Skip to main content

Showing 1–8 of 8 results for author: Arden, O

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.12577  [pdf, other

    cs.DC

    Proximal Byzantine Consensus

    Authors: Roy Shadmon, Daniel Spencer, Owen Arden

    Abstract: Distributed control systems require high reliability and availability guarantees despite often being deployed at the edge of network infrastructure. Edge computing resources are less secure and less reliable than centralized resources in data centers. Replication and consensus protocols improve robustness to network faults and crashed or corrupted nodes, but these volatile environments can cause n… ▽ More

    Submitted 19 February, 2024; originally announced February 2024.

  2. arXiv:2205.04384  [pdf, other

    cs.PL

    Applying consensus and replication securely with FLAQR

    Authors: Priyanka Mondal, Maximilian Algehed, Owen Arden

    Abstract: Availability is crucial to the security of distributed systems, but guaranteeing availability is hard, especially when participants in the system may act maliciously. Quorum replication protocols provide both integrity and availability: data and computation is replicated at multiple independent hosts, and a quorum of these hosts must agree on the output of all operations applied to the data. Unfor… ▽ More

    Submitted 9 May, 2022; originally announced May 2022.

    Comments: 31 pages, 5 figures, Appearing in CSF 2022

  3. arXiv:2104.10379  [pdf, other

    cs.CR cs.PL

    A Calculus for Flow-Limited Authorization

    Authors: Owen Arden, Anitha Gollamudi, Ethan Cecchetti, Stephen Chong, Andrew C. Myers

    Abstract: Real-world applications routinely make authorization decisions based on dynamic computation. Reasoning about dynamically computed authority is challenging. Integrity of the system might be compromised if attackers can improperly influence the authorizing computation. Confidentiality can also be compromised by authorization, since authorization decisions are often based on sensitive data such as me… ▽ More

    Submitted 21 April, 2021; originally announced April 2021.

    Comments: 58 pages

    ACM Class: F.3.1; F.3.2; D.4.6

  4. arXiv:2004.02020  [pdf, other

    cs.CR cs.DC

    Building secure distributed applications the DECENT way

    Authors: Haofan Zheng, Owen Arden

    Abstract: Remote attestation (RA) authenticates code running in trusted execution environments (TEEs), allowing trusted code to be deployed even on untrusted hosts. However, trust relationships established by one component in a distributed application may impact the security of other components, making it difficult to reason about the security of the application as a whole. Furthermore, traditional RA appro… ▽ More

    Submitted 31 January, 2022; v1 submitted 4 April, 2020; originally announced April 2020.

    Comments: 17 pages, 21 figures. V3: Added a section to introduce a distributed revoker design; Added details on Decent Handshake protocol; Revised the description on data sealing mechanism; Added a discussion of future research directions related to automatic component verification; Added and replaced 11 figures; V2: Added formal verification result for the protocols; clarified verifiers and revokers

  5. First-Order Logic for Flow-Limited Authorization

    Authors: Andrew K. Hirsch, Pedro H. Azevedo de Amorim, Ethan Cecchetti, Ross Tate, Owen Arden

    Abstract: We present the Flow-Limited Authorization First-Order Logic (FLAFOL), a logic for reasoning about authorization decisions in the presence of information-flow policies. We formalize the FLAFOL proof system, characterize its proof-theoretic properties, and develop its security guarantees. In particular, FLAFOL is the first logic to provide a non-interference guarantee while supporting all connective… ▽ More

    Submitted 28 January, 2020; originally announced January 2020.

    Comments: Coq code can be found at https://github.com/FLAFOL/flafol-coq

  6. Cryptographically Secure Information Flow Control on Key-Value Stores

    Authors: Lucas Waye, Pablo Buiras, Owen Arden, Alejandro Russo, Stephen Chong

    Abstract: We present Clio, an information flow control (IFC) system that transparently incorporates cryptography to enforce confidentiality and integrity policies on untrusted storage. Clio insulates developers from explicitly manipulating keys and cryptographic primitives by leveraging the policy language of the IFC system to automatically use the appropriate keys and correct cryptographic operations. We p… ▽ More

    Submitted 29 August, 2017; originally announced August 2017.

    Comments: Full version of conference paper appearing in CCS 2017

  7. Nonmalleable Information Flow: Technical Report

    Authors: Ethan Cecchetti, Andrew C. Myers, Owen Arden

    Abstract: Noninterference is a popular semantic security condition because it offers strong end-to-end guarantees, it is inherently compositional, and it can be enforced using a simple security type system. Unfortunately, it is too restrictive for real systems. Mechanisms for downgrading information are needed to capture real-world security requirements, but downgrading eliminates the strong compositional s… ▽ More

    Submitted 31 August, 2017; v1 submitted 29 August, 2017; originally announced August 2017.

    ACM Class: D.4.6

  8. arXiv:1208.0271  [pdf, other

    cs.DB

    Automatic Partitioning of Database Applications

    Authors: Alvin Cheung, Owen Arden, Samuel Madden, Andrew C. Myers

    Abstract: Database-backed applications are nearly ubiquitous in our daily lives. Applications that make many small accesses to the database create two challenges for developers: increased latency and wasted resources from numerous network round trips. A well-known technique to improve transactional database application performance is to convert part of the application into stored procedures that are execute… ▽ More

    Submitted 1 August, 2012; originally announced August 2012.

    Comments: VLDB2012

    Journal ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1471-1482 (2012)