiently mature to benefit from multiple independent implementatio...
With more than 2 billion people connected to the Internet, information security has become a top pri...