首页 > 最新文献

Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM最新文献

英文 中文
Characterizing and detecting malicious crowdsourcing 表征和检测恶意众包
Pub Date : 2013-08-27 DOI: 10.1145/2486001.2491719
Tianyi Wang, G. Wang, Xing Li, Haitao Zheng, Ben Y. Zhao
Popular Internet services in recent years have shown that remarkable things can be achieved by harnessing the power of the masses. However, crowd-sourcing systems also pose a real challenge to existing security mechanisms deployed to protect Internet services, particularly those tools that identify malicious activity by detecting activities of automated programs such as CAPTCHAs. In this work, we leverage access to two large crowdturfing sites to gather a large corpus of ground-truth data generated by crowdturfing campaigns. We compare and contrast this data with "organic" content generated by normal users to identify unique characteristics and potential signatures for use in real-time detectors. This poster describes first steps taken focused on crowdturfing campaigns targeting the Sina Weibo microblogging system. We describe our methodology, our data (over 290K campaigns, 34K worker accounts, 61 million tweets...), and some initial results.
近年来流行的互联网服务表明,利用群众的力量可以取得非凡的成就。然而,众包系统也对保护互联网服务的现有安全机制构成了真正的挑战,特别是那些通过检测自动程序(如captcha)的活动来识别恶意活动的工具。在这项工作中,我们利用对两个大型众筹网站的访问来收集由众筹活动产生的大量真实数据。我们将这些数据与普通用户生成的“有机”内容进行比较和对比,以识别实时检测器中使用的独特特征和潜在签名。这张海报描述了针对新浪微博系统的众筹活动的第一步。我们描述了我们的方法、我们的数据(超过29万个活动、3.4万个员工账户、6100万条推文……)和一些初步结果。
{"title":"Characterizing and detecting malicious crowdsourcing","authors":"Tianyi Wang, G. Wang, Xing Li, Haitao Zheng, Ben Y. Zhao","doi":"10.1145/2486001.2491719","DOIUrl":"https://doi.org/10.1145/2486001.2491719","url":null,"abstract":"Popular Internet services in recent years have shown that remarkable things can be achieved by harnessing the power of the masses. However, crowd-sourcing systems also pose a real challenge to existing security mechanisms deployed to protect Internet services, particularly those tools that identify malicious activity by detecting activities of automated programs such as CAPTCHAs. In this work, we leverage access to two large crowdturfing sites to gather a large corpus of ground-truth data generated by crowdturfing campaigns. We compare and contrast this data with \"organic\" content generated by normal users to identify unique characteristics and potential signatures for use in real-time detectors. This poster describes first steps taken focused on crowdturfing campaigns targeting the Sina Weibo microblogging system. We describe our methodology, our data (over 290K campaigns, 34K worker accounts, 61 million tweets...), and some initial results.","PeriodicalId":159374,"journal":{"name":"Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115185901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Making intra-domain traffic engineering resistant to failures 增强域内流量工程抗故障能力
Pub Date : 2013-08-27 DOI: 10.1145/2486001.2491730
Baobao Zhang, J. Bi, Jianping Wu
{"title":"Making intra-domain traffic engineering resistant to failures","authors":"Baobao Zhang, J. Bi, Jianping Wu","doi":"10.1145/2486001.2491730","DOIUrl":"https://doi.org/10.1145/2486001.2491730","url":null,"abstract":"","PeriodicalId":159374,"journal":{"name":"Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115985977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Integrating microsecond circuit switching into the data center 将微秒电路交换集成到数据中心
Pub Date : 2013-08-27 DOI: 10.1145/2486001.2486007
G. Porter, Richard D. Strong, Nathan Farrington, Alex Forencich, P. Sun, T. Simunic, Y. Fainman, G. Papen, Amin Vahdat
Recent proposals have employed optical circuit switching (OCS) to reduce the cost of data center networks. However, the relatively slow switching times (10--100 ms) assumed by these approaches, and the accompanying latencies of their control planes, has limited its use to only the largest data center networks with highly aggregated and constrained workloads. As faster switch technologies become available, designing a control plane capable of supporting them becomes a key challenge. In this paper, we design and implement an OCS prototype capable of switching in 11.5 us, and we use this prototype to expose a set of challenges that arise when supporting switching at microsecond time scales. In response, we propose a microsecond-latency control plane based on a circuit scheduling approach we call Traffic Matrix Scheduling (TMS) that proactively communicates circuit assignments to communicating entities so that circuit bandwidth can be used efficiently.
