首页 > 最新文献

Proceedings of the 21st ACM Workshop on Hot Topics in Networks最新文献

英文 中文
Reflections on trusting distributed trust 关于信任分布式信任的思考
Pub Date : 2022-10-14 DOI: 10.1145/3563766.3564089
Emma Dauterman, Vivian Fang, Natacha Crooks, R. A. Popa
Many systems today distribute trust across multiple parties such that the system provides certain security properties if a subset of the parties are honest. In the past few years, we have seen an explosion of academic and industrial cryptographic systems built on distributed trust, including secure multi-party computation applications (e.g., private analytics, secure learning, and private key recovery) and blockchains. These systems have great potential for improving security and privacy, but face a significant hurdle on the path to deployment. We initiate study of the following problem: a single organization is, by definition, a single party, and so how can a single organization build a distributed-trust system where corruptions are independent? We instead consider an alternative formulation of the problem: rather than ensuring that a distributed-trust system is set up correctly by design, what if instead, users can audit a distributed-trust deployment? We propose a framework that enables a developer to efficiently and cheaply set up any distributed-trust system in a publicly auditable way. To do this, we identify two application-independent building blocks that we can use to bootstrap arbitrary distributed-trust applications: secure hardware and an append-only log. We show how to leverage existing implementations of these building blocks to deploy distributed-trust systems, and we give recommendations for infrastructure changes that would make it easier to deploy distributed-trust systems in the future.
今天,许多系统在多方之间分配信任,这样,如果各方的一个子集是诚实的,系统就会提供某些安全属性。在过去的几年里,我们看到了建立在分布式信任基础上的学术和工业加密系统的爆炸式增长,包括安全的多方计算应用程序(例如,私有分析,安全学习和私钥恢复)和区块链。这些系统在提高安全性和隐私性方面具有巨大的潜力,但在部署的道路上面临着一个重大障碍。我们开始研究以下问题:一个单一的组织,根据定义,是一个单一的政党,那么一个单一的组织如何建立一个分布式的信任系统,腐败是独立的?我们转而考虑这个问题的另一种表述:与其确保分布式信任系统在设计上是正确设置的,不如让用户审计分布式信任部署?我们提出了一个框架,使开发人员能够以公开可审计的方式高效、廉价地建立任何分布式信任系统。为此,我们确定了两个独立于应用程序的构建块,我们可以使用它们来引导任意分布式信任应用程序:安全硬件和仅可追加的日志。我们展示了如何利用这些构建块的现有实现来部署分布式信任系统,并给出了基础设施更改的建议,这些更改将使将来更容易部署分布式信任系统。
{"title":"Reflections on trusting distributed trust","authors":"Emma Dauterman, Vivian Fang, Natacha Crooks, R. A. Popa","doi":"10.1145/3563766.3564089","DOIUrl":"https://doi.org/10.1145/3563766.3564089","url":null,"abstract":"Many systems today distribute trust across multiple parties such that the system provides certain security properties if a subset of the parties are honest. In the past few years, we have seen an explosion of academic and industrial cryptographic systems built on distributed trust, including secure multi-party computation applications (e.g., private analytics, secure learning, and private key recovery) and blockchains. These systems have great potential for improving security and privacy, but face a significant hurdle on the path to deployment. We initiate study of the following problem: a single organization is, by definition, a single party, and so how can a single organization build a distributed-trust system where corruptions are independent? We instead consider an alternative formulation of the problem: rather than ensuring that a distributed-trust system is set up correctly by design, what if instead, users can audit a distributed-trust deployment? We propose a framework that enables a developer to efficiently and cheaply set up any distributed-trust system in a publicly auditable way. To do this, we identify two application-independent building blocks that we can use to bootstrap arbitrary distributed-trust applications: secure hardware and an append-only log. We show how to leverage existing implementations of these building blocks to deploy distributed-trust systems, and we give recommendations for infrastructure changes that would make it easier to deploy distributed-trust systems in the future.","PeriodicalId":339381,"journal":{"name":"Proceedings of the 21st ACM Workshop on Hot Topics in Networks","volume":"292 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134329384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Tango or square dance?: how tightly should we integrate network functionality in browsers? 探戈舞还是广场舞:我们应如何紧密集成浏览器中的网络功能?
