Skip to main content

Showing 1–15 of 15 results for author: Trachtenberg, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2303.17530  [pdf, other

    cs.DC

    Enabling Cost-Benefit Analysis of Data Sync Protocols

    Authors: Novak Boškov, Ari Trachtenberg, David Starobinski

    Abstract: The problem of data synchronization arises in networked applications that require some measure of consistency. Indeed data synchronization approaches have demonstrated a significant potential for improving performance in various applications ranging from distributed ledgers to fog-enabled storage offloading for IoT. Although several protocols for data sets synchronization have been proposed over t… ▽ More

    Submitted 30 March, 2023; originally announced March 2023.

  2. arXiv:2303.16809  [pdf, other

    cs.DC

    SREP: Out-Of-Band Sync of Transaction Pools for Large-Scale Blockchains

    Authors: Novak Boškov, Şevval Şimşek, Ari Trachtenberg, David Starobinski

    Abstract: Synchronization of transaction pools (mempools) has shown potential for improving the performance and block propagation delay of state-of-the-art blockchains. Indeed, various heuristics have been proposed in the literature to this end, all of which incorporate exchanges of unconfirmed transactions into their block propagation protocol. In this work, we take a different approach, maintaining transa… ▽ More

    Submitted 29 March, 2023; originally announced March 2023.

  3. arXiv:2003.13670  [pdf, ps, other

    cs.CY cs.CR

    Anonymous Collocation Discovery: Harnessing Privacy to Tame the Coronavirus

    Authors: Ran Canetti, Ari Trachtenberg, Mayank Varia

    Abstract: Successful containment of the Coronavirus pandemic rests on the ability to quickly and reliably identify those who have been in close proximity to a contagious individual. Existing tools for doing so rely on the collection of exact location information of individuals over lengthy time periods, and combining this information with other personal information. This unprecedented encroachment on indivi… ▽ More

    Submitted 3 April, 2020; v1 submitted 30 March, 2020; originally announced March 2020.

    ACM Class: C.5.m; H.4.3; J.3; K.4.1; K.4.2

  4. arXiv:1912.11541  [pdf, other

    cs.CR

    Characterizing Orphan Transactions in the Bitcoin Network

    Authors: Muhammad Anas Imtiaz, David Starobinski, Ari Trachtenberg

    Abstract: Orphan transactions are those whose parental income-sources are missing at the time that they are processed. These transactions are not propagated to other nodes until all of their missing parents are received, and they thus end up languishing in a local buffer until evicted or their parents are found. Although there has been little work in the literature on characterizing the nature and impact of… ▽ More

    Submitted 11 March, 2020; v1 submitted 23 December, 2019; originally announced December 2019.

  5. arXiv:1910.00536  [pdf, other

    cs.IT

    Scalable String Reconciliation by Recursive Content-Dependent Shingling

    Authors: Bowen Song, Ari Trachtenberg

    Abstract: We consider the problem of reconciling similar, but remote, strings with minimum communication complexity. This "string reconciliation" problem is a fundamental building block for a variety of networking applications, including those that maintain large-scale distributed networks and perform remote file synchronization. We present the novel Recursive Content-Dependent Shingling (RCDS) protocol tha… ▽ More

    Submitted 1 October, 2019; originally announced October 2019.

    Comments: 8 pages, 7 figures, 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton)

  6. arXiv:1908.07965  [pdf, other

    cs.CY

    Case Study: Disclosure of Indirect Device Fingerprinting in Privacy Policies

    Authors: Julissa Milligan, Sarah Scheffler, Andrew Sellars, Trishita Tiwari, Ari Trachtenberg, Mayank Varia

    Abstract: Recent developments in online tracking make it harder for individuals to detect and block trackers. Some sites have deployed indirect tracking methods, which attempt to uniquely identify a device by asking the browser to perform a seemingly-unrelated task. One type of indirect tracking, Canvas fingerprinting, causes the browser to render a graphic recording rendering statistics as a unique identif… ▽ More

    Submitted 21 August, 2019; originally announced August 2019.

    Comments: Appearing in STAST 2019

  7. arXiv:1901.03383  [pdf, other

    cs.CR

    Collaborative Privacy for Web Applications

    Authors: Yihao Hu, Ari Trachtenberg, Prakash Ishwar

    Abstract: Real-time, online-editing web apps provide free and convenient services for collaboratively editing, sharing and storing files. The benefits of these web applications do not come for free: not only do service providers have full access to the users' files, but they also control access, transmission, and storage mechanisms for them. As a result, user data may be at risk of data mining, third-party… ▽ More

    Submitted 17 November, 2019; v1 submitted 10 January, 2019; originally announced January 2019.

    Comments: 14 pages, double column, 7 figures

  8. arXiv:1901.01161  [pdf, other

    cs.CR

    Page Cache Attacks

    Authors: Daniel Gruss, Erik Kraft, Trishita Tiwari, Michael Schwarz, Ari Trachtenberg, Jason Hennessey, Alex Ionescu, Anders Fogh

    Abstract: We present a new hardware-agnostic side-channel attack that targets one of the most fundamental software caches in modern computer systems: the operating system page cache. The page cache is a pure software cache that contains all disk-backed pages, including program binaries, shared libraries, and other files, and our attacks thus work across cores and CPUs. Our side-channel permits unprivileged… ▽ More

    Submitted 4 January, 2019; originally announced January 2019.

