Skip to main content

Showing 1–50 of 58 results for author: Tsudik, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.04308  [pdf, other

    cs.CR

    Towards Remotely Verifiable Software Integrity in Resource-Constrained IoT Devices

    Authors: Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, Norrathep Rattanavipanon, Gene Tsudik

    Abstract: Lower-end IoT devices typically have strict cost constraints that rule out usual security mechanisms available in general-purpose computers or higher-end devices. To secure low-end devices, various low-cost security architectures have been proposed for remote verification of their software state via integrity proofs. These proofs vary in terms of expressiveness, with simpler ones confirming correc… ▽ More

    Submitted 10 January, 2024; v1 submitted 8 January, 2024; originally announced January 2024.

  2. arXiv:2312.09125  [pdf, other

    cs.CR

    Puppy: A Publicly Verifiable Watermarking Protocol

    Authors: Devriş İşler, Seoyeon Hwang, Yoshimichi Nakatsuka, Nikolaos Laoutaris, Gene Tsudik

    Abstract: In this paper, we propose Puppy, the first formally defined framework for converting any symmetric watermarking into a publicly verifiable one. Puppy allows anyone to verify a watermark any number of times with the help of an untrusted third party, without requiring owner presence during detection. We formally define and prove security of Puppy using the ideal/real-world simulation paradigm and co… ▽ More

    Submitted 14 December, 2023; originally announced December 2023.

  3. arXiv:2311.10911  [pdf, other

    cs.CR

    Dazed & Confused: A Large-Scale Real-World User Study of reCAPTCHAv2

    Authors: Andrew Searles, Renascence Tarafder Prapty, Gene Tsudik

    Abstract: Since about 2003, captchas have been widely used as a barrier against bots, while simultaneously annoying great multitudes of users worldwide. As their use grew, techniques to defeat or bypass captchas kept improving, while captchas themselves evolved in terms of sophistication and diversity, becoming increasingly difficult to solve for both bots and humans. Given this long-standing and still-ongo… ▽ More

    Submitted 21 November, 2023; v1 submitted 17 November, 2023; originally announced November 2023.

  4. Poster: Control-Flow Integrity in Low-end Embedded Devices

    Authors: Sashidhar Jakkamsetti, Youngil Kim, Andrew Searles, Gene Tsudik

    Abstract: Embedded, smart, and IoT devices are increasingly popular in numerous everyday settings. Since lower-end devices have the most strict cost constraints, they tend to have few, if any, security features. This makes them attractive targets for exploits and malware. Prior research proposed various security architectures for enforcing security properties for resource-constrained devices, e.g., via Remo… ▽ More

    Submitted 20 September, 2023; v1 submitted 19 September, 2023; originally announced September 2023.

    Comments: The idea mentioned in the paper is still under development. This is an early version without full results. This version is only as a poster accepted at ACM CCS 2023

  5. Caveat (IoT) Emptor: Towards Transparency of IoT Device Presence (Full Version)

    Authors: Sashidhar Jakkamsetti, Youngil Kim, Gene Tsudik

    Abstract: As many types of IoT devices worm their way into numerous settings and many aspects of our daily lives, awareness of their presence and functionality becomes a source of major concern. Hidden IoT devices can snoop (via sensing) on nearby unsuspecting users, and impact the environment where unaware users are present, via actuation. This prompts, respectively, privacy and security/safety issues. The… ▽ More

    Submitted 8 September, 2023; v1 submitted 7 September, 2023; originally announced September 2023.

    Comments: 17 pages, 11 figures. To appear at ACM CCS 2023

  6. arXiv:2308.11921  [pdf, other

    cs.CR

    PARseL: Towards a Verified Root-of-Trust over seL4

    Authors: Ivan De Oliveira Nunes, Seoyeon Hwang, Sashidhar Jakkamsetti, Norrathep Rattanavipanon, Gene Tsudik

    Abstract: Widespread adoption and growing popularity of embedded/IoT/CPS devices make them attractive attack targets. On low-to-mid-range devices, security features are typically few or none due to various constraints. Such devices are thus subject to malware-based compromise. One popular defensive measure is Remote Attestation (RA) which allows a trusted entity to determine the current software integrity o… ▽ More

    Submitted 23 August, 2023; originally announced August 2023.

