1,195 research outputs found
Reaching Approximate Byzantine Consensus with Multi-hop Communication
We address the problem of reaching consensus in the presence of Byzantine
faults. In particular, we are interested in investigating the impact of
messages relay on the network connectivity for a correct iterative approximate
Byzantine consensus algorithm to exist. The network is modeled by a simple
directed graph. We assume a node can send messages to another node that is up
to hops away via forwarding by the intermediate nodes on the routes, where
is a natural number. We characterize the necessary and
sufficient topological conditions on the network structure. The tight
conditions we found are consistent with the tight conditions identified for
, where only local communication is allowed, and are strictly weaker for
. Let denote the length of a longest path in the given network. For
and undirected graphs, our conditions hold if and only if and the node-connectivity of the given graph is at least , where
is the total number of nodes and is the maximal number of Byzantine
nodes; and for and directed graphs, our conditions is equivalent to
the tight condition found for exact Byzantine consensus.
Our sufficiency is shown by constructing a correct algorithm, wherein the
trim function is constructed based on investigating a newly introduced minimal
messages cover property. The trim function proposed also works over
multi-graphs.Comment: 24 pages, 1 figure. arXiv admin note: text overlap with
arXiv:1203.188
Tight Bounds for MIS in Multichannel Radio Networks
Daum et al. [PODC'13] presented an algorithm that computes a maximal
independent set (MIS) within
rounds in an -node multichannel radio network with communication
channels. The paper uses a multichannel variant of the standard graph-based
radio network model without collision detection and it assumes that the network
graph is a polynomially bounded independence graph (BIG), a natural
combinatorial generalization of well-known geographic families. The upper bound
of that paper is known to be optimal up to a polyloglog factor.
In this paper, we adapt algorithm and analysis to improve the result in two
ways. Mainly, we get rid of the polyloglog factor in the runtime and we thus
obtain an asymptotically optimal multichannel radio network MIS algorithm. In
addition, our new analysis allows to generalize the class of graphs from those
with polynomially bounded local independence to graphs where the local
independence is bounded by an arbitrary function of the neighborhood radius.Comment: 37 pages, to be published in DISC 201
A Formal Approach to Exploiting Multi-Stage Attacks based on File-System Vulnerabilities of Web Applications (Extended Version)
Web applications require access to the file-system for many different tasks.
When analyzing the security of a web application, secu- rity analysts should
thus consider the impact that file-system operations have on the security of
the whole application. Moreover, the analysis should take into consideration
how file-system vulnerabilities might in- teract with other vulnerabilities
leading an attacker to breach into the web application. In this paper, we first
propose a classification of file- system vulnerabilities, and then, based on
this classification, we present a formal approach that allows one to exploit
file-system vulnerabilities. We give a formal representation of web
applications, databases and file- systems, and show how to reason about
file-system vulnerabilities. We also show how to combine file-system
vulnerabilities and SQL-Injection vulnerabilities for the identification of
complex, multi-stage attacks. We have developed an automatic tool that
implements our approach and we show its efficiency by discussing several
real-world case studies, which are witness to the fact that our tool can
generate, and exploit, complex attacks that, to the best of our knowledge, no
other state-of-the-art-tool for the security of web applications can find
On the Design of Cryptographic Primitives
The main objective of this work is twofold. On the one hand, it gives a brief
overview of the area of two-party cryptographic protocols. On the other hand,
it proposes new schemes and guidelines for improving the practice of robust
protocol design. In order to achieve such a double goal, a tour through the
descriptions of the two main cryptographic primitives is carried out. Within
this survey, some of the most representative algorithms based on the Theory of
Finite Fields are provided and new general schemes and specific algorithms
based on Graph Theory are proposed
Local Charge of the nu=5/2 Fractional Quantum Hall State
Electrons in two dimensions and strong magnetic fields effectively lose their
kinetic energy and display exotic behavior dominated by Coulomb forces. When
the ratio of electrons to magnetic flux quanta in the system is near 5/2, the
unique correlated phase that emerges is predicted to be gapped with
fractionally charged quasiparticles and a ground state degeneracy that grows
exponentially as these quasiparticles are introduced. Interestingly, the only
way to transform between the many ground states would be to braid the
fractional excitations around each other, a property with applications in
quantum information processing. Here we present the first observation of
localized quasiparticles at nu=5/2, confined to puddles by disorder. Using a
local electrometer to compare how quasiparticles at nu=5/2 and nu=7/3 charge
these puddles, we are able to extract the ratio of local charges for these
