Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
DNS Congestion Control in Adversarial Settings
SOSP '24: Proceedings of the ACM SIGOPS 30th Symposium on Operating Systems PrinciplesPages 726–747https://doi.org/10.1145/3694715.3695982We instigate the study of adversarial congestion in the context of the Domain Name System (DNS). By strategically choking inter-server channels, this new type of DoS attack can disrupt a large user group's access to target DNS servers at a low cost. In ...
- research-articleSeptember 2024
SPArch: A Hardware-oriented Sketch-based Architecture for High-speed Network Flow Measurements
ACM Transactions on Privacy and Security (TOPS), Volume 27, Issue 4Article No.: 29, Pages 1–34https://doi.org/10.1145/3687477Network flow measurement is an integral part of modern high-speed applications for network security and data-stream processing. However, processing at line rate while maintaining the required data structure within the on-chip memory of the hardware ...
- research-articleJanuary 2025
CAMP: compositional amplification attacks against DNS
SEC '24: Proceedings of the 33rd USENIX Conference on Security SymposiumArticle No.: 323, Pages 5769–5786While DNS is often exploited by reflective DoS attacks, it can also be weaponized as a powerful amplifier to overload itself, as evidenced by a stream of recently discovered application-layer amplification attacks. Given the importance of DNS, the ...
- research-articleJanuary 2025
Zero-setup intermediate-rate communication guarantees in a global internet
SEC '24: Proceedings of the 33rd USENIX Conference on Security SymposiumArticle No.: 15, Pages 253–270Network-targeting volumetric DDoS attacks remain a major threat to Internet communication. Unfortunately, existing solutions fall short of providing forwarding guarantees to the important class of short-lived intermediate-rate communication such as web ...
- research-articleJuly 2024
The SA4P Framework: Sensing and Actuation as a Privilege
ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications SecurityPages 873–885https://doi.org/10.1145/3634737.3657006Popular consumer Internet of Things (IoT) devices provide increasingly diverse sensing and actuation capabilities. Despite their benefits, such devices prompt numerous security concerns. Typically, security is attained at device-level granularity, which ...
-
- research-articleJuly 2024
An Empirical Study of Consensus Protocols’ DoS Resilience
ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications SecurityPages 1345–1360https://doi.org/10.1145/3634737.3656997With the proliferation of blockchain technology in high-value sectors, consensus protocols are becoming critical infrastructures. The rapid innovation cycle in Byzantine fault tolerant (BFT) consensus protocols has culminated in HotStuff, which provides ...
- articleFebruary 2024
Quality Competition Among Internet Service Providers
ACM SIGMETRICS Performance Evaluation Review (SIGMETRICS), Volume 51, Issue 4Pages 4–5https://doi.org/10.1145/3649477.3649481Internet service providers (ISPs) have a variety of quality attributes that determine their attractiveness for data transmission, ranging from quality-of-service metrics such as jitter to security properties such as the presence of DDoS defense systems. ...
- research-articleFebruary 2024
Quality competition among internet service providers
AbstractInternet service providers (ISPs) have a variety of quality attributes that determine their attractiveness for data transmission, ranging from quality-of-service metrics such as jitter to security properties such as the presence of DDoS defense ...
A Formal Framework for End-to-End DNS Resolution
ACM SIGCOMM '23: Proceedings of the ACM SIGCOMM 2023 ConferencePages 932–949https://doi.org/10.1145/3603269.3604870Despite the central importance of DNS, numerous attacks and vulnerabilities are regularly discovered. The root of the problem is the ambiguity and tremendous complexity of DNS protocol specifications, amid a rapidly evolving Internet infrastructure. To ...
- research-articleAugust 2023
Did the shark eat the watchdog in the NTP pool? deceiving the NTP pool's monitoring system
SEC '23: Proceedings of the 32nd USENIX Conference on Security SymposiumArticle No.: 344, Pages 6151–6166The NTP pool has become a critical infrastructure for modern Internet services and applications. With voluntarily joined thousands of timeservers, it supplies millions of distributed (heterogeneous) systems with time. While numerous efforts have been ...
- research-articleAugust 2023
FABRID: flexible attestation-based routing for inter-domain networks
SEC '23: Proceedings of the 32nd USENIX Conference on Security SymposiumArticle No.: 322, Pages 5755–5772In its current state, the Internet does not provide end users with transparency and control regarding on-path forwarding devices. In particular, the lack of network device information reduces the trustworthiness of the forwarding path and prevents end-...
- research-articleAugust 2023
Hey kimya, is my smart speaker spying on me? taking control of sensor privacy through isolation and amnesia
SEC '23: Proceedings of the 32nd USENIX Conference on Security SymposiumArticle No.: 135, Pages 2401–2418Although smart speakers and other voice assistants are becoming increasingly ubiquitous, their always-standby nature continues to prompt significant privacy concerns. To address these, we propose KIMYA, a hardening framework that allows device vendors to ...
- research-articleJune 2023
Carbon-Aware Global Routing in Path-Aware Networks
e-Energy '23: Proceedings of the 14th ACM International Conference on Future Energy SystemsPages 144–158https://doi.org/10.1145/3575813.3595192The growing energy consumption of Information and Communication Technology (ICT) has raised concerns about its environmental impact. However, the carbon footprint of data transmission over the Internet has so far received relatively modest attention. ...
- short-paperMay 2023
Qualitative Intention-aware Attribute-based Access Control Policy Refinement
SACMAT '23: Proceedings of the 28th ACM Symposium on Access Control Models and TechnologiesPages 201–208https://doi.org/10.1145/3589608.3593841Designing access control policies is often expensive and tedious due to the heterogeneous systems, services, and diverse user demands. Although ABAC policy and decision engine creation methods based on machine learning have been proposed, they cannot ...
- ArticleDecember 2023
Demystifying Web3 Centralization: The Case of Off-Chain NFT Hijacking
AbstractDespite the ambitious vision of re-decentralizing the Web as we know it, the Web3 movement is facing many hurdles of centralization which seem insurmountable in the near future, and the security implications of centralization remain largely ...
- ArticleOctober 2023
Determining an Economic Value of High Assurance for Commodity Software Security (Transcript of Discussion)
AbstractThis paper is on how to determine an economic value of high assurance for commodity software security.
- ArticleOctober 2023
Determining an Economic Value of High Assurance for Commodity Software Security
AbstractSecurity measures that attempt to prevent breaches of commodity software have not used high assurance methods and tools. Instead, rational defenders have risked incurring losses caused by breaches because the cost of recovery from a breach ...
- ArticleOctober 2023
Trusted Introductions for Secure Messaging
AbstractAlthough today’s most prevalent end-to-end encrypted messaging platforms using the Signal Protocol perform opportunistic encryption and provide resistance to eavesdropping, they are still vulnerable to impersonation attacks. We propose Trusted ...
Bayesian Sketches for Volume Estimation in Data Streams
Proceedings of the VLDB Endowment (PVLDB), Volume 16, Issue 4Pages 657–669https://doi.org/10.14778/3574245.3574252Given large data streams of items, each attributable to a certain key and possessing a certain volume, the aggregate volume associated with a key is difficult to estimate in a way that is both efficient and accurate. On the one hand, exact counting with ...
- research-articleNovember 2022
Tango or square dance?: how tightly should we integrate network functionality in browsers?
HotNets '22: Proceedings of the 21st ACM Workshop on Hot Topics in NetworksPages 205–212https://doi.org/10.1145/3563766.3564111The question at which layer network functionality is presented or abstracted remains a research challenge. Traditionally, network functionality was either placed into the core network, middleboxes, or into the operating system - but recent developments ...