“Stopping a Rapid Tornado with a Puff”

From Navigators

(Difference between revisions)
Jump to: navigation, search
 
Line 3: Line 3:
|document=Document for Publication-RaptorQ-SP2014.pdf
|document=Document for Publication-RaptorQ-SP2014.pdf
|title=Stopping a Rapid Tornado with a Puff
|title=Stopping a Rapid Tornado with a Puff
-
|author=José Lopes, Nuno Neves
+
|author=José Lopes, Nuno Ferreira Neves,
|Project=Project:MASSIF, Project:SITAN, Project:SEGRID,
|Project=Project:MASSIF, Project:SITAN, Project:SEGRID,
|ResearchLine=Fault and Intrusion Tolerance in Open Distributed Systems (FIT)
|ResearchLine=Fault and Intrusion Tolerance in Open Distributed Systems (FIT)

Latest revision as of 08:08, 5 June 2016

José Lopes, Nuno Ferreira Neves

in Proceedings of the IEEE Symposium on Security and Privacy (Oakland), San Jose, USA, May 2014.

Abstract: RaptorQ is the most advanced fountain code proposed so far. Its properties make it attractive for forward error correction (FEC), offering high reliability at low overheads (i.e., for a small amount of repair information) and efficient encoding and decoding operations. Since RaptorQ’s emergence, it has already been standardized by the IETF, and there is the expectation that it will be adopted by several other standardization bodies, in areas related to digital media broadcast, cellular networks, and satellite communications. The paper describes a new attack on RaptorQ that breaks the near ideal FEC performance, by carefully choosing which packets are allowed to reach the receiver. Furthermore, the attack was extended to be performed over secure channels with IPsec/ESP. The paper also proposes a few solutions to protect the code from the attack, which could be easily integrated into the implementations.

Download paper

Download Stopping a Rapid Tornado with a Puff

Export citation

BibTeX

Project(s): Project:MASSIF, Project:SITAN, Project:SEGRID

Research line(s): Fault and Intrusion Tolerance in Open Distributed Systems (FIT)

Personal tools
Navigators toolbox