Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Petros Maniatis is active.

Publication


Featured researches published by Petros Maniatis.


international workshop on peer to peer systems | 2002

Peer-to-Peer Caching Schemes to Address Flash Crowds

Tyron Stading; Petros Maniatis; Mary Baker

Flash crowds can cripple a web sites performance. Since they are infrequent and unpredictable, these floods do not justify the cost of traditional commercial solutions. We describe Backslash, a collaborative web mirroring system run by a collective of web sites that wish to protect themselves from flash crowds. Backslash is built on a distributed hash table overlay and uses the structure of the overlay to cache aggressively a resource that experiences an uncharacteristically high request load. By redirecting requests for that resource uniformly to the created caches, Backslash helps alleviate the effects of flash crowds. We explore cache diffusion techniques for use in such a system and find that probabilistic forwarding improves load distribution albeit not dramatically.


Mobile Computing and Communications Review | 1999

The mobile people architecture

Petros Maniatis; Mema Roussopoulos; Edward Swierk; Kevin Lai; Guido Appenzeller; Xinhua Zhao; Mary Baker

People are the outsiders in the current communications revolution. Computer hosts, pagers, and telephones are the addressable entities throughout the Internet and telephony systems. Human beings, however, still need application-specific tricks to be identified, like email addresses, telephone numbers, and ICQ IDs. The key challenge today is to find people and communicate with them personally, as opposed to communicating merely with their possibly inaccessible machines---cell phones that are turned off or PCs on faraway desktops.We introduce the Mobile People Architecture which aims to put the person, rather than the devices that the person uses, at the endpoints of a communication session. We describe a prototype that performs person-level routing; the prototype allows people to receive communication regardless of the network, device, or application they use, while maintaining their privacy.


computer and communications security | 2015

The Performance Cost of Shadow Stacks and Stack Canaries

Thurston H. Y. Dang; Petros Maniatis; David A. Wagner

Control flow defenses against ROP either use strict, expensive, but strong protection against redirected RET instructions with shadow stacks, or much faster but weaker protections without. In this work we study the inherent overheads of shadow stack schemes. We find that the overhead is roughly 10% for a traditional shadow stack. We then design a new scheme, the parallel shadow stack, and show that its performance cost is significantly less: 3.5%. Our measurements suggest it will not be easy to improve performance on current x86 processors further, due to inherent costs associated with RET and memory load/store instructions. We conclude with a discussion of the design decisions in our shadow stack instrumentation, and possible lighter-weight alternatives.


architectural support for programming languages and operating systems | 2012

Path-exploration lifting: hi-fi tests for lo-fi emulators

Lorenzo Martignoni; Stephen McCamant; Pongsin Poosankam; Dawn Song; Petros Maniatis

Processor emulators are widely used to provide isolation and instrumentation of binary software. However they have proved difficult to implement correctly: processor specifications have many corner cases that are not exercised by common workloads. It is untenable to base other system security properties on the correctness of emulators that have received only ad-hoc testing. To obtain emulators that are worthy of the required trust, we propose a technique to explore a high-fidelity emulator with symbolic execution, and then lift those test cases to test a lower-fidelity emulator. The high-fidelity emulator serves as a proxy for the hardware specification, but we can also further validate by running the tests on real hardware. We implement our approach and apply it to generate about 610,000 test cases; for about 95% of the instructions we achieve complete path coverage. The tests reveal thousands of individual differences; we analyze those differences to shed light on a number of root causes, such as atomicity violations and missing security features.


virtual execution environments | 2013

Towards verifiable resource accounting for outsourced computation

Chen Chen; Petros Maniatis; Adrian Perrig; Amit Vasudevan; Vyas Sekar

Outsourced computation services should ideally only charge customers for the resources used by their applications. Unfortunately, no verifiable basis for service providers and customers to reconcile resource accounting exists today. This leads to undesirable outcomes for both providers and consumers-providers cannot prove to customers that they really devoted the resources charged, and customers cannot verify that their invoice maps to their actual usage. As a result, many practical and theoretical attacks exist, aimed at charging customers for resources that their applications did not consume. Moreover, providers cannot charge consumers precisely, which causes them to bear the cost of unaccounted resources or pass these costs inefficiently to their customers.n We introduce ALIBI, a first step toward a vision for verifiable resource accounting. ALIBI places a minimal, trusted reference monitor underneath the service providers software platform. This monitor observes resource allocation to customers guest virtual machines and reports those observations to customers, for verifiable reconciliation. In this paper, we show that ALIBI efficiently and verifiably tracks guests memory use and CPU-cycle consumption.


