Proving the Impossible with Alibi Protocols
|
|
- Rolf Spencer
- 6 years ago
- Views:
Transcription
1 Proving the Impossible with Alibi Protocols Dave Levin Victoria Lai, Cristian Lumezanu, Neil Spring, Bobby Bhattacharjee, Bo Han, John Douceur, Jacob Lorch, Thomas Moscibroda
2 Uncooperative behavior Cooperation Anything and everything for the good of the network Selfishness Malice Gain at the potential expense of others Break the system for notoriety or profit
3 Uncooperative behavior Cooperation Routing: ARPANet s global policy Selfishness Malice Routing: BGP Local pref Routing: Prefix hijacking
4 Uncooperative behavior Cooperation Routing: Transport: ARPANet s global policy TCP congestion control Selfishness Malice Routing: BGP Local pref Routing: Prefix hijacking Transport: TCP Opt-Ack Transport: Mitnick attack
5 Uncooperative behavior Cooperation Routing: Transport: ARPANet s global policy TCP congestion control Selfishness Malice Routing: BGP Local pref Routing: Prefix hijacking Transport: TCP Opt-Ack Transport: Mitnick attack
6 Censorship via DNS injection Censoring AS [Anonymous authors, ACM CCR 2012]
7 Censorship via DNS injection Censoring AS [Anonymous authors, ACM CCR 2012]
8 Censorship via DNS injection lemon IP Censoring AS [Anonymous authors, ACM CCR 2012]
9 Censorship via DNS injection Censor-free ASes lemon IP Censoring AS [Anonymous authors, ACM CCR 2012]
10 Censorship via DNS injection Censor-free ASes lemon IP Censoring AS [Anonymous authors, ACM CCR 2012]
11 Censorship via DNS injection Censor-free ASes lemon IP lemon IP Censoring AS [Anonymous authors, ACM CCR 2012]
12 Censorship via DNS injection Censor-free ASes lemon IP Censoring AS [Anonymous authors, ACM CCR 2012]
13 Building secure decentralized systems Make malfeasance impossible Make malfeasance unprofitable Allow no progress if incorrect DNSSEC, Secure BGP,... Heavyweight Remove the incentive to be incorrect Assumptions not always aligned Make malfeasance detectable Allow incorrect progress Prove that nothing bad happened Ideally, lighter-weight
14 Building secure decentralized systems Make malfeasance impossible Make malfeasance unprofitable Allow no progress if incorrect DNSSEC, Secure BGP,... Heavyweight Remove the incentive to be incorrect Assumptions not always aligned Make malfeasance detectable Allow incorrect progress Prove that nothing bad happened Ideally, lighter-weight
15 Building secure decentralized systems Make malfeasance impossible Make malfeasance unprofitable Allow no progress if incorrect DNSSEC, Secure BGP,... Heavyweight Remove the incentive to be incorrect Assumptions not always aligned Make malfeasance detectable Allow incorrect progress Prove that nothing bad happened Ideally, lighter-weight
16 Building secure decentralized systems Make malfeasance impossible Make malfeasance unprofitable Allow no progress if incorrect DNSSEC, Secure BGP,... Heavyweight Remove the incentive to be incorrect Assumptions not always aligned Make malfeasance detectable Allow incorrect progress Prove that nothing bad happened Ideally, lighter-weight But how do you prove something did not happen?
17 One option: Monitor everything Watch everything that everyone does Watch those who watch everything that everyone does Simulate the system based on its inputs and outputs If it didn t happen in simulation, and if the monitoring was done well, then it probably didn t happen
18 Proving something didn t happen Provide a (small) proof that event A happened If events A and B are mutually exclusive Then B could not have happened
19 Proving something didn t happen Provide a (small) proof that event A happened If events A and B are mutually exclusive Then B could not have happened A serves as an alibi
20 Alibi protocols TrInc: Small, trusted h/w Fighting equivocation with trusted counters NSDI 09 Alibi routing Provably avoiding regions of the network Ongoing
21 Alibi protocols TrInc: Small, trusted h/w Fighting equivocation with trusted counters NSDI 09 Alibi routing Provably avoiding regions of the network Ongoing
22 Trust in distributed systems Selfish Participants Malicious Participants
23 Trust in distributed systems Selfish Participants Malicious Participants Powerful tool: Equivocation A participant equivocates by sending conflicting messages to others
24 Equivocation is versatile and powerful Byz. Generals
25 Equivocation is versatile and powerful Byz. Generals Advance Retreat
26 Equivocation is versatile and powerful Byz. Generals Voting BitTorrent Advance Counted your vote I have piece 5 Retreat Tally w/o s vote I don t have piece 5 Leader election Trusted logs sobgp Digital cash Online games Version control Auctions DHTs
27 Equivocation is versatile and powerful Byz. Generals Advance f malicious users If completely untrusted, 3f+1 users needed for consensus [Lamport et al., 1982] Retreat
28 Equivocation is versatile and powerful Byz. Generals Advance Retreat f malicious users If completely untrusted, 3f+1 users needed for consensus [Lamport et al., 1982] If users cannot equivocate, only 2f+1 users are needed [Chun et al., 2007]
29 Enter Trusted Hardware Equivocation can be rendered impossible with trusted hardware New design space All participants have a trusted component
30 Enter Trusted Hardware Equivocation can be rendered impossible with trusted hardware New design space All participants have a trusted component
31 Enter Trusted Hardware Equivocation can be rendered impossible with trusted hardware New design space All participants have a trusted component
32 Enter Trusted Hardware Equivocation can be rendered impossible with trusted hardware New design space All participants have a trusted component To be practical, the hardware must be small Ubiquity via low cost Tamper-resilient Easier to verify a small TCB
