3 research outputs found

    Front-Running Protection for Distributed Exchanges using Tamper-Resistant Round Trip Time Measurements

    Full text link
    In this paper we present ODIN, a front-running protection system that uses a novel algorithm to measure Round-Trip-Time (RTT) to untrusted servers. ODIN is the decentralized equivalent of THOR, a RTT-aware front-running protection system for trading on centralized exchanges. Unlike centralized exchanges, P2P exchanges have potentially malicious peers which makes reliable direct RTT measurement impossible. In order to prevent tampering by an arbitrarily malicious peer, ODIN performs an indirect RTT measurement that never interacts directly with the target machine. The RTT to the target is estimated by measuring the RTT to a randomized IP address that is known to be close to the target's IP address in the global routing network. We find that ODIN's RTT estimation algorithm provides an accurate, practical, and generic solution for collecting network latency data in a hostile network environment

    Energy Attack Mitigation for Intermittent Computing Devices

    No full text
    Energy attacks against energy-harvesting intermittent devices let a malicious agent shut downthe device without physical or network access. Energy attacks can prevent a sensor device from collecting important sensor data due to being powered down. We present an attack mitigation system for energy harvesting devices that improves quality of service during energy attacks.The attack mitigation system helps prevent or delay the device from running out of energy and powering down, which maximises the device's ability to provide sensor data despite energy attacks. We show that the attack mitigation system is effective by simulating an energyharvesting device in a range of energy conditions

    Energy Attack Mitigation for Intermittent Computing Devices

    No full text
    Energy attacks against energy-harvesting intermittent devices let a malicious agent shut downthe device without physical or network access. Energy attacks can prevent a sensor device from collecting important sensor data due to being powered down. We present an attack mitigation system for energy harvesting devices that improves quality of service during energy attacks.The attack mitigation system helps prevent or delay the device from running out of energy and powering down, which maximises the device's ability to provide sensor data despite energy attacks. We show that the attack mitigation system is effective by simulating an energyharvesting device in a range of energy conditions
    corecore