Abstract. Zero-knowledge middleboxes (ZKMBs) are a recent paradigm in which clients get privacy while middleboxes enforce policy: clients prove in zero knowledge that the plaintext underlying their encrypted traffic complies with network policies, such as DNS filtering. However, prior work had impractically poor performance and was limited in functionality. This work presents Zombie, the first system built using the ZKMB paradigm. Zombie introduces techniques that push ZKMBs to the verge of practicality: preprocessing (to move the bulk of proof generation to idle times between requests), asynchrony (to remove proving and verifying costs from the critical path), and batching (to amortize some of the verification work). Zombie’s choices, together with these techniques, reduce client and middlebox overhead by ≈ 3.5×, lowering the critical path overhead for a DNS filtering application on commodity hardware to less than 300ms or, in the asynchronous configuration, to 0. As an additional contribution that is likely of independent interest, Zombie introduces a portfolio of techniques to encode regular expressions in probabilistic (and zeroknowledge) proofs. These techniques significantly improve performance over a standard baseline, asymptotically and concretely. Zombie builds on this portfolio to support policies based on regular expressions, such as data loss prevention.
more »
« less
Don’t Say What You Don’t Know: Improving the Consistency of Abstractive Summarization by Constraining Beam Search
- Award ID(s):
- 2040196
- PAR ID:
- 10377198
- Date Published:
- Journal Name:
- arXiv
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
“Those who can’t do, teach.” This hurtful adage continues to be common, implying that those who are teachers are somehow lesser, not quite as smart, or could not make it in a ‘better’ profession. However, one could argue that this adage – and the damage it wreaks – persists because the general public does not fully understand what teachers do and the expertise involved in teaching well. The question then becomes, how can science educators provide an accurate picture of science education with those outside the field? The assumption being that a better-educated public may be more supportive in a number of spheres. Therefore, the purpose of this roundtable will to be to discuss the unexpected findings from a project that pairs STEM graduate students (GSs) with elementary teacher candidates (TCs) for the purposes of TCs learning content knowledge for lesson planning. These findings include themes of the difficulties involved in planning an effective lesson; the difference between content and teaching expertise; seeing teaching as a well-honed skill; and, finding ways to give back to the field of education. Viewed through the lens of disciplinary stewardship (both on the part of the GSs and TCs), we see these unanticipated findings as something that could perhaps be expanded into more purposeful collaborations in the future and would like to discuss these possibilities further with others in our field. Related to the conference theme of “Why Science Education?” this roundtable presentation intends to engage science educators in considering how to support those outside the field to answer this question as well as the question, “Why Teach Science in Particular Ways?” in a thoughtful manner such that we may cultivate more advocates for high-quality science education within the general public.more » « less
-
If a court knows that a respondent knows the password to a device, can the court compel the respondent to enter that password into the device? In this work, we propose a new approach to the foregone conclusion doctrine from Fisher v. U.S. that governs the answer to this question. The Holy Grail of this line of work would be a framework for reasoning about whether the testimony implicit in any action is already known to the government. In this paper we attempt something narrower. We introduce a framework for specifying actions for which all implicit testimony is, constructively, a foregone conclusion. Our approach is centered around placing the burden of proof on the government to demonstrate that it is not “rely[ing] on the truthtelling” of the respondent. Building on original legal analysis and using precise computer science formalisms, we propose demonstrability as a new central concept for describing compelled acts. We additionally provide a language for whether a compelled action meaningfully entails the respondent to perform in a manner that is “as good as” the government’s desired goal. Then, we apply our definitions to analyze the compellability of several cryptographic primitives including decryption, multifactor authentication, commitment schemes, and hash functions. In particular, our framework reaches a novel conclusion about compelled decryption in the setting that the encryption scheme is deniable: the government can compel but the respondent is free to use any password of her choice.more » « less
-
We explore linguistic features that contribute to sarcasm detection. The linguistic features that we investigate are a combination of text and word complexity, stylistic and psychological features. We experiment with sarcastic tweets with and without context. The results of our experiments indicate that contextual information is crucial for sarcasm prediction. One important observation is that sarcastic tweets are typically incongruent with their context in terms of sentiment or emotional load.more » « less
An official website of the United States government

