1,152 research outputs found
An Optimal Self-Stabilizing Firing Squad
Consider a fully connected network where up to processes may crash, and
all processes start in an arbitrary memory state. The self-stabilizing firing
squad problem consists of eventually guaranteeing simultaneous response to an
external input. This is modeled by requiring that the non-crashed processes
"fire" simultaneously if some correct process received an external "GO" input,
and that they only fire as a response to some process receiving such an input.
This paper presents FireAlg, the first self-stabilizing firing squad algorithm.
The FireAlg algorithm is optimal in two respects: (a) Once the algorithm is
in a safe state, it fires in response to a GO input as fast as any other
algorithm does, and (b) Starting from an arbitrary state, it converges to a
safe state as fast as any other algorithm does.Comment: Shorter version to appear in SSS0
A Formal Approach to Exploiting Multi-Stage Attacks based on File-System Vulnerabilities of Web Applications (Extended Version)
Web applications require access to the file-system for many different tasks.
When analyzing the security of a web application, secu- rity analysts should
thus consider the impact that file-system operations have on the security of
the whole application. Moreover, the analysis should take into consideration
how file-system vulnerabilities might in- teract with other vulnerabilities
leading an attacker to breach into the web application. In this paper, we first
propose a classification of file- system vulnerabilities, and then, based on
this classification, we present a formal approach that allows one to exploit
file-system vulnerabilities. We give a formal representation of web
applications, databases and file- systems, and show how to reason about
file-system vulnerabilities. We also show how to combine file-system
vulnerabilities and SQL-Injection vulnerabilities for the identification of
complex, multi-stage attacks. We have developed an automatic tool that
implements our approach and we show its efficiency by discussing several
real-world case studies, which are witness to the fact that our tool can
generate, and exploit, complex attacks that, to the best of our knowledge, no
other state-of-the-art-tool for the security of web applications can find
On the Tomography of Networks and Multicast Trees
In this paper we model the tomography of scale free networks by studying the
structure of layers around an arbitrary network node. We find, both
analytically and empirically, that the distance distribution of all nodes from
a specific network node consists of two regimes. The first is characterized by
rapid growth, and the second decays exponentially. We also show that the nodes
degree distribution at each layer is a power law with an exponential cut-off.
We obtain similar results for the layers surrounding the root of multicast
trees cut from such networks, as well as the Internet. All of our results were
obtained both analytically and on empirical Interenet data
Reaching Approximate Byzantine Consensus with Multi-hop Communication
We address the problem of reaching consensus in the presence of Byzantine
faults. In particular, we are interested in investigating the impact of
messages relay on the network connectivity for a correct iterative approximate
Byzantine consensus algorithm to exist. The network is modeled by a simple
directed graph. We assume a node can send messages to another node that is up
to hops away via forwarding by the intermediate nodes on the routes, where
is a natural number. We characterize the necessary and
sufficient topological conditions on the network structure. The tight
conditions we found are consistent with the tight conditions identified for
, where only local communication is allowed, and are strictly weaker for
. Let denote the length of a longest path in the given network. For
and undirected graphs, our conditions hold if and only if and the node-connectivity of the given graph is at least , where
is the total number of nodes and is the maximal number of Byzantine
nodes; and for and directed graphs, our conditions is equivalent to
the tight condition found for exact Byzantine consensus.
Our sufficiency is shown by constructing a correct algorithm, wherein the
trim function is constructed based on investigating a newly introduced minimal
messages cover property. The trim function proposed also works over
multi-graphs.Comment: 24 pages, 1 figure. arXiv admin note: text overlap with
arXiv:1203.188
Architecture and nationalist identity; the case of the architectural master plans for the Hebrew University in Jerusalem (1919-1974) and their connections with nationalist ideology.
The Hebrew University emerged from a need to provide Diaspora Jews with
higher education, and was developed by the Zionist Organization into an image of the
Third Temple, a sanctuary for learning that would create a Zionist dominance in
Jerusalem. The inclusion of "Hebrew" in its title indicates the University's connection with
the Zionist cultural revival that intended to create a Hebrew culture and identity. Locating
the University on Scopus created a new sanctifying meaning to both Mount and
University. After the 1649 war the University moved to the "Nation's Quarter' on Giv'at
Ram, but the devotion to the sanctified Scopus never diminished, until the 1967 war
enabled the return of the University to its original location. Five different master plans
were prepared for the first Mount Scopus campus, none of them fully implemented. Each
presented an interpretation of the University concept that also related to prevailing styles
and ideological trends. Erich Mendelsohn had a central role in the few buildings that
were constructed. The second campus presented a serene and functional campus, yet
its subdued affluence was quite outstanding within general deprivation. Immediately after
the 1967 war a new campus was constructed on Scopus, in the form of a megastructure.
The circumstances of the "return" to Scopus, of its planning and construction, as well as
the effects of occupation shed light on the significance of the new campus. To some
extent, the recruitment of the University to political goals and the implementation of an
ideology prevented a number of architectural plans from offering designs that would first
and foremost fulfil their purpose as academic institutions. Furthermore, as it has been a
central national institution, at certain periods it became influential as a propaganda tool,
a vocation quite alien and harmful to its true calling
- …