Evaluation Stack

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 9297 Experts worldwide ranked by ideXlab platform

Steven J Murdoch - One of the best experts on this subject based on the ideXlab platform.

  • systemization of pluggable transports for censorship resistance
    arXiv: Cryptography and Security, 2014
    Co-Authors: Sheharbano Khattak, Laurent Simon, Steven J Murdoch
    Abstract:

    An increasing number of countries implement Internet censorship at different scales and for a variety of reasons. In particular, the link between the censored client and entry point to the uncensored network is a frequent target of censorship due to the ease with which a nation-state censor can control it. A number of censorship resistance systems have been developed thus far to help circumvent blocking on this link, which we refer to as link circumvention systems (LCs). The variety and profusion of attack vectors available to a censor has led to an arms race, leading to a dramatic speed of evolution of LCs. Despite their inherent complexity and the breadth of work in this area, there is no systematic way to evaluate link circumvention systems and compare them against each other. In this paper, we (i) sketch an attack model to comprehensively explore a censor's capabilities, (ii) present an abstract model of a LC, a system that helps a censored client communicate with a server over the Internet while resisting censorship, (iii) describe an Evaluation Stack that underscores a layered approach to evaluate LCs, and (iv) systemize and evaluate existing censorship resistance systems that provide link circumvention. We highlight open challenges in the Evaluation and development of LCs and discuss possible mitigations.

  • systemization of pluggable transports for censorship resistance
    CoRR abs 14 (2014), 2014
    Co-Authors: Sheharbano Khattak, Laurent Simon, Steven J Murdoch
    Abstract:

    An increasing number of countries implement In- ternet censorship at different levels and for a variety of reasons. The link between the censored client and entry point to the uncensored communication system is a frequent target of cen- sorship due to the ease with which a nation-state censor can control this. The diversity of a censor's attack landscape has led to an arms race, leading to a dramatic speed of evolution of censorship resistance schemes (CRSs) (we note that at least six CRSs have been written in 2014 so far). Despite the inherent complexity of CRSs and the breadth of work in this area, there is no principled way to evaluate individual systems and compare them against each other. In this paper, we (i) sketch an attack model to comprehensively explore a censor's capabilities, (ii) present an abstract model of a Pluggable Transport (PT)-a system that helps a censored client communicate with a server over the Internet while resisting censorship, (iii) describe an Evaluation Stack that presents a layered approach to evaluate PT, and (iv) survey 34 existing PTs and present a detailed Evaluation of 6 of these corresponding to our attack model and Evaluation framework. We highlight the inflexibility of current PTs to lend themselves to feature sharability for broader defense coverage. To address this, we present Tweakable Transports-PTs built out of re-usable compo- nents following the Evaluation Stack architecture with a view to flexibly combine complementary PT features. We also list a set of challenges to guide future work on Tweakable Transports.

Sheharbano Khattak - One of the best experts on this subject based on the ideXlab platform.

  • systemization of pluggable transports for censorship resistance
    arXiv: Cryptography and Security, 2014
    Co-Authors: Sheharbano Khattak, Laurent Simon, Steven J Murdoch
    Abstract:

    An increasing number of countries implement Internet censorship at different scales and for a variety of reasons. In particular, the link between the censored client and entry point to the uncensored network is a frequent target of censorship due to the ease with which a nation-state censor can control it. A number of censorship resistance systems have been developed thus far to help circumvent blocking on this link, which we refer to as link circumvention systems (LCs). The variety and profusion of attack vectors available to a censor has led to an arms race, leading to a dramatic speed of evolution of LCs. Despite their inherent complexity and the breadth of work in this area, there is no systematic way to evaluate link circumvention systems and compare them against each other. In this paper, we (i) sketch an attack model to comprehensively explore a censor's capabilities, (ii) present an abstract model of a LC, a system that helps a censored client communicate with a server over the Internet while resisting censorship, (iii) describe an Evaluation Stack that underscores a layered approach to evaluate LCs, and (iv) systemize and evaluate existing censorship resistance systems that provide link circumvention. We highlight open challenges in the Evaluation and development of LCs and discuss possible mitigations.

  • systemization of pluggable transports for censorship resistance
    CoRR abs 14 (2014), 2014
    Co-Authors: Sheharbano Khattak, Laurent Simon, Steven J Murdoch
    Abstract:

    An increasing number of countries implement In- ternet censorship at different levels and for a variety of reasons. The link between the censored client and entry point to the uncensored communication system is a frequent target of cen- sorship due to the ease with which a nation-state censor can control this. The diversity of a censor's attack landscape has led to an arms race, leading to a dramatic speed of evolution of censorship resistance schemes (CRSs) (we note that at least six CRSs have been written in 2014 so far). Despite the inherent complexity of CRSs and the breadth of work in this area, there is no principled way to evaluate individual systems and compare them against each other. In this paper, we (i) sketch an attack model to comprehensively explore a censor's capabilities, (ii) present an abstract model of a Pluggable Transport (PT)-a system that helps a censored client communicate with a server over the Internet while resisting censorship, (iii) describe an Evaluation Stack that presents a layered approach to evaluate PT, and (iv) survey 34 existing PTs and present a detailed Evaluation of 6 of these corresponding to our attack model and Evaluation framework. We highlight the inflexibility of current PTs to lend themselves to feature sharability for broader defense coverage. To address this, we present Tweakable Transports-PTs built out of re-usable compo- nents following the Evaluation Stack architecture with a view to flexibly combine complementary PT features. We also list a set of challenges to guide future work on Tweakable Transports.

