SR
S. Roos
Authored
6 records found
Get Me Out of This Payment! Bailout
An HTLC Re-routing Protocol
The Lightning Network provides almost-instant payments to its parties. In addition to direct payments requiring a shared payment channel, parties can pay each other in the form of multi-hop payments via existing channels. Such multi-hop payments rely on a 2-phase commit protocol
...
Extras and Premiums
Local PCN Routing with Redundancy and Fees
Payment channel networks (PCNs) are a promising solution to the blockchain scalability problem. In PCNs, a sender can route a multi-hop payment to a receiver via intermediaries. Yet, Lightning, the only prominent payment channel network, has two major issues when it comes to mult
...
Fabricated Flips
Poisoning Federated Learning without Data
Attacks on Federated Learning (FL) can severely reduce the quality of the generated models and limit the usefulness of this emerging learning paradigm that enables on-premise decentralized learning. However, existing untargeted attacks are not practical for many scenarios as they
...
Maverick Matters
Client Contribution and Selection in Federated Learning
Federated learning (FL) enables collaborative learning between parties, called clients, without sharing the original and potentially sensitive data. To ensure fast convergence in the presence of such heterogeneous clients, it is imperative to timely select clients who can effecti
...
The Merchant
Avoiding Payment Channel Depletion through Incentives
Payment channels networks drastically increase the throughput and hence scalability of blockchains by performing transactions off-chain. Hence, they are a promising substrate for all decentralized applications that require instant payments. In an off-chain payment, parties deposi
...
Generative Adversarial Networks (GANs) are increasingly adopted by the industry to synthesize realistic images using competing generator and discriminator neural networks. Due to data not being centrally available, Multi-Discriminator (MD)-GANs training frameworks employ multiple
...
Contributed
14 records found
Revisit Attacks on Searchable Symmetric Encryption
Explore More, Reveal More
Searchable Symmetric Encryption (SSE) schemes provide secure search over encrypted databases while allowing admitted information leakages. Generally, the leakages can be categorized into access, search, and volume pattern. In most existing Searchable Encryption (SE) schemes, thes
...
Clusus
A cyber range for network attack simulations
This report documents the design and implementation of Clusus, a cyber range to provide students with a safe isolated environment to learn about cyber security and computer networks. This Bachelor project was proposed by the TU Delft cyber security group. During a two week resear
...
Bubblechain
An IoT authentication system
Authentication of domains has been a crucial part of the growth of web browsing, especially for e-commerce and secure browsing. However, the digital space has expanded from web domains to include devices such as smart cars, smart houses, and other IoT devices. The future for thes
...
Periscope
Censorship-Resistant Off-Chain Traffic Tunnelling
There is an everlasting arms race between censoring bodies and those in its grip. When the censor is employing increasingly sophisticated techniques to digitally monitor and restrict those in its scope, equally sophisticated means to circumvent the digital repression come forward
...
Unsatisfiable core learning for Chuffed
Improving the performance of Chuffed, a Lazy-Clause-Generation solver, by using machine learning to predict unsatisfiable cores
Solving propositional satisfiability (SAT) and constraint programming (CP) instances has been a fundamental part of a wide range of modern applications. For this reason a lot of research went into improving the efficiency of modern SAT and CP solvers. Recently much of this resear
...
Grip on Energy
With Blockchain Technology
Switching energy suppliers can be a time consuming process and the manner in which permissions regarding consumer data are stored lacks transparency. To overcome these issues, a solution was proposed in the form of a mandate register. Said register keeps track of which consumer g
...
Privacy-Preserving Verifiable Double Auctions
An application for electricity trading
Double Auctions are mechanisms to trade commodities such as electricity or parts of the wireless spectrum at optimal prices. Bidders and sellers simultaneously submit quantity-price pairs to an auctioneer, denoting the quantity they want to buy or sell at specific prices. The auc
...
Measuring Polkadot
The Impact of Tor and a VPN on Polkadot's Performance and Security
Begun in 2020, Polkadot is one of the largest blockchains in market capitalization and development. However, privacy on the Polkadot network has yet to be one of the key focus points. Especially unlinkability between the user’s IP address and Polkadot address is essential. Withou
...
SSE Is Not As Secure As It Looks
New Attacks On Range Queries Using PQ-Trees And Auxiliary Information
In a world where more data gets uploaded to the cloud, it is essential that the data gets stored securely. For users to keep search functionality, searchable symmetric encryption has been developed. SSE works by a user sending a token representing a keyword (or a range), after wh
...
The impact of reactionary behavior in channel creation games
How actions influence transaction routing in the bitcoin lightning network
Payment channels allow parties to utilize the blockchain to send transactions for a cheaper fee. Previous work has analyzed to which degree a party can profit by facilitating the transaction process. The aim is to increase the usability of the network and to be rewarded for provi
...
MarketPalace
A Sybil-Resistant and Decentralized Marketplace
Fraudulent behavior within online marketplaces is a prominent but unsolved problem. Most marketplace operators try to mitigate this behavior by serving as the central authority. This approach requires user data collection and is not privacy-friendly. In an attempt to build a foun
...
Black-box Adversarial Attacks using Substitute models
Effects of Data Distributions on Sample Transferability
Tor is an anonymity network used by a vast number of users in order to protect their privacy on the internet. It should not come as a surprise that this service is also used for abuse such as Denial of service attacks and other malicious activities because of the anonymity it pro
...