Skip to main content

Showing 1–28 of 28 results for author: Feigenbaum, J

.
  1. arXiv:2201.10677  [pdf, other

    cs.CY

    From Data Leverage to Data Co-Ops: An Institutional Model for User Control over Information Access

    Authors: Caleb Malchik, Joan Feigenbaum

    Abstract: Internet companies derive value from users by recording and influencing their behavior. Users can pressure companies to refrain from certain invasive and manipulative practices by selectively withdrawing their attention, an exercise of data leverage as formulated by Vincent et al. Ligett and Nissim's proposal for an institution representing the interests of users, the data co-op, offers a means of… ▽ More

    Submitted 25 January, 2022; originally announced January 2022.

    Comments: 12 pages, 2 figures; submitted to ACM FAccT 2022

    ACM Class: K.4.0; H.3.3

  2. arXiv:2201.07413  [pdf, other

    cs.CY

    On Heuristic Models, Assumptions, and Parameters

    Authors: Samuel Judson, Joan Feigenbaum

    Abstract: Insightful interdisciplinary collaboration is essential to the principled governance of complex technologies, like those produced by modern computing research and development. Technical research on the interaction between computation and society often focuses on how researchers model social and physical systems. These models underlie how computer scientists specify problems and propose algorithmic… ▽ More

    Submitted 16 August, 2023; v1 submitted 18 January, 2022; originally announced January 2022.

  3. arXiv:2011.04789  [pdf, ps, other

    cs.CR cs.LG

    Privacy-Preserving XGBoost Inference

    Authors: Xianrui Meng, Joan Feigenbaum

    Abstract: Although machine learning (ML) is widely used for predictive tasks, there are important scenarios in which ML cannot be used or at least cannot achieve its full potential. A major barrier to adoption is the sensitive nature of predictive queries. Individual users may lack sufficiently rich datasets to train accurate models locally but also be unwilling to send sensitive queries to commercial servi… ▽ More

    Submitted 24 November, 2020; v1 submitted 9 November, 2020; originally announced November 2020.

    Comments: Extended abstract appears in Privacy-preserving Machine Learning Workshop at NeurIPS 2020

  4. arXiv:1710.10237  [pdf, other

    cs.CR

    PriFi: Low-Latency Anonymity for Organizational Networks

    Authors: Ludovic Barman, Italo Dacosta, Mahdi Zamani, Ennan Zhai, Apostolos Pyrgelis, Bryan Ford, Jean-Pierre Hubaux, Joan Feigenbaum

    Abstract: Organizational networks are vulnerable to traffic-analysis attacks that enable adversaries to infer sensitive information from the network traffic - even if encryption is used. Typical anonymous communication networks are tailored to the Internet and are poorly suited for organizational networks. We present PriFi, an anonymous communication protocol for LANs, which protects users against eavesdrop… ▽ More

    Submitted 6 April, 2021; v1 submitted 27 October, 2017; originally announced October 2017.

    Comments: 25 pages

  5. arXiv:1607.03659  [pdf, other

    cs.CR

    Open, privacy-preserving protocols for lawful surveillance

    Authors: Aaron Segal, Joan Feigenbaum, Bryan Ford

    Abstract: The question of how government agencies can acquire actionable, useful information about legitimate but unknown targets without intruding upon the electronic activity of innocent parties is extremely important. We address this question by providing experimental evidence that actionable, useful information can indeed be obtained in a manner that preserves the privacy of innocent parties and that ho… ▽ More

    Submitted 13 July, 2016; originally announced July 2016.

    Comments: 13 pages, 2 figures

  6. arXiv:1511.05453  [pdf, other

    cs.CR

    Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection

    Authors: Aaron Johnson, Rob Jansen, Aaron D. Jaggard, Joan Feigenbaum, Paul Syverson

    Abstract: Tor users are vulnerable to deanonymization by an adversary that can observe some Tor relays or some parts of the network. We demonstrate that previous network-aware path-selection algorithms that propose to solve this problem are vulnerable to attacks across multiple Tor connections. We suggest that users use trust to choose the paths through Tor that are less likely to be observed, where trust i… ▽ More

    Submitted 27 January, 2017; v1 submitted 17 November, 2015; originally announced November 2015.

    Comments: A conference version of this paper appears in Proceedings of the 24th Network and Distributed System Security Symposium (NDSS 2017)

  7. arXiv:1506.02954  [pdf, other

    cs.CR

    Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values

    Authors: Benjamin Mood, Debayan Gupta, Kevin Butler, Joan Feigenbaum

    Abstract: Two-party secure function evaluation (SFE) has become significantly more feasible, even on resource-constrained devices, because of advances in server-aided computation systems. However, there are still bottlenecks, particularly in the input validation stage of a computation. Moreover, SFE research has not yet devoted sufficient attention to the important problem of retaining state after a computa… ▽ More

    Submitted 9 June, 2015; originally announced June 2015.

