### Top 6 Arxiv Papers Today in Cryptography And Security

##### #1. Limitations on Observability of Effects in Cyber-Physical Systems
###### Suresh K. Damodaran, Paul D. Rowe
Increased interconnectivity of Cyber-Physical Systems, by design or otherwise, increases the cyber attack surface and attack vectors. Observing the effects of these attacks is helpful in detecting them. In this paper, we show that many attacks on such systems result in a control loop effect we term Process Model Inconsistency (PMI). Our formal approach elucidates the relationships among incompleteness, incorrectness, safety, and inconsistency of process models. We show that incomplete process models lead to inconsistency. Surprisingly, inconsistency may arise even in complete and correct models. We illustrate our approach through an Automated Teller Machine (ATM) example, and describe the practical implications of the theoretical results.
more | pdf | html
###### Tweets
ComputerPapers: Limitations on Observability of Effects in Cyber-Physical Systems. https://t.co/ScDoh9YreS
LordProphet: RT @ComputerPapers: Limitations on Observability of Effects in Cyber-Physical Systems. https://t.co/ScDoh9YreS
None.
None.
###### Other stats
Sample Sizes : None.
Authors: 2
Total Words: 9864
Unqiue Words: 2457

##### #2. Statistical Privacy in Distributed Average Consensus on Bounded Real Inputs
###### Nirupam Gupta, Jonathan Katz, Nikhil Chopra
This paper proposes a privacy protocol for distributed average consensus algorithms on bounded real-valued inputs that guarantees statistical privacy of honest agents' inputs against colluding (passive adversarial) agents, if the set of colluding agents is not a vertex cut in the underlying communication network. This implies that privacy of agents' inputs is preserved against $t$ number of arbitrary colluding agents if the connectivity of the communication network is at least $(t+1)$. A similar privacy protocol has been proposed for the case of bounded integral inputs in our previous paper~\cite{gupta2018information}. However, many applications of distributed consensus concerning distributed control or state estimation deal with real-valued inputs. Thus, in this paper we propose an extension of the privacy protocol in~\cite{gupta2018information}, for bounded real-valued agents' inputs, where bounds are known apriori to all the agents.
more | pdf | html
###### Tweets
MathPaper: Statistical Privacy in Distributed Average Consensus on Bounded Real Inputs. https://t.co/T9opldAG8p
None.
None.
###### Other stats
Sample Sizes : None.
Authors: 3
Total Words: 6041
Unqiue Words: 1523

##### #3. Managing Recurrent Virtual Network Updates in Multi-Tenant Datacenters: A System Perspective
###### Zhuotao Liu, Yuan Cao, Xuewu Zhang
With the advent of software-defined networking, network configuration through programmable interfaces becomes practical, leading to various on-demand opportunities for network routing update in multi-tenant datacenters, where tenants have diverse requirements on network routings such as short latency, low path inflation, large bandwidth, high reliability, etc. Conventional solutions that rely on topology search coupled with an objective function to find desired routings have at least two shortcomings: (i) they run into scalability issues when handling consistent and frequent routing updates and (ii) they restrict the flexibility and capability to satisfy various routing requirements. To address these issues, this paper proposes a novel search and optimization decoupled design, which not only saves considerable topology search costs via search result reuse, but also avoids possible sub-optimality in greedy routing search algorithms by making decisions based on the global view of all possible routings. We implement a prototype of...
more | pdf | html
###### Tweets
ComputerPapers: Managing Recurrent Virtual Network Updates in Multi-Tenant Datacenters: A System Perspective. https://t.co/Yez6aAD90Y
None.
None.
###### Other stats
Sample Sizes : None.
Authors: 3
Total Words: 8469
Unqiue Words: 2340