最近的建议是采用光电路交换(OCS)来降低数据中心网络的成本。然而,这些方法所假定的相对较慢的交换时间(10—100毫秒),以及它们的控制平面所伴随的延迟,限制了其仅用于具有高度聚合和受限工作负载的最大数据中心网络。随着更快的开关技术的出现,设计一个能够支持它们的控制平面成为一个关键的挑战。在本文中,我们设计并实现了一个能够在11.5秒内切换的OCS原型,并且我们使用该原型来暴露在支持微秒时间尺度切换时出现的一系列挑战。作为回应,我们提出了一种基于电路调度方法的微秒延迟控制平面,我们称之为流量矩阵调度(TMS),它主动地将电路分配传递给通信实体,以便有效地利用电路带宽。
{"title":"Integrating microsecond circuit switching into the data center","authors":"G. Porter, Richard D. Strong, Nathan Farrington, Alex Forencich, P. Sun, T. Simunic, Y. Fainman, G. Papen, Amin Vahdat","doi":"10.1145/2486001.2486007","DOIUrl":"https://doi.org/10.1145/2486001.2486007","url":null,"abstract":"Recent proposals have employed optical circuit switching (OCS) to reduce the cost of data center networks. However, the relatively slow switching times (10--100 ms) assumed by these approaches, and the accompanying latencies of their control planes, has limited its use to only the largest data center networks with highly aggregated and constrained workloads. As faster switch technologies become available, designing a control plane capable of supporting them becomes a key challenge. In this paper, we design and implement an OCS prototype capable of switching in 11.5 us, and we use this prototype to expose a set of challenges that arise when supporting switching at microsecond time scales. In response, we propose a microsecond-latency control plane based on a circuit scheduling approach we call Traffic Matrix Scheduling (TMS) that proactively communicates circuit assignments to communicating entities so that circuit bandwidth can be used efficiently.","PeriodicalId":159374,"journal":{"name":"Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116447879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 331
Forwarding metamorphosis: fast programmable match-action processing in hardware for SDN 转发变形:用于SDN的硬件中的快速可编程匹配动作处理
Pub Date : 2013-08-27 DOI: 10.1145/2486001.2486011
P. Bosshart, G. Gibb, Hun-Seok Kim, G. Varghese, N. McKeown, M. Izzard, Fernando A. Mujica, M. Horowitz
In Software Defined Networking (SDN) the control plane is physically separate from the forwarding plane. Control software programs the forwarding plane (e.g., switches and routers) using an open interface, such as OpenFlow. This paper aims to overcomes two limitations in current switching chips and the OpenFlow protocol: i) current hardware switches are quite rigid, allowing ``Match-Action'' processing on only a fixed set of fields, and ii) the OpenFlow specification only defines a limited repertoire of packet processing actions. We propose the RMT (reconfigurable match tables) model, a new RISC-inspired pipelined architecture for switching chips, and we identify the essential minimal set of action primitives to specify how headers are processed in hardware. RMT allows the forwarding plane to be changed in the field without modifying hardware. As in OpenFlow, the programmer can specify multiple match tables of arbitrary width and depth, subject only to an overall resource limit, with each table configurable for matching on arbitrary fields. However, RMT allows the programmer to modify all header fields much more comprehensively than in OpenFlow. Our paper describes the design of a 64 port by 10 Gb/s switch chip implementing the RMT model. Our concrete design demonstrates, contrary to concerns within the community, that flexible OpenFlow hardware switch implementations are feasible at almost no additional cost or power.
