Yossi Gilad
YOU?
Author Swipe
View article: Sybil-Resistant Parallel Mixing
Sybil-Resistant Parallel Mixing Open
Parallel mixing is a common technique for efficiently unlinking messages from their senders' identity. It involves multiple servers arranged in a stratified mix-network (mixnet), each shuffling a fraction of the messages in parallel with o…
View article: Practical Rateless Set Reconciliation
Practical Rateless Set Reconciliation Open
Set reconciliation, where two parties hold fixed-length bit strings and run a protocol to learn the strings they are missing from each other, is a fundamental task in many distributed systems. We present Rateless Invertible Bloom Lookup Ta…
View article: Device Tracking via Linux's New TCP Source Port Selection Algorithm (Extended Version)
Device Tracking via Linux's New TCP Source Port Selection Algorithm (Extended Version) Open
We describe a tracking technique for Linux devices, exploiting a new TCP source port generation mechanism recently introduced to the Linux kernel. This mechanism is based on an algorithm, standardized in RFC 6056, for boosting security by …
View article: Coded Transaction Broadcasting for High-throughput Blockchains
Coded Transaction Broadcasting for High-throughput Blockchains Open
High-throughput blockchains require efficient transaction broadcast mechanisms that can deliver transactions to most network nodes with low bandwidth overhead and latency. Existing schemes coordinate transmissions across peers to avoid sen…
View article: DISCO: Sidestepping RPKI's Deployment Barriers
DISCO: Sidestepping RPKI's Deployment Barriers Open
BGP is a gaping security hole in todays Internet, as evidenced by numerous Internet outages and blackouts, repeated traffic hijacking, and surveillance incidents. To protect against prefix hijacking, the Resource Public Key Infrastructure …
View article: Yodel
Yodel Open
Yodel is the first system for voice calls that hides metadata (e.g., who is communicating with whom) from a powerful adversary that controls the network and compromises servers. Voice calls require sub-second message latency, but low laten…
View article: Vault: Fast Bootstrapping for the Algorand Cryptocurrency
Vault: Fast Bootstrapping for the Algorand Cryptocurrency Open
Decentralized cryptocurrencies rely on participants to keep track of the state of the system in order to verify new transactions.As the number of users and transactions grows, this requirement becomes a significant burden, requiring users …
View article: Vault: Fast Bootstrapping for the Algorand Cryptocurrency
Vault: Fast Bootstrapping for the Algorand Cryptocurrency Open
NSF (Awards CNS-1413920 and CNS-1414119)
View article: Stadium
Stadium Open
Private communication over the Internet remains a challenging problem. Even if messages are encrypted, it is hard to deliver them without revealing metadata about which pairs of users are communicating. Scalable anonymity systems, such as …
View article: Algorand
Algorand Open
© 2017 Copyright is held by the owner/author(s). Algorand is a new cryptocurrency that confirms transactions with latency on the order of a minute while scaling to many users. Algorand ensures that users never have divergent views of confi…
View article: Are We There Yet? On RPKI's Deployment and Security
Are We There Yet? On RPKI's Deployment and Security Open
The Resource Public Key Infrastructure (RPKI) binds IP address blocks to owners public keys. RPKI enables routers to perform Route Origin Validation (ROV), thus preventing devastating attacks such as IP prefix hijacking. Yet, despite exten…
View article: CDN-on-Demand: An Affordable DDoS Defense via Untrusted Clouds
CDN-on-Demand: An Affordable DDoS Defense via Untrusted Clouds Open
We present CDN-on-Demand, a software-based defense that administrators of small to medium websites install to resist powerful DDoS attacks, with a fraction of the cost of comparable commercial CDN services.Upon excessive load, CDNon-Demand…