##### #4. A Double-Edged Sword: Security Threats and Opportunities in One-Sided Network Communication
###### Shin-Yeh Tsai, Yiying Zhang
One-sided network communication technologies such as RDMA and NVMe-over-Fabrics are quickly gaining adoption in production software and in datacenters. Although appealing for their low CPU utilization and good performance, they raise new security concerns that could seriously undermine datacenter software systems building on top of them. This paper presents our insights into security implications of one-sided communication. In addition to security threats, we further discover opportunities of leveraging one-sided communication to enhance security, showing that one-sided communication is indeed a double-edged sword in security. As far as we know, this is the first work that discusses the security aspect of one-sided communication.
more | pdf | html
None.
###### Tweets
ComputerPapers: A Double-Edged Sword: Security Threats and Opportunities in One-Sided Network Communication. https://t.co/C9Nbcyq5F4
None.
None.
###### Other stats
Sample Sizes : None.
Authors: 2
Total Words: 5878
Unqiue Words: 1969

##### #5. Surfing the Web quicker than QUIC via a shared Address Validation
###### Erik Sy
QUIC is a performance-optimized secure transport protocol and a building block of the upcoming HTTP/3 standard. To protect against denial-of-service attacks, QUIC servers need to validate the IP addresses claimed by their clients. So far, the QUIC protocol conducts address validation for each hostname separately using validation tokens. In this work, we review this practice and introduce a new QUIC transport parameter to allow a shared address validation across hostnames. This parameter indicates to the client, that an issued validation token can be used to abbreviate the address validation when connecting to specific other hostnames. Based on trust-relations between real-world hostnames we evaluate the performance benefits of our proposal. Our results suggest that a shared address validation saves a round-trip time on almost 60% of the required handshakes to different hosts during the first loading of an average website. Assuming a typical transatlantic connection with a round-trip time of 90ms. We find that deploying our...
more | pdf | html
None.
###### Tweets
ComputerPapers: Surfing the Web quicker than QUIC via a shared Address Validation. https://t.co/K7smbFWolw
None.
None.
###### Other stats
Sample Sizes : None.
Authors: 1
Total Words: 5132
Unqiue Words: 1314

##### #6. A Random Number Generator Built from Repurposed Hardware in Embedded Systems
###### Jacob Grycel, Robert Walls
Quality randomness is fundamental to cryptographic operations but on embedded systems good sources are (seemingly) hard to find. Rather than use expensive custom hardware, this study investigates entropy sources that are already common in a range of low-cost embedded platforms. In particular, we empirically evaluate the entropy provided by three sources - SRAM startup state, oscillator jitter, and device temperature - and integrate those sources into a full Pseudo-Random Number Generator implementation based on Fortuna. Our system addresses a number of fundamental challenges affecting random number generation on embedded systems. For instance, we propose SRAM startup state as a means to efficiently generate the initial seed - even for systems that do not have writeable storage. Further, the system's use of oscillator jitter allows for the continuous collection of entropy-generating events - even for systems that do not have the user-generated events that are commonly used in general-purpose systems for entropy, e.g., key presses...
more | pdf | html
###### Tweets
ComputerPapers: A Random Number Generator Built from Repurposed Hardware in Embedded Systems. https://t.co/4As08ErzlP
None.
None.
###### Other stats
Sample Sizes : None.
Authors: 2
Total Words: 6260
Unqiue Words: 1958

Assert is a website where the best academic papers on arXiv (computer science, math, physics), bioRxiv (biology), BITSS (reproducibility), EarthArXiv (earth science), engrXiv (engineering), LawArXiv (law), PsyArXiv (psychology), SocArXiv (social science), and SportRxiv (sport research) bubble to the top each day.

Papers are scored (in real-time) based on how verifiable they are (as determined by their Github repos) and how interesting they are (based on Twitter).

To see top papers, follow us on twitter @assertpub_ (arXiv), @assert_pub (bioRxiv), and @assertpub_dev (everything else).

To see beautiful figures extracted from papers, follow us on Instagram.

Tracking 100,376 papers.

###### Search
Sort results based on if they are interesting or reproducible.
Interesting
Reproducible
Online
###### Stats
Tracking 100,376 papers.