When a host discovers that it has a software vulnerability that is susceptible to an attack, the host needs to obtain and install a patch. Because centralized distribution of patches may not scale well, peer-to-peer (P2P) approaches have recently been suggested. There is, however, a serious privacy problem with peer-assisted patch distribution: when a peer A requests a patch from another peer B, it announces to B its vulnerability, which B can exploit instead of providing the patch. Through analytical modeling and simulation, we show that a large majority of vulnerable hosts will typically become compromised with a basic design for peer-assisted patch distribution. We then study the effectiveness of two different approaches in countering th...
In recent times, the growth in the number of subscribers of peer to peer networks has been phenomena...
Abstract. Freenet is a distributed, Internet-wide peer-to-peer overlay network de-signed to allow an...
The architectures of deployed anonymity systems such as Tor suffer from two key problems that limit ...
P2P networks employ the resources available at peers to reduce the load at, or eliminate the need fo...
Peer-to-peer information sharing environments are increasingly gaining acceptance on the Internet as...
Peer-to-peer information sharing environments are increasingly gaining acceptance on the Internet as...
In an environment where privacy is an increasing concern to users that communicate through a public ...
The necessity for peer-to-peer (p2p) communications is obvious; current centralized solutions are ca...
Peer-to-peer (P2P) applications have seen an enormous success, and recently introduced P2P services ...
Peer-to-peer (P2P) applications have seen an enormous success, and recently introduced P2P services ...
The peer-assisted CDN is a new content distribution paradigm supported by CDNs (e.g., Akamai), which...
Establishing trust in an unknown entity is difficult in malicious environments. In a peer-to-peer sy...
This paper proposes to address new requirements of confidentiality, integrity and availability prope...
Gossiping has been identified as a useful building block for the development of large-scale, decentr...
Publish-subscribe is an increasingly popular messaging pattern for distributed systems, supporting s...
In recent times, the growth in the number of subscribers of peer to peer networks has been phenomena...
Abstract. Freenet is a distributed, Internet-wide peer-to-peer overlay network de-signed to allow an...
The architectures of deployed anonymity systems such as Tor suffer from two key problems that limit ...
P2P networks employ the resources available at peers to reduce the load at, or eliminate the need fo...
Peer-to-peer information sharing environments are increasingly gaining acceptance on the Internet as...
Peer-to-peer information sharing environments are increasingly gaining acceptance on the Internet as...
In an environment where privacy is an increasing concern to users that communicate through a public ...
The necessity for peer-to-peer (p2p) communications is obvious; current centralized solutions are ca...
Peer-to-peer (P2P) applications have seen an enormous success, and recently introduced P2P services ...
Peer-to-peer (P2P) applications have seen an enormous success, and recently introduced P2P services ...
The peer-assisted CDN is a new content distribution paradigm supported by CDNs (e.g., Akamai), which...
Establishing trust in an unknown entity is difficult in malicious environments. In a peer-to-peer sy...
This paper proposes to address new requirements of confidentiality, integrity and availability prope...
Gossiping has been identified as a useful building block for the development of large-scale, decentr...
Publish-subscribe is an increasingly popular messaging pattern for distributed systems, supporting s...
In recent times, the growth in the number of subscribers of peer to peer networks has been phenomena...
Abstract. Freenet is a distributed, Internet-wide peer-to-peer overlay network de-signed to allow an...
The architectures of deployed anonymity systems such as Tor suffer from two key problems that limit ...