Fighting Sybils in Airdrops

Z Liu, H Zhu - arXiv preprint arXiv:2209.04603, 2022 - arxiv.org
Airdrop is a crucial concept in tokenomics. Startups of decentralized applications (DApps)
reward early supporters by airdropping newly issued tokens up to a certain amount as a free …

Defending Hash Tables from Subterfuge with Depth Charge

T Chakraborty, J Saia, M Young - Proceedings of the 25th International …, 2024 - dl.acm.org
We consider the problem of defending a hash table against a Byzantine attacker that is
trying to degrade the performance of query, insertion and deletion operations. Our defense …

Bankrupting DoS Attackers Despite Uncertainty

T Chakraborty, A Islam, V King, D Rayborn… - arXiv preprint arXiv …, 2022 - arxiv.org
On-demand provisioning in the cloud allows for services to remain available despite
massive denial-of-service (DoS) attacks. Unfortunately, on-demand provisioning is …

Defending hash tables from algorithmic complexity attacks with resource burning

T Chakraborty, J Saia, M Young - Theoretical Computer Science, 2024 - Elsevier
We consider the problem of defending a hash table against a Byzantine attacker that is
trying to degrade the performance of query, insertion and deletion operations. Our defense …

Plateau: a secure and scalable overlay network for large distributed trust applications

J Augustine, WG Bhat, S Nair - … on Stabilizing, Safety, and Security of …, 2022 - Springer
We propose a novel two-tiered overlay network design called plateau. It has two levels: a
small upper-level that regulates entry of new nodes into the network, and a lower-level …

Resource sharing in secure distributed systems

T Chakraborty - 2024 - scholarsjunction.msstate.edu
Allocating resources in computer systems is a significant challenge due to constraints on
resources, coordinating access to those resources, and tolerating malicious behavior. This …