all InfoSec news
Defending Hash Tables from Subterfuge with Depth Charge. (arXiv:2308.04305v1 [cs.DC])
Aug. 9, 2023, 1:10 a.m. | Trisha Chakraborty, Jared Saia, Maxwell Young
cs.CR updates on arXiv.org arxiv.org
We consider the problem of defending a hash table against a Byzantine
attacker that is trying to degrade the performance of query, insertion and
deletion operations. Our defense makes use of resource burning (RB) -- the the
verifiable expenditure of network resources -- where the issuer of a request
incurs some RB cost. Our algorithm, Depth Charge, charges RB costs for
operations based on the depth of the appropriate object in the list that the
object hashes to in the …
charge defending defense deletion hash network operations performance problem query request resources tables
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
Social Engineer For Reverse Engineering Exploit Study
@ Independent study | Remote
Information Security Specialist, Sr. (Container Hardening)
@ Rackner | San Antonio, TX
Principal Security Researcher (Advanced Threat Prevention)
@ Palo Alto Networks | Santa Clara, CA, United States
EWT Infosec | IAM Technical Security Consultant - Manager
@ KPMG India | Bengaluru, Karnataka, India
Security Engineering Operations Manager
@ Gusto | San Francisco, CA; Denver, CO; Remote
Network Threat Detection Engineer
@ Meta | Denver, CO | Reston, VA | Menlo Park, CA | Washington, DC