Skip to main content

Showing 1–9 of 9 results for author: Schiff, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.01878  [pdf, other

    cs.CR cs.NI

    I DPID It My Way! A Covert Timing Channel in Software-Defined Networks

    Authors: Robert Krösche, Kashyap Thimmaraju, Liron Schiff, Stefan Schmid

    Abstract: Software-defined networking is considered a promising new paradigm, enabling more reliable and formally verifiable communication networks. However, this paper shows that the separation of the control plane from the data plane, which lies at the heart of Software-Defined Networks (SDNs), can be exploited for covert channels based on SDN Teleportation, even when the data planes are physically discon… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

    Journal ref: IFIP Networking 2018

  2. arXiv:2312.04440  [pdf, other

    cs.CL

    OpenAsp: A Benchmark for Multi-document Open Aspect-based Summarization

    Authors: Shmuel Amar, Liat Schiff, Ori Ernst, Asi Shefer, Ori Shapira, Ido Dagan

    Abstract: The performance of automatic summarization models has improved dramatically in recent years. Yet, there is still a gap in meeting specific information needs of users in real-world scenarios, particularly when a targeted summary is sought, such as in the useful aspect-based summarization setting targeted in this paper. Previous datasets and studies for this setting have predominantly concentrated o… ▽ More

    Submitted 7 December, 2023; originally announced December 2023.

    Comments: EMNLP 2023

  3. arXiv:2306.04221  [pdf, other

    cs.DC

    Dynamic Probabilistic Reliable Broadcast

    Authors: Veronika Anikina, João Paulo Bezerra, Petr Kuznetsov, Liron Schiff, Stefan Schmid

    Abstract: Byzantine reliable broadcast is a primitive that allows a set of processes to agree on a message broadcast by a dedicated source process, even when some of them are malicious (Byzantine). It guarantees that no two correct processes deliver different messages, and if a message is delivered by a correct process, every correct process eventually delivers one. The primitive is known not to scale, as i… ▽ More

    Submitted 7 June, 2023; originally announced June 2023.

  4. Renaissance: A Self-Stabilizing Distributed SDN Control Plane using In-band Communications

    Authors: Marco Canini, Iosif Salem, Liron Schiff, Elad Michael Schiller, Stefan Schmid

    Abstract: By introducing programmability, automated verification, and innovative debugging tools, Software-Defined Networks (SDNs) are poised to meet the increasingly stringent dependability requirements of today's communication networks. However, the design of fault-tolerant SDNs remains an open challenge. This paper considers the design of dependable SDNs through the lenses of self-stabilization - a very… ▽ More

    Submitted 29 March, 2022; v1 submitted 20 December, 2017; originally announced December 2017.

    Comments: v3: journal version

  5. arXiv:1705.00370  [pdf, other

    cs.NI cs.CR

    Software-Defined Adversarial Trajectory Sampling

    Authors: Kashyap Thimmaraju, Liron Schiff, Stefan Schmid

    Abstract: Today's routing protocols critically rely on the assumption that the underlying hardware is trusted. Given the increasing number of attacks on network devices, and recent reports on hardware backdoors this assumption has become questionable. Indeed, with the critical role computer networks play today, the contrast between our security assumptions and reality is problematic. This paper presents S… ▽ More

    Submitted 30 April, 2017; originally announced May 2017.

    Comments: SDN Security, Trajectory Sampling, Forwarding Attacks, Malicious Router, Malicious Data Plane, Compromised Data Plane, Data Plane Security

  6. arXiv:1702.08037  [pdf, other

    cs.NI

    Detecting Heavy Flows in the SDN Match and Action Model

    Authors: Yehuda Afek, Anat Bremler-Barr, Shir Landau Feibish, Liron Schiff

    Abstract: Efficient algorithms and techniques to detect and identify large flows in a high throughput traffic stream in the SDN match-and-action model are presented. This is in contrast to previous work that either deviated from the match and action model by requiring additional switch level capabilities or did not exploit the SDN data plane. Our construction has two parts; (a) how to sample in an SDN match… ▽ More

    Submitted 26 February, 2017; originally announced February 2017.

  7. Outsmarting Network Security with SDN Teleportation

    Authors: Kashyap Thimmaraju, Liron Schiff, Stefan Schmid

    Abstract: Software-defined networking is considered a promising new paradigm, enabling more reliable and formally verifiable communication networks. However, this paper shows that the separation of the control plane from the data plane, which lies at the heart of Software-Defined Networks (SDNs), introduces a new vulnerability which we call \emph{teleportation}. An attacker (e.g., a malicious switch in the… ▽ More

    Submitted 5 March, 2018; v1 submitted 16 November, 2016; originally announced November 2016.

    Comments: Accepted in EuroSP'17

  8. arXiv:1609.02324  [pdf, other

    cs.NI

    Routing-Verification-as-a-Service (RVaaS): Trustworthy Routing Despite Insecure Providers

    Authors: Liron Schiff, Kashyap Thimmaraju, Stefan Schmid

    Abstract: Computer networks today typically do not provide any mechanisms to the users to learn, in a reliable manner, which paths have (and have not) been taken by their packets. Rather, it seems inevitable that as soon as a packet leaves the network card, the user is forced to trust the network provider to forward the packets as expected or agreed upon. This can be undesirable, especially in the light of… ▽ More

    Submitted 8 September, 2016; originally announced September 2016.

  9. arXiv:1604.04465  [pdf, other

    cs.CR cs.NI

    PRI: Privacy Preserving Inspection of Encrypted Network Traffic

    Authors: Liron Schiff, Stefan Schmid

    Abstract: Traffic inspection is a fundamental building block of many security solutions today. For example, to prevent the leakage or exfiltration of confidential insider information, as well as to block malicious traffic from entering the network, most enterprises today operate intrusion detection and prevention systems that inspect traffic. However, the state-of-the-art inspection systems do not reflect w… ▽ More

    Submitted 15 April, 2016; originally announced April 2016.

    ACM Class: C.2.0