Skip to main content

Showing 1–43 of 43 results for author: Ford, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2409.08243  [pdf, ps, other

    math.LO cs.LO

    Reasoning Around Paradox with Grounded Deduction

    Authors: Bryan Ford

    Abstract: How can we reason around logical paradoxes without falling into them? This paper introduces grounded deduction or GD, a Kripke-inspired approach to first-order logic and arithmetic that is neither classical nor intuitionistic, but nevertheless appears both pragmatically usable and intuitively justifiable. GD permits the direct expression of unrestricted recursive definitions -- including paradoxic… ▽ More

    Submitted 3 April, 2025; v1 submitted 12 September, 2024; originally announced September 2024.

    MSC Class: 03B60 ACM Class: F.4.1

  2. arXiv:2404.12075  [pdf, other

    cs.HC cs.CR

    E-Vote Your Conscience: Perceptions of Coercion and Vote Buying, and the Usability of Fake Credentials in Online Voting

    Authors: Louis-Henri Merino, Alaleh Azhir, Haoqian Zhang, Simone Colombo, Bernhard Tellenbach, Vero Estrada-Galiñanes, Bryan Ford

    Abstract: Online voting is attractive for convenience and accessibility, but is more susceptible to voter coercion and vote buying than in-person voting. One mitigation is to give voters fake voting credentials that they can yield to a coercer. Fake credentials appear identical to real ones, but cast votes that are silently omitted from the final tally. An important unanswered question is how ordinary voter… ▽ More

    Submitted 18 April, 2024; originally announced April 2024.

    Comments: 23 pages, 2024 IEEE Symposium on Security and Privacy

  3. arXiv:2305.00554  [pdf, other

    cs.GT cs.CR

    Breaking Blockchain Rationality with Out-of-Band Collusion

    Authors: Haoqian Zhang, Mahsa Bastankhah, Louis-Henri Merino, Vero Estrada-Galiñanes, Bryan Ford

    Abstract: Blockchain systems often rely on rationality assumptions for their security, expecting that nodes are motivated to maximize their profits. These systems thus design their protocols to incentivize nodes to execute the honest protocol but fail to consider out-of-band collusion. Existing works analyzing rationality assumptions are limited in their scope, either by focusing on a specific protocol or r… ▽ More

    Submitted 30 April, 2023; originally announced May 2023.

  4. arXiv:2212.14129  [pdf, other

    cs.PL

    Matchertext: Towards Verbatim Interlanguage Embedding

    Authors: Bryan Ford

    Abstract: Embedding text in one language within text of another is commonplace for numerous purposes, but usually requires tedious and error-prone "escaping" transformations on the embedded string. We propose a simple cross-language syntactic discipline, matchertext, which enables the safe embedding a string in any compliant language into a string in any other language via simple "copy-and-paste" - in parti… ▽ More

    Submitted 28 December, 2022; originally announced December 2022.

    Comments: 23 pages, 4 figures, 2 tables

  5. arXiv:2205.08529  [pdf, other

    cs.CR

    F3B: A Low-Overhead Blockchain Architecture with Per-Transaction Front-Running Protection

    Authors: Haoqian Zhang, Louis-Henri Merino, Ziyan Qu, Mahsa Bastankhah, Vero Estrada-Galinanes, Bryan Ford

    Abstract: Front-running attacks, which benefit from advanced knowledge of pending transactions, have proliferated in the blockchain space since the emergence of decentralized finance. Front-running causes devastating losses to honest participants and continues to endanger the fairness of the ecosystem. We present Flash Freezing Flash Boys (F3B), a blockchain architecture that addresses front-running attacks… ▽ More

    Submitted 5 September, 2023; v1 submitted 17 May, 2022; originally announced May 2022.