在SDN (Software Defined Networking)中,控制平面与转发平面在物理上是分离的。控制软件使用开放接口(如OpenFlow)对转发平面(如交换机和路由器)进行编程。本文旨在克服当前交换芯片和OpenFlow协议的两个限制:i)当前的硬件交换机非常严格,只允许在固定的一组字段上进行“匹配-动作”处理;ii) OpenFlow规范只定义了有限的数据包处理动作。我们提出了RMT(可重构匹配表)模型,这是一种新的risc启发的用于切换芯片的流水线架构,我们确定了基本的最小操作原语集,以指定如何在硬件中处理头信息。RMT允许在不修改硬件的情况下现场改变转发平面。就像在OpenFlow中一样,程序员可以指定任意宽度和深度的多个匹配表,只受总体资源限制,每个表都可以配置为在任意字段上匹配。然而,RMT允许程序员比OpenFlow更全面地修改所有报头字段。本文介绍了一种实现RMT模型的64口10gb /s开关芯片的设计。我们的具体设计表明,与社区的担忧相反,灵活的OpenFlow硬件交换机实现几乎不需要额外的成本或功率。
{"title":"Forwarding metamorphosis: fast programmable match-action processing in hardware for SDN","authors":"P. Bosshart, G. Gibb, Hun-Seok Kim, G. Varghese, N. McKeown, M. Izzard, Fernando A. Mujica, M. Horowitz","doi":"10.1145/2486001.2486011","DOIUrl":"https://doi.org/10.1145/2486001.2486011","url":null,"abstract":"In Software Defined Networking (SDN) the control plane is physically separate from the forwarding plane. Control software programs the forwarding plane (e.g., switches and routers) using an open interface, such as OpenFlow. This paper aims to overcomes two limitations in current switching chips and the OpenFlow protocol: i) current hardware switches are quite rigid, allowing ``Match-Action'' processing on only a fixed set of fields, and ii) the OpenFlow specification only defines a limited repertoire of packet processing actions. We propose the RMT (reconfigurable match tables) model, a new RISC-inspired pipelined architecture for switching chips, and we identify the essential minimal set of action primitives to specify how headers are processed in hardware. RMT allows the forwarding plane to be changed in the field without modifying hardware. As in OpenFlow, the programmer can specify multiple match tables of arbitrary width and depth, subject only to an overall resource limit, with each table configurable for matching on arbitrary fields. However, RMT allows the programmer to modify all header fields much more comprehensively than in OpenFlow. Our paper describes the design of a 64 port by 10 Gb/s switch chip implementing the RMT model. Our concrete design demonstrates, contrary to concerns within the community, that flexible OpenFlow hardware switch implementations are feasible at almost no additional cost or power.","PeriodicalId":159374,"journal":{"name":"Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM","volume":"3 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132768158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 970
Verifiable auctions for online ad exchanges 在线广告交易的可验证拍卖
Pub Date : 2013-08-12 DOI: 10.1145/2486001.2486038
Sebastian Angel, Michael Walfish
This paper treats a critical component of the Web ecosystem that has so far received little attention in our community: ad exchanges. Ad exchanges run auctions to sell publishers' inventory-space on Web pages-to advertisers who want to display ads in those spaces. Unfortunately, under the status quo, the parties to an auction cannot check that the auction was carried out correctly, which raises the following more general question: how can we create verifiability in low-latency, high-frequency auctions where the parties do not know each other? We address this question with the design, prototype implementation, and experimental evaluation of VEX. VEX introduces a technique for efficient, privacy-preserving integer comparisons; couples these with careful protocol design; and adds little latency and tolerable overhead.