Pub Date : 2022-10-10 DOI: 10.1145/3563766.3564111
Alex Davidson, Matthias Frei, Marten Gartner, Hamed Haddadi, Jordi Subira Nieto, A. Perrig, Philipp Winter, Franccois Wirz
The question at which layer network functionality is presented or abstracted remains a research challenge. Traditionally, network functionality was either placed into the core network, middleboxes, or into the operating system - but recent developments have expanded the design space to directly introduce functionality into the application (and in particular into the browser) as a way to expose it to the user. Given the context of emerging path-aware networking technology, an interesting question arises: which layer should handle the new features? We argue that the browser is becoming a powerful platform for network innovation, where even user-driven properties can be implemented in an OS-agnostic fashion. We demonstrate the feasibility of geo-fenced browsing using a prototype browser extension, realized by the SCION path-aware networking architecture, without introducing any significant performance overheads.
在哪一层呈现或抽象网络功能仍然是一个研究难题。传统上,网络功能要么被置于核心网络、中间件中,要么被置于操作系统中--但最近的发展拓展了设计空间,将功能直接引入应用程序(尤其是浏览器),作为向用户展示功能的一种方式。考虑到新兴的路径感知网络技术,一个有趣的问题出现了:应该由哪一层来处理新功能?我们认为,浏览器正在成为网络创新的一个强大平台,在这个平台上,即使是用户驱动的属性也能以与操作系统无关的方式实现。我们利用 SCION 路径感知网络架构实现的浏览器扩展原型演示了地理围栏浏览的可行性,而且不会带来任何显著的性能开销。
{"title":"Tango or square dance?: how tightly should we integrate network functionality in browsers?","authors":"Alex Davidson, Matthias Frei, Marten Gartner, Hamed Haddadi, Jordi Subira Nieto, A. Perrig, Philipp Winter, Franccois Wirz","doi":"10.1145/3563766.3564111","DOIUrl":"https://doi.org/10.1145/3563766.3564111","url":null,"abstract":"The question at which layer network functionality is presented or abstracted remains a research challenge. Traditionally, network functionality was either placed into the core network, middleboxes, or into the operating system - but recent developments have expanded the design space to directly introduce functionality into the application (and in particular into the browser) as a way to expose it to the user. Given the context of emerging path-aware networking technology, an interesting question arises: which layer should handle the new features? We argue that the browser is becoming a powerful platform for network innovation, where even user-driven properties can be implemented in an OS-agnostic fashion. We demonstrate the feasibility of geo-fenced browsing using a prototype browser extension, realized by the SCION path-aware networking architecture, without introducing any significant performance overheads.","PeriodicalId":339381,"journal":{"name":"Proceedings of the 21st ACM Workshop on Hot Topics in Networks","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128576000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
CC-fuzz: genetic algorithm-based fuzzing for stress testing congestion control algorithms 基于遗传算法的模糊测试,用于压力测试拥塞控制算法
Pub Date : 2022-07-15 DOI: 10.1145/3563766.3564088
Devdeep Ray, S. Seshan
Recent congestion control research has focused on purpose-built algorithms designed for the special needs of specific applications. Often, limited testing before deploying a CCA results in unforeseen and hard-to-debug performance issues due to the complex ways a CCA interacts with other existing CCAs and diverse network environments. We present CC-Fuzz, an automated framework that uses genetic search algorithms to generate adversarial network traces and traffic patterns for stress-testing CCAs. Initial results include CC-Fuzz automatically finding a bug in BBR that causes it to stall permanently, and automatically discovering the well-known low-rate TCP attack, among other things.
最近的拥塞控制研究集中在为特定应用的特殊需求而设计的专用算法上。通常,由于CCA与其他现有CCA和各种网络环境交互的复杂方式,在部署CCA之前进行的有限测试会导致无法预见和难以调试的性能问题。我们提出了CC-Fuzz,这是一个使用遗传搜索算法生成对抗网络痕迹和流量模式的自动化框架,用于压力测试cca。最初的结果包括CC-Fuzz自动发现BBR中导致其永久停止的错误,以及自动发现众所周知的低速率TCP攻击等。
{"title":"CC-fuzz: genetic algorithm-based fuzzing for stress testing congestion control algorithms","authors":"Devdeep Ray, S. Seshan","doi":"10.1145/3563766.3564088","DOIUrl":"https://doi.org/10.1145/3563766.3564088","url":null,"abstract":"Recent congestion control research has focused on purpose-built algorithms designed for the special needs of specific applications. Often, limited testing before deploying a CCA results in unforeseen and hard-to-debug performance issues due to the complex ways a CCA interacts with other existing CCAs and diverse network environments. We present CC-Fuzz, an automated framework that uses genetic search algorithms to generate adversarial network traces and traffic patterns for stress-testing CCAs. Initial results include CC-Fuzz automatically finding a bug in BBR that causes it to stall permanently, and automatically discovering the well-known low-rate TCP attack, among other things.","PeriodicalId":339381,"journal":{"name":"Proceedings of the 21st ACM Workshop on Hot Topics in Networks","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134148920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A new hope for network model generalization 网络模型泛化的新希望
Pub Date : 2022-07-12 DOI: 10.1145/3563766.3564104
Alexander Dietmüller, Siddhant Ray, Romain Jacob, L. Vanbever
Generalizing machine learning (ML) models for network traffic dynamics tends to be considered a lost cause. Hence for every new task, we design new models and train them on model-specific datasets closely mimicking the deployment environments. Yet, an ML architecture called Transformer has enabled previously unimaginable generalization in other domains. Nowadays, one can download a model pre-trained on massive datasets and only fine-tune it for a specific task and context with comparatively little time and data. These fine-tuned models are now state-of-the-art for many benchmarks. We believe this progress could translate to networking and propose a Network Traffic Transformer (NTT), a transformer adapted to learn network dynamics from packet traces. Our initial results are promising: NTT seems able to generalize to new prediction tasks and environments. This study suggests there is still hope for generalization through future research.
将机器学习(ML)模型推广到网络流量动态往往被认为是失败的原因。因此,对于每个新任务,我们都设计新的模型,并在模型特定的数据集上训练它们,这些数据集与部署环境非常相似。然而,一个名为Transformer的ML架构在其他领域实现了以前难以想象的泛化。如今,人们可以下载一个在大量数据集上预先训练过的模型,只需要相对较少的时间和数据,就可以针对特定的任务和上下文对其进行微调。这些经过微调的模型现在在许多基准测试中都是最先进的。我们相信这一进展可以转化为网络,并提出了一种网络流量转换器(NTT),一种适应从数据包跟踪中学习网络动态的转换器。我们的初步结果是有希望的:NTT似乎能够推广到新的预测任务和环境。这项研究表明,未来的研究仍有推广的希望。
{"title":"A new hope for network model generalization","authors":"Alexander Dietmüller, Siddhant Ray, Romain Jacob, L. Vanbever","doi":"10.1145/3563766.3564104","DOIUrl":"https://doi.org/10.1145/3563766.3564104","url":null,"abstract":"Generalizing machine learning (ML) models for network traffic dynamics tends to be considered a lost cause. Hence for every new task, we design new models and train them on model-specific datasets closely mimicking the deployment environments. Yet, an ML architecture called Transformer has enabled previously unimaginable generalization in other domains. Nowadays, one can download a model pre-trained on massive datasets and only fine-tune it for a specific task and context with comparatively little time and data. These fine-tuned models are now state-of-the-art for many benchmarks. We believe this progress could translate to networking and propose a Network Traffic Transformer (NTT), a transformer adapted to learn network dynamics from packet traces. Our initial results are promising: NTT seems able to generalize to new prediction tasks and environments. This study suggests there is still hope for generalization through future research.","PeriodicalId":339381,"journal":{"name":"Proceedings of the 21st ACM Workshop on Hot Topics in Networks","volume":"42 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113973519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Proceedings of the 21st ACM Workshop on Hot Topics in Networks 第21届ACM网络热点研讨会论文集