  6. arXiv:2204.10934  [pdf, other

    cs.DC

    Baxos: Backing off for Robust and Efficient Consensus

    Authors: Pasindu Tennage, Cristina Basescu, Eleftherios Kokoris Kogias, Ewa Syta, Philipp Jovanovic, Bryan Ford

    Abstract: Leader-based consensus algorithms are vulnerable to liveness and performance downgrade attacks. We explore the possibility of replacing leader election in Multi-Paxos with random exponential backoff (REB), a simpler approach that requires minimum modifications to the two phase Synod Paxos and achieves better resiliency under attacks. We propose Baxos, a new resilient consensus protocol that levera… ▽ More

    Submitted 19 December, 2024; v1 submitted 22 April, 2022; originally announced April 2022.

    ACM Class: C.5.0; C.4.1

  7. arXiv:2202.06692  [pdf, other

    cs.CR cs.CY cs.HC

    TRIP: Trust-Limited Coercion-Resistant In-Person Voter Registration

    Authors: Louis-Henri Merino, Simone Colombo, Rene Reyes, Alaleh Azhir, Haoqian Zhang, Jeff Allen, Bernhard Tellenbach, Vero Estrada-Galiñanes, Bryan Ford

    Abstract: Remote electronic voting is convenient and flexible, but presents risks of coercion and vote buying. One promising mitigation strategy enables voters to give a coercer fake voting credentials, which silently cast votes that do not count. However, current proposals make problematic assumptions during credential issuance, such as relying on a trustworthy registrar, on trusted hardware, or on voters… ▽ More

    Submitted 17 March, 2024; v1 submitted 14 February, 2022; originally announced February 2022.

    Comments: 21 pages

  8. arXiv:2011.02412  [pdf, ps, other

    cs.CY cs.CR cs.DC cs.SI

    Identity and Personhood in Digital Democracy: Evaluating Inclusion, Equality, Security, and Privacy in Pseudonym Parties and Other Proofs of Personhood

    Authors: Bryan Ford

    Abstract: Digital identity seems like a prerequisite for digital democracy: how can we ensure "one person, one vote" online without identifying voters? But digital identity solutions - ID checking, biometrics, self-sovereign identity, and trust networks - all present flaws, leaving users vulnerable to exclusion, identity loss or theft, and coercion. These flaws may be insurmountable because digital identity… ▽ More

    Submitted 4 November, 2020; originally announced November 2020.

  9. arXiv:2011.01712  [pdf, ps, other

    cs.CY q-fin.GN

    Economic Principles of PoPCoin, a Democratic Time-based Cryptocurrency

    Authors: Haoqian Zhang, Cristina Basescu, Bryan Ford

    Abstract: While democracy is founded on the principle of equal opportunity to manage our lives and pursue our fortunes, the forms of money we have inherited from millenia of evolution has brought us to an unsustainable dead-end of exploding inequality. PoPCoin proposes to leverage the unique historical opportunities that digital cryptocurrencies present for a "clean-slate" redesign of money, in particular a… ▽ More

    Submitted 3 November, 2020; originally announced November 2020.

  10. arXiv:2003.12393  [pdf, ps, other

    cs.CY cs.SI

    A Liquid Perspective on Democratic Choice

    Authors: Bryan Ford

    Abstract: The idea of liquid democracy responds to a widely-felt desire to make democracy more "fluid" and continuously participatory. Its central premise is to enable users to employ networked technologies to control and delegate voting power, to approximate the ideal of direct democracy in a scalable fashion that accounts for time and attention limits. There are many potential definitions, meanings, and w… ▽ More

    Submitted 26 March, 2020; originally announced March 2020.

  11. arXiv:2003.12375  [pdf, ps, other

    cs.CY cs.CR cs.DC

    Democratic Value and Money for Decentralized Digital Society

    Authors: Bryan Ford

    Abstract: Classical monetary systems regularly subject the most vulnerable majority of the world's population to debilitating financial shocks, and have manifestly allowed uncontrolled global inequality over the long term. Given these basic failures, how can we avoid asking whether mainstream macroeconomic principles are actually compatible with democratic principles such as equality or the protection of hu… ▽ More

    Submitted 26 March, 2020; originally announced March 2020.