本文讨论了网络生态系统的一个关键组成部分,但迄今为止在我们的社区中很少受到关注:广告交换。广告交易平台通过拍卖将出版商的目录(网页上的空间)卖给想在这些空间展示广告的广告商。不幸的是,在目前的情况下,拍卖各方无法检查拍卖是否正确进行,这就提出了以下更普遍的问题:我们如何在各方互不认识的低延迟、高频拍卖中创建可验证性?我们通过VEX的设计、原型实现和实验评估来解决这个问题。VEX引入了一种高效、保护隐私的整数比较技术;将这些与仔细的协议设计结合起来;并且增加了很少的延迟和可容忍的开销。
{"title":"Verifiable auctions for online ad exchanges","authors":"Sebastian Angel, Michael Walfish","doi":"10.1145/2486001.2486038","DOIUrl":"https://doi.org/10.1145/2486001.2486038","url":null,"abstract":"This paper treats a critical component of the Web ecosystem that has so far received little attention in our community: ad exchanges. Ad exchanges run auctions to sell publishers' inventory-space on Web pages-to advertisers who want to display ads in those spaces. Unfortunately, under the status quo, the parties to an auction cannot check that the auction was carried out correctly, which raises the following more general question: how can we create verifiability in low-latency, high-frequency auctions where the parties do not know each other? We address this question with the design, prototype implementation, and experimental evaluation of VEX. VEX introduces a technique for efficient, privacy-preserving integer comparisons; couples these with careful protocol design; and adds little latency and tolerable overhead.","PeriodicalId":159374,"journal":{"name":"Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115151238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Ambient backscatter: wireless communication out of thin air 环境反向散射:稀薄空气中的无线通信
Pub Date : 2013-08-12 DOI: 10.1145/2486001.2486015
Vincent Liu, Aaron N. Parks, V. Talla, Shyamnath Gollakota, D. Wetherall, Joshua R. Smith
We present the design of a communication system that enables two devices to communicate using ambient RF as the only source of power. Our approach leverages existing TV and cellular transmissions to eliminate the need for wires and batteries, thus enabling ubiquitous communication where devices can communicate among themselves at unprecedented scales and in locations that were previously inaccessible. To achieve this, we introduce ambient backscatter, a new communication primitive where devices communicate by backscattering ambient RF signals. Our design avoids the expensive process of generating radio waves; backscatter communication is orders of magnitude more power-efficient than traditional radio communication. Further, since it leverages the ambient RF signals that are already around us, it does not require a dedicated power infrastructure as in traditional backscatter communication. To show the feasibility of our design, we prototype ambient backscatter devices in hardware and achieve information rates of 1 kbps over distances of 2.5 feet and 1.5 feet, while operating outdoors and indoors respectively. We use our hardware prototype to implement proof-of-concepts for two previously infeasible ubiquitous communication applications.
我们提出了一种通信系统的设计,使两个设备能够使用环境射频作为唯一的电源进行通信。我们的方法利用现有的电视和蜂窝传输来消除对电线和电池的需求,从而实现无处不在的通信,设备之间可以在前所未有的规模和以前无法到达的位置进行通信。为了实现这一点,我们引入了环境后向散射,这是一种新的通信原语,其中设备通过后向散射环境射频信号进行通信。我们的设计避免了产生无线电波的昂贵过程;反向散射通信比传统的无线电通信节能几个数量级。此外,由于它利用了我们周围的环境射频信号,因此不需要像传统的反向散射通信那样专门的电源基础设施。为了证明我们设计的可行性,我们在硬件中对环境反向散射设备进行了原型设计,并在室外和室内分别工作时,在2.5英尺和1.5英尺的距离上实现了1 kbps的信息速率。我们使用硬件原型来实现两个以前不可行的无处不在的通信应用程序的概念验证。
{"title":"Ambient backscatter: wireless communication out of thin air","authors":"Vincent Liu, Aaron N. Parks, V. Talla, Shyamnath Gollakota, D. Wetherall, Joshua R. Smith","doi":"10.1145/2486001.2486015","DOIUrl":"https://doi.org/10.1145/2486001.2486015","url":null,"abstract":"We present the design of a communication system that enables two devices to communicate using ambient RF as the only source of power. Our approach leverages existing TV and cellular transmissions to eliminate the need for wires and batteries, thus enabling ubiquitous communication where devices can communicate among themselves at unprecedented scales and in locations that were previously inaccessible. To achieve this, we introduce ambient backscatter, a new communication primitive where devices communicate by backscattering ambient RF signals. Our design avoids the expensive process of generating radio waves; backscatter communication is orders of magnitude more power-efficient than traditional radio communication. Further, since it leverages the ambient RF signals that are already around us, it does not require a dedicated power infrastructure as in traditional backscatter communication. To show the feasibility of our design, we prototype ambient backscatter devices in hardware and achieve information rates of 1 kbps over distances of 2.5 feet and 1.5 feet, while operating outdoors and indoors respectively. We use our hardware prototype to implement proof-of-concepts for two previously infeasible ubiquitous communication applications.","PeriodicalId":159374,"journal":{"name":"Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116382301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1156
Security risks evaluation toolbox for smart grid devices 智能电网设备安全风险评估工具箱
Pub Date : 2013-08-12 DOI: 10.1145/2486001.2491693
Yang Liu, Jiahe Liu, Ting Liu, X. Guan, Yanan Sun
Numerous smart devices are deployed in smart grid for state measurement, decision-making and remote control. The security issues of smart devices attract more and more attention. In our work, the communication protocol, storage mechanism and authentication of smart devices are analyzed and a toolbox is developed to evaluate the security risks of smart devices. In this demo, our toolbox is applied to scan 3 smart meters/power monitor systems. A potential risk list is generated and the vulnerabilities are further verified.