Pub Date : 2011-11-14 DOI: 10.1145/2070562
H. Balakrishnan, D. Katabi, Aditya Akella, I. Stoica
It is our pleasure to welcome you to the tenth ACM SIGCOMM Workshop on Hot Topics in Networks---HotNets X. As with previous instances of this workshop, the goal has been to provide a venue for publication and discussion of early-stage, provocative research. We received 119 submissions and accepted 24 papers. The accepted papers cover topics ranging from novel network architectures to wireless networks, data center networks, energy, privacy and security issues. Like many conferences, we adopted a 2-round review process. Our program committee wrote over 450 reviews to ensure every paper received at least 3 reviews, with a little more than half the papers proceeding to the second round and receiving at least 2 additional reviews. Nearly 60 papers were discussed in the full-day PC meeting. We aimed to ensure that highly innovative work would be accepted even if not quite "fully baked", and encourage papers that identify fundamental open questions, or offer a constructive critique of the state of networking research. In achieving this goal, we were helped by the high quality of submissions, and the incredibly thorough reviews and positive discussions during the PC meeting. While there were papers that produced divided opinions among the PC, we were able to converge and achieve consensus on the accepted papers in a constructive manner.
我们很高兴欢迎您参加第十届ACM SIGCOMM网络热点话题研讨会——HotNets x。与之前的研讨会一样,我们的目标是为早期的、具有煽动性的研究提供一个发表和讨论的场所。共收到投稿119篇,录用论文24篇。被接受的论文涵盖了从新型网络架构到无线网络、数据中心网络、能源、隐私和安全问题的主题。像许多会议一样,我们采用了两轮审查过程。我们的项目委员会撰写了450多篇审稿,以确保每篇论文至少收到3篇审稿,其中略多于一半的论文进入第二轮,并收到至少2篇额外的审稿。在一整天的PC会议上,讨论了近60篇论文。我们的目标是确保高度创新的工作即使不完全“成熟”也能被接受,并鼓励那些确定基本开放问题的论文,或对网络研究现状提出建设性批评的论文。在实现这一目标的过程中,我们得到了高质量的提交,以及PC会议期间令人难以置信的彻底审查和积极讨论的帮助。虽然有些论文在PC中产生了分歧,但我们能够以建设性的方式就接受的论文达成共识。
{"title":"Proceedings of the 21st ACM Workshop on Hot Topics in Networks","authors":"H. Balakrishnan, D. Katabi, Aditya Akella, I. Stoica","doi":"10.1145/2070562","DOIUrl":"https://doi.org/10.1145/2070562","url":null,"abstract":"It is our pleasure to welcome you to the tenth ACM SIGCOMM Workshop on Hot Topics in Networks---HotNets X. As with previous instances of this workshop, the goal has been to provide a venue for publication and discussion of early-stage, provocative research. We received 119 submissions and accepted 24 papers. The accepted papers cover topics ranging from novel network architectures to wireless networks, data center networks, energy, privacy and security issues. \u0000 \u0000Like many conferences, we adopted a 2-round review process. Our program committee wrote over 450 reviews to ensure every paper received at least 3 reviews, with a little more than half the papers proceeding to the second round and receiving at least 2 additional reviews. Nearly 60 papers were discussed in the full-day PC meeting. We aimed to ensure that highly innovative work would be accepted even if not quite \"fully baked\", and encourage papers that identify fundamental open questions, or offer a constructive critique of the state of networking research. In achieving this goal, we were helped by the high quality of submissions, and the incredibly thorough reviews and positive discussions during the PC meeting. While there were papers that produced divided opinions among the PC, we were able to converge and achieve consensus on the accepted papers in a constructive manner.","PeriodicalId":339381,"journal":{"name":"Proceedings of the 21st ACM Workshop on Hot Topics in Networks","volume":"9 14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123996747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 21st ACM Workshop on Hot Topics in Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1