Zum Hauptinhalt springen

Showing 1–16 of 16 results for author: Christin, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.01508  [pdf, other

    cs.CR

    Blockchain Economic Denial of Sustainability Attack: Exploiting Latency Optimization in Ethereum Transaction Forwarding

    Authors: Taro Tsuchiya, Liyi Zhou, Kaihua Qin, Arthur Gervais, Nicolas Christin

    Abstract: Strategies related to the blockchain concept of Extractable Value (MEV/BEV), such as arbitrage, front- or back-running create an economic incentive for network nodes to reduce latency, including minimizing transaction validation time -- a core feature to secure blockchain networks. A modified node, that neglects to filter invalid transactions in the Ethereum P2P network, introduces novel attack ve… ▽ More

    Submitted 2 August, 2024; originally announced August 2024.

  2. arXiv:2407.08185  [pdf, other

    cs.CR cs.CL cs.CY cs.NI

    Automatic Generation of Web Censorship Probe Lists

    Authors: Jenny Tang, Leo Alvarez, Arjun Brar, Nguyen Phong Hoang, Nicolas Christin

    Abstract: Domain probe lists--used to determine which URLs to probe for Web censorship--play a critical role in Internet censorship measurement studies. Indeed, the size and accuracy of the domain probe list limits the set of censored pages that can be detected; inaccurate lists can lead to an incomplete view of the censorship landscape or biased results. Previous efforts to generate domain probe lists have… ▽ More

    Submitted 11 July, 2024; originally announced July 2024.

    Comments: To appear in the Proceedings on Privacy Enhancing Technologies 2024

  3. arXiv:2305.18545  [pdf, other

    cs.CR cs.NI

    Blockchain Censorship

    Authors: Anton Wahrstätter, Jens Ernstberger, Aviv Yaish, Liyi Zhou, Kaihua Qin, Taro Tsuchiya, Sebastian Steinhorst, Davor Svetinovic, Nicolas Christin, Mikolaj Barczentewicz, Arthur Gervais

    Abstract: Permissionless blockchains promise to be resilient against censorship by a single entity. This suggests that deterministic rules, and not third-party actors, are responsible for deciding if a transaction is appended to the blockchain or not. In 2022, the U.S. Office of Foreign Assets Control (OFAC) sanctioned a Bitcoin mixer and an Ethereum application, putting the neutrality of permissionless blo… ▽ More

    Submitted 2 June, 2023; v1 submitted 29 May, 2023; originally announced May 2023.

  4. arXiv:2204.12601  [pdf, other

    cs.CR cs.HC

    Observations From an Online Security Competition and Its Implications on Crowdsourced Security

    Authors: Alejandro Cuevas, Emma Hogan, Hanan Hibshi, Nicolas Christin

    Abstract: The crowd sourced security industry, particularly bug bounty programs, has grown dramatically over the past years and has become the main source of software security reviews for many companies. However, the academic literature has largely omitted security teams, particularly in crowd work contexts. As such, we know very little about how distributed security teams organize, collaborate, and what te… ▽ More

    Submitted 26 April, 2022; originally announced April 2022.

    Comments: 13 pages, 1 figure, 1 table

  5. arXiv:2111.08209  [pdf, other

    cs.HC cs.CR cs.LO

    Exploring Usable Security to Improve the Impact of Formal Verification: A Research Agenda

    Authors: Carolina Carreira, João F. Ferreira, Alexandra Mendes, Nicolas Christin

    Abstract: As software becomes more complex and assumes an even greater role in our lives, formal verification is set to become the gold standard in securing software systems into the future, since it can guarantee the absence of errors and entire classes of attack. Recent advances in formal verification are being used to secure everything from unmanned drones to the internet. At the same time, the usable… ▽ More

    Submitted 15 November, 2021; originally announced November 2021.