  12. arXiv:2003.02291  [pdf, ps, other

    cs.DC cs.DS cs.NI

    Que Sera Consensus: Simple Asynchronous Agreement with Private Coins and Threshold Logical Clocks

    Authors: Bryan Ford, Philipp Jovanovic, Ewa Syta

    Abstract: It is commonly held that asynchronous consensus is much more complex, difficult, and costly than partially-synchronous algorithms, especially without using common coins. This paper challenges that conventional wisdom with que sera consensus QSC, an approach to consensus that cleanly decomposes the agreement problem from that of network asynchrony. QSC uses only private coins and reaches consensus… ▽ More

    Submitted 4 March, 2020; originally announced March 2020.

    Comments: 6 algorithms

  13. arXiv:1910.08820  [pdf, ps, other

    cs.CR cs.GT

    Rationality is Self-Defeating in Permissionless Systems

    Authors: Bryan Ford, Rainer Böhme

    Abstract: We outline a metacircular argument explaining why it is rational to be irrational when attacking open-world decentralized systems, and why systems whose security depend on rationality assumptions are insecure.

    Submitted 19 October, 2019; originally announced October 2019.

    Comments: First posted on September 23, 2019 at https://bford.info/2019/09/23/rational/

  14. arXiv:1907.07010  [pdf, ps, other

    cs.DC cs.CR cs.NI

    Threshold Logical Clocks for Asynchronous Distributed Coordination and Consensus

    Authors: Bryan Ford

    Abstract: Consensus protocols for asynchronous networks are usually complex and inefficient, leading practical systems to rely on synchronous protocols. This paper attempts to simplify asynchronous consensus by building atop a novel threshold logical clock abstraction, which enables upper layers to operate as if on a synchronous network. This approach yields an asynchronous consensus protocol for fail-stop… ▽ More

    Submitted 16 July, 2019; originally announced July 2019.

  15. arXiv:1806.03160  [pdf, ps, other

    cs.CR

    Reducing Metadata Leakage from Encrypted Files and Communication with PURBs

    Authors: Kirill Nikitin, Ludovic Barman, Wouter Lueks, Matthew Underwood, Jean-Pierre Hubaux, Bryan Ford

    Abstract: Most encrypted data formats leak metadata via their plaintext headers, such as format version, encryption schemes used, number of recipients who can decrypt the data, and even the recipients' identities. This leakage can pose security and privacy risks to users, e.g., by revealing the full membership of a group of collaborators from a single encrypted e-mail, or by enabling an eavesdropper to fing… ▽ More

    Submitted 25 July, 2019; v1 submitted 8 June, 2018; originally announced June 2018.

    Comments: 30 pages

  16. arXiv:1710.10237  [pdf, other

    cs.CR

    PriFi: Low-Latency Anonymity for Organizational Networks

    Authors: Ludovic Barman, Italo Dacosta, Mahdi Zamani, Ennan Zhai, Apostolos Pyrgelis, Bryan Ford, Jean-Pierre Hubaux, Joan Feigenbaum

    Abstract: Organizational networks are vulnerable to traffic-analysis attacks that enable adversaries to infer sensitive information from the network traffic - even if encryption is used. Typical anonymous communication networks are tailored to the Internet and are poorly suited for organizational networks. We present PriFi, an anonymous communication protocol for LANs, which protects users against eavesdrop… ▽ More

    Submitted 6 April, 2021; v1 submitted 27 October, 2017; originally announced October 2017.

    Comments: 25 pages

  17. arXiv:1612.07841  [pdf, other

    cs.CR

    Atom: Horizontally Scaling Strong Anonymity

    Authors: Albert Kwon, Henry Corrigan-Gibbs, Srinivas Devadas, Bryan Ford

    Abstract: Atom is an anonymous messaging system that protects against traffic-analysis attacks. Unlike many prior systems, each Atom server touches only a small fraction of the total messages routed through the network. As a result, the system's capacity scales near-linearly with the number of servers. At the same time, each Atom user benefits from "best possible" anonymity: a user is anonymous among all ho… ▽ More

    Submitted 2 October, 2017; v1 submitted 22 December, 2016; originally announced December 2016.

