Skip to main content

Showing 1–8 of 8 results for author: Gilad, Y

.
  1. Practical Rateless Set Reconciliation

    Authors: Lei Yang, Yossi Gilad, Mohammad Alizadeh

    Abstract: Set reconciliation, where two parties hold fixed-length bit strings and run a protocol to learn the strings they are missing from each other, is a fundamental task in many distributed systems. We present Rateless Invertible Bloom Lookup Tables (Rateless IBLT), the first set reconciliation protocol, to the best of our knowledge, that achieves low computation cost and near-optimal communication cost… ▽ More

    Submitted 19 June, 2024; v1 submitted 4 February, 2024; originally announced February 2024.

    Comments: SIGCOMM 2024

    Journal ref: In ACM SIGCOMM 2024 Conference, August 4-8, 2024, Sydney, NSW, Australia. ACM, New York, NY, USA, 18 pages (2024)

  2. arXiv:2209.12993  [pdf, other

    cs.CR

    Device Tracking via Linux's New TCP Source Port Selection Algorithm (Extended Version)

    Authors: Moshe Kol, Amit Klein, Yossi Gilad

    Abstract: We describe a tracking technique for Linux devices, exploiting a new TCP source port generation mechanism recently introduced to the Linux kernel. This mechanism is based on an algorithm, standardized in RFC 6056, for boosting security by better randomizing port selection. Our technique detects collisions in a hash function used in the said algorithm, based on sampling TCP source ports generated i… ▽ More

    Submitted 22 December, 2022; v1 submitted 26 September, 2022; originally announced September 2022.

    Comments: This is an extended version of a paper with the same name that will be presented in the 32nd Usenix Security Symposium (USENIX 2023). UPDATE (2022-10-08): We revised some bibliography entries and clarified some aspects of the mathematical analysis. UPDATE (2022-12-22): Added Usenix 2023 artifact badges and fixed some typos

  3. arXiv:2205.01797  [pdf, other

    cs.NI cs.CR cs.DC

    Coded Transaction Broadcasting for High-throughput Blockchains

    Authors: Lei Yang, Yossi Gilad, Mohammad Alizadeh

    Abstract: High-throughput blockchains require efficient transaction broadcast mechanisms that can deliver transactions to most network nodes with low bandwidth overhead and latency. Existing schemes coordinate transmissions across peers to avoid sending redundant data, but they either incur a high latency or are not robust against adversarial network nodes. We present Strokkur, a new transaction broadcastin… ▽ More

    Submitted 3 May, 2022; originally announced May 2022.

  4. arXiv:1401.7444  [pdf, other

    cs.CR

    Securing Smartphones: A Micro-TCB Approach

    Authors: Yossi Gilad, Amir Herzberg, Ari Trachtenberg

    Abstract: As mobile phones have evolved into `smartphones', with complex operating systems running third- party software, they have become increasingly vulnerable to malicious applications (malware). We introduce a new design for mitigating malware attacks against smartphone users, based on a small trusted computing base module, denoted uTCB. The uTCB manages sensitive data and sensors, and provides core se… ▽ More

    Submitted 29 January, 2014; originally announced January 2014.

  5. The Functional Consequences of Variation in Transcription Factor Binding

    Authors: Darren A. Cusanovich, Bryan Pavlovic, Jonathan K. Pritchard, Yoav Gilad

    Abstract: One goal of human genetics is to understand how the information for precise and dynamic gene expression programs is encoded in the genome. The interactions of transcription factors (TFs) with DNA regulatory elements clearly play an important role in determining gene expression outputs, yet the regulatory logic underlying functional transcription factor binding is poorly understood. Many studies ha… ▽ More

    Submitted 18 October, 2013; originally announced October 2013.

    Comments: 30 pages, 6 figures (7 supplemental figures and 6 supplemental tables available upon request to [email protected]). Submitted to PLoS Genetics

    Journal ref: PLoS Genet 10(3) (2014) e1004226

  6. arXiv:1305.0854  [pdf, other

    cs.CR

    Off-Path Hacking: The Illusion of Challenge-Response Authentication

    Authors: Yossi Gilad, Amir Herzberg, Haya Shulman

    Abstract: Everyone is concerned about the Internet security, yet most traffic is not cryptographically protected. The usual justification is that most attackers are only off-path and cannot intercept traffic; hence, challenge-response mechanisms suffice to ensure authenticity. Usually, the challenges re-use existing `unpredictable' header fields to protect widely-deployed protocols such as TCP and DNS. We a… ▽ More

    Submitted 3 May, 2013; originally announced May 2013.

  7. arXiv:1208.2357  [pdf, other

    cs.CR

    TCP Injections for Fun and Clogging

    Authors: Yossi Gilad, Amir Herzberg

    Abstract: We present a new type of clogging DoS attacks, with the highest amplification factors achieved by off-path attackers, using only puppets, i.e., sandboxed malware on victim machines. Specifically, we present off-path variants of the Opt-ack, Ack-storm and Coremelt DoS attacks, achieving results comparable to these achieved previously achieved by eavesdrop**/MitM attackers and (unrestricted) malwa… ▽ More

    Submitted 11 August, 2012; originally announced August 2012.

  8. arXiv:1204.6623  [pdf, other

    cs.CR

    Off-Path Attacking the Web

    Authors: Yossi Gilad, Amir Herzberg

    Abstract: We show how an off-path (spoofing-only) attacker can perform cross-site scripting (XSS), cross-site request forgery (CSRF) and site spoofing/defacement attacks, without requiring vulnerabilities in either web-browser or server and circumventing known defenses. Attacker can also launch devastating denial of service (DoS) attacks, even when the connection between the client and the server is secured… ▽ More

    Submitted 30 April, 2012; originally announced April 2012.