33 Motivating question What is the minimal abstraction needed to make equivocation impossible?
34 Motivating question What is the minimal abstraction needed to make equivocation impossible? A counter and a key are enough
35 TrInc: Trusted Incrementer 1. Monotonically increasing counter 2. Key for signing attestations 34 K
36 TrInc: Trusted Incrementer 1. Monotonically increasing counter 2. Key for signing attestations Attest(36, data) 34 K
37 TrInc: Trusted Incrementer 1. Monotonically increasing counter 2. Key for signing attestations Attest(36, data) 34 K
38 TrInc: Trusted Incrementer 1. Monotonically increasing counter 2. Key for signing attestations Attest(36, data) K
39 TrInc: Trusted Incrementer 1. Monotonically increasing counter 2. Key for signing attestations Attest(36, data) < 34, 36, data >K K
40 TrInc: Trusted Incrementer 1. Monotonically increasing counter 2. Key for signing attestations Attest(36, data) < 34, 36, data >K K Alibi: Nothing was bound to 35
41 TrInc: Trusted Incrementer 1. Monotonically increasing counter 2. Key for signing attestations Attest(36, data) < 34, 36, data >K K Alibi: Nothing was bound to K
42 TrInc: Trusted Incrementer 1. Monotonically increasing counter 2. Key for signing attestations Attest(36, data) < 34, 36, data >K K Alibi: Nothing was bound to 35 Attest(36, non) 36 K
43 TrInc: Trusted Incrementer 1. Monotonically increasing counter 2. Key for signing attestations Attest(36, data) < 34, 36, data >K K Alibi: Nothing was bound to 35 Attest(36, non) 36 K
44 TrInc: Trusted Incrementer 1. Monotonically increasing counter 2. Key for signing attestations Attest(36, data) < 34, 36, data >K K Alibi: Nothing was bound to 35 Attest(36, non) 36 < 36, 36, non >K K
45 TrInc: Trusted Incrementer 1. Monotonically increasing counter 2. Key for signing attestations Attest(36, data) < 34, 36, data >K K Alibi: Nothing was bound to 35 Attest(36, non) 36 < 36, 36, non >K K Status attestation
46 What can TrInc do? Trusted append-only logs Prevent under-reporting in BitTorrent Reduces communication in PeerReview BFT with fewer nodes and messages Ensure fresh data in DHTs Prevent Sybil attacks
47 Implementing a trusted log in TrInc Append(data): Bind new data to the end of the log Lookup(sequence num): No equivocating on what is or is not stored
48 Implementing a trusted log in TrInc Append(data): Bind new data to the end of the log 10 Lookup(sequence num): No equivocating on what is or is not stored
49 Implementing a trusted log in TrInc Append(data): Bind new data to the end of the log 10 Lookup(sequence num): No equivocating on what is or is not stored < 3,8, > < 8,9, > < 9,10, > Untrusted storage
50 Implementing a trusted log in TrInc append Append(data): Bind new data to the end of the log 10 Lookup(sequence num): No equivocating on what is or is not stored < 3,8, > < 8,9, > < 9,10, > Untrusted storage
51 Implementing a trusted log in TrInc attest(11,, ) Append(data): Bind new data to the end of the log 10 Lookup(sequence num): No equivocating on what is or is not stored < 3,8, > < 8,9, > < 9,10, > Untrusted storage
52 Implementing a trusted log in TrInc Append(data): Bind new data to the end of the log 10 Lookup(sequence num): No equivocating on what is or is not stored < 3,8, > < 8,9, > < 9,10, > Untrusted storage
53 Implementing a trusted log in TrInc Append(data): Bind new data to the end of the log Lookup(sequence num): No equivocating on what is or is not stored < 3,8, > < 8,9, > < 9,10, > Untrusted storage
54 Implementing a trusted log in TrInc < 10,11, > Append(data): Bind new data to the end of the log Lookup(sequence num): No equivocating on what is or is not stored < 3,8, > < 8,9, > < 9,10, > Untrusted storage
55 Implementing a trusted log in TrInc Append(data): Bind new data to the end of the log Lookup(sequence num): No equivocating on what is or is not stored < 3,8, > < 8,9, > < 9,10, > < 10,11, > Untrusted storage
56 Implementing a trusted log in TrInc lookup 10 Append(data): Bind new data to the end of the log Lookup(sequence num): No equivocating on what is or is not stored < 3,8, > < 8,9, > < 9,10, > < 10,11, > Untrusted storage
57 Implementing a trusted log in TrInc lookup 10 Append(data): Bind new data to the end of the log Lookup(sequence num): No equivocating on what is or is not stored < 3,8, > < 8,9, > < 9,10, > < 10,11, > Untrusted storage
58 Implementing a trusted log in TrInc Append(data): Bind new data to the end of the log Lookup(sequence num): No equivocating on what is or is not stored < 3,8, > < 8,9, > < 9,10, > < 10,11, > Untrusted storage
59 Implementing a trusted log in TrInc Append(data): Bind new data to the end of the log Lookup(sequence num): No equivocating on what is or is not stored < 3,8, > < 8,9, > < 9,10, > < 9,10, > < 10,11, > Untrusted storage