  18. arXiv:1607.03659  [pdf, other

    cs.CR

    Open, privacy-preserving protocols for lawful surveillance

    Authors: Aaron Segal, Joan Feigenbaum, Bryan Ford

    Abstract: The question of how government agencies can acquire actionable, useful information about legitimate but unknown targets without intruding upon the electronic activity of innocent parties is extremely important. We address this question by providing experimental evidence that actionable, useful information can indeed be obtained in a manner that preserves the privacy of innocent parties and that ho… ▽ More

    Submitted 13 July, 2016; originally announced July 2016.

    Comments: 13 pages, 2 figures

  19. arXiv:1602.06997  [pdf, other

    cs.CR

    Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing

    Authors: Eleftherios Kokoris-Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, Bryan Ford

    Abstract: While showing great promise, Bitcoin requires users to wait tens of minutes for transactions to commit, and even then, offering only probabilistic guarantees. This paper introduces ByzCoin, a novel Byzantine consensus protocol that leverages scalable collective signing to commit Bitcoin transactions irreversibly within seconds. ByzCoin achieves Byzantine consensus while preserving Bitcoin's open m… ▽ More

    Submitted 1 August, 2016; v1 submitted 22 February, 2016; originally announced February 2016.

    Comments: 18 pages, 12 figures, 1 table

  20. arXiv:1504.07070  [pdf, other

    cs.OS

    Deterministically Deterring Timing Attacks in Deterland

    Authors: Weiyi Wu, Bryan Ford

    Abstract: The massive parallelism and resource sharing embodying today's cloud business model not only exacerbate the security challenge of timing channels, but also undermine the viability of defenses based on resource partitioning. We propose hypervisor-enforced timing mitigation to control timing channels in cloud environments. This approach closes "reference clocks" internal to the cloud by imposing a d… ▽ More

    Submitted 30 May, 2016; v1 submitted 27 April, 2015; originally announced April 2015.

    Comments: 15 pages, 15 figures

  21. arXiv:1503.08768  [pdf, other

    cs.CR

    Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning

    Authors: Ewa Syta, Iulia Tamas, Dylan Visher, David Isaac Wolinsky, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Ismail Khoffi, Bryan Ford

    Abstract: The secret keys of critical network authorities - such as time, name, certificate, and software update services - represent high-value targets for hackers, criminals, and spy agencies wishing to use these keys secretly to compromise other hosts. To protect authorities and their clients proactively from undetected exploits and misuse, we introduce CoSi, a scalable witness cosigning protocol ensurin… ▽ More

    Submitted 30 May, 2016; v1 submitted 30 March, 2015; originally announced March 2015.

    Comments: 20 pages, 7 figures

  22. arXiv:1406.4053  [pdf, ps, other

    cs.CR

    Crypto-Book: Bootstrapping Privacy Preserving Online Identities from Social Networks

    Authors: John Maheswaran, Daniel Jackowitz, David Isaac Wolinsky, Lining Wang, Bryan Ford

    Abstract: Social networking sites supporting federated identities offer a convenient and increasingly popular mechanism for cross-site authentication. Unfortunately, they also exacerbate many privacy and tracking risks. We propose Crypto-Book, an anonymizing layer enabling cross-site authentication while reducing these risks. Crypto-Book relies on a set of independently managed servers that collectively a… ▽ More

    Submitted 16 June, 2014; originally announced June 2014.

    Comments: 9 figures

  23. arXiv:1405.0637  [pdf, other

    cs.DC

    Limiting Lamport Exposure to Distant Failures in Globally-Managed Distributed Systems

    Authors: Cristina Băsescu, Georgia Fragkouli, Enis Ceyhun Alp, Michael F. Nowlan, Jose M. Faleiro, Gaylor Bosson, Kelong Cong, Pierluca Borsò-Tan, Vero Estrada-Galiñanes, Bryan Ford

    Abstract: Globalized computing infrastructures offer the convenience and elasticity of globally managed objects and services, but lack the resilience to distant failures that localized infrastructures such as private clouds provide. Providing both global management and resilience to distant failures, however, poses a fundamental problem for configuration services: How to discover a possibly migratory, stron… ▽ More

    Submitted 15 July, 2022; v1 submitted 3 May, 2014; originally announced May 2014.

