Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Eugene Y. Vasserman is active.

Publication


Featured researches published by Eugene Y. Vasserman.


ACM Transactions on Information and System Security | 2010

How much anonymity does network latency leak

Nicholas Hopper; Eugene Y. Vasserman; Eric Chan-Tin

Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by “local” adversaries who control only a few machines and have low enough delay to support anonymous use of network services like Web browsing and remote login. One consequence of these goals is that these services leak some information about the network latency between the sender and one or more nodes in the system. We present two attacks on low-latency anonymity schemes using this information. The first attack allows a pair of colluding Web sites to predict, based on local timing information and with no additional resources, whether two connections from the same Tor exit node are using the same circuit with high confidence. The second attack requires more resources but allows a malicious Web site to gain several bits of information about a client each time he visits the site. We evaluate both attacks against two low-latency anonymity protocols—the Tor network and the MultiProxy proxy aggregator service—and conclude that both are highly vulnerable to these attacks.


computer and communications security | 2009

Membership-concealing overlay networks

Eugene Y. Vasserman; Rob Jansen; James Tyra; Nicholas Hopper; Yongdae Kim

We introduce the concept of membership-concealing overlay networks (MCONs), which hide the real-world identities of participants. We argue that while membership concealment is orthogonal to anonymity and censorship resistance, pseudonymous communication and censorship resistance become much easier if done over a membership-concealing network. We formalize the concept of membership concealment, discuss a number of attacks against existing systems and present real-world attack results. We then propose three proof-of-concept MCON designs that resist those attacks: one that is more efficient, another that is more robust to membership churn, and a third that balances efficiency and robustness. We show theoretical and simulation results demonstrating the feasibility and performance of our schemes.


computer and communications security | 2010

Losing control of the internet: using the data plane to attack the control plane

Max Schuchard; Abedelaziz Mohaisen; Denis Foo Kune; Nicholas Hopper; Yongdae Kim; Eugene Y. Vasserman

In this work, we introduce the Coordinated Cross Plane Session Termination, or CXPST, attack, a distributed denial of service attack that attacks the control plane of the Internet. CXPST extends previous work that demonstrates a vulnerability in routers that allows an adversary to disconnect a pair of routers using only data plane traffic. By carefully choosing BGP sessions to terminate, CXPST generates a surge of BGP updates that are seen by nearly all core routers on the Internet. This surge of updates surpasses the computational capacity of affected routers, crippling their ability to make routing decisions


International Journal of Information Security | 2009

S ilent K nock : practical, provably undetectable authentication

Eugene Y. Vasserman; Nicholas Hopper; James Tyra

Port knocking is a technique to prevent attackers from discovering and exploiting vulnerable network services, while allowing access for authenticated users. Unfortunately, most work in this area suffers from a lack of a clear threat model or motivation. To remedy this, we introduce a formal security model for port knocking, show how previous schemes fail to meet our definition, and give a provably secure scheme. We also present SilentKnock, an implementation of this protocol that is provably secure under the assumption that AES and a modified version of MD4 are pseudorandom functions, and integrates seamlessly with existing applications.


IEEE Transactions on Dependable and Secure Computing | 2013

Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs

Abedelaziz Mohaien; Denis Foo Kune; Eugene Y. Vasserman; Yongdae Kim

Encounter-based social networks and encounter-based systems link users who share a location at the same time, as opposed to the traditional social network paradigm of linking users who have an offline friendship. This new approach presents challenges that are fundamentally different from those tackled by previous social network designs. In this paper, we explore the functional and security requirements for these new systems, such as availability, security, and privacy, and present several design options for building secure encounter-based social networks. To highlight these challenges, we examine one recently proposed encounter-based social network design and compare it to a set of idealized security and functionality requirements. We show that it is vulnerable to several attacks, including impersonation, collusion, and privacy breaching, even though it was designed specifically for security. Mindful of the possible pitfalls, we construct a flexible framework for secure encounter-based social networks, which can be used to construct networks that offer different security, privacy, and availability guarantees. We describe two example constructions derived from this framework, and consider each in terms of the ideal requirements. Some of our new designs fulfill more requirements in terms of system security, reliability, and privacy than previous work. We also evaluate real-world performance of one of our designs by implementing a proof-of-concept iPhone application called MeetUp. Experiments highlight the potential of our system and hint at the deployability of our designs on a large scale.


international conference on distributed computing systems | 2007

Combating Double-Spending Using Cooperative P2P Systems

Ivan Osipkov; Eugene Y. Vasserman; Nicholas Hopper; Yongdae Kim

An electronic cash system allows users to withdraw coins, represented as bit strings, from a bank or broker, and spend those coins anonymously at participating merchants, so that the broker cannot link spent coins to the user who withdraws them. A variety of schemes with various security properties have been proposed for this purpose, but because strings of bits are inherently copyable, they must all deal with the problem of double-spending. In this paper, we present an electronic cash scheme that introduces a new peer-to-peer system architecture to prevent double-spending without requiring an on-line trusted party or tamper-resistant software or hardware. The scheme is easy to implement, computationally efficient, and provably secure. To demonstrate this, we report on a proof-of-concept implementation for Internet vendors along with a detailed complexity analysis and selected security proofs.


