{"id":170532,"date":"2010-08-17T17:16:59","date_gmt":"2010-08-17T17:16:59","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/project\/bunker-a-privacy-oriented-platform-for-network-tracing\/"},"modified":"2017-06-05T09:30:18","modified_gmt":"2017-06-05T16:30:18","slug":"bunker-a-privacy-oriented-platform-for-network-tracing","status":"publish","type":"msr-project","link":"https:\/\/www.microsoft.com\/en-us\/research\/project\/bunker-a-privacy-oriented-platform-for-network-tracing\/","title":{"rendered":"Bunker: A Privacy-Oriented Platform for Network Tracing"},"content":{"rendered":"<p>Bunker is a network tracing system that offers strong privacy while simplifying the development of network tracing software. With Bunker, network operators can perform network tracing based on the following two-step usage model:<\/p>\n<ol>\n<li>Pre-load Bunker with the trace collection and anonymization software.<\/li>\n<li>Start data collection with Bunker.<\/li>\n<\/ol>\n<p>With Bunker, all sensitive data is stored in a buffer on disk that is &#8220;locked down&#8221; along with the tracing software. In this way, no raw data can be lost, leaked, or stolen.<\/p>\n<p>The locked down buffer is encrypted with a key stored in Bunker&#8217;s RAM. Bunker uses virtualization, encryption, and restricted I\/O interfaces to protect the key and the tracing software, exporting only an anonymized trace. For more information about Bunker&#8217;s architecture and a performance evaluation, please read our research papers.<\/p>\n<p>To download Bunker&#8217;s source code and instructions on how to install it, please visit the <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" href=\"http:\/\/www.cs.toronto.edu\/~stefan\/\/bunker\" target=\"_blank\">Bunker project page <span class=\"sr-only\"> (opens in new tab)<\/span><\/a>hosted at the University of Toronto.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bunker is a network tracing system that offers strong privacy while simplifying the development of network tracing software. With Bunker, network operators can perform network tracing based on the following two-step usage model: Pre-load Bunker with the trace collection and anonymization software. Start data collection with Bunker. With Bunker, all sensitive data is stored in [&hellip;]<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"research-area":[13547],"msr-locale":[268875],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-170532","msr-project","type-msr-project","status-publish","hentry","msr-research-area-systems-and-networking","msr-locale-en_us","msr-archive-status-active"],"msr_project_start":"2010-08-17","related-publications":[160032],"related-downloads":[],"related-videos":[],"related-groups":[144899],"related-events":[],"related-opportunities":[],"related-posts":[],"related-articles":[],"tab-content":[],"slides":[],"related-researchers":[{"type":"user_nicename","value":"alecw","display_name":"Alec Wolman","author_link":"<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/alecw\/\" aria-label=\"Visit the profile page for Alec Wolman\">Alec Wolman<\/a>","is_active":false,"user_id":30925,"last_first":"Wolman, Alec","people_section":0,"alias":"alecw"},{"type":"user_nicename","value":"ssaroiu","display_name":"Stefan Saroiu","author_link":"<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/ssaroiu\/\" aria-label=\"Visit the profile page for Stefan Saroiu\">Stefan Saroiu<\/a>","is_active":false,"user_id":33716,"last_first":"Saroiu, Stefan","people_section":0,"alias":"ssaroiu"}],"msr_research_lab":[199565],"msr_impact_theme":[],"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/170532","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-project"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/170532\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=170532"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=170532"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=170532"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=170532"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=170532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}