symposium on operating systems principles | 2017

Prochlo: Strong Privacy for Analytics in the Crowd

Andrea Bittau; Úlfar Erlingsson; Petros Maniatis; Ilya Mironov; Ananth Raghunathan; David Lie; Mitch Rudominer; Ushasree Kode; Julien Tinnes

The large-scale monitoring of computer users software activities has become commonplace, e.g., for application telemetry, error reporting, or demographic profiling. This paper describes a principled systems architecture---Encode, Shuffle, Analyze (ESA)---for performing such monitoring with high utility while also protecting user privacy. The ESA design, and its Prochlo implementation, are informed by our practical experiences with an existing, large deployment of privacy-preserving software monitoring. With ESA, the privacy of monitored users data is guaranteed by its processing in a three-step pipeline. First, the data is encoded to control scope, granularity, and randomness. Second, the encoded data is collected in batches subject to a randomized threshold, and blindly shuffled, to break linkability and to ensure that individual data items get lost in the crowd of the batch. Third, the anonymous, shuffled data is analyzed by a specific analysis engine that further prevents statistical inference attacks on analysis results. ESA extends existing best-practice methods for sensitive-data analytics, by using cryptography and statistical techniques to make explicit how data is elided and reduced in precision, how only common-enough, anonymous data is analyzed, and how this is done for only specific, permitted purposes. As a result, ESA remains compatible with the established workflows of traditional database analysis. Strong privacy guarantees, including differential privacy, can be established at each processing step to defend against malice or compromise at one or more of those steps. Prochlo develops new techniques to harden those steps, including the Stash Shuffle, a novel scalable and efficient oblivious-shuffling algorithm based on Intels SGX, and new applications of cryptographic secret sharing and blinding. We describe ESA and Prochlo, as well as experiments that validate their ability to balance utility and privacy.


arXiv: Cryptography and Security | 2017

Glimmers: Resolving the Privacy/Trust Quagmire

David Lie; Petros Maniatis

Users today enjoy access to a wealth of services that rely on user-contributed data, such as recommendation services, prediction services, and services that help classify and interpret data. The quality of such services inescapably relies on trustworthy contributions from users. However, validating the trustworthiness of contributions may rely on privacy-sensitive contextual data about the user, such as a users location or usage habits, creating a conflict between privacy and trust: users benefit from a higher-quality service that identifies and removes illegitimate user contributions, but, at the same time, they may be reluctant to let the service access their private information to achieve this high quality. We argue that this conflict can be resolved with a pragmatic Glimmer of Trust, which allows services to validate user contributions in a trustworthy way without forfeiting user privacy. We describe how trustworthy hardware such as Intels SGX can be used on the client-side---in contrast to much recent work exploring SGX in cloud services---to realize the Glimmer architecture, and demonstrate how this realization is able to resolve the tension between privacy and trust in a variety of cases.


usenix security symposium | 2002

Secure History Preservation Through Timeline Entanglement

Petros Maniatis; Mary Baker


usenix symposium on internet technologies and systems | 1999

Person-level routing in the mobile people architecture

Mema Roussopoulos; Petros Maniatis; Edward Swierk; Kevin Lai; Guido Appenzeller; Mary Baker


file and storage technologies | 2002

Enabling the archival storage of signed documents

Petros Maniatis; Mary Baker

Collaboration


Dive into the Petros Maniatis's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mema Roussopoulos

National and Kapodistrian University of Athens

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Amit Vasudevan

Association for Computing Machinery

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Thurston H. Y. Dang

Victor Chang Cardiac Research Institute

View shared research outputs
Top Co-Authors

Avatar

David Lie

University of Toronto

View shared research outputs
Top Co-Authors

Avatar

Anupam Datta

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge