-
SoK: SCT Auditing in Certificate Transparency
Authors:
Sarah Meiklejohn,
Joe DeBlasio,
Devon O'Brien,
Chris Thompson,
Kevin Yeo,
Emily Stark
Abstract:
The Web public key infrastructure is essential to providing secure communication on the Internet today, and certificate authorities play a crucial role in this ecosystem by issuing certificates. These authorities may misissue certificates or suffer misuse attacks, however, which has given rise to the Certificate Transparency (CT) project. The goal of CT is to store all issued certificates in publi…
▽ More
The Web public key infrastructure is essential to providing secure communication on the Internet today, and certificate authorities play a crucial role in this ecosystem by issuing certificates. These authorities may misissue certificates or suffer misuse attacks, however, which has given rise to the Certificate Transparency (CT) project. The goal of CT is to store all issued certificates in public logs, which can then be checked for the presence of potentially misissued certificates. Thus, the requirement that a given certificate is indeed in one (or several) of these logs lies at the core of CT. In its current deployment, however, most individual clients do not check that the certificates they see are in logs, as requesting a proof of inclusion directly reveals the certificate and thus creates the clear potential for a violation of that client's privacy. In this paper, we explore the techniques that have been proposed for privacy-preserving auditing of certificate inclusion, focusing on their effectiveness, efficiency, and suitability in a near-term deployment. In doing so, we also explore the parallels with related problems involving browser clients. Guided by a set of constraints that we develop, we ultimately observe several key limitations in many proposals, ranging from their privacy provisions to the fact that they focus on the interaction between a client and a log but leave open the question of how a client could privately report any certificates that are missing.
△ Less
Submitted 3 March, 2022;
originally announced March 2022.
-
Observationally Cooperative Multithreading
Authors:
Christopher A. Stone,
Melissa E. O'Neill,
Sonja A. Bohr,
Adam M. Cozzette,
M. Joe DeBlasio,
Julia Matsieva,
Stuart A. Pernsteiner,
Ari D. Schumer
Abstract:
Despite widespread interest in multicore computing, concur- rency models in mainstream languages often lead to subtle, error-prone code.
Observationally Cooperative Multithreading (OCM) is a new approach to shared-memory parallelism. Programmers write code using the well-understood cooperative (i.e., nonpreemptive) multithreading model for uniprocessors. OCM then allows threads to run in paralle…
▽ More
Despite widespread interest in multicore computing, concur- rency models in mainstream languages often lead to subtle, error-prone code.
Observationally Cooperative Multithreading (OCM) is a new approach to shared-memory parallelism. Programmers write code using the well-understood cooperative (i.e., nonpreemptive) multithreading model for uniprocessors. OCM then allows threads to run in parallel, so long as results remain consistent with the cooperative model.
Programmers benefit because they can reason largely sequentially. Remaining interthread interactions are far less chaotic than in other models, permitting easier reasoning and debugging. Programmers can also defer the choice of concurrency-control mechanism (e.g., locks or transactions) until after they have written their programs, at which point they can compare concurrency-control strategies and choose the one that offers the best performance. Implementers and researchers also benefit from the agnostic nature of OCM -- it provides a level of abstraction to investigate, compare, and combine a variety of interesting concurrency-control techniques.
△ Less
Submitted 17 February, 2015;
originally announced February 2015.
-
Morphologies of Ultracompact HII Regions in W49A and Sgr B2: Prevalence of Shells and a Modified Classification Scheme
Authors:
C. G. De Pree,
D. J. Wilner,
J. Deblasio,
A. J. Mercer,
L. E. Davis
Abstract:
We have used Very Large Array (VLA) observations of the massive star forming regions W49A and Sgr B2, obtained with resolutions from 2\farcs0 to 0\farcs04, to classify the morphologies of nearly 100 ultracompact HII regions. These high resolution, multi-frequency, multi-configuration VLA observations motivate several modifications of the existing morphological classification scheme for UC HII re…
▽ More
We have used Very Large Array (VLA) observations of the massive star forming regions W49A and Sgr B2, obtained with resolutions from 2\farcs0 to 0\farcs04, to classify the morphologies of nearly 100 ultracompact HII regions. These high resolution, multi-frequency, multi-configuration VLA observations motivate several modifications of the existing morphological classification scheme for UC HII regions. In this work, we describe the modified morphology scheme and the criteria used in source classification. In particular, we drop the ``core-halo'' classification, add a ``bipolar'' classification, and change the shell classification to ``shell-like''. We tally the percentage of each morphology found in the Sgr B2 and W49A regions and find broad agreement with the Galactic plane surveys in the distribution of morphologies for most types. However, we find that nearly a third of the sources in these regions are shell-like, which is a higher percentage by nearly a factor of ten than found in the surveys of Galactic plane star forming regions by Wood & Churchwell (1989a) and Kurtz et al. (1994). This difference may be due to physical differences in the environments of these two extreme star forming regions. Alternatively, differences in observational technique may be responsible.
△ Less
Submitted 10 April, 2005;
originally announced April 2005.