    Comments: In Proceedings AppFM 2021, arXiv:2111.07538

    Journal ref: EPTCS 349, 2021, pp. 77-84

  6. arXiv:2103.16808  [pdf, other

    cs.CL

    Self-Supervised Euphemism Detection and Identification for Content Moderation

    Authors: Wanzheng Zhu, Hongyu Gong, Rohan Bansal, Zachary Weinberg, Nicolas Christin, Giulia Fanti, Suma Bhat

    Abstract: Fringe groups and organizations have a long history of using euphemisms--ordinary-sounding words with a secret meaning--to conceal what they are discussing. Nowadays, one common use of euphemisms is to evade content moderation policies enforced by social media platforms. Existing tools for enforcing policy automatically rely on keyword searches for words on a "ban list", but these are notoriously… ▽ More

    Submitted 31 March, 2021; originally announced March 2021.

    Comments: 18 pages, 5 figures, 10 tables, 42nd IEEE Symposium on Security & Privacy (2021)

  7. arXiv:1907.04245  [pdf, other

    cs.CR cs.CY cs.NI cs.SI

    ICLab: A Global, Longitudinal Internet Censorship Measurement Platform

    Authors: Arian Akhavan Niaki, Shinyoung Cho, Zachary Weinberg, Nguyen Phong Hoang, Abbas Razaghpanah, Nicolas Christin, Phillipa Gill

    Abstract: Researchers have studied Internet censorship for nearly as long as attempts to censor contents have taken place. Most studies have however been limited to a short period of time and/or a few countries; the few exceptions have traded off detail for breadth of coverage. Collecting enough data for a comprehensive, global, longitudinal perspective remains challenging. In this work, we present ICLab, a… ▽ More

    Submitted 10 July, 2019; v1 submitted 9 July, 2019; originally announced July 2019.

    Comments: To appear in Proceedings of the 41st IEEE Symposium on Security and Privacy (Oakland 2020). San Francisco, CA. May 2020

  8. arXiv:1704.04299  [pdf, other

    cs.CR

    An Empirical Analysis of Traceability in the Monero Blockchain

    Authors: Malte Möser, Kyle Soska, Ethan Heilman, Kevin Lee, Henry Heffan, Shashvat Srivastava, Kyle Hogan, Jason Hennessey, Andrew Miller, Arvind Narayanan, Nicolas Christin

    Abstract: Monero is a privacy-centric cryptocurrency that allows users to obscure their transactions by including chaff coins, called "mixins," along with the actual coins they spend. In this paper, we empirically evaluate two weaknesses in Monero's mixin sampling strategy. First, about 62% of transaction inputs with one or more mixins are vulnerable to "chain-reaction" analysis -- that is, the real input c… ▽ More

    Submitted 23 April, 2018; v1 submitted 13 April, 2017; originally announced April 2017.

  9. arXiv:1611.02968  [pdf, other

    cs.CR

    A Public Comment on NCCoE's White Paper on Privacy-Enhancing Identity Brokers

    Authors: Luís T. A. N. Brandão, Nicolas Christin, George Danezis

    Abstract: The National Cybersecurity Center of Excellence (NCCoE) (in the United States) has published on October 19, 2015, a white paper on "privacy-enhanced identity brokers." We present here a reply to their request for public comments. We enumerate concerns whose consideration we find paramount for the design of a privacy-enhancing identity brokering solution, for identification and authentication of ci… ▽ More

    Submitted 9 November, 2016; originally announced November 2016.

    Comments: 18 pages

  10. arXiv:1409.4503  [pdf, other

    cs.GT cs.CR

    Audit Games with Multiple Defender Resources

    Authors: Jeremiah Blocki, Nicolas Christin, Anupam Datta, Ariel Procaccia, Arunesh Sinha

    Abstract: Modern organizations (e.g., hospitals, social networks, government agencies) rely heavily on audit to detect and punish insiders who inappropriately access and disclose confidential information. Recent work on audit games models the strategic interaction between an auditor with a single audit resource and auditees as a Stackelberg game, augmenting associated well-studied security games with a conf… ▽ More

    Submitted 1 March, 2015; v1 submitted 16 September, 2014; originally announced September 2014.

  11. arXiv:1303.0356  [pdf, ps, other

    cs.GT cs.CR

    Audit Games

    Authors: Jeremiah Blocki, Nicolas Christin, Anupam Datta, Ariel D. Procaccia, Arunesh Sinha

    Abstract: Effective enforcement of laws and policies requires expending resources to prevent and detect offenders, as well as appropriate punishment schemes to deter violators. In particular, enforcement of privacy laws and policies in modern organizations that hold large volumes of personal information (e.g., hospitals, banks, and Web services providers) relies heavily on internal audit mechanisms. We stud… ▽ More

    Submitted 5 March, 2013; v1 submitted 2 March, 2013; originally announced March 2013.