Laurent Simon - One of the best experts on this subject based on the ideXlab platform.

  • systemization of pluggable transports for censorship resistance
    arXiv: Cryptography and Security, 2014
    Co-Authors: Sheharbano Khattak, Laurent Simon, Steven J Murdoch
    Abstract:

    An increasing number of countries implement Internet censorship at different scales and for a variety of reasons. In particular, the link between the censored client and entry point to the uncensored network is a frequent target of censorship due to the ease with which a nation-state censor can control it. A number of censorship resistance systems have been developed thus far to help circumvent blocking on this link, which we refer to as link circumvention systems (LCs). The variety and profusion of attack vectors available to a censor has led to an arms race, leading to a dramatic speed of evolution of LCs. Despite their inherent complexity and the breadth of work in this area, there is no systematic way to evaluate link circumvention systems and compare them against each other. In this paper, we (i) sketch an attack model to comprehensively explore a censor's capabilities, (ii) present an abstract model of a LC, a system that helps a censored client communicate with a server over the Internet while resisting censorship, (iii) describe an Evaluation Stack that underscores a layered approach to evaluate LCs, and (iv) systemize and evaluate existing censorship resistance systems that provide link circumvention. We highlight open challenges in the Evaluation and development of LCs and discuss possible mitigations.

  • systemization of pluggable transports for censorship resistance
    CoRR abs 14 (2014), 2014
    Co-Authors: Sheharbano Khattak, Laurent Simon, Steven J Murdoch
    Abstract:

    An increasing number of countries implement In- ternet censorship at different levels and for a variety of reasons. The link between the censored client and entry point to the uncensored communication system is a frequent target of cen- sorship due to the ease with which a nation-state censor can control this. The diversity of a censor's attack landscape has led to an arms race, leading to a dramatic speed of evolution of censorship resistance schemes (CRSs) (we note that at least six CRSs have been written in 2014 so far). Despite the inherent complexity of CRSs and the breadth of work in this area, there is no principled way to evaluate individual systems and compare them against each other. In this paper, we (i) sketch an attack model to comprehensively explore a censor's capabilities, (ii) present an abstract model of a Pluggable Transport (PT)-a system that helps a censored client communicate with a server over the Internet while resisting censorship, (iii) describe an Evaluation Stack that presents a layered approach to evaluate PT, and (iv) survey 34 existing PTs and present a detailed Evaluation of 6 of these corresponding to our attack model and Evaluation framework. We highlight the inflexibility of current PTs to lend themselves to feature sharability for broader defense coverage. To address this, we present Tweakable Transports-PTs built out of re-usable compo- nents following the Evaluation Stack architecture with a view to flexibly combine complementary PT features. We also list a set of challenges to guide future work on Tweakable Transports.

Nasser Benameur - One of the best experts on this subject based on the ideXlab platform.

  • An MSIL Hardware Evaluation Stack for EPIC
    2015
    Co-Authors: Jamel Tayeb, Smail Niar, Nasser Benameur
    Abstract:

    In this paper, we define a hardware Evaluation Stack for MSIL and we propose a conservative implementation over the EPIC architecture. This new hardware Evaluation Stack, named virtual Stack, is based upon the EPIC architecture’s register files. An additional register renaming logic, to offload the run-time type checking performed by the Common Language Runtime is also proposed. Finally, we introduce a mechanism to overcome the sequential nature of the Evaluation Stack allowing the code generator to better use the parallel instructions execution of instruction bundles. The virtual Stack’s final purpose is to simplify the implementation of fast one-pass JIT compiler

Jamel Tayeb - One of the best experts on this subject based on the ideXlab platform.

  • An MSIL Hardware Evaluation Stack for EPIC
    2015
    Co-Authors: Jamel Tayeb, Smail Niar, Nasser Benameur
    Abstract:

    In this paper, we define a hardware Evaluation Stack for MSIL and we propose a conservative implementation over the EPIC architecture. This new hardware Evaluation Stack, named virtual Stack, is based upon the EPIC architecture’s register files. An additional register renaming logic, to offload the run-time type checking performed by the Common Language Runtime is also proposed. Finally, we introduce a mechanism to overcome the sequential nature of the Evaluation Stack allowing the code generator to better use the parallel instructions execution of instruction bundles. The virtual Stack’s final purpose is to simplify the implementation of fast one-pass JIT compiler