Skip to main content

Showing 1–27 of 27 results for author: Meiklejohn, S

  1. arXiv:2406.12800  [pdf, other

    cs.CR

    Supporting Human Raters with the Detection of Harmful Content using Large Language Models

    Authors: Kurt Thomas, Patrick Gage Kelley, David Tao, Sarah Meiklejohn, Owen Vallis, Shunwen Tan, Blaž Bratanič, Felipe Tiengo Ferreira, Vijay Kumar Eranti, Elie Bursztein

    Abstract: In this paper, we explore the feasibility of leveraging large language models (LLMs) to automate or otherwise assist human raters with identifying harmful content including hate speech, harassment, violent extremism, and election misinformation. Using a dataset of 50,000 comments, we demonstrate that LLMs can achieve 90% accuracy when compared to human verdicts. We explore how to best leverage the… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

  2. arXiv:2406.12161  [pdf, other

    cs.CY cs.CR cs.HC cs.SI

    Understanding Help-Seeking and Help-Giving on Social Media for Image-Based Sexual Abuse

    Authors: Miranda Wei, Sunny Consolvo, Patrick Gage Kelley, Tadayoshi Kohno, Tara Matthews, Sarah Meiklejohn, Franziska Roesner, Renee Shelby, Kurt Thomas, Rebecca Umbach

    Abstract: Image-based sexual abuse (IBSA), like other forms of technology-facilitated abuse, is a growing threat to people's digital safety. Attacks include unwanted solicitations for sexually explicit images, extorting people under threat of leaking their images, or purposefully leaking images to enact revenge or exert control. In this paper, we explore how people seek and receive help for IBSA on social m… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

    Comments: 18 pages, 4 figures, 8 tables, 103 references

    ACM Class: K.4.2; H.4.3; J.4

    Journal ref: Proceedings of the 33rd USENIX Security Symposium (USENIX Security 2024)

  3. arXiv:2405.09757  [pdf, other

    cs.CR

    Give and Take: An End-To-End Investigation of Giveaway Scam Conversion Rates

    Authors: Enze Liu, George Kappos, Eric Mugnier, Luca Invernizzi, Stefan Savage, David Tao, Kurt Thomas, Geoffrey M. Voelker, Sarah Meiklejohn

    Abstract: Scams -- fraudulent schemes designed to swindle money from victims -- have existed for as long as recorded history. However, the Internet's combination of low communication cost, global reach, and functional anonymity has allowed scam volumes to reach new heights. Designing effective interventions requires first understanding the context: how scammers reach potential victims, the earnings they mak… ▽ More

    Submitted 15 May, 2024; originally announced May 2024.

    Comments: Under review

  4. arXiv:2304.02810  [pdf, other

    cs.CR

    Robust, privacy-preserving, transparent, and auditable on-device blocklisting

    Authors: Kurt Thomas, Sarah Meiklejohn, Michael A. Specter, Xiang Wang, Xavier Llorà, Stephan Somogyi, David Kleidermacher

    Abstract: With the accelerated adoption of end-to-end encryption, there is an opportunity to re-architect security and anti-abuse primitives in a manner that preserves new privacy expectations. In this paper, we consider two novel protocols for on-device blocklisting that allow a client to determine whether an object (e.g., URL, document, image, etc.) is harmful based on threat information possessed by a so… ▽ More

    Submitted 5 April, 2023; originally announced April 2023.

  5. arXiv:2209.08740  [pdf, other

    cs.DC

    Distributed Execution Indexing

    Authors: Christopher S. Meiklejohn, Rohan Padhye, Heather Miller

    Abstract: This work-in-progress report presents both the design and partial evaluation of distributed execution indexing, a technique for microservice applications that precisely identifies dynamic instances of inter-service remote procedure calls (RPCs). Such an indexing scheme is critical for request-level fault injection techniques, which aim to automatically find failure-handling bugs in microservice ap… ▽ More

    Submitted 18 September, 2022; originally announced September 2022.

  6. arXiv:2205.13882  [pdf, other

    cs.CR

    How to Peel a Million: Validating and Expanding Bitcoin Clusters

    Authors: George Kappos, Haaroon Yousaf, Rainer Stütz, Sofia Rollet, Bernhard Haslhofer, Sarah Meiklejohn

    Abstract: One of the defining features of Bitcoin and the thousands of cryptocurrencies that have been derived from it is a globally visible transaction ledger. While Bitcoin uses pseudonyms as a way to hide the identity of its participants, a long line of research has demonstrated that Bitcoin is not anonymous. This has been perhaps best exemplified by the development of clustering heuristics, which have i… ▽ More

    Submitted 27 May, 2022; originally announced May 2022.