  12. arXiv:1207.7139  [pdf, ps, other

    cs.CY cs.CR

    Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace

    Authors: Nicolas Christin

    Abstract: We perform a comprehensive measurement analysis of Silk Road, an anonymous, international online marketplace that operates as a Tor hidden service and uses Bitcoin as its exchange currency. We gather and analyze data over eight months between the end of 2011 and 2012, including daily crawls of the marketplace for nearly six months in 2012. We obtain a detailed picture of the type of goods being so… ▽ More

    Submitted 28 November, 2012; v1 submitted 30 July, 2012; originally announced July 2012.

    Comments: 26 pages, 13 figures, 4 tables; changes to v1 include revised sales volume and commission estimates (Sec. 5) and slightly expanded discussion

    Report number: CMU-Cylab-12-018 ACM Class: K.4.1

  13. arXiv:1111.2888  [pdf, ps, other

    cs.GT

    Adaptive Regret Minimization in Bounded-Memory Games

    Authors: Jeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha

    Abstract: Online learning algorithms that minimize regret provide strong guarantees in situations that involve repeatedly making decisions in an uncertain environment, e.g. a driver deciding what route to drive to work every day. While regret minimization has been extensively studied in repeated games, we study regret minimization for a richer class of games called bounded memory games. In each round of a t… ▽ More

    Submitted 5 September, 2013; v1 submitted 11 November, 2011; originally announced November 2011.

    Comments: Full Version. GameSec 2013 (Invited Paper)

  14. arXiv:cs/0406019  [pdf, ps, other

    cs.NI

    Providing Service Guarantees in High-Speed Switching Systems with Feedback Output Queuing

    Authors: Victor Firoiu, Xiaohui Zhang, Emre Gunduzhan, Nicolas Christin

    Abstract: We consider the problem of providing service guarantees in a high-speed packet switch. As basic requirements, the switch should be scalable to high speeds per port, a large number of ports and a large number of traffic flows with independent guarantees. Existing scalable solutions are based on Virtual Output Queuing, which is computationally complex when required to provide service guarantees fo… ▽ More

    Submitted 11 June, 2004; originally announced June 2004.

    Comments: 30 pages, 9 figures. Shorter preliminary version appeared in Proceedings of Hot Interconnects X, Stanford CA, August 2002

    ACM Class: C.2.1; C.2.6

  15. arXiv:cs/0404040  [pdf, ps, other

    cs.GT cs.NI

    Near Rationality and Competitive Equilibria in Networked Systems

    Authors: Nicolas Christin, Jens Grossklags, John Chuang

    Abstract: A growing body of literature in networked systems research relies on game theory and mechanism design to model and address the potential lack of cooperation between self-interested users. Most game-theoretic models applied to system research only describe competitive equilibria in terms of pure Nash equilibria, that is, a situation where the strategy of each user is deterministic, and is her bes… ▽ More

    Submitted 20 April, 2004; originally announced April 2004.

    Comments: 13 pages, no figures

    Report number: p2pecon TR-2004-04-CGC ACM Class: C.2

  16. arXiv:cs/0401010  [pdf, ps, other

    cs.NI

    On the Cost of Participating in a Peer-to-Peer Network

    Authors: Nicolas Christin, John Chuang

    Abstract: In this paper, we model the cost incurred by each peer participating in a peer-to-peer network. Such a cost model allows to gauge potential disincentives for peers to collaborate, and provides a measure of the ``total cost'' of a network, which is a possible benchmark to distinguish between proposals. We characterize the cost imposed on a node as a function of the experienced load and the node c… ▽ More

    Submitted 13 January, 2004; originally announced January 2004.

    Comments: 17 pages, 4 figures. Short version to be published in the Proceedings of the Third International Workshop on Peer-to-Peer Systems (IPTPS'04). San Diego, CA. February 2004

    Report number: p2pecon TR-2003-12-CC ACM Class: C.2.4