Jelle Hellings, Daniel P. Hugues, Joshua Primero, Mohammad Sadoghi
To enable scalable resilient blockchain systems, several powerful general-purpose approaches toward sharding such systems have been demonstrated. Unfortunately, these approaches all come with substantial costs for ordering andexecution of multi-shard transactions.In this work, we ask whether one can achieve significantcost reductions for processing multi-shard transactions by limiting the type of workloads supported. To initiate the study of this problem, we propose CERBERUS, a family of minimalistic primitives for processing single-shard and multi-shard UTXO-like transactions. The first CERBERUS variant we propose is core-CERBERUS (CCERBERUS). CCERBERUS uses strict UTXO-based environmental requirements to enable powerful multi-shard transaction processing with an absolute minimum amount of coordination between shards. In the environment we designed CCERBERUS for, CCERBERUS will operate perfectly with respect to all transactions proposed and approved by well-behaved clients, but does not provide any other guarantees.To illustrate that CCERBERUS -like protocols can also be of use in environments with faulty clients, we also demonstrate two generalizations of CCERBERUS, optimistic-CERBERUS and resilient-CERBERUS, that make different tradeoffs in complexity and costs when dealing with faulty behavior and attacks. Finally, we compare these three protocols and show their potential scalability and performance benefits over state-of-the-art general-purpose systems. These results underline the importance of the study of specialized approaches toward sharding in resilient systems.
{"title":"[Problem] Cerberus: Minimalistic Multi-shard Byzantine-resilient Transaction Processing","authors":"Jelle Hellings, Daniel P. Hugues, Joshua Primero, Mohammad Sadoghi","doi":"10.5070/sr33161314","DOIUrl":"https://doi.org/10.5070/sr33161314","url":null,"abstract":"To enable scalable resilient blockchain systems, several powerful general-purpose approaches toward sharding such systems have been demonstrated. Unfortunately, these approaches all come with substantial costs for ordering andexecution of multi-shard transactions.In this work, we ask whether one can achieve significantcost reductions for processing multi-shard transactions by limiting the type of workloads supported. To initiate the study of this problem, we propose CERBERUS, a family of minimalistic primitives for processing single-shard and multi-shard UTXO-like transactions. The first CERBERUS variant we propose is core-CERBERUS (CCERBERUS). CCERBERUS uses strict UTXO-based environmental requirements to enable powerful multi-shard transaction processing with an absolute minimum amount of coordination between shards. In the environment we designed CCERBERUS for, CCERBERUS will operate perfectly with respect to all transactions proposed and approved by well-behaved clients, but does not provide any other guarantees.To illustrate that CCERBERUS -like protocols can also be of use in environments with faulty clients, we also demonstrate two generalizations of CCERBERUS, optimistic-CERBERUS and resilient-CERBERUS, that make different tradeoffs in complexity and costs when dealing with faulty behavior and attacks. Finally, we compare these three protocols and show their potential scalability and performance benefits over state-of-the-art general-purpose systems. These results underline the importance of the study of specialized approaches toward sharding in resilient systems.","PeriodicalId":36882,"journal":{"name":"Journal of World-Systems Research","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135146446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"[Tool] Automatically Extracting Hardware Descriptions from PDF Technical Documentation","authors":"Niklas Hauser, Jan Pennekamp","doi":"10.5070/sr33162446","DOIUrl":"https://doi.org/10.5070/sr33162446","url":null,"abstract":"","PeriodicalId":36882,"journal":{"name":"Journal of World-Systems Research","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135201593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To evaluate the severity of a security vulnerability a security researcher usually tries to prove its exploitability by writing an actual exploit. In the case of buffer overflows on the heap, a necessary part of this is manipulating the heap layout in a way that creates an exploitable state, usually by placing a vulnerable object adjacent to a target object. This requires manual effort and extensive knowledge of the target. With a target as complex as the Linux kernel, this problem becomes highly non-trivial. At the current time, there has been little research in terms of employing algorithmic solutions for this. In this work, we present Kernel-SIEVE, a framework for evaluating heap layout manipulation algorithms that target the SLAB/SLUB allocator in the Linux kernel. Inspired by previous work that targets user-space allocators [34–36] it provides an interface for triggering allocations/deallocations in the kernel and contains a feedback loop that returns the resulting distance of two target objects. With this, we create the (to our knowledge) first performance benchmarks for heap layout manipulation algorithms in the Linux kernel. We present and evaluate two algorithms: A pseudo-random search, whose performance serves as a baseline, and KEvoHeap, a genetic algorithm based on Heelan’s EvoHeap [34,36]. We show that KEvoHeap is successful at creating the desired heap layout in all test cases and also surpasses the user-space performance benchmarks of EvoHeap. Finally, we discuss the challenges of applying these kinds of algorithms in real-world scenarios and weigh different possible approaches to tackle the problems that arise. Our research results are publicly available on GitHub [18].
{"title":"[Solution] Algorithmic Heap Layout Manipulation in the Linux Kernel","authors":"Max Jens Ufer, Daniel Baier","doi":"10.5070/sr33160040","DOIUrl":"https://doi.org/10.5070/sr33160040","url":null,"abstract":"To evaluate the severity of a security vulnerability a security researcher usually tries to prove its exploitability by writing an actual exploit. In the case of buffer overflows on the heap, a necessary part of this is manipulating the heap layout in a way that creates an exploitable state, usually by placing a vulnerable object adjacent to a target object. This requires manual effort and extensive knowledge of the target. With a target as complex as the Linux kernel, this problem becomes highly non-trivial. At the current time, there has been little research in terms of employing algorithmic solutions for this. In this work, we present Kernel-SIEVE, a framework for evaluating heap layout manipulation algorithms that target the SLAB/SLUB allocator in the Linux kernel. Inspired by previous work that targets user-space allocators [34–36] it provides an interface for triggering allocations/deallocations in the kernel and contains a feedback loop that returns the resulting distance of two target objects. With this, we create the (to our knowledge) first performance benchmarks for heap layout manipulation algorithms in the Linux kernel. We present and evaluate two algorithms: A pseudo-random search, whose performance serves as a baseline, and KEvoHeap, a genetic algorithm based on Heelan’s EvoHeap [34,36]. We show that KEvoHeap is successful at creating the desired heap layout in all test cases and also surpasses the user-space performance benchmarks of EvoHeap. Finally, we discuss the challenges of applying these kinds of algorithms in real-world scenarios and weigh different possible approaches to tackle the problems that arise. Our research results are publicly available on GitHub [18].","PeriodicalId":36882,"journal":{"name":"Journal of World-Systems Research","volume":"172 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74925438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Olav Lamberts, Konrad Wolsing, Eric Wagner, Jan Pennekamp, Jan Bauer, Klaus Wehrle, Martin Henze
Industrial systems are increasingly threatened by cyberattacks with potentially disastrous consequences. To counter such attacks, industrial intrusion detection systems strive to timely uncover even the most sophisticated breaches. Due to its criticality for society, this fast-growing field attracts researchers from diverse backgrounds, resulting in 130 new detection approaches in 2021 alone. This huge momentum facilitates the exploration of diverse promising paths but likewise risks fragmenting the research landscape and burying promising progress. Consequently, it needs sound and comprehensible evaluations to mitigate this risk and catalyze efforts into sustainable scientific progress with real-world applicability. In this paper, we therefore systematically analyze the evaluation methodologies of this field to understand the current state of industrial intrusion detection research. Our analysis of 609 publications shows that the rapid growth of this research field has positive and negative consequences. While we observe an increased use of public datasets, publications still only evaluate 1.3 datasets on average, and frequently used benchmarking metrics are ambiguous. At the same time, the adoption of newly developed benchmarking metrics sees little advancement. Finally, our systematic analysis enables us to provide actionable recommendations for all actors involved and thus bring the entire research field forward.
{"title":"[SoK] Evaluations in Industrial Intrusion Detection Research","authors":"Olav Lamberts, Konrad Wolsing, Eric Wagner, Jan Pennekamp, Jan Bauer, Klaus Wehrle, Martin Henze","doi":"10.5070/sr33162445","DOIUrl":"https://doi.org/10.5070/sr33162445","url":null,"abstract":"Industrial systems are increasingly threatened by cyberattacks with potentially disastrous consequences. To counter such attacks, industrial intrusion detection systems strive to timely uncover even the most sophisticated breaches. Due to its criticality for society, this fast-growing field attracts researchers from diverse backgrounds, resulting in 130 new detection approaches in 2021 alone. This huge momentum facilitates the exploration of diverse promising paths but likewise risks fragmenting the research landscape and burying promising progress. Consequently, it needs sound and comprehensible evaluations to mitigate this risk and catalyze efforts into sustainable scientific progress with real-world applicability. In this paper, we therefore systematically analyze the evaluation methodologies of this field to understand the current state of industrial intrusion detection research. Our analysis of 609 publications shows that the rapid growth of this research field has positive and negative consequences. While we observe an increased use of public datasets, publications still only evaluate 1.3 datasets on average, and frequently used benchmarking metrics are ambiguous. At the same time, the adoption of newly developed benchmarking metrics sees little advancement. Finally, our systematic analysis enables us to provide actionable recommendations for all actors involved and thus bring the entire research field forward.","PeriodicalId":36882,"journal":{"name":"Journal of World-Systems Research","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135201592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"[Solution] Byzantine Cluster-Sending in Expected Constant Cost and Constant Time","authors":"Jelle Hellings, Mohammad Sadoghi","doi":"10.5070/sr33161345","DOIUrl":"https://doi.org/10.5070/sr33161345","url":null,"abstract":"","PeriodicalId":36882,"journal":{"name":"Journal of World-Systems Research","volume":"25 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79945727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marronnage, or escape from slavery, was a longue-durée form of resistance to slavery in Haiti and was also, as Sylvia Wynter argues, a “dialectical response to the capitalist plantation system”—a system that aimed to deny humanity, sever social and cultural ties, and commodified people and their labor power. This article, as well as works by others such as Cedric Robinson (1983), Sylvia Wynter (n.d.), and Jean Casimir (2020), argues that marronnage was a fundamentally anti-capitalist mode of resistance, socio-political critique, and grassroots mobilizing. In the immediate moments when enslaved people fled plantations, they reclaimed possession of themselves and other tangible and intangible resources, such as their time, social relationships, forms of knowledge, and labor skills that enslavers stole from them. When maroons re-appropriated resources and mobilized themselves, they challenged and subverted colonial plantation structures, contributing to the downfall of both Spanish and French imperial slaveries in Haiti. During and after the Haitian Revolution of 1791–1804, Africa-born rebels and maroons were central to the mobilizing structures that successfully fought to abolish slavery and overturn colonialism—representing an astounding rupture to the prevailing Atlantic world-system that was dependent upon enslaved labor. Even after the post-independence Haitian government replicated aspects of the colonial administration, as Casimir (2020) points out, the formerly enslaved masses of Haiti organized themselves into communal social arrangements that prioritized subsistence labor and extended kin networks, and continued to rely on marronnage to protest exploitative economic practices. This article explores the trajectory of marronnage in Haiti as a continuous struggle, emphasizing the ways that it exposed the violence, exploitation, and oppression inherently embedded in the Atlantic world-system, and exposed the limits of the governing Haitian states.
{"title":"Maroon Movements Against Empire","authors":"C. Eddins","doi":"10.5195/jwsr.2022.1108","DOIUrl":"https://doi.org/10.5195/jwsr.2022.1108","url":null,"abstract":"Marronnage, or escape from slavery, was a longue-durée form of resistance to slavery in Haiti and was also, as Sylvia Wynter argues, a “dialectical response to the capitalist plantation system”—a system that aimed to deny humanity, sever social and cultural ties, and commodified people and their labor power. This article, as well as works by others such as Cedric Robinson (1983), Sylvia Wynter (n.d.), and Jean Casimir (2020), argues that marronnage was a fundamentally anti-capitalist mode of resistance, socio-political critique, and grassroots mobilizing. In the immediate moments when enslaved people fled plantations, they reclaimed possession of themselves and other tangible and intangible resources, such as their time, social relationships, forms of knowledge, and labor skills that enslavers stole from them. When maroons re-appropriated resources and mobilized themselves, they challenged and subverted colonial plantation structures, contributing to the downfall of both Spanish and French imperial slaveries in Haiti. During and after the Haitian Revolution of 1791–1804, Africa-born rebels and maroons were central to the mobilizing structures that successfully fought to abolish slavery and overturn colonialism—representing an astounding rupture to the prevailing Atlantic world-system that was dependent upon enslaved labor. Even after the post-independence Haitian government replicated aspects of the colonial administration, as Casimir (2020) points out, the formerly enslaved masses of Haiti organized themselves into communal social arrangements that prioritized subsistence labor and extended kin networks, and continued to rely on marronnage to protest exploitative economic practices. This article explores the trajectory of marronnage in Haiti as a continuous struggle, emphasizing the ways that it exposed the violence, exploitation, and oppression inherently embedded in the Atlantic world-system, and exposed the limits of the governing Haitian states.","PeriodicalId":36882,"journal":{"name":"Journal of World-Systems Research","volume":" ","pages":""},"PeriodicalIF":1.1,"publicationDate":"2022-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46652713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The current proliferation of authoritarianism across both core and periphery is one political articulation of the current crisis of the capitalist world-system. Authoritarianism similarly proliferated in previous periods of crisis, in the 1970s and 80s in the peripheries, and in the 1930s and 40s in the core. In Part I of this essay, I detail how world-systems analysts have long been attuned to describing and analyzing chaotic moments in between systemic cycles of hegemony, but less attention has been given to the rise of authoritarianism in these chaotic phases. The multiple crises of hegemonic transition engenders an ideological contestation between Fascism and Communism revealing the limitations of Liberalism, the foundational ideology of the world-system. In such periods of hegemonic breakdown, anarchists developed autonomous strategies of resisting authoritarian rule at both the point of production (the worker-occupied and self-managed workplace) and at the point of leisure (the autonomous zone of the infoshop or café as resources and interventions in the joint struggle against capitalism and authoritarianism. These theories are important to recover for the contemporary fight against a resurgent authoritarianism across the world-system in the current conjuncture.
{"title":"Theories of Antifascism in the Interwar Mediterranean Part I","authors":"Kristin Plys","doi":"10.5195/jwsr.2022.1105","DOIUrl":"https://doi.org/10.5195/jwsr.2022.1105","url":null,"abstract":"The current proliferation of authoritarianism across both core and periphery is one political articulation of the current crisis of the capitalist world-system. Authoritarianism similarly proliferated in previous periods of crisis, in the 1970s and 80s in the peripheries, and in the 1930s and 40s in the core. In Part I of this essay, I detail how world-systems analysts have long been attuned to describing and analyzing chaotic moments in between systemic cycles of hegemony, but less attention has been given to the rise of authoritarianism in these chaotic phases. The multiple crises of hegemonic transition engenders an ideological contestation between Fascism and Communism revealing the limitations of Liberalism, the foundational ideology of the world-system. In such periods of hegemonic breakdown, anarchists developed autonomous strategies of resisting authoritarian rule at both the point of production (the worker-occupied and self-managed workplace) and at the point of leisure (the autonomous zone of the infoshop or café as resources and interventions in the joint struggle against capitalism and authoritarianism. These theories are important to recover for the contemporary fight against a resurgent authoritarianism across the world-system in the current conjuncture.","PeriodicalId":36882,"journal":{"name":"Journal of World-Systems Research","volume":" ","pages":""},"PeriodicalIF":1.1,"publicationDate":"2022-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44636794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Drawing from processes of autonomous community organization in Mexico, this paper will interrogate and rethink the borders and boundaries of autonomy. Rather than articulating autonomy as some fully separated space with clearly delineated borders, this paper will show how struggles for autonomy in Mexico are constantly navigating their insides and outsides, organizing and inhabiting the border or boundary space. With this, we can begin to re-conceptualize autonomy without state-like borders as something in constant movement. In the same way, we can begin to take seriously the complexities and intricacies of autonomous struggles as they play out in practice.
{"title":"Ins and Outs of Autonomy","authors":"Ryan A. Knight","doi":"10.5195/jwsr.2022.1096","DOIUrl":"https://doi.org/10.5195/jwsr.2022.1096","url":null,"abstract":"Drawing from processes of autonomous community organization in Mexico, this paper will interrogate and rethink the borders and boundaries of autonomy. Rather than articulating autonomy as some fully separated space with clearly delineated borders, this paper will show how struggles for autonomy in Mexico are constantly navigating their insides and outsides, organizing and inhabiting the border or boundary space. With this, we can begin to re-conceptualize autonomy without state-like borders as something in constant movement. In the same way, we can begin to take seriously the complexities and intricacies of autonomous struggles as they play out in practice.","PeriodicalId":36882,"journal":{"name":"Journal of World-Systems Research","volume":" ","pages":""},"PeriodicalIF":1.1,"publicationDate":"2022-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44408448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Editor's introduction to the special issue on non-state movements and spaces.
编者对非国家运动和空间特刊的介绍。
{"title":"Introduction to the Special Issue","authors":"Spencer Louis Potiker","doi":"10.5195/jwsr.2022.1142","DOIUrl":"https://doi.org/10.5195/jwsr.2022.1142","url":null,"abstract":"Editor's introduction to the special issue on non-state movements and spaces.","PeriodicalId":36882,"journal":{"name":"Journal of World-Systems Research","volume":" ","pages":""},"PeriodicalIF":1.1,"publicationDate":"2022-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42949887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}