智能电网中部署了大量的智能设备,用于状态测量、决策和远程控制。智能设备的安全问题越来越受到人们的关注。在我们的工作中,分析了智能设备的通信协议、存储机制和认证,并开发了一个工具箱来评估智能设备的安全风险。在这个演示中,我们的工具箱被应用于扫描3个智能电表/电力监控系统。生成潜在风险列表,并进一步验证漏洞。
{"title":"Security risks evaluation toolbox for smart grid devices","authors":"Yang Liu, Jiahe Liu, Ting Liu, X. Guan, Yanan Sun","doi":"10.1145/2486001.2491693","DOIUrl":"https://doi.org/10.1145/2486001.2491693","url":null,"abstract":"Numerous smart devices are deployed in smart grid for state measurement, decision-making and remote control. The security issues of smart devices attract more and more attention. In our work, the communication protocol, storage mechanism and authentication of smart devices are analyzed and a toolbox is developed to evaluate the security risks of smart devices. In this demo, our toolbox is applied to scan 3 smart meters/power monitor systems. A potential risk list is generated and the vulnerabilities are further verified.","PeriodicalId":159374,"journal":{"name":"Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122667181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Expressive privacy control with pseudonyms 使用假名进行表达性隐私控制
Pub Date : 2013-08-12 DOI: 10.1145/2486001.2486032
Seungyeop Han, Vincent Liu, Qifan Pu, Simon Peter, T. Anderson, A. Krishnamurthy, D. Wetherall
As personal information increases in value, the incentives for remote services to collect as much of it as possible increase as well. In the current Internet, the default assumption is that all behavior can be correlated using a variety of identifying information, not the least of which is a user's IP address. Tools like Tor, Privoxy, and even NATs, are located at the opposite end of the spectrum and prevent any behavior from being linked. Instead, our goal is to provide users with more control over linkability---which activites of the user can be correlated at the remote services---not necessarily more anonymity. We design a cross-layer architecture that provides users with a pseudonym abstraction. To the user, a pseudonym represents a set of activities that the user is fine with linking, and to the outside world, a pseudonym gives the illusion of a single machine. We provide this abstraction by associating each pseudonym with a unique, random address drawn from the IPv6 address space, which is large enough to provide each device with multiple globally-routable addresses. We have implemented and evaluated a prototype that is able to provide unlinkable pseudonyms within the Chrome web browser in order to demonstrate the feasibility, efficacy, and expressiveness of our approach.
