Skip to main content

Showing 1–15 of 15 results for author: Król, M

Searching in archive cs. Search in all archives.
.
  1. Don't Get Hijacked: Prevalence, Mitigation, and Impact of Non-Secure DNS Dynamic Updates

    Authors: Yevheniya Nosyk, Maciej Korczyński, Carlos H. Gañán, Michał Król, Qasim Lone, Andrzej Duda

    Abstract: DNS dynamic updates represent an inherently vulnerable mechanism deliberately granting the potential for any host to dynamically modify DNS zone files. Consequently, this feature exposes domains to various security risks such as domain hijacking, compromise of domain control validation, and man-in-the-middle attacks. Originally devised without the implementation of authentication mechanisms, non-s… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

  2. The Cloud Strikes Back: Investigating the Decentralization of IPFS

    Authors: Leonhard Balduf, Maciej Korczyński, Onur Ascigil, Navin V. Keizer, George Pavlou, Björn Scheuermann, Michał Król

    Abstract: Interplanetary Filesystem (IPFS) is one of the largest peer-to-peer filesystems in operation. The network is the default storage layer for Web3 and is being presented as a solution to the centralization of the web. In this paper, we present a large-scale, multi-modal measurement study of the IPFS network. We analyze the topology, the traffic, the content providers and the entry points from the cla… ▽ More

    Submitted 30 September, 2023; v1 submitted 28 September, 2023; originally announced September 2023.

    Comments: To be presented at IMC'23

  3. arXiv:2307.12212  [pdf, other

    cs.CR cs.DC

    Content Censorship in the InterPlanetary File System

    Authors: Srivatsan Sridhar, Onur Ascigil, Navin Keizer, François Genon, Sébastien Pierre, Yiannis Psaras, Etienne Rivière, Michał Król

    Abstract: The InterPlanetary File System (IPFS) is currently the largest decentralized storage solution in operation, with thousands of active participants and millions of daily content transfers. IPFS is used as remote data storage for numerous blockchain-based smart contracts, Non-Fungible Tokens (NFT), and decentralized applications. We present a content censorship attack that can be executed with mini… ▽ More

    Submitted 4 December, 2023; v1 submitted 22 July, 2023; originally announced July 2023.

    Comments: 17 pages (including references and appendices), 15 figures. Accepted to be published at the Network and Distributed System Security (NDSS) Symposium 2024

  4. arXiv:2306.11456  [pdf, other

    cs.NI cs.CR

    Data Availability Sampling in Ethereum: Analysis of P2P Networking Requirements

    Authors: Michał Król, Onur Ascigil, Sergi Rene, Etienne Rivière, Matthieu Pigaglio, Kaleem Peeroo, Vladimir Stankovic, Ramin Sadre, Felix Lange

    Abstract: Despite their increasing popularity, blockchains still suffer from severe scalability limitations. Recently, Ethereum proposed a novel approach to block validation based on Data Availability Sampling (DAS), that has the potential to improve its transaction per second rate by more than two orders of magnitude. DAS should also significantly reduce per-transaction validation costs. At the same time,… ▽ More

    Submitted 20 June, 2023; originally announced June 2023.

  5. arXiv:2201.05073  [pdf, ps, other

    cs.CR

    Low-latency, Scalable, DeFi with Zef

    Authors: Mathieu Baudet, Alberto Sonnino, Michal Krol

    Abstract: Zef was recently proposed to extend the low-latency, Byzantine-Fault Tolerant (BFT) payment protocol FastPay with anonymous coins. This report explores further extensions of FastPay and Lef beyond payments. We start by off-chain assets (e.g. NFTs). We introduce the idea of on-demand BFT consensus instances throught the example of atomic swaps between account owners.

    Submitted 13 January, 2022; originally announced January 2022.

  6. Energy-efficient neural network inference with microcavity exciton-polaritons

    Authors: M. Matuszewski, A. Opala, R. Mirek, M. Furman, M. Król, K. Tyszka, T. C. H. Liew, D. Ballarini, D. Sanvitto, J. Szczytko, B. Piętka

    Abstract: We propose all-optical neural networks characterized by very high energy efficiency and performance density of inference. We argue that the use of microcavity exciton-polaritons allows to take advantage of the properties of both photons and electrons in a seamless manner. This results in strong optical nonlinearity without the use of optoelectronic conversion. We propose a design of a realistic ne… ▽ More

    Submitted 28 August, 2021; originally announced August 2021.

    Journal ref: Phys. Rev. Applied 16, 024045 (2021)

  7. arXiv:2107.07297  [pdf, other

    cs.CR

    Shard Scheduler: object placement and migration in sharded account-based blockchains

    Authors: Michał Król, Onur Ascigil, Sergi Rene, Alberto Sonnino, Mustafa Al-Bassam, Etienne Rivière

    Abstract: We propose Shard Scheduler, a system for object placement and migration in account-based sharded blockchains. Our system calculates optimal placement and decides of object migrations across shards and supports complex multi-account transactions caused by smart contracts. Placement and migration decisions made by Shard Scheduler are fully deterministic, verifiable, and can be made part of the conse… ▽ More

    Submitted 15 July, 2021; originally announced July 2021.

  8. arXiv:2101.02993  [pdf, other

    quant-ph cs.PL

    Efficient decomposition of unitary matrices in quantum circuit compilers

    Authors: A. M. Krol, A. Sarkar, I. Ashraf, Z. Al-Ars, K. Bertels

    Abstract: Unitary decomposition is a widely used method to map quantum algorithms to an arbitrary set of quantum gates. Efficient implementation of this decomposition allows for translation of bigger unitary gates into elementary quantum operations, which is key to executing these algorithms on existing quantum computers. The decomposition can be used as an aggressive optimization method for the whole circu… ▽ More

    Submitted 8 January, 2021; originally announced January 2021.

    Comments: 13 pages

    Journal ref: Appl. Sci. 2022, 12(2), 759;

  9. arXiv:2005.13283  [pdf, other

    quant-ph cs.PL cs.SE

    OpenQL : A Portable Quantum Programming Framework for Quantum Accelerators

    Authors: N. Khammassi, I. Ashraf, J. v. Someren, R. Nane, A. M. Krol, M. A. Rol, L. Lao, K. Bertels, C. G. Almudever

    Abstract: With the potential of quantum algorithms to solve intractable classical problems, quantum computing is rapidly evolving and more algorithms are being developed and optimized. Expressing these quantum algorithms using a high-level language and making them executable on a quantum processor while abstracting away hardware details is a challenging task. Firstly, a quantum programming language should p… ▽ More

    Submitted 27 May, 2020; originally announced May 2020.

  10. arXiv:2004.06403  [pdf, other

    cs.CR

    PASTRAMI: Privacy-preserving, Auditable, Scalable & Trustworthy Auctions for Multiple Items

    Authors: Michał Król, Alberto Sonnino, Argyrios Tasiopoulos, Ioannis Psaras, Etienne Rivière

    Abstract: Decentralised cloud computing platforms enable individuals to offer and rent resources in a peer-to-peer fashion. They must assign resources from multiple sellers to multiple buyers and derive prices that match the interests and capacities of both parties. The assignment process must be decentralised, fair and transparent, but also protect the privacy of buyers. We present PASTRAMI, a decentralise… ▽ More

    Submitted 16 December, 2020; v1 submitted 14 April, 2020; originally announced April 2020.

  11. EL PASSO: Privacy-preserving, Asynchronous Single Sign-On

    Authors: Zhiyi Zhang, Michał Król, Alberto Sonnino, Lixia Zhang, Etienne Rivière

    Abstract: We introduce EL PASSO, a privacy-preserving, asynchronous Single Sign-On (SSO) system. It enables personal authentication while protecting users' privacy against both identity providers and relying parties, and allows selective attribute disclosure. EL PASSO is based on anonymous credentials, yet it supports users' accountability. Selected authorities may recover the identity of allegedly misbehav… ▽ More

    Submitted 3 June, 2020; v1 submitted 24 February, 2020; originally announced February 2020.

    Journal ref: Privacy Enhancing Technologies Symposium (PETS); 2021 (2): 70-87

  12. arXiv:1905.03016  [pdf, other

    cs.CR

    Proof-of-Prestige: A Useful Work Reward System for Unverifiable Tasks

    Authors: Michał Król, Alberto Sonnino, Mustafa Al-Bassam, Argyrios Tasiopoulos, Ioannis Psaras

    Abstract: As cryptographic tokens and altcoins are increasingly being built to serve as utility tokens, the notion of useful work consensus protocols, as opposed to number-crunching PoW consensus, is becoming ever more important. In such contexts, users get rewards from the network after they have carried out some specific task useful for the network. While in some cases the proof of some utility or service… ▽ More

    Submitted 8 May, 2019; originally announced May 2019.

    Comments: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2019)

  13. arXiv:1901.07824  [pdf, other

    cs.CR

    AStERISK: Auction-based Shared Economy ResolutIon System for blocKchain

    Authors: Alberto Sonnino, Michał Król, Argyrios G. Tasiopoulos, Ioannis Psaras

    Abstract: Recent developments in blockchains and edge computing allows to deploy decentralized shared economy with utility tokens, where altcoins secure and reward useful work. However, the majority of the systems being developed, does not provide mechanisms to pair workers and clients, or rely on manual and insecure resolution. AStERISK bridges this gap allowing to perform sealed-bid auctions on blockchain… ▽ More

    Submitted 23 January, 2019; originally announced January 2019.

  14. arXiv:1807.06462  [pdf, other

    cs.CR

    SPOC: Secure Payments for Outsourced Computations

    Authors: Michał Król, Ioannis Psaras

    Abstract: Constrained devices in IoT networks often require to outsource resource-heavy computations or data processing tasks. Currently, most of those jobs are done in the centralised cloud. However, with rapidly increasing number of devices and amount of produced data, edge computing represents a much more efficient solution decreasing the cost, the delay and improves users' privacy. To enable wide deploy… ▽ More

    Submitted 17 July, 2018; originally announced July 2018.

  15. arXiv:1805.06411  [pdf, other

    cs.CR

    Airtnt: Fair Exchange Payment for Outsourced Secure Enclave Computations

    Authors: Mustafa Al-Bassam, Alberto Sonnino, Michał Król, Ioannis Psaras

    Abstract: We present Airtnt, a novel scheme that enables users with CPUs that support Trusted Execution Environments (TEEs) and remote attestation to rent out computing time on secure enclaves to untrusted users. Airtnt makes use of the attestation capabilities of TEEs and smart contracts on distributed ledgers to guarantee the fair exchange of the payment and the result of an execution. Airtnt makes use of… ▽ More

    Submitted 16 May, 2018; originally announced May 2018.