states. Averaged over several disorder configurations and samples, we find the
ratio to be 4/3, suggesting that the local charges are e/3 at seven thirds and
e/4 at five halves, in agreement with theoretical predictions. This
confirmation of localized e/4 quasiparticles is necessary for proposed
interferometry experiments to test statistics and computational ability of the
state at nu=5/2.Comment: 6 pages, 4 figures corrected titl
Synchronous counting and computational algorithm design
Consider a complete communication network on n nodes, each of which is a state machine with s states. In synchronous 2-counting, the nodes receive a common clock pulse and they have to agree on which pulses are “odd” and which are “even”. We require that the solution is self-stabilising (reaching the correct operation from any initial state) and it tolerates f Byzantine failures (nodes that send arbitrary misinformation). Prior algorithms are expensive to implement in hardware: they require a source of random bits or a large number of states s. We use computational techniques to construct very compact deterministic algorithms for the first non-trivial case of f = 1. While no algorithm exists for n < 4, we show that as few as 3 states are sufficient for all values n ≥ 4. We prove that the problem cannot be solved with only 2 states for n = 4, but there is a 2-state solution for all values n ≥ 6.Peer reviewe
Algorithms For Extracting Timeliness Graphs
We consider asynchronous message-passing systems in which some links are
timely and processes may crash. Each run defines a timeliness graph among
correct processes: (p; q) is an edge of the timeliness graph if the link from p
to q is timely (that is, there is bound on communication delays from p to q).
The main goal of this paper is to approximate this timeliness graph by graphs
having some properties (such as being trees, rings, ...). Given a family S of
graphs, for runs such that the timeliness graph contains at least one graph in
S then using an extraction algorithm, each correct process has to converge to
the same graph in S that is, in a precise sense, an approximation of the
timeliness graph of the run. For example, if the timeliness graph contains a
ring, then using an extraction algorithm, all correct processes eventually
converge to the same ring and in this ring all nodes will be correct processes
and all links will be timely. We first present a general extraction algorithm
and then a more specific extraction algorithm that is communication efficient
(i.e., eventually all the messages of the extraction algorithm use only links
of the extracted graph)
On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals
The importance of the Electronic Health Record (EHR) has been addressed in recent years by governments and institutions.Many large scale projects have been funded with the aim to allow healthcare professionals to consult patients data. Properties such as confidentiality, authentication and authorization are the key for the success for these projects. The Integrating the Healthcare Enterprise (IHE) initiative promotes the coordinated use of established standards for authenticated and secure EHR exchanges among clinics and hospitals. In particular, the IHE integration profile named XUA permits to attest user identities by relying on SAML assertions, i.e. XML documents containing authentication statements. In this paper, we provide a formal model for the secure issuance of such an assertion. We first specify the scenario using the process calculus COWS and then analyse it using the model checker CMC. Our analysis reveals a potential flaw in the XUA profile when using a SAML assertion in an unprotected network. We then suggest a solution for this flaw, and model check and implement this solution to show that it is secure and feasible
Search in Complex Networks : a New Method of Naming
We suggest a method for routing when the source does not posses full
information about the shortest path to the destination. The method is
particularly useful for scale-free networks, and exploits its unique
characteristics. By assigning new (short) names to nodes (aka labelling) we are
able to reduce significantly the memory requirement at the routers, yet we
succeed in routing with high probability through paths very close in distance
to the shortest ones.Comment: 5 pages, 4 figure
Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version)
Security protocols are often found to be flawed after their deployment. We
present an approach that aims at the neutralization or mitigation of the
attacks to flawed protocols: it avoids the complete dismissal of the interested
protocol and allows honest agents to continue to use it until a corrected
version is released. Our approach is based on the knowledge of the network
topology, which we model as a graph, and on the consequent possibility of
creating an interference to an ongoing attack of a Dolev-Yao attacker, by means
of non-collaboration actuated by ad-hoc benign attackers that play the role of
network guardians. Such guardians, positioned in strategical points of the
network, have the task of monitoring the messages in transit and discovering at
runtime, through particular types of inference, whether an attack is ongoing,
interrupting the run of the protocol in the positive case. We study not only
how but also where we can attempt to defend flawed security protocols: we
investigate the different network topologies that make security protocol
defense feasible and illustrate our approach by means of concrete examples.Comment: 29 page
- …