随着个人信息价值的增加,远程服务收集尽可能多的个人信息的动机也在增加。在当前的互联网中,默认的假设是,所有的行为都可以使用各种识别信息进行关联,其中最重要的是用户的IP地址。像Tor、privvoxy甚至nat这样的工具位于频谱的另一端,可以防止任何行为被链接。相反,我们的目标是为用户提供对可链接性的更多控制——用户的哪些活动可以在远程服务上关联——而不一定是更多的匿名性。我们设计了一个跨层架构,为用户提供一个假名抽象。对于用户来说,假名代表用户可以轻松链接的一组活动,而对于外部世界,假名则给人一种单一机器的错觉。我们通过将每个假名与从IPv6地址空间中提取的唯一随机地址相关联来提供这种抽象,该地址空间足够大,可以为每个设备提供多个全球可路由的地址。我们已经实现并评估了一个原型,该原型能够在Chrome网络浏览器中提供不可链接的假名,以证明我们方法的可行性、有效性和表现力。
{"title":"Expressive privacy control with pseudonyms","authors":"Seungyeop Han, Vincent Liu, Qifan Pu, Simon Peter, T. Anderson, A. Krishnamurthy, D. Wetherall","doi":"10.1145/2486001.2486032","DOIUrl":"https://doi.org/10.1145/2486001.2486032","url":null,"abstract":"As personal information increases in value, the incentives for remote services to collect as much of it as possible increase as well. In the current Internet, the default assumption is that all behavior can be correlated using a variety of identifying information, not the least of which is a user's IP address. Tools like Tor, Privoxy, and even NATs, are located at the opposite end of the spectrum and prevent any behavior from being linked. Instead, our goal is to provide users with more control over linkability---which activites of the user can be correlated at the remote services---not necessarily more anonymity. We design a cross-layer architecture that provides users with a pseudonym abstraction. To the user, a pseudonym represents a set of activities that the user is fine with linking, and to the outside world, a pseudonym gives the illusion of a single machine. We provide this abstraction by associating each pseudonym with a unique, random address drawn from the IPv6 address space, which is large enough to provide each device with multiple globally-routable addresses. We have implemented and evaluated a prototype that is able to provide unlinkable pseudonyms within the Chrome web browser in order to demonstrate the feasibility, efficacy, and expressiveness of our approach.","PeriodicalId":159374,"journal":{"name":"Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128449549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
HomeLab: a platform for conducting experiments with connected devices in the home HomeLab:一个用家中联网设备进行实验的平台
Pub Date : 2013-08-12 DOI: 10.1145/2486001.2491701
R. Singh, A. Brush, E. Filippov, D. Huang, Ratul Mahajan, Khurshed Mazhar, Amar Phanishayee, Arjmand Samuel
The downward spiral in the cost of connected devices and sensors (e.g., cameras, motion sensors, remote controlled light switches) has generated a vast amount of interest towards using them in the home environments. Companies and researchers are developing technologies that employ these devices in a diverse range of ways. These include improving energy efficiency, increasing comfort and convenience through automation, implementing security and monitoring, and providing in-home healthcare. However, conducting experimental work in this domain is extremely challenging today. Evaluating the effectiveness of research prototypes typically requires some form of deployment in real homes. This task is riddled with not only social and legal constraints, but also logistical and technical hurdles. Examples include recruiting participants, hardware and software setup in the home, training participants and residents who typically possess varying levels of technical expertise, and diverse security and privacy concerns. Because of these challenges, individual research groups rarely manage to deploy their prototypes on more than a dozen or so homes concentrated in their geographic area. Such deployments tend to lack the scale and diversity that is needed to confidently answer the research hypothesis. Our goal is to lower the barrier towards deploying experimental technology in a large number of geographically distributed homes.
