Part 3: Reliability and ResilienceInternational audiencePeacock and Cuckoo hashing schemes are currently the most studied hash implementations for hardware network systems (such as NIDS, Firewalls, etc.). In this work we evaluate their vulnerability to sophisticated complexity Denial of Service (DoS) attacks. We show that an attacker can use insertion of carefully selected keys to hit the Peacock and Cuckoo hashing schemes at their weakest points. For the Peacock Hashing, we show that after the attacker fills up only a fraction (typically 5% − 10%) of the buckets, the table completely loses its ability to handle collisions, causing the discard rate (of new keys) to increase dramatically (100 − 1,800 times higher). For the Cuckoo Hashing, we...
In this paper, we provide a polylogarithmic bound that holds with high probability on the insertion ...
Several recent research results describe how to design Distributed Hash Tables (DHTs) that are robus...
We present a new class of low-bandwidth denial of service attacks that exploit algorithmic deficienc...
Abstract—In recent years we have experienced a wave of DDoS attacks threatening the welfare of the i...
Introduced less than twenty years ago, cuckoo hashing has a number of attractive features like a con...
Abstract—The design of computer and communication systems has been based, for decades, on the fundam...
Abstract-In recent years we have experienced a wave of DDoS attacks threatening the welfare of the i...
Cuckoo hashing holds great potential as a high-performance hashing scheme for real appli-cations. Up...
Analysis of AlgorithmsCuckoo hashing is a hash table data structure offering constant access time, e...
International audienceCuckoo hashing is a common hashing technique, guaranteeing constant-time looku...
Denial-of-service (DoS) attacks are a growing concern to networked services like the Internet.\ud \u...
A predictive-hashing based Denial-of-Service (DoS) resistant multicast authentication protocol was p...
The algorithm Argon2i-B of Biryukov, Dinu and Khovratovich is currently being considered by the IRTF...
Hash functions are often used to consistently assign objects to particular resources, for example t...
There are ample opportunities at both design and manufacturing phases to meddle in a many-core chip ...
In this paper, we provide a polylogarithmic bound that holds with high probability on the insertion ...
Several recent research results describe how to design Distributed Hash Tables (DHTs) that are robus...
We present a new class of low-bandwidth denial of service attacks that exploit algorithmic deficienc...
Abstract—In recent years we have experienced a wave of DDoS attacks threatening the welfare of the i...
Introduced less than twenty years ago, cuckoo hashing has a number of attractive features like a con...
Abstract—The design of computer and communication systems has been based, for decades, on the fundam...
Abstract-In recent years we have experienced a wave of DDoS attacks threatening the welfare of the i...
Cuckoo hashing holds great potential as a high-performance hashing scheme for real appli-cations. Up...
Analysis of AlgorithmsCuckoo hashing is a hash table data structure offering constant access time, e...
International audienceCuckoo hashing is a common hashing technique, guaranteeing constant-time looku...
Denial-of-service (DoS) attacks are a growing concern to networked services like the Internet.\ud \u...
A predictive-hashing based Denial-of-Service (DoS) resistant multicast authentication protocol was p...
The algorithm Argon2i-B of Biryukov, Dinu and Khovratovich is currently being considered by the IRTF...
Hash functions are often used to consistently assign objects to particular resources, for example t...
There are ample opportunities at both design and manufacturing phases to meddle in a many-core chip ...
In this paper, we provide a polylogarithmic bound that holds with high probability on the insertion ...
Several recent research results describe how to design Distributed Hash Tables (DHTs) that are robus...
We present a new class of low-bandwidth denial of service attacks that exploit algorithmic deficienc...