1,152 research outputs found

    An Optimal Self-Stabilizing Firing Squad

    Full text link
    Consider a fully connected network where up to tt processes may crash, and all processes start in an arbitrary memory state. The self-stabilizing firing squad problem consists of eventually guaranteeing simultaneous response to an external input. This is modeled by requiring that the non-crashed processes "fire" simultaneously if some correct process received an external "GO" input, and that they only fire as a response to some process receiving such an input. This paper presents FireAlg, the first self-stabilizing firing squad algorithm. The FireAlg algorithm is optimal in two respects: (a) Once the algorithm is in a safe state, it fires in response to a GO input as fast as any other algorithm does, and (b) Starting from an arbitrary state, it converges to a safe state as fast as any other algorithm does.Comment: Shorter version to appear in SSS0

    A Formal Approach to Exploiting Multi-Stage Attacks based on File-System Vulnerabilities of Web Applications (Extended Version)

    Full text link
    Web applications require access to the file-system for many different tasks. When analyzing the security of a web application, secu- rity analysts should thus consider the impact that file-system operations have on the security of the whole application. Moreover, the analysis should take into consideration how file-system vulnerabilities might in- teract with other vulnerabilities leading an attacker to breach into the web application. In this paper, we first propose a classification of file- system vulnerabilities, and then, based on this classification, we present a formal approach that allows one to exploit file-system vulnerabilities. We give a formal representation of web applications, databases and file- systems, and show how to reason about file-system vulnerabilities. We also show how to combine file-system vulnerabilities and SQL-Injection vulnerabilities for the identification of complex, multi-stage attacks. We have developed an automatic tool that implements our approach and we show its efficiency by discussing several real-world case studies, which are witness to the fact that our tool can generate, and exploit, complex attacks that, to the best of our knowledge, no other state-of-the-art-tool for the security of web applications can find

    On the Tomography of Networks and Multicast Trees

    Full text link
    In this paper we model the tomography of scale free networks by studying the structure of layers around an arbitrary network node. We find, both analytically and empirically, that the distance distribution of all nodes from a specific network node consists of two regimes. The first is characterized by rapid growth, and the second decays exponentially. We also show that the nodes degree distribution at each layer is a power law with an exponential cut-off. We obtain similar results for the layers surrounding the root of multicast trees cut from such networks, as well as the Internet. All of our results were obtained both analytically and on empirical Interenet data

    Reaching Approximate Byzantine Consensus with Multi-hop Communication

    Full text link
    We address the problem of reaching consensus in the presence of Byzantine faults. In particular, we are interested in investigating the impact of messages relay on the network connectivity for a correct iterative approximate Byzantine consensus algorithm to exist. The network is modeled by a simple directed graph. We assume a node can send messages to another node that is up to ll hops away via forwarding by the intermediate nodes on the routes, where l∈Nl\in \mathbb{N} is a natural number. We characterize the necessary and sufficient topological conditions on the network structure. The tight conditions we found are consistent with the tight conditions identified for l=1l=1, where only local communication is allowed, and are strictly weaker for l>1l>1. Let l∗l^* denote the length of a longest path in the given network. For l≥l∗l\ge l^* and undirected graphs, our conditions hold if and only if n≥3f+1n\ge 3f+1 and the node-connectivity of the given graph is at least 2f+12f+1 , where nn is the total number of nodes and ff is the maximal number of Byzantine nodes; and for l≥l∗l\ge l^* and directed graphs, our conditions is equivalent to the tight condition found for exact Byzantine consensus. Our sufficiency is shown by constructing a correct algorithm, wherein the trim function is constructed based on investigating a newly introduced minimal messages cover property. The trim function proposed also works over multi-graphs.Comment: 24 pages, 1 figure. arXiv admin note: text overlap with arXiv:1203.188

    Architecture and nationalist identity; the case of the architectural master plans for the Hebrew University in Jerusalem (1919-1974) and their connections with nationalist ideology.

    Get PDF
    The Hebrew University emerged from a need to provide Diaspora Jews with higher education, and was developed by the Zionist Organization into an image of the Third Temple, a sanctuary for learning that would create a Zionist dominance in Jerusalem. The inclusion of "Hebrew" in its title indicates the University's connection with the Zionist cultural revival that intended to create a Hebrew culture and identity. Locating the University on Scopus created a new sanctifying meaning to both Mount and University. After the 1649 war the University moved to the "Nation's Quarter' on Giv'at Ram, but the devotion to the sanctified Scopus never diminished, until the 1967 war enabled the return of the University to its original location. Five different master plans were prepared for the first Mount Scopus campus, none of them fully implemented. Each presented an interpretation of the University concept that also related to prevailing styles and ideological trends. Erich Mendelsohn had a central role in the few buildings that were constructed. The second campus presented a serene and functional campus, yet its subdued affluence was quite outstanding within general deprivation. Immediately after the 1967 war a new campus was constructed on Scopus, in the form of a megastructure. The circumstances of the "return" to Scopus, of its planning and construction, as well as the effects of occupation shed light on the significance of the new campus. To some extent, the recruitment of the University to political goals and the implementation of an ideology prevented a number of architectural plans from offering designs that would first and foremost fulfil their purpose as academic institutions. Furthermore, as it has been a central national institution, at certain periods it became influential as a propaganda tool, a vocation quite alien and harmful to its true calling
    • …
    corecore