    Comments: 20 pages, shorter conference version published in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Pages 582-596, ACM New York, NY, USA

  8. arXiv:1406.3583  [pdf, other

    cs.CR

    Representing Network Trust and Using It to Improve Anonymous Communication

    Authors: Aaron D. Jaggard, Aaron Johnson, Paul Syverson, Joan Feigenbaum

    Abstract: Motivated by the effectiveness of correlation attacks against Tor, the censorship arms race, and observations of malicious relays in Tor, we propose that Tor users capture their trust in network elements using probability distributions over the sets of elements observed by network adversaries. We present a modular system that allows users to efficiently and conveniently create such distributions a… ▽ More

    Submitted 13 June, 2014; originally announced June 2014.

    Comments: 24 pages; talk to be presented at HotPETs 2014

  9. arXiv:1312.5307  [pdf, ps, other

    cs.CR

    Seeking Anonymity in an Internet Panopticon

    Authors: Joan Feigenbaum, Bryan Ford

    Abstract: Obtaining and maintaining anonymity on the Internet is challenging. The state of the art in deployed tools, such as Tor, uses onion routing (OR) to relay encrypted connections on a detour passing through randomly chosen relays scattered around the Internet. Unfortunately, OR is known to be vulnerable at least in principle to several classes of attacks for which no solution is known or believed to… ▽ More

    Submitted 2 January, 2015; v1 submitted 18 December, 2013; originally announced December 2013.

    Comments: 8 pages, 10 figures

  10. arXiv:1208.0383  [pdf, other

    cs.GT

    An Economic Analysis of User-Privacy Options in Ad-Supported Services

    Authors: Joan Feigenbaum, Michael Mitzenmacher, Georgios Zervas

    Abstract: We analyze the value to e-commerce website operators of offering privacy options to users, e.g., of allowing users to opt out of ad targeting. In particular, we assume that site operators have some control over the cost that a privacy option imposes on users and ask when it is to their advantage to make such costs low. We consider both the case of a single site and the case of multiple sites that… ▽ More

    Submitted 1 August, 2012; originally announced August 2012.

  11. On the Resilience of Routing Tables

    Authors: Joan Feigenbaum, Brighten Godfrey, Aurojit Panda, Michael Schapira, Scott Shenker, Ankit Singla

    Abstract: Many modern network designs incorporate "failover" paths into routers' forwarding tables. We initiate the theoretical study of the conditions under which such resilient routing tables can guarantee delivery of packets.

    Submitted 3 August, 2012; v1 submitted 16 July, 2012; originally announced July 2012.

    Comments: Brief announcement, PODC 2012

  12. arXiv:1111.2520  [pdf, ps, other

    cs.CR

    Probabilistic Analysis of Onion Routing in a Black-box Model

    Authors: Joan Feigenbaum, Aaron Johnson, Paul Syverson

    Abstract: We perform a probabilistic analysis of onion routing. The analysis is presented in a black-box model of anonymous communication in the Universally Composable framework that abstracts the essential properties of onion routing in the presence of an active adversary that controls a portion of the network and knows all a priori distributions on user choices of destination. Our results quantify how muc… ▽ More

    Submitted 10 November, 2011; originally announced November 2011.

    Comments: Extended abstract appeared in Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society (WPES 2007)

    ACM Class: C.2.0; C.2.4; K.4.1; G.3

  13. arXiv:1001.3388  [pdf, ps, other

    cs.CR

    Approximate Privacy: PARs for Set Problems

    Authors: Joan Feigenbaum, Aaron D. Jaggard, Michael Schapira

    Abstract: In previous work (arXiv:0910.5714), we introduced the Privacy Approximation Ratio (PAR) and used it to study the privacy of protocols for second-price Vickrey auctions and Yao's millionaires problem. Here, we study the PARs of multiple protocols for both the disjointness problem (in which two participants, each with a private subset of {1,...,k}, determine whether their sets are disjoint) and the… ▽ More

    Submitted 9 June, 2010; v1 submitted 19 January, 2010; originally announced January 2010.

    Comments: 34 pages, nine figures, one table. Version 2 adds acknowledgements and Appendix B

    Report number: DIMACS TR 2010-01

  14. arXiv:0910.5714  [pdf, ps, other

    cs.CR cs.GT

    Approximate Privacy: Foundations and Quantification

    Authors: Joan Feigenbaum, Aaron D. Jaggard, Michael Schapira

    Abstract: Increasing use of computers and networks in business, government, recreation, and almost all aspects of daily life has led to a proliferation of online sensitive data about individuals and organizations. Consequently, concern about the privacy of these data has become a top priority, particularly those data that are created and used in electronic commerce. There have been many formulations of priv… ▽ More

    Submitted 9 June, 2010; v1 submitted 29 October, 2009; originally announced October 2009.

    Comments: 33 pages, seven figures, two tables. Changes in version 2 include an expanded discussion of other approaches to approximate privacy and added acknowledgements

    Report number: DIMACS TR 2009-14

  15. arXiv:0806.1234  [pdf, ps, other

    physics.class-ph physics.ed-ph physics.hist-ph

    The Theory of Relativity - Galileo's Child

    Authors: Mitchell J. Feigenbaum

    Abstract: We determine the Lorentz transformations and the kinematic content and dynamical framework of special relativity as purely an extension of Galileo's thoughts. No reference to light is ever required: The theories of relativity are logically independent of any properties of light. The thoughts of Galileo are fully realized in a system of Lorentz transformations with a parameter 1/c^2, some undeter… ▽ More

    Submitted 6 June, 2008; originally announced June 2008.

  16. arXiv:cond-mat/0207690  [pdf, ps, other

    cond-mat.soft nlin.PS

    Pattern Selection: Determined by Symmetry and Modifiable by Long-Range Effects

    Authors: Mitchell J. Feigenbaum

    Abstract: We consider Saffman-Taylor channel flow without surface tension on a high-pressure driven interface, but modify the usual infinite-fluid in infinite-channel configuration. Here we include the treatment of efflux by considering a finite connected body of fluid in an arbitrarily long channel, with its second free interface the efflux of this configuration. We show that there is a uniquely determin… ▽ More

    Submitted 29 July, 2002; originally announced July 2002.

  17. arXiv:cond-mat/0107445  [pdf, ps, other

    cond-mat

    More on A Statistical Analysis of Log-Periodic Precursors to Financial Crashes

    Authors: James A. Feigenbaum

    Abstract: We respond to Sornette and Johansen's criticisms of our findings regarding log-periodic precursors to financial crashes. Included in this paper are discussions of the Sornette-Johansen theoretical paradigm, traditional methods of identifying log-periodic precursors, the behavior of the first differences of a log-periodic price series, and the distribution of drawdowns for a securities price.

    Submitted 20 July, 2001; originally announced July 2001.

    Comments: 12 LaTex pages, no figures

  18. arXiv:cond-mat/0101031  [pdf, ps, other

    cond-mat

    A Statistical Analysis of Log-Periodic Precursors to Financial Crashes

    Authors: James Feigenbaum

    Abstract: Motivated by the hypothesis that financial crashes are macroscopic examples of critical phenomena associated with a discrete scaling symmetry, we reconsider the evidence of log-periodic precursors to financial crashes and test the prediction that log-periodic oscillations in a financial index are embedded in the mean function of this index. In particular, we examine the first differences of the… ▽ More

    Submitted 27 February, 2001; v1 submitted 3 January, 2001; originally announced January 2001.

    Comments: 26 pages, 10 figures, figures are incorporated into paper, some changes to the text have been made

  19. arXiv:cond-mat/0002420  [pdf, ps, other

    cond-mat.stat-mech nlin.CD

    Conformal Dynamics of Fractal Growth Patterns Without Randomness

    Authors: Benny Davidovich, M. J. Feigenbaum, H. G. E. Hentschel, Itamar Procaccia

    Abstract: Many models of fractal growth patterns (like Diffusion Limited Aggregation and Dielectric Breakdown Models) combine complex geometry with randomness; this double difficulty is a stumbling block to their elucidation. In this paper we introduce a wide class of fractal growth models with highly complex geometry but without any randomness in their growth rules. The models are defined in terms of det… ▽ More

    Submitted 27 February, 2000; originally announced February 2000.

    Comments: 12 pages, 21 figures

  20. Dynamics of Finger Formation in Laplacian Growth without Surface Tension

    Authors: Mitchell J. Feigenbaum, Itamar Procaccia, Benny Davidovich

    Abstract: We study the dynamics of "finger" formation in Laplacian growth without surface tension in a channel geometry (the Saffman-Taylor problem). Carefully determining the role of boundary geometry, we construct field equations of motion, these central to the analytic power we can here exercise. We consider an explicit analytic class of maps to the physical space, a basis of solutions for infinite flu… ▽ More

    Submitted 1 August, 1999; originally announced August 1999.

    Comments: J.Stat.Phys, submitted. RevTex, 16 pages, 4 figures included

  21. Born-Regulated Gravity in Four Dimensions

    Authors: James A. Feigenbaum

    Abstract: Previous work involving Born-regulated gravity theories in two dimensions is extended to four dimensions. The action we consider has two dimensionful parameters. Black hole solutions are studied for typical values of these parameters. For masses above a critical value determined in terms of these parameters, the event horizon persists. For masses below this critical value, the event horizon disa… ▽ More

    Submitted 16 July, 1998; originally announced July 1998.