technical symposium on computer science education | 2014

Spreading the word: introducing pre-service teachers to programming in the K12 classroom

Scott Bell; Tim Frey; Eugene Y. Vasserman

We present our experiences and outcomes from a programming camp held for sixth through ninth grade students. The instructional team included five pre-service teachers who earned field experience credit for this work, and one in-service teacher. The pre-service teachers were art and music teachers-in-training, providing an opportunity for us to utilize their creative expertise in developing content for the camp. In turn, we helped the teachers explore ways they might incorporate todays user-friendly programming environments (in this case, Scratch) into their curriculum. During each of four week-long sessions, the pre-service teachers gradually took over more teaching responsibilities, modifying and then presenting lessons that incorporate their own music and art expertise into the programming activities. Student pre-camp and post-camp surveys show that self-efficacy towards programming, enjoyment of programming, and interest in continuing to program increased over the course of the week-long sessions. Meanwhile, the teachers-in-training discovered they are capable of incorporating their subject matter into Scratch-based classroom activities, and teaching this material in a classroom setting. This is an encouraging demonstration of a way to introduce programming to the K-12 teaching community without overloading in-service teachers or requiring additional course work for pre-service teachers.


Proceedings of the 2012 ACM workshop on Medical communication systems | 2012

Toward a safe integrated clinical environment: a communication security perspective

Denis Foo Kune; Krishna K. Venkatasubramanian; Eugene Y. Vasserman; Insup Lee; Yongdae Kim

With a vision emerging for dynamically composable and interoperable medical devices and information systems, many communication standards have been proposed, and more are in development. However, few include sufficiently comprehensive or flexible security mechanisms to meet current and future safety needs. In this work, we enumerate security requirements for the communication stack of a medical composition framework. We then survey existing medical and non-medical communication standards and find significant gaps between required properties and those that can be fulfilled even by combinations of currently standardized protocols. This paper is meant to inform future work on building such a comprehensive protocol stack or standardizing protocols and protocol suites that satisfy the properties needed for safe and secure next-generation device coordination.


computer and communications security | 2010

Secure encounter-based social networks: requirements, challenges, and designs

Abedelaziz Mohaisen; Eugene Y. Vasserman; Maxfield Schuchard; Denis Foo Kune; Yongdae Kim

In this paper we outline requirements, challenges, and designs for encounter-based mobile social networks, where relationships are based on a temporarily shared location. To illustrate the challenges we examine a recently proposed design, SMILE, against a set of functional and security requirements. We show that SMILE is vulnerable to several attacks such as impersonation, collusion, and privacy breaching, even though it was built with the explicit goal of resisting some of those attacks. With this in mind, we construct a flexible framework for secure mobile social networks, and describe how to use it in order to construct several networks which offer somewhat different security properties. Each of the designs is then examined against the ideal requirements where some are shown to outperform previous work.


computer and communications security | 2017

Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin

Yujin Kwon; Do Hyun Kim; Yunmok Son; Eugene Y. Vasserman; Yongdae Kim

In the Bitcoin system, participants are rewarded for solving cryptographic puzzles. In order to receive more consistent rewards over time, some participants organize mining pools and split the rewards from the pool in proportion to each participants contribution. However, several attacks threaten the ability to participate in pools. The block withholding (BWH) attack makes the pool reward system unfair by letting malicious participants receive unearned wages while only pretending to contribute work. When two pools launch BWH attacks against each other, they encounter the miners dilemma: in a Nash equilibrium, the revenue of both pools is diminished. In another attack called selfish mining, an attacker can unfairly earn extra rewards by deliberately generating forks. In this paper, we propose a novel attack called a fork after withholding (FAW) attack. FAW is not just another attack. The reward for an FAW attacker is always equal to or greater than that for a BWH attacker, and it is usable up to four times more often per pool than in BWH attack. When considering multiple pools --- the current state of the Bitcoin network -- the extra reward for an FAW attack is about 56% more than that for a BWH attack. Furthermore, when two pools execute FAW attacks on each other, the miners dilemma may not hold: under certain circumstances, the larger pool can consistently win. More importantly, an FAW attack, while using intentional forks, does not suffer from practicality issues, unlike selfish mining. We also discuss partial countermeasures against the FAW attack, but finding a cheap and efficient countermeasure remains an open problem. As a result, we expect to see FAW attacks among mining pools.

Collaboration


Dive into the Eugene Y. Vasserman's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Insup Lee

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Oleg Sokolsky

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar

Hong Liu

Kansas State University

View shared research outputs
Top Co-Authors

Avatar

James Tyra

University of Minnesota

View shared research outputs
Researchain Logo
Decentralizing Knowledge