60 Implementing a trusted log in TrInc Append(data): Bind new data to the end of the log Lookup(sequence num): No equivocating on what is or is not stored < 3,8, > < 8,9, > < 9,10, > < 10,11, > < 9,10, > Fast lookups Few hardware accesses Untrusted storage
61 TrInc Summary Equivocation is versatile and powerful A small amount of trust can secure a large system TrInc is Minimal? A counter and a key Versatile Applies to a wide range of systems Practical Uses the familiar components (in unfamiliar ways)
62 Alibi protocols TrInc: Small, trusted h/w Fighting equivocation with trusted counters NSDI 09 Alibi routing Provably avoiding regions of the network Ongoing
63 Alibi protocols TrInc: Small, trusted h/w Fighting equivocation with trusted counters NSDI 09 Alibi routing Provably avoiding regions of the network Ongoing
64 Avoiding censors Censor-free ASes lemon IP Censoring AS
65 Avoiding censors Censor-free ASes lemon IP Censoring AS
66 Avoiding censors Censor-free ASes but avoid lemon IP Censoring AS
67 Alibi routing
68 Alibi routing
69 Alibi routing Solicit participation from a relay
70 Alibi routing A signature proves the relay forwarded it Solicit participation from a relay
71 Alibi routing A signature proves the relay forwarded it Solicit participation from a relay
72 Alibi routing
73 Alibi routing
74 Alibi routing The triangle inequality mostly holds in the Internet
75 Alibi routing The triangle inequality mostly holds in the Internet Going through the boycotted region would increase latency
76 Alibi routing The farther away the relay, the greater the latency increase. The triangle inequality mostly holds in the Internet Going through the boycotted region would increase latency
77 Finding relays Embed end hosts and regions into a coordinate space Query regions of the space that are far from the avoidee
78 Finding relays Embed end hosts and regions into a coordinate space Query regions of the space that are far from the avoidee
79 Finding relays Embed end hosts and regions into a coordinate space Query regions of the space that are far from the avoidee
80 Finding relays Embed end hosts and regions into a coordinate space Query regions of the space that are far from the avoidee
81 Finding relays Embed end hosts and regions into a coordinate space Query regions of the space that are far from the avoidee
82 Can countries avoid one another? NorthAmerica MiddleEast Europe SouthAmerica Asia 0.6 CDF Number of reachable destinations
83 Can countries avoid one another? Ideal NorthAmerica MiddleEast Europe SouthAmerica Asia 0.6 CDF Number of reachable destinations
84 Can countries avoid one another? NorthAmerica MiddleEast Europe SouthAmerica Asia 0.6 CDF Number of reachable destinations
85 Can countries avoid one another? NorthAmerica MiddleEast Europe SouthAmerica Asia CDF Multiple relays may be necessary Number of reachable destinations
86 Can countries avoid one another? NorthAmerica MiddleEast Europe SouthAmerica Asia CDF Multiple relays may be necessary A few tens of Number of reachable destinations milliseconds often suffices (not shown)
87 Alibi routing is not a panacea Packets can always be copied Provides a small but useful signal to systems: This packet didn t go somewhere bad Or else it might have Systems must decide how to react to that signal Drop the connection? Initiate stronger end-to-end protection?
88 Proving the impossible with alibis Global systems require interactions among self-interested parties Alibi protocols prove something untoward did not happen Without having to prove everything that did An attractive alternative to traditional accountability systems Lightweight Easy to deploy Easy to incorporate with existing systems
TrInc: Small Trusted Hardware for Large Distributed Systems
TrInc: Small Trusted Hardware for Large Distributed Systems University of Maryland John R. Douceur Jacob R. Lorch Thomas Moscibroda Microsoft Research Trust in distributed systems Selfish Participants
More informationAlibi Routing. D. Levin, Y. Lee, L. Valenta Z. Li, V. Lai, C. Lumezanu N. Spring, B. Bhattacharjee SIGCOMM 2015
Alibi Routing D. Levin, Y. Lee, L. Valenta Z. Li, V. Lai, C. Lumezanu N. Spring, B. Bhattacharjee SIGCOMM 2015 Sniff sniff State agencies censor and log citizens internet traffic Abundant in certain regions
More informationInternet Anycast: Performance, Problems and Potential
Internet Anycast: Performance, Problems and Potential Zhihao Li, Dave Levin, Neil Spring, Bobby Bhattacharjee University of Maryland 1 Anycast is increasingly used DNS root servers: All 13 DNS root servers
More informationTrInc: Small Trusted Hardware for Large Distributed Systems
TrInc: Small Trusted Hardware for Large Distributed Systems Dave Levin John R. Douceur Jacob R. Lorch Thomas Moscibroda University of Maryland Microsoft Research Microsoft Research Microsoft Research Abstract
More informationIntroduction to Cryptoeconomics
Introduction to Cryptoeconomics What is cryptoeconomics? Cryptoeconomics is about... Building systems that have certain desired properties Use cryptography to prove properties about messages that happened
More informationISA 674 Understanding Firewalls & NATs
ISA 674 Understanding & NATs Angelos Stavrou September 12, 2012 Types of Types of Schematic of a Firewall Conceptual Pieces Packet UDP Packet Dynamic Packet Application Gateways Circuit Relays Personal
More informationSCION: Scalability, Control and Isolation On Next-Generation Networks
SCION: Scalability, Control and Isolation On Next-Generation Networks Xin Zhang, Hsu-Chun Hsiao, Geoff Hasker, Haowen Chan, Adrian Perrig, David Andersen 1 After years of patching, the Internet is Reliable
More informationInternet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016
Internet Technology 06. Exam 1 Review Paul Krzyzanowski Rutgers University Spring 2016 March 2, 2016 2016 Paul Krzyzanowski 1 Question 1 Defend or contradict this statement: for maximum efficiency, at
More informationProving the Impossible: Provable Route Avoidance using Alibi Routing
Proving the Impossible: Provable Route Avoidance using Alibi Routing Victoria Lai, Dave Levin University of Maryland CMSC499A May 8, 23 Abstract We introduce route avoidance using alibi routing, in which
More informationSecuring BGP. Geoff Huston November 2007
Securing BGP Geoff Huston November 2007 Agenda An Introduction to BGP BGP Security Questions Current Work Research Questions An Introduction to BGP Background to Internet Routing The routing architecture
More informationInternet Technology 3/2/2016
Question 1 Defend or contradict this statement: for maximum efficiency, at the expense of reliability, an application should bypass TCP or UDP and use IP directly for communication. Internet Technology
More informationHOW NEWNODE WORKS. Efficient and Inefficient Networks NEWNODE. And Who Needs a Content Distribution Network Anyway?
HOW WORKS And Who Needs a Content Distribution Network Anyway? Efficient and Inefficient Networks If all networks were fast, efficient, and never suffered from congestion there wouldn t be any need for
More informationFirewalls. Types of Firewalls. Schematic of a Firewall. Conceptual Pieces Packet Filters Stateless Packet Filtering. UDP Filtering.
Network Security - ISA 656 & NATs Angelos Stavrou Types of Schematic of a Conceptual Pieces Packet UDP Types of Packet Dynamic Packet Application Gateways Circuit Relays Personal /or Distributed Many firewalls
More informationFailure models. Byzantine Fault Tolerance. What can go wrong? Paxos is fail-stop tolerant. BFT model. BFT replication 5/25/18
Failure models Byzantine Fault Tolerance Fail-stop: nodes either execute the protocol correctly or just stop Byzantine failures: nodes can behave in any arbitrary way Send illegal messages, try to trick
More informationSecurity in inter-domain routing
DD2491 p2 2011 Security in inter-domain routing Olof Hagsand KTH CSC 1 Literature Practical BGP pages Chapter 9 See reading instructions Beware of BGP Attacks (Nordström, Dovrolis) Examples of attacks
More informationLecture 3. Introduction to Cryptocurrencies
Lecture 3 Introduction to Cryptocurrencies Public Keys as Identities public key := an identity if you see sig such that verify(pk, msg, sig)=true, think of it as: pk says, [msg] to speak for pk, you must
More informationLecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011
Lecture 6: Overlay Networks CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 1 Overlay networks: Motivations Protocol changes in the network happen very slowly Why? Internet is shared
More informationThe Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Presented By: Kamalakar Kambhatla
The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Venugopalan Ramasubramanian Emin Gün Sirer Presented By: Kamalakar Kambhatla * Slides adapted from the paper -
More informationCongestion? What Congestion? Mark Handley
Congestion? What Congestion? Mark Handley Is there a problem to be solved? TCP has done a pretty good job since 1988 of matching offered load to available capacity and avoiding congestion collapse. Doesn
More informationCS 161 Computer Security
Raluca Ada Popa Spring 2018 CS 161 Computer Security Discussion 7 Week of March 5, 2018 Question 1 DHCP (5 min) Professor Raluca gets home after a tiring day writing papers and singing karaoke. She opens
More informationSome Thoughts on Integrity in Routing
Some Thoughts on Integrity in Routing Geoff Huston Chief Scientist, APNIC What we want We want the routing system to advertise the correct reachability information for legitimately connected prefixes at
More informationDistributed Systems Exam 1 Review. Paul Krzyzanowski. Rutgers University. Fall 2016
Distributed Systems 2016 Exam 1 Review Paul Krzyzanowski Rutgers University Fall 2016 Question 1 Why does it not make sense to use TCP (Transmission Control Protocol) for the Network Time Protocol (NTP)?
More informationSafely Measuring Tor. Rob Jansen U.S. Naval Research Laboratory Center for High Assurance Computer Systems
Safely Measuring Tor Safely Measuring Tor, Rob Jansen and Aaron Johnson, In the Proceedings of the 23rd ACM Conference on Computer and Communication Security (CCS 2016). Rob Jansen Center for High Assurance
More informationBYZANTINE GENERALS BYZANTINE GENERALS (1) A fable: Michał Szychowiak, 2002 Dependability of Distributed Systems (Byzantine agreement)
BYZANTINE GENERALS (1) BYZANTINE GENERALS A fable: BYZANTINE GENERALS (2) Byzantine Generals Problem: Condition 1: All loyal generals decide upon the same plan of action. Condition 2: A small number of
More informationSafely Measuring Tor. Rob Jansen U.S. Naval Research Laboratory Center for High Assurance Computer Systems
Safely Measuring Tor Safely Measuring Tor, Rob Jansen and Aaron Johnson, In the Proceedings of the 23rd ACM Conference on Computer and Communication Security (CCS 2016). Rob Jansen Center for High Assurance
More informationA Survey of BGP Security: Issues and Solutions
A Survey of BGP Security: Issues and Solutions Butler, Farley, McDaniel, Rexford Kyle Super CIS 800/003 October 3, 2011 Outline Introduction/Motivation Sources of BGP Insecurity BGP Security Today BGP
More informationSaaS Providers. ThousandEyes for. Summary
USE CASE ThousandEyes for SaaS Providers Summary With Software-as-a-Service (SaaS) applications rapidly replacing onpremise solutions, the onus of ensuring a great user experience for these applications
More informationOFF-PATH ATTACKS AGAINST PUBLIC KEY INFRASTRUCTURES. Markus Brandt, Tianxiang Dai, Elias Heftrig, Amit Klein, Haya Shulman, Michael Waidner
OFF-PATH ATTACKS AGAINST PUBLIC KEY INFRASTRUCTURES Markus Brandt, Tianxiang Dai, Elias Heftrig, Amit Klein, Haya Shulman, Michael Waidner 1 AGENDA Objectives Attacking Impact Mitigation Summary 2 AGENDA
More information0x1A Great Papers in Computer Security
CS 380S 0x1A Great Papers in Computer Security Vitaly Shmatikov http://www.cs.utexas.edu/~shmat/courses/cs380s/ Privacy on Public Networks Internet is designed as a public network Wi-Fi access points,
More informationRouting Security Security Solutions
Routing Security Security Solutions CSE598K/CSE545 - Advanced Network Security Prof. McDaniel - Spring 2008 Page 1 Solving BGP Security Reality: most attempts at securing BGP have been at the local level
More informationAnnouncements. More Announcements. Brief History of Networking. How does a computer send messages over the Internet? 12/7/11
12/7/11 Announcements Final Project : Deadlines Wed (12/7): Project draft to Learn@UW dropbox by 5pm Whatever you have completed TODAY No partner changes after TODAY (email us if problems) Due December
More informationInternet Kill Switches Demystified
Internet Kill Switches Demystified Benjamin Rothenberger, Daniele E. Asoni, David Barrera, Adrian Perrig EuroSec 17, Belgrade B.Rothenberger 23.04.2017 1 B.Rothenberger 23.04.2017 2 Internet Kill Switches
More informationCS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 21: Network Protocols (and 2 Phase Commit)
CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring 2003 Lecture 21: Network Protocols (and 2 Phase Commit) 21.0 Main Point Protocol: agreement between two parties as to
More informationPeer-to-peer computing research a fad?
Peer-to-peer computing research a fad? Frans Kaashoek kaashoek@lcs.mit.edu NSF Project IRIS http://www.project-iris.net Berkeley, ICSI, MIT, NYU, Rice What is a P2P system? Node Node Node Internet Node
More informationEECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations
EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley
More informationThe power of Blockchain: Smart Contracts. Foteini Baldimtsi
The power of Blockchain: Smart Contracts Foteini Baldimtsi The Blockchain at the heart of a cryptocurrency Alice sends 2 John sends 1 Dave sends 5 to Bob to Eve to Alice Bob sends 1 Eve sends 4 to Dave
More informationRule based Forwarding (RBF): improving the Internet s flexibility and security. Lucian Popa, Ion Stoica, Sylvia Ratnasamy UC Berkeley Intel Labs
Rule based Forwarding (RBF): improving the Internet s flexibility and security Lucian Popa, Ion Stoica, Sylvia Ratnasamy UC Berkeley Intel Labs Motivation Improve network s flexibility Middlebox support,
More informationA SIMPLE INTRODUCTION TO TOR
A SIMPLE INTRODUCTION TO TOR The Onion Router Fabrizio d'amore May 2015 Tor 2 Privacy on Public Networks Internet is designed as a public network Wi-Fi access points, network routers see all traffic that
More informationPrivCount: A Distributed System for Safely Measuring Tor
PrivCount: A Distributed System for Safely Measuring Tor Rob Jansen Center for High Assurance Computer Systems Invited Talk, October 4 th, 2016 University of Oregon Department of Computer and Information
More informationCS Paul Krzyzanowski
Computer Security 17. Tor & Anonymous Connectivity Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2018 1 2 Anonymity on the Internet Often considered bad Only criminals need to hide
More informationAn Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks
An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks December 1. 2006 Jong Oh Choi Department of Computer Science Yonsei University jochoi@emerald.yonsei.ac.kr Contents Motivation
More informationCE Advanced Network Security
CE 817 - Advanced Network Security Lecture 3 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially obtained from other
More informationNetworking Review & Grand Challenges
ing Review & Grand Challenges CS 538 August 25 2011 slides 2010-2011 by Brighten Godfrey unless otherwise noted Undergraduate ing in Three Slides (including this one) Layering Application Application Transport
More informationProblems in Reputation based Methods in P2P Networks
WDS'08 Proceedings of Contributed Papers, Part I, 235 239, 2008. ISBN 978-80-7378-065-4 MATFYZPRESS Problems in Reputation based Methods in P2P Networks M. Novotný Charles University, Faculty of Mathematics
More informationBlockchains & Cryptocurrencies
1 Blockchains & Cryptocurrencies A Technical Introduction Lorenz Breidenbach ETH Zürich Cornell Tech The Initiative for CryptoCurrencies & Contracts (IC3) 2 Cryptocurrency Mania Market cap as of yesterday:
More informationNetworking Review & Grand Challenges
ing Review & Grand Challenges Brighten Godfrey CS 538 January 22 2018 slides 2010-2018 by Brighten Godfrey unless otherwise noted Announcements Introducing Sangeetha Key dates posted Assignment release,
More informationWeek 2 / Paper 1. The Design Philosophy of the DARPA Internet Protocols
Week 2 / Paper 1 The Design Philosophy of the DARPA Internet Protocols David D. Clark ACM CCR, Vol. 18, No. 4, August 1988 Main point Many papers describe how the Internet Protocols work But why do they
More informationhard to perform, easy to verify
Proof of Stake The Role of PoW Bitcoin, Ethereum and similar systems are open, permissionless networks Anyone can participate The system must agree on some canonical order of transactions Think of this
More informationAnonymous Communication and Internet Freedom
Anonymous Communication and Internet Freedom CS 161: Computer Security Prof. David Wagner April 29, 2016 Announcements Final exam in RSF Fieldhouse, 5/10, arrive by 7PM HW4 due Monday, 5/2, 11:59pm Review
More informationSecuring BGP Networks using Consistent Check Algorithm
Securing BGP Networks using Consistent Check Algorithm C. K. Man, K.Y. Wong, and K. H. Yeung Abstract The Border Gateway Protocol (BGP) is the critical routing protocol in the Internet infrastructure.
More informationCSE 123b Communications Software
CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Stefan Savage Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to
More informationQuick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004
CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to be part of the
More informationVirtualization of networks
Virtualization of networks Virtualization of resources: powerful abstraction in systems engineering Computing examples: Virtual memory, virtual devices Virtual machines: e.g., Java IBM VM OS from 1960
More informationRIPE Labs. Operators Tools, Ideas and Analysis. Mirjam Kühne, RIPE NCC. RIPE Network Coordination Centre. IETF 78 - Juy 2010.
RIPE Labs Operators Tools, Ideas and Analysis, RIPE NCC 1 What is RIPE Labs? It is a web site, but more importantly: A platform and a tool for the community You can Test and evaluate new tools and prototypes
More informationCooperation in Open Distributed Systems. Stefan Schmid
Cooperation in Open Distributed Systems Stefan Schmid T-Labs, Berlin, July 2, 2009 Distributed Systems 2008/9 Wireless: Many mobile phones today have WLAN (and even Skype) P2P: Olympic games 2008 live-broadcast
More informationBrief History of Networking. Lecture 34: How does a computer send messages over the Internet? Modern Internet. Caveat: Internet Web 11/22/10
11/22/10 UNIVERSITY of WISCONSIN-MADISON Computer Sciences Department CS 202 Introduction to Computation Brief History of Networking Professor Andrea Arpaci-Dusseau Fall 2010 Lecture 34: How does a computer
More informationDNSSEC. CS 161: Computer Security Prof. David Wagner. April 11, 2016
DNSSEC CS 161: Computer Security Prof. David Wagner April 11, 2016 DNSSEC Last lecture, you invented DNSSEC. Well, the basic ideas, anyway: Sign all DNS records. Signatures let you verify answer to DNS
More informationCSE 565 Computer Security Fall 2018
CSE 565 Computer Security Fall 2018 Lecture 18: Network Attacks Department of Computer Science and Engineering University at Buffalo 1 Lecture Overview Network attacks denial-of-service (DoS) attacks SYN
More informationENEE 459-C Computer Security. Security protocols (continued)
ENEE 459-C Computer Security Security protocols (continued) Key Agreement: Diffie-Hellman Protocol Key agreement protocol, both A and B contribute to the key Setup: p prime and g generator of Z p *, p
More informationSybil defenses via social networks
Sybil defenses via social networks Abhishek University of Oslo, Norway 19/04/2012 1 / 24 Sybil identities Single user pretends many fake/sybil identities i.e., creating multiple accounts observed in real-world
More informationChallenges in building overlay networks: a case study of Tor. Steven Murdoch Principal Research Fellow University College London
Challenges in building overlay networks: a case study of Steven Murdoch Principal Research Fellow University College London Who uses? Ordinary people e.g. to avoid unscrupulous marketers, protect children,
More informationCONIKS BRINGING KEY TRANSPARENCY TO END USERS. Marcela Melara. Aaron Blankstein, Joseph Bonneau*, Edward W. Felten, Michael J.
CONIKS BRINGING KEY TRANSPARENCY TO END USERS Marcela Melara Aaron Blankstein, Joseph Bonneau*, Edward W. Felten, Michael J. Freedman Princeton University, *Stanford University/EFF E2E Encrypted Communication
More informationRIPE Network Coordination Centre RIPE Labs Nathalie Trenaman UKNOF 17 - Sept
RIPE Labs Operators Tools, Ideas and Analysis, RIPE NCC 1 What is RIPE Labs? RIPE Network Coordination Centre It is a web site, but more importantly: A platform and a tool for the community You can Test
More informationCS 43: Computer Networks. 24: Internet Routing November 19, 2018
CS 43: Computer Networks 24: Internet Routing November 19, 2018 Last Class Link State + Fast convergence (reacts to events quickly) + Small window of inconsistency Distance Vector + + Distributed (small
More informationThousandEyes for. Application Delivery White Paper
ThousandEyes for Application Delivery White Paper White Paper Summary The rise of mobile applications, the shift from on-premises to Software-as-a-Service (SaaS), and the reliance on third-party services
More informationHow Bitcoin achieves Decentralization. How Bitcoin achieves Decentralization
Centralization vs. Decentralization Distributed Consensus Consensus without Identity, using a Block Chain Incentives and Proof of Work Putting it all together Centralization vs. Decentralization Distributed
More informationCPSC 426/526. Reputation Systems. Ennan Zhai. Computer Science Department Yale University
CPSC 426/526 Reputation Systems Ennan Zhai Computer Science Department Yale University Recall: Lec-4 P2P search models: - How Chord works - Provable guarantees in Chord - Other DHTs, e.g., CAN and Pastry
More informationSecure Algorithms and Data Structures for Massive Networks
Secure Algorithms and Data Structures for Massive Networks Jared Saia Joint work with: Amos Fiat(U. Tel Aviv), Valerie King(U. Vic), Erik Vee (IBM Labs), Vishal Sanwalani(U. Waterloo), and Maxwell Young(UNM)
More informationCISC859: Topics in Advanced Networks & Distributed Computing: Network & Distributed System Security. A Brief Overview of Security & Privacy Issues
CISC859: Topics in Advanced Networks & Distributed Computing: Network & Distributed System Security A Brief Overview of Security & Privacy Issues 1 Topics to Be Covered Cloud computing RFID systems Bitcoin
More informationComputer Security. 15. Tor & Anonymous Connectivity. Paul Krzyzanowski. Rutgers University. Spring 2017
Computer Security 15. Tor & Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2017 April 24, 2017 CS 419 2017 Paul Krzyzanowski 1 Private Browsing Browsers offer a "private" browsing modes
More informationPrivate Browsing. Computer Security. Is private browsing private? Goal. Tor & The Tor Browser. History. Browsers offer a "private" browsing modes
Private Browsing Computer Security 16. Tor & Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2017 Browsers offer a "private" browsing modes Apple Private Browsing, Mozilla Private Browsing,
More informationTerra: A Virtual Machine-Based Platform for Trusted Computing by Garfinkel et al. (Some slides taken from Jason Franklin s 712 lecture, Fall 2006)
Terra: A Virtual Machine-Based Platform for Trusted Computing by Garfinkel et al. (Some slides taken from Jason Franklin s 712 lecture, Fall 2006) Trusted Computing Hardware What can you do if you have
More informationSecurity (and finale) Dan Ports, CSEP 552
Security (and finale) Dan Ports, CSEP 552 Today Security: what if parts of your distributed system are malicious? BFT: state machine replication Bitcoin: peer-to-peer currency Course wrap-up Security Too
More informationSecure Routing in Wireless Sensor Networks: Attacks and Countermeasures
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures By Chris Karlof and David Wagner Lukas Wirne Anton Widera 23.11.2017 Table of content 1. Background 2. Sensor Networks vs. Ad-hoc
More informationPeer-to-peer systems and overlay networks
Complex Adaptive Systems C.d.L. Informatica Università di Bologna Peer-to-peer systems and overlay networks Fabio Picconi Dipartimento di Scienze dell Informazione 1 Outline Introduction to P2P systems
More informationWireless Network Security Spring 2015
Wireless Network Security Spring 2015 Patrick Tague Class #10 Network Layer Threats; Identity Mgmt. 2015 Patrick Tague 1 Class #10 Summary of wireless network layer threats Specific threats related to
More informationBitcoin. CS6450: Distributed Systems Lecture 20 Ryan Stutsman
Bitcoin CS6450: Distributed Systems Lecture 20 Ryan Stutsman Material taken/derived from Princeton COS-418 materials created by Michael Freedman and Kyle Jamieson at Princeton University. Licensed for
More informationIntroduction Distributed Systems
Introduction Distributed Systems Today Welcome Distributed systems definition, goals and challenges What is a distributed system? Very broad definition Collection of components, located at networked computers,
More informationBlockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini
Blockchain CS 240: Computing Systems and Concurrency Lecture 20 Marco Canini Credits: Michael Freedman and Kyle Jamieson developed much of the original material. Bitcoin: 10,000 foot view New bitcoins
More informationICANN and Technical Work: Really? Yes! Steve Crocker DNS Symposium, Madrid, 13 May 2017
ICANN and Technical Work: Really? Yes! Steve Crocker DNS Symposium, Madrid, 13 May 2017 Welcome, everyone. I appreciate the invitation to say a few words here. This is an important meeting and I think
More informationAnonymous Communication and Internet Freedom