    Comments: LaTeX, 15 pages, 2 figures

    Report number: EFI 98-28

    Journal ref: Phys. Rev. D 58, 124023 (1998)

  22. Discrete Scale Invariance and the "Second Black Monday"

    Authors: James A. Feigenbaum, Peter G. O. Freund

    Abstract: Evidence is offered for log-periodic (in time) fluctuations in the S&P 500 stock index during the three years prior to the October 27, 1997 "correction". These fluctuations were expected on the basis of a discretely scale invariant rupture phenomenology of stock market crashes proposed earlier.

    Submitted 29 October, 1997; originally announced October 1997.

    Comments: LaTeX file, 4 pages, 2 figures

    Report number: EFI 97-49

  23. Gravitational Analogues of Non-linear Born Electrodynamics

    Authors: James A. Feigenbaum, Peter G. O. Freund, Mircea Pigli

    Abstract: Gravitational analogues of the nonlinear electrodynamics of Born and of Born and Infeld are introduced and applied to the black hole problem. This work is mainly devoted to the 2-dimensional case in which the relevant lagrangians are nonpolynomial in the scalar curvature.

    Submitted 12 December, 1997; v1 submitted 26 September, 1997; originally announced September 1997.

    Comments: 20 pages, 2 figures, included a detailed discussion of "non-trace" field equations

    Report number: EFI 97-42

    Journal ref: Phys.Rev. D57 (1998) 4738-4744

  24. T-Duality Considerations for Hadronic Strings

    Authors: James A. Feigenbaum, Peter G. O. Freund, Mircea Pigli

    Abstract: We show that a simple account of hadronic high energy total cross-sections and of the observed masses and flavor-gauge-like couplings of the familiar vector mesons is obtained in a hadronic string model suggested by QCD in the limit of a large number of colors. Our picture involves a Minkowski space which in addition to the well established continuous one time and three space dimensions is endow… ▽ More

    Submitted 11 March, 1997; originally announced March 1997.

    Comments: 14 pages, latex, 1 figure

    Report number: EFI-97-14

    Journal ref: Phys.Rev. D56 (1997) 2590-2595

  25. High Energy Hadronic Total Cross-Sections

    Authors: James A. Feigenbaum, Peter G. O. Freund, Mircea Pigli

    Abstract: High energy hadronic total cross-section data are found to agree with the predictions of a QCD-string picture.

    Submitted 11 March, 1997; v1 submitted 11 March, 1997; originally announced March 1997.

    Comments: 14 pages, latex, 5 figures

    Report number: EFI-97-13

    Journal ref: Phys.Rev. D56 (1997) 2596-2601

  26. Square root singularity in the viscosity of neutral colloidal suspensions at large frequencies

    Authors: R. Verberg, I. M. de Schepper, M. J. Feigenbaum, E. G. D. Cohen

    Abstract: The asymptotic frequency $ω$, dependence of the dynamic viscosity of neutral hard sphere colloidal suspensions is shown to be of the form $η_0 A(φ) (ωτ_P)^{-1/2}$, where $A(φ)$ has been determined as a function of the volume fraction $φ$, for all concentrations in the fluid range, $η_0$ is the solvent viscosity and $τ_P$ the Péclet time. For a soft potential it is shown that, to leading order st… ▽ More

    Submitted 17 January, 1997; originally announced January 1997.

    Comments: 18 pages LaTeX, 1 postscript figure

    Report number: JSP-96-229

  27. Discrete Scaling in Stock Markets Before Crashes

    Authors: James A. Feigenbaum, Peter G. O. Freund

    Abstract: We propose a picture of stock market crashes as critical points in a hierachical system with discrete scaling. The critical exponent is then complex, leading to log-periodic fluctuations in stock market indexes. We present ``experimental'' evidence in favor of this prediction. This picture is in the spirit of the known earthquake-stock market analogy and of recent work on log-periodic fluctuatio… ▽ More

    Submitted 6 September, 1995; originally announced September 1995.

    Comments: 7 pages LaTeX, 5 uuencoded Postscript figures

    Report number: EFI-95-58

  28. arXiv:hep-th/9507116  [pdf, ps, other

    hep-th math.QA

    A $q$-deformation of the Coulomb Problem

    Authors: J. Feigenbaum, P. G. O. Freund

    Abstract: The algebra of observables of $SO_{q}(3)$-symmetric quantum mechanics is extended to include the inverse $\frac{1}{R}$ of the radial coordinate and used to obtain eigenvalues and eigenfunctions of a \q-deformed Coulomb Hamiltonian.

    Submitted 21 July, 1995; originally announced July 1995.

    Comments: 17 pages, LaTeX

    Report number: EFI-95-42

    Journal ref: J.Math.Phys.37:1602-1616,1996