连接设备和传感器(如摄像头、运动传感器、遥控灯开关)成本的螺旋式下降,引起了人们对在家庭环境中使用它们的极大兴趣。公司和研究人员正在开发以各种方式使用这些设备的技术。这些措施包括提高能源效率、通过自动化提高舒适度和便利性、实施安全和监控以及提供家庭医疗保健。然而,今天在这个领域进行实验工作是极具挑战性的。评估研究原型的有效性通常需要在真实家庭中进行某种形式的部署。这项任务不仅受到社会和法律的限制,而且还面临后勤和技术方面的障碍。例子包括招募参与者,在家中设置硬件和软件,培训通常拥有不同技术水平的参与者和居民,以及各种安全和隐私问题。由于这些挑战,个别研究小组很少能够在他们所在地理区域的十几个家庭中部署他们的原型。这种部署往往缺乏自信地回答研究假设所需的规模和多样性。我们的目标是降低在大量地理分布的家庭中部署实验技术的障碍。
{"title":"HomeLab: a platform for conducting experiments with connected devices in the home","authors":"R. Singh, A. Brush, E. Filippov, D. Huang, Ratul Mahajan, Khurshed Mazhar, Amar Phanishayee, Arjmand Samuel","doi":"10.1145/2486001.2491701","DOIUrl":"https://doi.org/10.1145/2486001.2491701","url":null,"abstract":"The downward spiral in the cost of connected devices and sensors (e.g., cameras, motion sensors, remote controlled light switches) has generated a vast amount of interest towards using them in the home environments. Companies and researchers are developing technologies that employ these devices in a diverse range of ways. These include improving energy efficiency, increasing comfort and convenience through automation, implementing security and monitoring, and providing in-home healthcare. However, conducting experimental work in this domain is extremely challenging today. Evaluating the effectiveness of research prototypes typically requires some form of deployment in real homes. This task is riddled with not only social and legal constraints, but also logistical and technical hurdles. Examples include recruiting participants, hardware and software setup in the home, training participants and residents who typically possess varying levels of technical expertise, and diverse security and privacy concerns. Because of these challenges, individual research groups rarely manage to deploy their prototypes on more than a dozen or so homes concentrated in their geographic area. Such deployments tend to lack the scale and diversity that is needed to confidently answer the research hypothesis. Our goal is to lower the barrier towards deploying experimental technology in a large number of geographically distributed homes.","PeriodicalId":159374,"journal":{"name":"Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129738168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Participatory networking: an API for application control of SDNs 参与式网络:用于sdn应用程序控制的API
Pub Date : 2013-08-12 DOI: 10.1145/2486001.2486003
Andrew D. Ferguson, Arjun Guha, Chen Liang, Rodrigo Fonseca, S. Krishnamurthi
We present the design, implementation, and evaluation of an API for applications to control a software-defined network (SDN). Our API is implemented by an OpenFlow controller that delegates read and write authority from the network's administrators to end users, or applications and devices acting on their behalf. Users can then work with the network, rather than around it, to achieve better performance, security, or predictable behavior. Our API serves well as the next layer atop current SDN stacks. Our design addresses the two key challenges: how to safely decompose control and visibility of the network, and how to resolve conflicts between untrusted users and across requests, while maintaining baseline levels of fairness and security. Using a real OpenFlow testbed, we demonstrate our API's feasibility through microbenchmarks, and its usefulness by experiments with four real applications modified to take advantage of it.
我们提出了用于控制软件定义网络(SDN)的应用程序的API的设计、实现和评估。我们的API是由OpenFlow控制器实现的,该控制器将网络管理员的读写权限委托给最终用户,或代表他们的应用程序和设备。然后,用户可以与网络一起工作,而不是绕过它,以获得更好的性能、安全性或可预测的行为。我们的API可以很好地作为当前SDN堆栈的下一层。我们的设计解决了两个关键挑战:如何安全地分解网络的控制和可见性,以及如何解决不受信任的用户和跨请求之间的冲突,同时保持公平和安全的基线水平。使用真正的OpenFlow测试平台,我们通过微基准测试证明了我们的API的可行性,并通过对四个实际应用程序进行了修改以利用它的有效性。
{"title":"Participatory networking: an API for application control of SDNs","authors":"Andrew D. Ferguson, Arjun Guha, Chen Liang, Rodrigo Fonseca, S. Krishnamurthi","doi":"10.1145/2486001.2486003","DOIUrl":"https://doi.org/10.1145/2486001.2486003","url":null,"abstract":"We present the design, implementation, and evaluation of an API for applications to control a software-defined network (SDN). Our API is implemented by an OpenFlow controller that delegates read and write authority from the network's administrators to end users, or applications and devices acting on their behalf. Users can then work with the network, rather than around it, to achieve better performance, security, or predictable behavior. Our API serves well as the next layer atop current SDN stacks. Our design addresses the two key challenges: how to safely decompose control and visibility of the network, and how to resolve conflicts between untrusted users and across requests, while maintaining baseline levels of fairness and security. Using a real OpenFlow testbed, we demonstrate our API's feasibility through microbenchmarks, and its usefulness by experiments with four real applications modified to take advantage of it.","PeriodicalId":159374,"journal":{"name":"Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129035377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 303
期刊
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1