Skip to main content

Showing 1–10 of 10 results for author: Almashaqbeh, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2409.06556  [pdf, other

    cs.CR cs.DS

    Adversary Resilient Learned Bloom Filters

    Authors: Ghada Almashaqbeh, Allison Bishop, Hayder Tirmazi

    Abstract: A learned Bloom filter (LBF) combines a classical Bloom filter (CBF) with a learning model to reduce the amount of memory needed to represent a given set while achieving a target false positive rate (FPR). Provable security against adaptive adversaries that advertently attempt to increase FPR has been studied for CBFs. However, achieving adaptive security for LBFs is an open problem. In this paper… ▽ More

    Submitted 16 May, 2025; v1 submitted 10 September, 2024; originally announced September 2024.

  2. arXiv:2406.17121  [pdf, ps, other

    cs.DS

    Competitive Policies for Online Collateral Maintenance

    Authors: Ghada Almashaqbeh, Sixia Chen, Alexander Russell

    Abstract: Layer-two blockchain protocols emerged to address scalability issues related to fees, storage cost, and confirmation delay of on-chain transactions. They aggregate off-chain transactions into a fewer on-chain ones, thus offering immediate settlement and reduced transaction fees. To preserve security of the underlying ledger, layer-two protocols often work in a collateralized model; resources are c… ▽ More

    Submitted 2 August, 2024; v1 submitted 24 June, 2024; originally announced June 2024.

  3. arXiv:2406.17094  [pdf, other

    cs.CR

    ammBoost: State Growth Control for AMMs

    Authors: Nicolas Michel, Mohamed E. Najd, Ghada Almashaqbeh

    Abstract: Automated market makers (AMMs) are a prime example of Web 3.0 applications. Their popularity and high trading activity led to serious scalability issues in terms of throughput and state size. In this paper, we address these challenges by utilizing a new sidechain architecture, building a system called ammBoost. ammBoost reduces the amount of on-chain transactions, boosts throughput, and supports b… ▽ More

    Submitted 20 March, 2025; v1 submitted 24 June, 2024; originally announced June 2024.

  4. arXiv:2402.16095  [pdf, other

    cs.CR

    chainBoost: A Secure Performance Booster for Blockchain-based Resource Markets

    Authors: Zahra Motaqy, Mohamed E. Najd, Ghada Almashaqbeh

    Abstract: Cryptocurrencies and blockchain technology provide an innovative model for reshaping digital services. Driven by the movement toward Web 3.0, recent systems started to provide distributed services, such as computation outsourcing or file storage, on top of the currency exchange medium. By allowing anyone to join and collect payments for serving others, these systems create decentralized markets fo… ▽ More

    Submitted 16 June, 2024; v1 submitted 25 February, 2024; originally announced February 2024.

    Comments: To appear in IEEE EuroS&P 2024

  5. arXiv:2306.06825  [pdf, other

    cs.CR cs.LG

    AnoFel: Supporting Anonymity for Privacy-Preserving Federated Learning

    Authors: Ghada Almashaqbeh, Zahra Ghodsi

    Abstract: Federated learning enables users to collaboratively train a machine learning model over their private datasets. Secure aggregation protocols are employed to mitigate information leakage about the local datasets. This setup, however, still leaks the participation of a user in a training iteration, which can also be sensitive. Protecting user anonymity is even more challenging in dynamic environment… ▽ More

    Submitted 11 June, 2023; originally announced June 2023.

  6. Bet and Attack: Incentive Compatible Collaborative Attacks Using Smart Contracts

    Authors: Z. Motaqy, G. Almashaqbeh, B. Bahrak, N. Yazdani

    Abstract: Smart contract-enabled blockchains allow building decentralized applications in which mutually-distrusted parties can work together. Recently, oracle services emerged to provide these applications with real-world data feeds. Unfortunately, these capabilities have been used for malicious purposes under what is called criminal smart contracts. A few works explored this dark side and showed a variety… ▽ More

    Submitted 23 September, 2021; v1 submitted 23 October, 2020; originally announced October 2020.

    Comments: Final Version

  7. arXiv:1911.08520  [pdf, other

    cs.CR

    MicroCash: Practical Concurrent Processing of Micropayments

    Authors: Ghada Almashaqbeh, Allison Bishop, Justin Cappos

    Abstract: Micropayments are increasingly being adopted by a large number of applications. However, processing micropayments individually can be expensive, with transaction fees exceeding the payment value itself. By aggregating these small transactions into a few larger ones, and using cryptocurrencies, today's decentralized probabilistic micropayment schemes can reduce these fees. Unfortunately, existing s… ▽ More

    Submitted 19 November, 2019; originally announced November 2019.

  8. arXiv:1906.10272  [pdf, other

    cs.CR

    CAPnet: A Defense Against Cache Accounting Attacks on Content Distribution Networks

    Authors: Ghada Almashaqbeh, Kevin Kelley, Allison Bishop, Justin Cappos

    Abstract: Peer-assisted content distribution networks(CDNs) have emerged to improve performance and reduce deployment costs of traditional, infrastructure-based content delivery networks. This is done by employing peer-to-peer data transfers to supplement the resources of the network infrastructure. However, these hybrid systems are vulnerable to accounting attacks in which the peers, or caches, collude wit… ▽ More

    Submitted 24 June, 2019; originally announced June 2019.

  9. arXiv:1903.03422  [pdf, other

    cs.CR

    ABC: A Cryptocurrency-Focused Threat Modeling Framework

    Authors: Ghada Almashaqbeh, Allison Bishop, Justin Cappos

    Abstract: Cryptocurrencies are an emerging economic force, but there are concerns about their security. This is due, in part, to complex collusion cases and new threat vectors that could be missed by conventional security assessment strategies. To address these issues, we propose ABC, an Asset-Based Cryptocurrency-focused threat modeling framework capable of identifying such risks. ABC's key innovation is t… ▽ More

    Submitted 23 August, 2019; v1 submitted 8 March, 2019; originally announced March 2019.

  10. arXiv:1509.01763  [pdf, ps, other

    cs.CR cs.PL

    Implementing Support for Pointers to Private Data in a General-Purpose Secure Multi-Party Compiler

    Authors: Yihua Zhang, Marina Blanton, Ghada Almashaqbeh

    Abstract: Recent compilers allow a general-purpose program (written in a conventional programming language) that handles private data to be translated into secure distributed implementation of the corresponding functionality. The resulting program is then guaranteed to provably protect private data using secure multi-party computation techniques. The goals of such compilers are generality, usability, and ef… ▽ More

    Submitted 30 June, 2017; v1 submitted 5 September, 2015; originally announced September 2015.