  7. arXiv:2203.01661  [pdf, other

    cs.CR

    SoK: SCT Auditing in Certificate Transparency

    Authors: Sarah Meiklejohn, Joe DeBlasio, Devon O'Brien, Chris Thompson, Kevin Yeo, Emily Stark

    Abstract: The Web public key infrastructure is essential to providing secure communication on the Internet today, and certificate authorities play a crucial role in this ecosystem by issuing certificates. These authorities may misissue certificates or suffer misuse attacks, however, which has given rise to the Certificate Transparency (CT) project. The goal of CT is to store all issued certificates in publi… ▽ More

    Submitted 3 March, 2022; originally announced March 2022.

    Comments: PETS 2022, issue 3

  8. arXiv:2105.04380  [pdf, other

    cs.CR

    Forsage: Anatomy of a Smart-Contract Pyramid Scheme

    Authors: Tyler Kell, Haaroon Yousaf, Sarah Allen, Sarah Meiklejohn, Ari Juels

    Abstract: Pyramid schemes are investment scams in which top-level participants in a hierarchical network recruit and profit from an expanding base of defrauded newer participants. Pyramid schemes have existed for over a century, but there have been no in-depth studies of their dynamics and communities because of the opacity of participants' transactions. In this paper, we present an empirical study of For… ▽ More

    Submitted 24 August, 2021; v1 submitted 10 May, 2021; originally announced May 2021.

    Comments: 17 pages, 13 figures

  9. arXiv:2103.00033  [pdf, other

    cs.DC cs.PL eess.SY

    Serverless Workflows with Durable Functions and Netherite

    Authors: Sebastian Burckhardt, Chris Gillum, David Justo, Konstantinos Kallas, Connor McMahon, Christopher S. Meiklejohn

    Abstract: Serverless is an increasingly popular choice for service architects because it can provide elasticity and load-based billing with minimal developer effort. A common and important use case is to compose serverless functions and cloud storage into reliable workflows. However, existing solutions for authoring workflows provide a rudimentary experience compared to writing standard code in a modern pro… ▽ More

    Submitted 26 February, 2021; originally announced March 2021.

    Comments: This paper was written in September 2020, and the content has not been edited after October 10, 2020

  10. arXiv:2102.09041  [pdf, ps, other

    cs.DC

    Reaching Consensus for Asynchronous Distributed Key Generation

    Authors: Ittai Abraham, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern, Alin Tomescu

    Abstract: We give a protocol for Asynchronous Distributed Key Generation (A-DKG) that is optimally resilient (can withstand $f<\frac{n}{3}$ faulty parties), has a constant expected number of rounds, has $\tilde{O}(n^3)$ expected communication complexity, and assumes only the existence of a PKI. Prior to our work, the best A-DKG protocols required $Ω(n)$ expected number of rounds, and $Ω(n^4)$ expected commu… ▽ More

    Submitted 4 June, 2021; v1 submitted 17 February, 2021; originally announced February 2021.

  11. arXiv:2011.04551  [pdf, other

    cs.CR

    Think Global, Act Local: Gossip and Client Audits in Verifiable Data Structures

    Authors: Sarah Meiklejohn, Pavel Kalinnikov, Cindy S. Lin, Martin Hutchinson, Gary Belvin, Mariana Raykova, Al Cutter

    Abstract: In recent years, there has been increasing recognition of the benefits of having services provide auditable logs of data, as demonstrated by the deployment of Certificate Transparency and the development of other transparency projects. Most proposed systems, however, rely on a gossip protocol by which users can be assured that they have the same view of the log, but the few gossip protocols that d… ▽ More

    Submitted 9 November, 2020; originally announced November 2020.

  12. arXiv:2003.12470  [pdf, other

    cs.CR

    An Empirical Analysis of Privacy in the Lightning Network

    Authors: George Kappos, Haaroon Yousaf, Ania Piotrowska, Sanket Kanjalkar, Sergi Delgado-Segura, Andrew Miller, Sarah Meiklejohn

    Abstract: Payment channel networks, and the Lightning Network in particular, seem to offer a solution to the lack of scalability and privacy offered by Bitcoin and other blockchain-based cryptocurrencies. Previous research has focused on the scalability, availability, and crypto-economics of the Lightning Network, but relatively little attention has been paid to exploring the level of privacy it achieves in… ▽ More

    Submitted 21 January, 2021; v1 submitted 27 March, 2020; originally announced March 2020.

    Comments: 26 pages, 5 figures

  13. arXiv:1810.12786  [pdf, other

    cs.CR

    Tracing Transactions Across Cryptocurrency Ledgers

    Authors: Haaroon Yousaf, George Kappos, Sarah Meiklejohn

    Abstract: One of the defining features of a cryptocurrency is that its ledger, containing all transactions that have evertaken place, is globally visible. As one consequenceof this degree of transparency, a long line of recent re-search has demonstrated that even in cryptocurrenciesthat are specifically designed to improve anonymity it is often possible to track money as it changes hands,and in some cases t… ▽ More

    Submitted 17 May, 2019; v1 submitted 30 October, 2018; originally announced October 2018.

    Comments: 14 pages, 13 tables, 6 figures

  14. arXiv:1810.08420  [pdf, other

    cs.CR

    Why is a Ravencoin Like a TokenDesk? An Exploration of Code Diversity in the Cryptocurrency Landscape

    Authors: Pierre Reibel, Haaroon Yousaf, Sarah Meiklejohn

    Abstract: Interest in cryptocurrencies has skyrocketed since their introduction a decade ago, with hundreds of billions of dollars now invested across a landscape of thousands of different cryptocurrencies. While there is significant diversity, there is also a significant number of scams as people seek to exploit the current popularity. In this paper, we seek to identify the extent of innovation in the cryp… ▽ More

    Submitted 19 October, 2018; originally announced October 2018.

    Comments: 19 pages, 7 figures, 3 tables

  15. arXiv:1805.06786  [pdf, other

    cs.CR

    Betting on Blockchain Consensus with Fantomette

    Authors: Sarah Azouvi, Patrick McCorry, Sarah Meiklejohn

    Abstract: Blockchain-based consensus protocols present the opportunity to develop new protocols, due to their novel requirements of open participation and explicit incentivization of participants. To address the first requirement, it is necessary to consider the leader election inherent in consensus protocols, which can be difficult to scale to a large and untrusted set of participants. To address the secon… ▽ More

    Submitted 8 August, 2018; v1 submitted 16 May, 2018; originally announced May 2018.

    Comments: arXiv admin note: text overlap with arXiv:1801.07965

  16. arXiv:1805.04772  [pdf, other

    cs.CR

    VAMS: Verifiable Auditing of Access to Confidential Data

    Authors: Alexander Hicks, Vasilios Mavroudis, Mustafa Al-Bassam, Sarah Meiklejohn, Steven J. Murdoch

    Abstract: We propose VAMS, a system that enables transparency for audits of access to data requests without compromising the privacy of parties in the system. VAMS supports audits on an aggregate level and an individual level, by relying on three mechanisms. A tamper-evident log provides integrity for the log entries that are audited. A tagging scheme allows users to query log entries that relate to them, w… ▽ More

    Submitted 3 May, 2023; v1 submitted 12 May, 2018; originally announced May 2018.

    Comments: Slight update on the original work paper from 2018

  17. arXiv:1805.03180  [pdf, other

    cs.CR

    An Empirical Analysis of Anonymity in Zcash

    Authors: George Kappos, Haaroon Yousaf, Mary Maller, Sarah Meiklejohn

    Abstract: Among the now numerous alternative cryptocurrencies derived from Bitcoin, Zcash is often touted as the one with the strongest anonymity guarantees, due to its basis in well-regarded cryptographic research. In this paper, we examine the extent to which anonymity is achieved in the deployed version of Zcash. We investigate all facets of anonymity in Zcash's transactions, ranging from its transparent… ▽ More

    Submitted 8 May, 2018; originally announced May 2018.

    Comments: 27th USENIX Security Symposium (USENIX Security '18), 15 pages, Zcash

  18. arXiv:1802.07344  [pdf, other

    cs.CR

    Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers

    Authors: Alberto Sonnino, Mustafa Al-Bassam, Shehar Bano, Sarah Meiklejohn, George Danezis

    Abstract: Coconut is a novel selective disclosure credential scheme supporting distributed threshold issuance, public and private attributes, re-randomization, and multiple unlinkable selective attribute revelations. Coconut integrates with blockchains to ensure confidentiality, authenticity and availability even when a subset of credential issuing authorities are malicious or offline. We implement and eval… ▽ More

    Submitted 16 March, 2020; v1 submitted 20 February, 2018; originally announced February 2018.

  19. arXiv:1802.02681  [pdf, ps, other

    cs.DC

    Towards A Systems Approach To Distributed Programming

    Authors: Christopher S. Meiklejohn, Peter Van Roy

    Abstract: It is undeniable that most developers today are building distributed applications. However, most of these applications are developed by composing existing systems together through unspecified APIs exposed to the application developer. Systems are not going away: they solve a particular problem and most applications today need to rely on several of these systems working in concert. Given this, we p… ▽ More

    Submitted 7 February, 2018; originally announced February 2018.

  20. arXiv:1801.07965  [pdf, ps, other

    cs.CR

    Winning the Caucus Race: Continuous Leader Election via Public Randomness

    Authors: Sarah Azouvi, Patrick McCorry, Sarah Meiklejohn

    Abstract: Consensus protocols inherently rely on the notion of leader election, in which one or a subset of participants are temporarily elected to authorize and announce the network's latest state. While leader election is a well studied problem, the rise of distributed ledgers (i.e., blockchains) has led to a new perspective on how to perform large-scale leader elections via solving a computationally diff… ▽ More

    Submitted 4 February, 2018; v1 submitted 24 January, 2018; originally announced January 2018.

  21. arXiv:1712.08427  [pdf, other

    cs.CR

    Contour: A Practical System for Binary Transparency

    Authors: Mustafa Al-Bassam, Sarah Meiklejohn

    Abstract: Transparency is crucial in security-critical applications that rely on authoritative information, as it provides a robust mechanism for holding these authorities accountable for their actions. A number of solutions have emerged in recent years that provide transparency in the setting of certificate issuance, and Bitcoin provides an example of how to enforce transparency in a financial setting. In… ▽ More

    Submitted 7 August, 2018; v1 submitted 22 December, 2017; originally announced December 2017.

    Comments: International Workshop on Cryptocurrencies and Blockchain Technology (CBT), 2018

  22. arXiv:1711.03936  [pdf, ps, other

    cs.CR

    Consensus in the Age of Blockchains

    Authors: Shehar Bano, Alberto Sonnino, Mustafa Al-Bassam, Sarah Azouvi, Patrick McCorry, Sarah Meiklejohn, George Danezis

    Abstract: The blockchain initially gained traction in 2008 as the technology underlying bitcoin, but now has been employed in a diverse range of applications and created a global market worth over $150B as of 2017. What distinguishes blockchains from traditional distributed databases is the ability to operate in a decentralized setting without relying on a trusted third party. As such their core technical c… ▽ More

    Submitted 13 November, 2017; v1 submitted 10 November, 2017; originally announced November 2017.

  23. Practical Evaluation of the Lasp Programming Model at Large Scale - An Experience Report

    Authors: Christopher S. Meiklejohn, Vitor Enes, Junghun Yoo, Carlos Baquero, Peter Van Roy, Annette Bieniusa

    Abstract: Programming models for building large-scale distributed applications assist the developer in reasoning about consistency and distribution. However, many of the programming models for weak consistency, which promise the largest scalability gains, have little in the way of evaluation to demonstrate the promised scalability. We present an experience report on the implementation and large-scale evalua… ▽ More

    Submitted 21 August, 2017; originally announced August 2017.

  24. arXiv:1701.07615  [pdf, other

    cs.DC

    On the Design of Distributed Programming Models

    Authors: Christopher S. Meiklejohn

    Abstract: Programming large-scale distributed applications requires new abstractions and models to be done well. We demonstrate that these models are possible. Following from both the FLP result and CAP theorem, we show that concurrent programming models are necessary, but not sufficient, in the construction of large-scale distributed systems because of the problem of failure and network partitions: langu… ▽ More

    Submitted 1 February, 2017; v1 submitted 26 January, 2017; originally announced January 2017.

  25. arXiv:1609.01068  [pdf, other

    cs.DC

    Dynamic Path Contraction for Distributed, Dynamic Dataflow Languages

    Authors: Borja Arnau de Régil Basáñez, Christopher S. Meiklejohn

    Abstract: We present a work in progress report on applying deforestation to distributed, dynamic dataflow programming models. We propose a novel algorithm, dynamic path contraction, that applies and reverses optimizations to a distributed dataflow application as the program executes. With this algorithm, data and control flow is tracked by the runtime system used to identify potential optimizations as the s… ▽ More

    Submitted 5 September, 2016; originally announced September 2016.

  26. arXiv:1510.08473  [pdf, ps, other

    cs.DC

    A Certain Tendency Of The Database Community

    Authors: Christopher S. Meiklejohn

    Abstract: We posit that striving for distributed systems that provide "single system image" semantics is fundamentally flawed and at odds with how systems operate in the physical world. We realize the database as an optimization of this system: a required, essential optimization in practice that facilitates central data placement and ease of access to participants in a system. We motivate a new model of com… ▽ More

    Submitted 8 March, 2017; v1 submitted 28 October, 2015; originally announced October 2015.

  27. arXiv:1505.06895  [pdf, other

    cs.CR

    Centrally Banked Cryptocurrencies

    Authors: George Danezis, Sarah Meiklejohn

    Abstract: Current cryptocurrencies, starting with Bitcoin, build a decentralized blockchain-based transaction ledger, maintained through proofs-of-work that also generate a monetary supply. Such decentralization has benefits, such as independence from national political control, but also significant limitations in terms of scalability and computational cost. We introduce RSCoin, a cryptocurrency framework i… ▽ More

    Submitted 18 December, 2015; v1 submitted 26 May, 2015; originally announced May 2015.

    Comments: 15 pages, 4 figures, 2 tables in Proceedings of NDSS 2016