  9. arXiv:1807.02719  [pdf, other

    cs.CR

    Nothing But Net: Invading Android User Privacy Using Only Network Access Patterns

    Authors: Mikhail Andreev, Avi Klausner, Trishita Tiwari, Ari Trachtenberg, Arkady Yerukhimovich

    Abstract: We evaluate the power of simple networks side-channels to violate user privacy on Android devices. Specifically, we show that, using blackbox network metadata alone (i.e., traffic statistics such as transmission time and size of packets) it is possible to infer several elements of a user's location and also identify their web browsing history (i.e, which sites they visited). We do this with relati… ▽ More

    Submitted 7 July, 2018; originally announced July 2018.

  10. arXiv:1803.06559  [pdf, other

    cs.CR

    Improving Bitcoin's Resilience to Churn

    Authors: Nabeel Younis, Muhammad Anas Imtiaz, David Starobinski, Ari Trachtenberg

    Abstract: Efficient and reliable block propagation on the Bitcoin network is vital for ensuring the scalability of this peer-to-peer network. To this end, several schemes have been proposed over the last few years to speed up the block propagation, most notably the compact block protocol (BIP 152). Despite this, we show experimental evidence that nodes that have recently joined the network may need about te… ▽ More

    Submitted 17 March, 2018; originally announced March 2018.

  11. Fountain Codes with Nonuniform Selection Distributions through Feedback

    Authors: Morteza Hashemi, Yuval Cassuto, Ari Trachtenberg

    Abstract: One key requirement for fountain (rateless) coding schemes is to achieve a high intermediate symbol recovery rate. Recent coding schemes have incorporated the use of a feedback channel to improve intermediate performance of traditional rateless codes; however, these codes with feedback are designed based on uniformly at random selection of input symbols. In this paper, on the other hand, we develo… ▽ More

    Submitted 7 April, 2015; originally announced April 2015.

    Comments: Submitted to the IEEE Transactions on Information Theory

  12. arXiv:1401.7444  [pdf, other

    cs.CR

    Securing Smartphones: A Micro-TCB Approach

    Authors: Yossi Gilad, Amir Herzberg, Ari Trachtenberg

    Abstract: As mobile phones have evolved into `smartphones', with complex operating systems running third- party software, they have become increasingly vulnerable to malicious applications (malware). We introduce a new design for mitigating malware attacks against smartphone users, based on a small trusted computing base module, denoted uTCB. The uTCB manages sensitive data and sensors, and provides core se… ▽ More

    Submitted 29 January, 2014; originally announced January 2014.

  13. arXiv:1204.3293  [pdf, ps, other

    cs.DM

    Efficiently decoding strings from their shingles

    Authors: Aryeh Kontorovich, Ari Trachtenberg

    Abstract: Determining whether an unordered collection of overlap** substrings (called shingles) can be uniquely decoded into a consistent string is a problem that lies within the foundation of a broad assortment of disciplines ranging from networking and information theory through cryptography and even genetic engineering and linguistics. We present three perspectives on this problem: a graph theoretic fr… ▽ More

    Submitted 15 April, 2012; originally announced April 2012.

  14. arXiv:1111.6431  [pdf, ps, other

    cs.FL

    Unique decodability of bigram counts by finite automata

    Authors: Aryeh Kontorovich, Ari Trachtenberg

    Abstract: We revisit the problem of deciding whether a given string is uniquely decodable from its bigram counts by means of a finite automaton. An efficient algorithm for constructing a polynomial-size nondeterministic finite automaton that decides unique decodability is given. Conversely, we show that the minimum deterministic finite automaton for deciding unique decodability has at least exponentially ma… ▽ More

    Submitted 28 November, 2011; originally announced November 2011.

    Comments: 12 pages

    ACM Class: F.4.3

  15. arXiv:q-bio/0505050  [pdf, ps, other

    q-bio.QM cs.IT

    HLA and HIV Infection Progression: Application of the Minimum Description Length Principle to Statistical Genetics

    Authors: Peter T. Hraber, Bette T. Korber, Steven Wolinsky, Henry A. Erlich, Elizabeth A. Trachtenberg, Thomas B. Kepler

    Abstract: The minimum description length (MDL) principle states that the best model to account for some data minimizes the sum of the lengths, in bits, of the descriptions of the model and the residual error. The description length is thus a criterion for model selection. Description-length analysis of HLA alleles from the Chicago MACS cohort enables classification of alleles associated with plasma HIV RN… ▽ More

    Submitted 26 May, 2005; originally announced May 2005.

    Comments: 17 pages, 1 figure

    Report number: Santa Fe Institute Working Paper 03-04-023

    Journal ref: Lecture Notes in Computer Science Volume 4345, 2006, pp 1-12