    Comments: 14 pages, 9 figures, 5 algorithms, 1 table

  24. arXiv:1312.5307  [pdf, ps, other

    cs.CR

    Seeking Anonymity in an Internet Panopticon

    Authors: Joan Feigenbaum, Bryan Ford

    Abstract: Obtaining and maintaining anonymity on the Internet is challenging. The state of the art in deployed tools, such as Tor, uses onion routing (OR) to relay encrypted connections on a detour passing through randomly chosen relays scattered around the Internet. Unfortunately, OR is known to be vulnerable at least in principle to several classes of attacks for which no solution is known or believed to… ▽ More

    Submitted 2 January, 2015; v1 submitted 18 December, 2013; originally announced December 2013.

    Comments: 8 pages, 10 figures

  25. arXiv:1312.3665  [pdf, ps, other

    cs.OS cs.CR

    Managing NymBoxes for Identity and Tracking Protection

    Authors: David Isaac Wolinsky, Bryan Ford

    Abstract: Despite the attempts of well-designed anonymous communication tools to protect users from tracking or identification, flaws in surrounding software (such as web browsers) and mistakes in configuration may leak the user's identity. We introduce Nymix, an anonymity-centric operating system architecture designed "top-to-bottom" to strengthen identity- and tracking-protection. Nymix's core contributio… ▽ More

    Submitted 5 May, 2014; v1 submitted 12 December, 2013; originally announced December 2013.

    Comments: 16 pages, 7 figure, 1 table

  26. arXiv:1309.7366  [pdf, ps, other

    cs.CR

    Ensuring High-Quality Randomness in Cryptographic Key Generation

    Authors: Henry Corrigan-Gibbs, Wendy Mu, Dan Boneh, Bryan Ford

    Abstract: The security of any cryptosystem relies on the secrecy of the system's secret keys. Yet, recent experimental work demonstrates that tens of thousands of devices on the Internet use RSA and DSA secrets drawn from a small pool of candidate values. As a result, an adversary can derive the device's secret keys without breaking the underlying cryptosystem. We introduce a new threat model, under which t… ▽ More

    Submitted 8 January, 2014; v1 submitted 27 September, 2013; originally announced September 2013.

    Comments: This is an extended and corrected version of a paper which appeared in the proceedings of the 2013 ACM Conference on Computer and Communications Security (CCS). This version corrects an error in the proceedings version of the DSA protocol and accompanying security proof. This version also contains the full proof of security for the RSA protocol

    ACM Class: C.2.0; C.2.2; E.3

  27. arXiv:1309.0958  [pdf, ps, other

    cs.CR

    Conscript Your Friends into Larger Anonymity Sets with JavaScript

    Authors: Henry Corrigan-Gibbs, Bryan Ford

    Abstract: We present the design and prototype implementation of ConScript, a framework for using JavaScript to allow casual Web users to participate in an anonymous communication system. When a Web user visits a cooperative Web site, the site serves a JavaScript application that instructs the browser to create and submit "dummy" messages into the anonymity system. Users who want to send non-dummy messages t… ▽ More

    Submitted 4 September, 2013; originally announced September 2013.

    Comments: An abbreviated version of this paper will appear at the WPES 2013 workshop

    ACM Class: K.4.1; C.2.0

  28. Hang With Your Buddies to Resist Intersection Attacks

    Authors: David Isaac Wolinsky, Ewa Syta, Bryan Ford

    Abstract: Some anonymity schemes might in principle protect users from pervasive network surveillance - but only if all messages are independent and unlinkable. Users in practice often need pseudonymity - sending messages intentionally linkable to each other but not to the sender - but pseudonymity in dynamic networks exposes users to intersection attacks. We present Buddies, the first systematic design for… ▽ More

    Submitted 27 August, 2013; v1 submitted 22 May, 2013; originally announced May 2013.

    Comments: 15 pages, 8 figures

    ACM Class: C.2.0

    Journal ref: ACM CCS'13, Nov 04-08 2013, Berlin, Germany

  29. arXiv:1209.4819  [pdf, ps, other

    cs.CR cs.NI

    Proactively Accountable Anonymous Messaging in Verdict

    Authors: Henry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford

    Abstract: The DC-nets approach to anonymity has long held attraction for its strength against traffic analysis, but practical implementations remain vulnerable to internal disruption or "jamming" attacks requiring time-consuming tracing procedures to address. We present Verdict, the first practical anonymous group communication system built using proactively verifiable DC-nets: participants use public key c… ▽ More

    Submitted 26 June, 2013; v1 submitted 21 September, 2012; originally announced September 2012.

    Comments: 22 pages, 9 figures

    Report number: YALEU/DCS/TR1478

  30. arXiv:1208.1157  [pdf, ps, other

    astro-ph.EP astro-ph.IM cs.DC cs.MS physics.comp-ph

    Swarm-NG: a CUDA Library for Parallel n-body Integrations with focus on Simulations of Planetary Systems

    Authors: Saleh Dindar, Eric B. Ford, Mario Juric, Young In Yeo, Jianwei Gao, Aaron C. Boley, Benjamin Nelson, Jorg Peters

    Abstract: We present Swarm-NG, a C++ library for the efficient direct integration of many n-body systems using highly-parallel Graphics Processing Unit (GPU), such as NVIDIA's Tesla T10 and M2070 GPUs. While previous studies have demonstrated the benefit of GPUs for n-body simulations with thousands to millions of bodies, Swarm-NG focuses on many few-body systems, e.g., thousands of systems with 3...15 bodi… ▽ More

    Submitted 24 September, 2012; v1 submitted 6 August, 2012; originally announced August 2012.

    Comments: Submitted to New Astronomy

  31. arXiv:1203.3428  [pdf, ps, other

    cs.CR

    Plugging Side-Channel Leaks with Timing Information Flow Control

    Authors: Bryan Ford

    Abstract: The cloud model's dependence on massive parallelism and resource sharing exacerbates the security challenge of timing side-channels. Timing Information Flow Control (TIFC) is a novel adaptation of IFC techniques that may offer a way to reason about, and ultimately control, the flow of sensitive information through systems via timing channels. With TIFC, objects such as files, messages, and process… ▽ More

    Submitted 16 May, 2012; v1 submitted 8 March, 2012; originally announced March 2012.

    Comments: 5 pages, 3 figures

    Journal ref: 4th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud '12), June 12-13, 2012

  32. arXiv:1203.1979  [pdf, ps, other

    cs.CY cs.CR

    Icebergs in the Clouds: the Other Risks of Cloud Computing

    Authors: Bryan Ford

    Abstract: Cloud computing is appealing from management and efficiency perspectives, but brings risks both known and unknown. Well-known and hotly-debated information security risks, due to software vulnerabilities, insider attacks, and side-channels for example, may be only the "tip of the iceberg." As diverse, independently developed cloud services share ever more fluidly and aggressively multiplexed hardw… ▽ More

    Submitted 16 May, 2012; v1 submitted 8 March, 2012; originally announced March 2012.

    Comments: 6 pages, 3 figures

    Journal ref: 4th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud '12), June 12-13, 2012

  33. arXiv:1103.0463  [pdf, ps, other

    cs.NI cs.PF

    Fitting Square Pegs Through Round Pipes: Unordered Delivery Wire-Compatible with TCP and TLS

    Authors: Michael F. Nowlan, Nabin Tiwari, Janardhan Iyengar, Syed Obaid Amin, Bryan Ford

    Abstract: Internet applications increasingly employ TCP not as a stream abstraction, but as a substrate for application-level transports, a use that converts TCP's in-order semantics from a convenience blessing to a performance curse. As Internet evolution makes TCP's use as a substrate likely to grow, we offer Minion, an architecture for backward-compatible out-of-order delivery atop TCP and TLS. Small OS… ▽ More

    Submitted 27 August, 2013; v1 submitted 2 March, 2011; originally announced March 2011.

    Comments: 16 pages, 13 figures, 1 table

    Journal ref: NSDI '12, San Jose, CA, April 2012

  34. arXiv:1005.3450  [pdf, ps, other

    cs.OS cs.DC

    Efficient System-Enforced Deterministic Parallelism

    Authors: Amittai Aviram, Shu-Chun Weng, Sen Hu, Bryan Ford

    Abstract: Deterministic execution offers many benefits for debugging, fault tolerance, and security. Running parallel programs deterministically is usually difficult and costly, however - especially if we desire system-enforced determinism, ensuring precise repeatability of arbitrarily buggy or malicious software. Determinator is a novel operating system that enforces determinism on both multithreaded and m… ▽ More

    Submitted 19 May, 2010; originally announced May 2010.

    Comments: 14 pages, 12 figures, 3 tables

  35. arXiv:1004.3057  [pdf, ps, other

    cs.CR

    Accountable Anonymous Group Messaging

    Authors: Henry Corrigan-Gibbs, Bryan Ford

    Abstract: Users often wish to participate in online groups anonymously, but misbehaving users may abuse this anonymity to spam or disrupt the group. Messaging protocols such as Mix-nets and DC-nets leave online groups vulnerable to denial-of-service and Sybil attacks, while accountable voting protocols are unusable or inefficient for general anonymous messaging. We present the first general messagin… ▽ More

    Submitted 18 April, 2010; originally announced April 2010.

    Comments: 12 pages, 5 figures

  36. arXiv:1003.5303  [pdf, ps, other

    cs.OS cs.CR

    Determinating Timing Channels in Compute Clouds

    Authors: Amittai Aviram, Sen Hu, Bryan Ford, Ramakrishna Gummadi

    Abstract: Timing side-channels represent an insidious security challenge for cloud computing, because: (a) massive parallelism in the cloud makes timing channels pervasive and hard to control; (b) timing channels enable one customer to steal information from another without leaving a trail or raising alarms; (c) only the cloud provider can feasibly detect and report such attacks, but the provider's incentiv… ▽ More

    Submitted 25 July, 2010; v1 submitted 27 March, 2010; originally announced March 2010.

    Comments: 6 pages, 4 figures

  37. arXiv:0912.0926  [pdf, ps, other

    cs.OS

    Deterministic Consistency: A Programming Model for Shared Memory Parallelism

    Authors: Amittai Aviram, Bryan Ford

    Abstract: The difficulty of developing reliable parallel software is generating interest in deterministic environments, where a given program and input can yield only one possible result. Languages or type systems can enforce determinism in new code, and runtime systems can impose synthetic schedules on legacy parallel code. To parallelize existing serial code, however, we would like a programming model t… ▽ More

    Submitted 1 February, 2010; v1 submitted 4 December, 2009; originally announced December 2009.

    Comments: 7 pages, 3 figures

    ACM Class: C.1.4; D.1.3; D.3.3

  38. arXiv:0912.0921  [pdf, ps, other

    cs.NI

    Flow Splitting with Fate Sharing in a Next Generation Transport Services Architecture

    Authors: Janardhan Iyengar, Bryan Ford

    Abstract: The challenges of optimizing end-to-end performance over diverse Internet paths has driven widespread adoption of in-path optimizers, which can destructively interfere with TCP's end-to-end semantics and with each other, and are incompatible with end-to-end IPsec. We identify the architectural cause of these conflicts and resolve them in Tng, an experimental next-generation transport services ar… ▽ More

    Submitted 4 December, 2009; originally announced December 2009.