Anonymous Communication and Internet Freedom CS 161: Computer Security Prof. David Wagner May 2, 2013 Goals For Today State-sponsored adversaries Anonymous communication Internet censorship State-Sponsored
More informationChapter 5: Networking and the Internet
Chapter 5: Networking and the Internet (Completion Time: 3 weeks) Topics: Internet Basics An overview of how the internet works and how we as users interact with it. This topic can also be used as sort
More informationLecture 17: Peer-to-Peer System and BitTorrent
CSCI-351 Data communication and Networks Lecture 17: Peer-to-Peer System and BitTorrent (I swear I only use it for Linux ISOs) The slide is built with the help of Prof. Alan Mislove, Christo Wilson, and
More informationCommunications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage
CSE 123b CSE 123b Communications Software Spring 2003 Lecture 10: Mobile Networking Stefan Savage Quick announcement My office hours tomorrow are moved to 12pm May 6, 2003 CSE 123b -- Lecture 10 Mobile
More informationQuick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003
CSE 123b Communications Software Quick announcement My office hours tomorrow are moved to 12pm Spring 2003 Lecture 10: Mobile Networking Stefan Savage May 6, 2003 CSE 123b -- Lecture 10 Mobile IP 2 Last
More informationCNT Computer and Network Security: BGP Security
CNT 5410 - Computer and Network Security: BGP Security Professor Kevin Butler Fall 2015 Internet inter-as routing: BGP BGP (Border Gateway Protocol): the de facto standard BGP provides each AS a means
More informationNetwork Forensics Prefix Hijacking Theory Prefix Hijacking Forensics Concluding Remarks. Network Forensics:
Network Forensics: Network OS Fingerprinting Prefix Hijacking Analysis Scott Hand September 30 th, 2011 Outline 1 Network Forensics Introduction OS Fingerprinting 2 Prefix Hijacking Theory BGP Background
More informationCaveat. Much of security-related stuff is mostly beyond my expertise. So coverage of this topic is very limited
Security Issues 476 Caveat Much of security-related stuff is mostly beyond my expertise So coverage of this topic is very limited 477 Security Issues in Mobile Ad Hoc Networks Not much work in this area
More informationThe Case for Pushing DNS. Mark Handley and Adam Greenhalgh
The Case for Pushing DNS Mark Handley and Adam Greenhalgh UCL 1 In the beginning There was Jon Postel And hosts.txt And all was well. Then came DNS And scale. And all was well. Then came scale. And all
More informationSpaceMint Overcoming Bitcoin s waste of energy
Bitcoin Overcoming Bitcoin s waste of energy Georg Fuchsbauer joint work with S Park, A Kwon, K Pietrzak, J Alwen and P Gaži Digital currency Decentralized (no bank issuing coins) Pseudonymous Controled
More informationCSE 127: Computer Security Network Security. Kirill Levchenko
CSE 127: Computer Security Network Security Kirill Levchenko November 28, 2017 Network Security Original TCP/IP design: Trusted network and hosts Hosts and networks administered by mutually trusted parties
More informationCONSENSUS PROTOCOLS & BLOCKCHAINS. Techruption Lecture March 16 th, 2017 Maarten Everts (TNO & University of Twente)
CONSENSUS PROTOCOLS & BLOCKCHAINS Techruption Lecture March 16 th, 2017 Maarten Everts (TNO & University of Twente) 2 Consensus protocols & blockchain 3 Consensus protocols & blockchain 4 Consensus protocols
More informationInterdomain Routing. Networked Systems (H) Lecture 11
Interdomain Routing Networked Systems (H) Lecture 11 Lecture Outline Interdomain routing Autonomous systems and the Internet AS-level topology BGP and Internet routing 2 Interdomain Unicast Routing Tier-1
More informationCRYPTOGRAPHIC PROTOCOLS: PRACTICAL REVOCATION AND KEY ROTATION
#RSAC SESSION ID: CRYP-W04 CRYPTOGRAPHIC PROTOCOLS: PRACTICAL REVOCATION AND KEY ROTATION Adam Shull Recent Ph.D. Graduate Indiana University Access revocation on the cloud #RSAC sk sk Enc Pub Sym pk k
More informationLecture 15 Networking Fundamentals. Today s Plan
Lecture 15 Networking Fundamentals Slides attributed to Neil Spring Today s Plan Talk about networking in general Layers, Routing Specifically about IP and TCP Service model, what TCP provides Work our
More informationCSE 123A Computer Netwrking
CSE 123A Computer Netwrking Winter 2005 Mobile Networking Alex Snoeren presenting in lieu of Stefan Savage Today s s issues What are implications of hosts that move? Remember routing? It doesn t work anymore
More informationInternet Architecture and Experimentation
Internet Architecture and Experimentation Today l Internet architecture l Principles l Experimentation A packet switched network Modern comm. networks are packet switched Data broken into packets, packet
More informationComputing with Infinitely Many Processes under assumptions on concurrency and participation -M.Merritt&G.Taubenfeld. Dean Christakos & Deva Seetharam
Computing with Infinitely Many Processes under assumptions on concurrency and participation -M.Merritt&G.Taubenfeld Dean Christakos & Deva Seetharam November 25, 2003 Abstract This paper explores four
More informationENEE 459-C Computer Security. Security protocols
ENEE 459-C Computer Security Security protocols Key Agreement: Diffie-Hellman Protocol Key agreement protocol, both A and B contribute to the key Setup: p prime and g generator of Z p *, p and g public.
More informationWhy do we really want an ID/locator split anyway?
Why do we really want an ID/locator split anyway? Dave Thaler dthaler@microsoft.com MobiArch 2008 1 Starting from basics Users deal with names, not addresses (esp. in IPv6) Humans need friendly identifiers
More information