    Comments: 8 pages and 8 figures. To be published at IEEE/ACM International Conference on Computer-Aided Design (ICCAD) 2023

  7. arXiv:2307.12108  [pdf, other

    cs.CR

    An Empirical Study & Evaluation of Modern CAPTCHAs

    Authors: Andrew Searles, Yoshimichi Nakatsuka, Ercan Ozturk, Andrew Paverd, Gene Tsudik, Ai Enkoji

    Abstract: For nearly two decades, CAPTCHAs have been widely used as a means of protection against bots. Throughout the years, as their use grew, techniques to defeat or bypass CAPTCHAs have continued to improve. Meanwhile, CAPTCHAs have also evolved in terms of sophistication and diversity, becoming increasingly difficult to solve for both bots (machines) and humans. Given this long-standing and still-ongoi… ▽ More

    Submitted 22 July, 2023; originally announced July 2023.

    Comments: Accepted at USENIX Security 2023

  8. arXiv:2210.02234  [pdf, other

    cs.CR cs.LG

    Thermal (and Hybrid Thermal/Audio) Side-Channel Attacks on Keyboard Input

    Authors: Tyler Kaczmarek, Ercan Ozturk, Pier Paolo Tricomi, Gene Tsudik

    Abstract: To date, there has been no systematic investigation of thermal profiles of keyboards, and thus no efforts have been made to secure them. This serves as our main motivation for constructing a means for password harvesting from keyboard thermal emanations. Specifically, we introduce Thermanator: a new post-factum insider attack based on heat transfer caused by a user ty** a password on a typical e… ▽ More

    Submitted 5 October, 2022; originally announced October 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:1806.10189

  9. arXiv:2209.00813  [pdf, other

    cs.CR cs.AR

    CASU: Compromise Avoidance via Secure Update for Low-end Embedded Systems

    Authors: Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, Youngil Kim, Gene Tsudik

    Abstract: Guaranteeing runtime integrity of embedded system software is an open problem. Trade-offs between security and other priorities (e.g., cost or performance) are inherent, and resolving them is both challenging and important. The proliferation of runtime attacks that introduce malicious code (e.g., by injection) into embedded devices has prompted a range of mitigation techniques. One popular approac… ▽ More

    Submitted 2 September, 2022; originally announced September 2022.

    Comments: 10 pages, 9 figures, To appear at ICCAD 2022

  10. arXiv:2205.02963  [pdf, other

    cs.CR cs.AR

    Privacy-from-Birth: Protecting Sensed Data from Malicious Sensors with VERSA

    Authors: Ivan De Oliveira Nunes, Seoyeon Hwang, Sashidhar Jakkamsetti, Gene Tsudik

    Abstract: There are many well-known techniques to secure sensed data in IoT/CPS systems, e.g., by authenticating communication end-points, encrypting data before transmission, and obfuscating traffic patterns. Such techniques protect sensed data from external adversaries while assuming that the sensing device itself is secure. Meanwhile, both the scale and frequency of IoT-focused attacks are growing. This… ▽ More

    Submitted 5 May, 2022; originally announced May 2022.

    Comments: 13 pages paper and 4 pages appendix. To be published at 2022 IEEE Symposium on Security and Privacy

  11. arXiv:2205.01973  [pdf, other

    cs.CR

    V'CER: Efficient Certificate Validation in Constrained Networks

    Authors: David Koisser, Patrick Jauernig, Gene Tsudik, Ahmad-Reza Sadeghi

    Abstract: We address the challenging problem of efficient trust establishment in constrained networks, i.e., networks that are composed of a large and dynamic set of (possibly heterogeneous) devices with limited bandwidth, connectivity, storage, and computational capabilities. Constrained networks are an integral part of many emerging application domains, from IoT meshes to satellite networks. A particularl… ▽ More

    Submitted 4 May, 2022; originally announced May 2022.

    Comments: 18 pages, 7 figures, to be published at USENIX Security 2022

  12. arXiv:2109.12712  [pdf, other

    cs.CR

    Vronicle: A System for Producing Videos with Verifiable Provenance

    Authors: Yuxin, Liu, Yoshimichi Nakatsuka, Ardalan Amiri Sani, Sharad Agarwal, Gene Tsudik

    Abstract: Demonstrating the veracity of videos is a longstanding problem that has recently become more urgent and acute. It is extremely hard to accurately detect manipulated videos using content analysis, especially in the face of subtle, yet effective, manipulations, such as frame rate changes or skin tone adjustments. One prominent alternative to content analysis is to securely embed provenance informati… ▽ More

    Submitted 26 September, 2021; originally announced September 2021.

  13. VICEROY: GDPR-/CCPA-compliant Enforcement of Verifiable Accountless Consumer Requests

    Authors: Scott Jordan, Yoshimichi Nakatsuka, Ercan Ozturk, Andrew Paverd, Gene Tsudik

    Abstract: Recent data protection regulations (such as GDPR and CCPA) grant consumers various rights, including the right to access, modify or delete any personal information collected about them (and retained) by a service provider. To exercise these rights, one must submit a verifiable consumer request proving that the collected data indeed pertains to them. This action is straightforward for consumers wit… ▽ More

    Submitted 21 October, 2022; v1 submitted 14 May, 2021; originally announced May 2021.

    Journal ref: Network and Distributed System Security (NDSS) Symposium 2023

  14. arXiv:2103.12928  [pdf, other

    cs.CR cs.AR

    DIALED: Data Integrity Attestation for Low-end Embedded Devices

    Authors: Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, Gene Tsudik

    Abstract: Verifying integrity of software execution in low-end micro-controller units (MCUs) is a well-known open problem. The central challenge is how to securely detect software exploits with minimal overhead, since these MCUs are designed for low cost, low energy and small size. Some recent work yielded inexpensive hardware/software co-designs for remotely verifying code and execution integrity. In parti… ▽ More

    Submitted 23 March, 2021; originally announced March 2021.

    Comments: 6 pages, to be published in DAC 2021

  15. arXiv:2102.07014  [pdf, other

    cs.CR

    GAROTA: Generalized Active Root-Of-Trust Architecture

    Authors: Esmerald Aliaj, Ivan De Oliveira Nunes, Gene Tsudik

    Abstract: In this paper, we set out to systematically design a minimal active RoT for tiny low-end MCU-s. We begin with the following questions: (1) What functions and hardware support are required to guarantee actions in the presence of malware?, (2) How to implement this efficiently?, and (3) What security benefits stem from such an active RoT architecture? We then design, implement, formally verify, and… ▽ More

    Submitted 1 March, 2021; v1 submitted 13 February, 2021; originally announced February 2021.

  16. arXiv:2011.07400  [pdf, other

    cs.CR cs.AR

    Tiny-CFA: A Minimalistic Approach for Control-Flow Attestation Using Verified Proofs of Execution

    Authors: Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, Gene Tsudik

    Abstract: The design of tiny trust anchors has received significant attention over the past decade, to secure low-end MCU-s that cannot afford expensive security mechanisms. In particular, hardware/software (hybrid) co-designs offer low hardware cost, while retaining similar security guarantees as (more expensive) hardware-based techniques. Hybrid trust anchors support security services, such as remote atte… ▽ More

    Submitted 14 December, 2020; v1 submitted 14 November, 2020; originally announced November 2020.

  17. arXiv:2010.13858  [pdf, other

    cs.CR

    On the Root of Trust Identification Problem

    Authors: Ivan De Oliveira Nunes, Xuhua Ding, Gene Tsudik

    Abstract: Root of Trust Identification (RTI) refers to determining whether a given security service or task is being performed by the particular root of trust (e.g., a TEE) within a specific physical device. Despite its importance, this problem has been mostly overlooked. We formalize the RTI problem and argue that security of RTI protocols is especially challenging due to local adversaries, cuckoo adversar… ▽ More

    Submitted 26 October, 2020; originally announced October 2020.

  18. arXiv:2007.10397  [pdf, other

    cs.CR

    CACTI: Captcha Avoidance via Client-side TEE Integration

    Authors: Yoshimichi Nakatsuka, Ercan Ozturk, Andrew Paverd, Gene Tsudik

    Abstract: Preventing abuse of web services by bots is an increasingly important problem, as abusive activities grow in both volume and variety. CAPTCHAs are the most common way for thwarting bot activities. However, they are often ineffective against bots and frustrating for humans. In addition, some recent CAPTCHA techniques diminish user privacy. Meanwhile, client-side Trusted Execution Environments (TEEs… ▽ More

    Submitted 20 July, 2020; originally announced July 2020.

    Comments: 18 pages

  19. arXiv:2005.03873  [pdf, other

    cs.CR

    On the TOCTOU Problem in Remote Attestation

    Authors: Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, Norrathep Rattanavipanon, Gene Tsudik

    Abstract: We propose Remote Attestation with TOCTOU Avoidance (RATA): a provably secure approach to address the RA TOCTOU problem. With RATA, even malware that erases itself before execution of the next RA, can not hide its ephemeral presence. RATA targets hybrid RA architectures (implemented as Hardware/Software co-designs), which are aimed at low-end embedded devices. We present two alternative techniques… ▽ More

    Submitted 15 April, 2021; v1 submitted 8 May, 2020; originally announced May 2020.

  20. PDoT: Private DNS-over-TLS with TEE Support

    Authors: Yoshimichi Nakatsuka, Andrew Paverd, Gene Tsudik

    Abstract: Security and privacy of the Internet Domain Name System (DNS) have been longstanding concerns. Recently, there is a trend to protect DNS traffic using Transport Layer Security (TLS). However, at least two major issues remain: (1) how do clients authenticate DNS-over-TLS endpoints in a scalable and extensible manner; and (2) how can clients trust endpoints to behave as expected? In this paper, we p… ▽ More

    Submitted 25 September, 2019; originally announced September 2019.

    Comments: To appear: ACSAC 2019

  21. arXiv:1908.02444  [pdf, other

    cs.CR

    A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise

    Authors: Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik

    Abstract: Modern society is increasingly surrounded by, and accustomed to, a wide range of Cyber-Physical Systems (CPS), Internet-of-Things (IoT), and smart devices. They often perform safety-critical functions, e.g., personal medical devices, automotive CPS and industrial automation (smart factories). Some devices are small, cheap and specialized sensors and/or actuators. They tend to run simple software a… ▽ More

    Submitted 10 January, 2020; v1 submitted 7 August, 2019; originally announced August 2019.

  22. arXiv:1904.00188  [pdf, other

    cs.CR

    PILOT: Password and PIN Information Leakage from Obfuscated Ty** Videos

    Authors: Kiran Balagani, Matteo Cardaioli, Mauro Conti, Paolo Gasti, Martin Georgiev, Tristan Gurtler, Daniele Lain, Charissa Miller, Kendall Molas, Nikita Samarin, Eugen Saraci, Gene Tsudik, Lynn Wu

    Abstract: This paper studies leakage of user passwords and PINs based on observations of ty** feedback on screens or from projectors in the form of masked characters that indicate keystrokes. To this end, we developed an attack called Password and Pin Information Leakage from Obfuscated Ty** Videos (PILOT). Our attack extracts inter-keystroke timing information from videos of password masking characters… ▽ More

    Submitted 9 April, 2019; v1 submitted 30 March, 2019; originally announced April 2019.

    ACM Class: K.6.5

  23. arXiv:1811.00175  [pdf, other

    cs.CR

    Formally Verified Hardware/Software Co-Design for Remote Attestation

    Authors: Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Michael Steiner, Gene Tsudik

    Abstract: In this work, we take the first step towards formal verification of Remote Attestation (RA) by designing and verifying an architecture called VRASED: Verifiable Remote Attestation for Simple Embedded Devices. VRASED instantiates a hybrid (HW/SW) RA co-design aimed at low-end embedded systems, e.g., simple IoT devices. VRASED provides a level of security comparable to HW-based approaches, while rel… ▽ More

    Submitted 24 May, 2019; v1 submitted 31 October, 2018; originally announced November 2018.

  24. ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices

    Authors: N. Asokan, Thomas Nyman, Norrathep Rattanavipanon, Ahmad-Reza Sadeghi, Gene Tsudik

    Abstract: Secure firmware update is an important stage in the IoT device life-cycle. Prior techniques, designed for other computational settings, are not readily suitable for IoT devices, since they do not consider idiosyncrasies of a realistic large-scale IoT deployment. This motivates our design of ASSURED, a secure and scalable update framework for IoT. ASSURED includes all stakeholders in a typical IoT… ▽ More

    Submitted 18 October, 2018; v1 submitted 13 July, 2018; originally announced July 2018.

    Comments: Author's version of the work that appeared in International Conference on Embedded Software (EMSOFT'18), Octobet 2018, TUrin, Italy. The definitive Version of Record was published in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 37, no. 11, Nov. 2018

    Journal ref: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 37, no. 11, Nov. 2018

  25. arXiv:1806.10189  [pdf, other

    cs.CR

    Thermanator: Thermal Residue-Based Post Factum Attacks On Keyboard Password Entry

    Authors: Tyler Kaczmarek, Ercan Ozturk, Gene Tsudik

    Abstract: As a warm-blooded mammalian species, we humans routinely leave thermal residues on various objects with which we come in contact. This includes common input devices, such as keyboards, that are used for entering (among other things) secret information, such as passwords and PINs. Although thermal residue dissipates over time, there is always a certain time window during which thermal energy readin… ▽ More

    Submitted 10 July, 2018; v1 submitted 26 June, 2018; originally announced June 2018.

  26. arXiv:1804.03820  [pdf, other

    cs.CR

    KRB-CCN: Lightweight Authentication & Access Control for Private Content-Centric Networks

    Authors: Ivan O. Nunes, Gene Tsudik

    Abstract: Content-Centric Networking (CCN) is an internetworking paradigm that offers an alternative to today's IP-based Internet Architecture. Instead of focusing on hosts and their locations, CCN emphasizes addressable named content. By decoupling content from its location, CCN allows opportunistic in-network content caching, thus enabling better network utilization, at least for scalable content distribu… ▽ More

    Submitted 11 April, 2018; originally announced April 2018.

  27. arXiv:1708.03978  [pdf, other

    cs.CR

    Assentication: User Deauthentication and Lunchtime Attack Mitigation with Seated Posture Biometric

    Authors: Tyler Kaczmarek, Ercan Ozturk, Gene Tsudik

    Abstract: Biometric techniques are often used as an extra security factor in authenticating human users. Numerous biometrics have been proposed and evaluated, each with its own set of benefits and pitfalls. Static biometrics (such as fingerprints) are geared for discrete operation, to identify users, which typically involves some user burden. Meanwhile, behavioral biometrics (such as keystroke dynamics) are… ▽ More

    Submitted 13 August, 2017; originally announced August 2017.

  28. arXiv:1707.09043  [pdf, other

    cs.CR

    ERASMUS: Efficient Remote Attestation via Self- Measurement for Unattended Settings

    Authors: Xavier Carpent, Norrathep Rattanavipanon, Gene Tsudik

    Abstract: Remote attestation (RA) is a popular means of detecting malware in embedded and IoT devices. RA is usually realized as an interactive protocol, whereby a trusted party -- verifier -- measures integrity of a potentially compromised remote device -- prover. Early work focused on purely software-based and fully hardware-based techniques, neither of which is ideal for low-end devices. More recent resu… ▽ More

    Submitted 27 July, 2017; originally announced July 2017.

  29. arXiv:1706.00056  [pdf, other

    cs.HC

    Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks

    Authors: Bruce Berg, Tyler Kaczmarek, Alfred Kobsa, Gene Tsudik

    Abstract: Human errors in performing security-critical tasks are typically blamed on the complexity of those tasks. However, such errors can also occur because of (possibly unexpected) sensory distractions. A sensory distraction that produces negative effects can be abused by the adversary that controls the environment. Meanwhile, a distraction with positive effects can be artificially introduced to improve… ▽ More

    Submitted 31 May, 2017; originally announced June 2017.

  30. arXiv:1703.02688  [pdf, other

    cs.CR

    HYDRA: HYbrid Design for Remote Attestation (Using a Formally Verified Microkernel)

    Authors: Karim ElDefrawy, Norrathep Rattanavipanon, Gene Tsudik

    Abstract: Remote Attestation (RA) allows a trusted entity (verifier) to securely measure internal state of a remote untrusted hardware platform (prover). RA can be used to establish a static or dynamic root of trust in embedded and cyber-physical systems. It can also be used as a building block for other security services and primitives, such as software updates and patches, verifiable deletion and memory r… ▽ More

    Submitted 14 March, 2017; v1 submitted 7 March, 2017; originally announced March 2017.

  31. FADEWICH: Fast Deauthentication over the Wireless Channel

    Authors: Mauro Conti, Giulio Lovisotto, Ivan Martinovic, Gene Tsudik

    Abstract: Both authentication and deauthentication are instrumental for preventing unauthorized access to computer and data assets. While there are obvious motivating factors for using strong authentication mechanisms, convincing users to deauthenticate is not straight-forward, since deauthentication is not considered mandatory. A user who leaves a logged-in workstation unattended (especially for a short ti… ▽ More

    Submitted 27 December, 2016; originally announced December 2016.

    Comments: conference

  32. arXiv:1610.00355  [pdf, other

    cs.NI

    Security and Privacy Analysis of NSF Future Internet Architectures

    Authors: Moreno Ambrosin, Alberto Compagno, Mauro Conti, Cesar Ghali, Gene Tsudik

    Abstract: The Internet Protocol (IP) is the lifeblood of the modern Internet. Its simplicity and universality have fueled the unprecedented and lasting global success of the current Internet. Nonetheless, some limitations of IP have been emerging in recent years. Its original design envisaged supporting perhaps tens of thousands of static hosts operating in a friendly academic-like setting, mainly in order… ▽ More

    Submitted 10 October, 2016; v1 submitted 2 October, 2016; originally announced October 2016.

  33. arXiv:1609.09359  [pdf, other

    cs.CR

    Don't Skype & Type! Acoustic Eavesdrop** in Voice-Over-IP

    Authors: Alberto Compagno, Mauro Conti, Daniele Lain, Gene Tsudik

    Abstract: Acoustic emanations of computer keyboards represent a serious privacy issue. As demonstrated in prior work, physical properties of keystroke sounds might reveal what a user is ty**. However, previous attacks assumed relatively strong adversary models that are not very practical in many real-world settings. Such strong models assume: (i) adversary's physical proximity to the victim, (ii) precise… ▽ More

    Submitted 11 March, 2017; v1 submitted 29 September, 2016; originally announced September 2016.

    Comments: To appear in ACM Asia Conference on Computer and Communications Security (ASIACCS) 2017. 13 pages, 17 figures

  34. arXiv:1605.07763  [pdf, other

    cs.CR

    C-FLAT: Control-FLow ATtestation for Embedded Systems Software

    Authors: Tigist Abera, N. Asokan, Lucas Davi, Jan-Erik Ekberg, Thomas Nyman, Andrew Paverd, Ahmad-Reza Sadeghi, Gene Tsudik

    Abstract: Remote attestation is a crucial security service particularly relevant to increasingly popular IoT (and other embedded) devices. It allows a trusted party (verifier) to learn the state of a remote, and potentially malware-infected, device (prover). Most existing approaches are static in nature and only check whether benign software is initially loaded on the prover. However, they are vulnerable to… ▽ More

    Submitted 17 August, 2016; v1 submitted 25 May, 2016; originally announced May 2016.

    Comments: Extended version of article to appear in CCS '16 Proceedings of the 23rd ACM Conference on Computer and Communications Security

  35. arXiv:1512.07755  [pdf, other

    cs.NI

    Living in a PIT-less World: A Case Against Stateful Forwarding in Content-Centric Networking

    Authors: Cesar Ghali, Gene Tsudik, Ersin Uzun, Christopher A. Wood

    Abstract: Information-Centric Networking (ICN) is a recent paradigm that claims to mitigate some limitations of the current IP-based Internet architecture. The centerpiece of ICN is named and addressable content, rather than hosts or interfaces. Content-Centric Networking (CCN) is a prominent ICN instance that shares the fundamental architectural design with its equally popular academic sibling Named-Data N… ▽ More

    Submitted 24 December, 2015; originally announced December 2015.

    Comments: 10 pages, 6 figures

  36. arXiv:1512.07311  [pdf, other

    cs.NI

    BEAD: Best Effort Autonomous Deletion in Content-Centric Networking

    Authors: Cesar Ghali, Gene Tsudik, Christopher A. Wood

    Abstract: A core feature of Content-Centric Networking (CCN) is opportunistic content caching in routers. It enables routers to satisfy content requests with in-network cached copies, thereby reducing bandwidth utilization, decreasing congestion, and improving overall content retrieval latency. One major drawback of in-network caching is that content producers have no knowledge about where their content i… ▽ More

    Submitted 22 December, 2015; originally announced December 2015.

    Comments: 9 pages, 4 figures

  37. arXiv:1510.01852  [pdf, other

    cs.NI

    Practical Accounting in Content-Centric Networking (extended version)

    Authors: Cesar Ghali, Gene Tsudik, Christopher A. Wood, Edmund Yeh

    Abstract: Content-Centric Networking (CCN) is a new class of network architectures designed to address some key limitations of the current IP-based Internet. One of its main features is in-network content caching, which allows requests for content to be served by routers. Despite improved bandwidth utilization and lower latency for popular content retrieval, in-network content caching offers producers no me… ▽ More

    Submitted 7 October, 2015; originally announced October 2015.

    Comments: 13 pages, 6 figures

  38. arXiv:1510.00783  [pdf, other

    cs.CY cs.CR cs.SI

    Trilateral Large-Scale OSN Account Linkability Study

    Authors: Mishari Almishari, Ekin Oguz, Gene Tsudik

    Abstract: In the last decade, Online Social Networks (OSNs) have taken the world by storm. They range from superficial to professional, from focused to general-purpose, and, from free-form to highly structured. Numerous people have multiple accounts within the same OSN and even more people have an account on more than one OSN. Since all OSNs involve some amount of user input, often in written form, it is na… ▽ More

    Submitted 3 October, 2015; originally announced October 2015.

  39. Interest-Based Access Control for Content Centric Networks (extended version)

    Authors: Cesar Ghali, Marc A. Schlosberg, Gene Tsudik, Christopher A. Wood

    Abstract: Content-Centric Networking (CCN) is an emerging network architecture designed to overcome limitations of the current IP-based Internet. One of the fundamental tenets of CCN is that data, or content, is a named and addressable entity in the network. Consumers request content by issuing interest messages with the desired content name. These interests are forwarded by routers to producers, and the re… ▽ More

    Submitted 22 May, 2015; originally announced May 2015.

    Comments: 11 pages, 2 figures

  40. To NACK or not to NACK? Negative Acknowledgments in Information-Centric Networking

    Authors: Alberto Compagno, Mauro Conti, Cesar Ghali, Gene Tsudik

    Abstract: Information-Centric Networking (ICN) is an internetworking paradigm that offers an alternative to the current IP\nobreakdash-based Internet architecture. ICN's most distinguishing feature is its emphasis on information (content) instead of communication endpoints. One important open issue in ICN is whether negative acknowledgments (NACKs) at the network layer are useful for notifying downstream no… ▽ More

    Submitted 6 March, 2015; originally announced March 2015.

    Comments: 10 pages, 7 figures

  41. The Effect of Visual Noise on The Completion of Security Critical Tasks

    Authors: Tyler Kaczmarek, Alfed Kobsa, Robert Sy, Gene Tsudik

    Abstract: User errors while performing security-critical tasks can lead to undesirable or even disastrous consequences. One major factor influencing mistakes and failures is complexity of such tasks, which has been studied extensively in prior research. Another important issue which hardly received any attention is the impact of both accidental and intended distractions on users performing security-critical… ▽ More

    Submitted 25 August, 2015; v1 submitted 21 May, 2014; originally announced June 2014.

    Comments: 10 pages, 5 figures

  42. arXiv:1406.2746  [pdf, other

    cs.IR cs.DL

    Are 140 Characters Enough? A Large-Scale Linkability Study of Tweets

    Authors: Mishari Almishari, Mohamed Ali Kaafar, Gene Tsudik, Ekin Oguz

    Abstract: Microblogging is a very popular Internet activity that informs and entertains great multitudes of people world-wide via quickly and scalably disseminated terse messages containing all kinds of newsworthy utterances. Even though microblogging is neither designed nor meant to emphasize privacy, numerous contributors hide behind pseudonyms and compartmentalize their different incarnations via multipl… ▽ More

    Submitted 8 September, 2014; v1 submitted 10 June, 2014; originally announced June 2014.

  43. arXiv:1405.4918  [pdf, other

    cs.DL cs.CL

    Fighting Authorship Linkability with Crowdsourcing

    Authors: Mishari Almishari, Ekin Oguz, Gene Tsudik

    Abstract: Massive amounts of contributed content -- including traditional literature, blogs, music, videos, reviews and tweets -- are available on the Internet today, with authors numbering in many millions. Textual information, such as product or service reviews, is an important and increasingly popular type of content that is being used as a foundation of many trendy community-based reviewing sites, such… ▽ More

    Submitted 19 May, 2014; originally announced May 2014.

  44. arXiv:1405.2861  [pdf, other

    cs.NI cs.CR

    Secure Fragmentation for Content-Centric Networks (extended version)

    Authors: Cesar Ghali, Ashok Narayanan, David Oran, Gene Tsudik, Christopher A. Wood

    Abstract: Content-Centric Networking (CCN) is a communication paradigm that emphasizes content distribution. Named-Data Networking (NDN) is an instantiation of CCN, a candidate Future Internet Architecture. NDN supports human-readable content naming and router-based content caching which lends itself to efficient, secure, and scalable content distribution. Because of NDN's fundamental requirement that each… ▽ More

    Submitted 19 August, 2015; v1 submitted 12 May, 2014; originally announced May 2014.

    Comments: 13 pages, 6 figures

  45. Elements of Trust in Named-Data Networking

    Authors: Cesar Ghali, Gene Tsudik, Ersin Uzun

    Abstract: In contrast to today's IP-based host-oriented Internet architecture, Information-Centric Networking (ICN) emphasizes content by making it directly addressable and routable. Named Data Networking (NDN) architecture is an instance of ICN that is being developed as a candidate next-generation Internet architecture. By opportunistically caching content within the network (in routers), NDN appears to b… ▽ More

    Submitted 30 October, 2014; v1 submitted 13 February, 2014; originally announced February 2014.

    Comments: 9 pages, 2 figures

    Journal ref: ACM SIGCOMM Computer Communication Review, Volume 44 Issue 5, October 2014

  46. arXiv:1311.2517  [pdf, other

    cs.CR cs.NI

    Covert Ephemeral Communication in Named Data Networking

    Authors: Moreno Ambrosin, Mauro Conti, Paolo Gasti, Gene Tsudik

    Abstract: In the last decade, there has been a growing realization that the current Internet Protocol is reaching the limits of its senescence. This has prompted several research efforts that aim to design potential next-generation Internet architectures. Named Data Networking (NDN), an instantiation of the content-centric approach to networking, is one such effort. In contrast with IP, NDN routers maintain… ▽ More

    Submitted 11 November, 2013; originally announced November 2013.

  47. arXiv:1306.1264  [pdf, other

    cs.CR

    The Chills and Thrills of Whole Genome Sequencing

    Authors: Erman Ayday, Emiliano De Cristofaro, Jean-Pierre Hubaux, Gene Tsudik

    Abstract: In recent years, Whole Genome Sequencing (WGS) evolved from a futuristic-sounding research project to an increasingly affordable technology for determining complete genome sequences of complex organisms, including humans. This prompts a wide range of revolutionary applications, as WGS promises to improve modern healthcare and provide a better understanding of the human genome -- in particular, its… ▽ More

    Submitted 16 February, 2015; v1 submitted 5 June, 2013; originally announced June 2013.

    Comments: A slightly different version of this article appears in IEEE Computer Magazine, Vol. 48, No. 2, February 2015, under the title "Whole Genome Sequencing: Revolutionary Medicine or Privacy Nightmare"

  48. Poseidon: Mitigating Interest Flooding DDoS Attacks in Named Data Networking

    Authors: Alberto Compagno, Mauro Conti, Paolo Gasti, Gene Tsudik

    Abstract: Content-Centric Networking (CCN) is an emerging networking paradigm being considered as a possible replacement for the current IP-based host-centric Internet infrastructure. In CCN, named content becomes a first-class entity. CCN focuses on content distribution, which dominates current Internet traffic and is arguably not well served by IP. Named-Data Networking (NDN) is an example of CCN. NDN is… ▽ More

    Submitted 1 August, 2013; v1 submitted 19 March, 2013; originally announced March 2013.

    Comments: The IEEE Conference on Local Computer Networks (LCN 2013)

  49. arXiv:1208.1336  [pdf, other

    cs.CR

    Securing Instrumented Environments over Content-Centric Networking: the Case of Lighting Control

    Authors: Jeff Burke, Paolo Gasti, Naveen Nathan, Gene Tsudik

    Abstract: Instrumented environments, such as modern building automation systems (BAS), are becoming commonplace and are increasingly interconnected with (and sometimes by) enterprise networks and the Internet. Regardless of the underlying communication platform, secure control of devices in such environments is a challenging task. The current trend is to move from proprietary communication media and protoco… ▽ More

    Submitted 7 August, 2012; originally announced August 2012.

    Comments: arXiv admin note: text overlap with arXiv:1208.0952

  50. arXiv:1208.0952  [pdf, ps, other

    cs.NI cs.CR

    DoS and DDoS in Named-Data Networking

    Authors: Paolo Gasti, Gene Tsudik, Ersin Uzun, Lixia Zhang

    Abstract: With the growing realization that current Internet protocols are reaching the limits of their senescence, a number of on-going research efforts aim to design potential next-generation Internet architectures. Although they vary in maturity and scope, in order to avoid past pitfalls, these efforts seek to treat security and privacy as fundamental requirements. Resilience to Denial-of-Service (DoS) a… ▽ More

    Submitted 7 August, 2012; v1 submitted 4 August, 2012; originally announced August 2012.