    Comments: 12 pages, 11 figures, 1 table

    ACM Class: C.2.5

  39. arXiv:cs/0603077  [pdf, ps, other

    cs.DS cs.CC cs.PL

    Packrat Parsing: Simple, Powerful, Lazy, Linear Time

    Authors: Bryan Ford

    Abstract: Packrat parsing is a novel technique for implementing parsers in a lazy functional programming language. A packrat parser provides the power and flexibility of top-down parsing with backtracking and unlimited lookahead, but nevertheless guarantees linear parse time. Any language defined by an LL(k) or LR(k) grammar can be recognized by a packrat parser, in addition to many languages that convent… ▽ More

    Submitted 18 March, 2006; originally announced March 2006.

    Comments: 12 pages, 5 figures

    ACM Class: D.3.4; D.1.1; F.4.2

    Journal ref: International Conference on Functional Programming (ICFP '02), October 2002, Pittsburgh, PA

  40. arXiv:cs/0603076  [pdf, ps, other

    cs.NI cs.DC cs.OS

    User-Relative Names for Globally Connected Personal Devices

    Authors: Bryan Ford, Jacob Strauss, Chris Lesniewski-Laas, Sean Rhea, Frans Kaashoek, Robert Morris

    Abstract: Nontechnical users who own increasingly ubiquitous network-enabled personal devices such as laptops, digital cameras, and smart phones need a simple, intuitive, and secure way to share information and services between their devices. User Information Architecture, or UIA, is a novel naming and peer-to-peer connectivity architecture addressing this need. Users assign UIA names by "introducing" dev… ▽ More

    Submitted 18 March, 2006; originally announced March 2006.

    Comments: 7 pages, 1 figure, 1 table

    ACM Class: C.2.1; C.2.2

    Journal ref: 5th International Workshop on Peer-to-Peer Systems, February 2006 (IPTPS 2006), Santa Barbara, CA

  41. arXiv:cs/0603075  [pdf, ps, other

    cs.NI cs.OS

    Unmanaged Internet Protocol: Taming the Edge Network Management Crisis

    Authors: Bryan Ford

    Abstract: Though appropriate for core Internet infrastructure, the Internet Protocol is unsuited to routing within and between emerging ad-hoc edge networks due to its dependence on hierarchical, administratively assigned addresses. Existing ad-hoc routing protocols address the management problem but do not scale to Internet-wide networks. The promise of ubiquitous network computing cannot be fulfilled un… ▽ More

    Submitted 18 March, 2006; originally announced March 2006.

    Comments: 7 pages, 3 figures

    ACM Class: C.2.1; C.2.2

    Journal ref: Second Workshop on Hot Topics in Networks (HotNets-II), November 2003, Cambridge, MA

  42. arXiv:cs/0603074  [pdf, ps, other

    cs.NI cs.CR

    Peer-to-Peer Communication Across Network Address Translators

    Authors: Bryan Ford, Pyda Srisuresh, Dan Kegel

    Abstract: Network Address Translation (NAT) causes well-known difficulties for peer-to-peer (P2P) communication, since the peers involved may not be reachable at any globally valid IP address. Several NAT traversal techniques are known, but their documentation is slim, and data about their robustness or relative merits is slimmer. This paper documents and analyzes one of the simplest but most robust and p… ▽ More

    Submitted 18 March, 2006; originally announced March 2006.

    Comments: 8 figures, 1 table

    ACM Class: C.2.0

    Journal ref: USENIX Annual Technical Conference, April 2005 (USENIX '05), Anaheim, CA

  43. arXiv:cs/0603073  [pdf, ps, other

    cs.DL cs.IR

    VXA: A Virtual Architecture for Durable Compressed Archives

    Authors: Bryan Ford

    Abstract: Data compression algorithms change frequently, and obsolete decoders do not always run on new hardware and operating systems, threatening the long-term usability of content archived using those algorithms. Re-encoding content into new formats is cumbersome, and highly undesirable when lossy compression is involved. Processor architectures, in contrast, have remained comparatively stable over rec… ▽ More

    Submitted 18 March, 2006; originally announced March 2006.

    Comments: 14 pages, 7 figures, 2 tables

    ACM Class: H.3.7; H.1.1; D.4.5; E.5

    Journal ref: 4th USENIX Conference on File and Storage Technologies, December 2005 (FAST '05), San Francisco, CA