Christos Pappas

ORCID: 0000-0003-0669-021X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Internet Traffic Analysis and Secure E-voting
  • Network Security and Intrusion Detection
  • Software-Defined Networks and 5G
  • Network Traffic and Congestion Control
  • Caching and Content Delivery
  • Access Control and Trust
  • Cryptography and Data Security
  • Network Packet Processing and Optimization
  • Privacy, Security, and Data Protection
  • Advanced Optical Network Technologies
  • Mobile Ad Hoc Networks
  • Satellite Communication Systems
  • Underwater Vehicles and Communication Systems
  • Blockchain Technology Applications and Security
  • Quantum-Dot Cellular Automata
  • Technology Assessment and Management
  • Opportunistic and Delay-Tolerant Networks

ETH Zurich
2015-2019

Union Bank of Switzerland
2019

The first step in making sure that R&D spending is productive to be it going the same direction as overall business strategy. Simple enough say but not always so simple do. Chris Pappas suggests corporate strategy process often focuses on financial factors and market share neglects technology a key resource planned. With competitive success well productivity profitability becoming more directly tied development, time give important place process. Using example of an actual firm, shows...

10.1016/s0737-6782(84)80040-5 article EN Journal of Product Innovation Management 1984-01-01

SDN promises to make networks more flexible, programmable, and easier manage. Inherent security problems in today, however, pose a threat the promised benefits. First, network operator lacks tools proactively ensure that policies will be followed or reactively inspect behavior of network. Second, distributed nature state updates at data plane leads inconsistent during reconfigurations. Third, large flow space makes susceptible exhaustion attacks. This paper presents SDNsec, an extension...

10.1109/icccn.2016.7568569 article EN 2016-08-01

The Internet will undergo a major transformation as satellite-based service providers start to disrupt the market. Constellations of hundreds thousands satellites promise offer low-latency even most remote areas. We anticipate exciting business and research opportunities.

10.1145/3286062.3286066 article EN 2018-11-12

In an ideal Internet, every packet would be attributable to its sender, while host identities and transmitted content remain private. Designing such a network is challenging because source accountability communication privacy are typically viewed as conflicting properties. this paper, we propose architecture that guarantees privacy-preserving by enlisting ISPs agents brokers. While can link originates from their customers, customer identity remains unknown the rest of Internet. our...

10.1145/2999572.2999581 article EN 2016-11-29

We make a case for packet-replay suppression at the network layer, concept that has been generally neglected. Our contribution is twofold. First, we demonstrate new attack, router-reflection can be launched using compromised routers. In this router degrades connectivity of remote Internet region just by replaying packets. The attack feasible even if all packets are attributed to their sources, i.e., source authentication in place, and our evaluation shows threat pervasive---candidate routers...

10.1145/3052973.3052988 article EN Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security 2017-03-31

This paper presents FAIR, a forwarding accountability mechanism that incentivizes ISPs to apply stricter security policies their customers. The Autonomous System (AS) of the receiver specifies traffic profile sender AS must adhere to. Transit ASes on path mark packets. In case violations, marked packets are used as proof misbehavior. FAIR introduces low bandwidth overhead and requires no per-packet per-flow state for forwarding. We describe integration with IP demonstrate software switch...

10.1109/icnp.2015.22 preprint EN 2015-11-01

research-article Share on Transparency Instead of Neutrality Authors: Christos Pappas ETH Zürich ZürichView Profile , Katerina Argyraki EPFL, Switzerland SwitzerlandView Stefan Bechtold Adrian Perrig Authors Info & Claims HotNets-XIV: Proceedings the 14th ACM Workshop Hot Topics in NetworksNovember 2015 Article No.: 22Pages 1–7https://doi.org/10.1145/2834050.2834082Published:16 November 2015Publication History 8citation197DownloadsMetricsTotal Citations8Total Downloads197Last 12 Months19Last...

10.1145/2834050.2834082 article EN 2015-11-09

SDN promises to make networks more flexible, programmable, and easier manage. Inherent security problems in today, however, pose a threat the promised benefits. First, network operator lacks tools proactively ensure that policies will be followed or reactively inspect behavior of network. Second, distributed nature state updates at data plane leads inconsistent during reconfigurations. Third, large flow space makes susceptible exhaustion attacks. This paper presents SDNsec, an extension...

10.48550/arxiv.1605.01944 preprint EN other-oa arXiv (Cornell University) 2016-01-01

The act of communication on the Internet inevitably leaks information. In particular, network headers reveal information (e.g., source address, flow information); yet, protecting header has proven challenging. Past research successfully protected certain fields address), but no proposal attempted to eliminate from so that packets cannot be linked flows; is systematically used subvert privacy. Hence, we investigate following questions: Can design an architecture eliminates flow-packet...

10.1109/icnp.2016.7784450 article EN 2016-11-01

In source-based path selection, the sender chooses to destination from a set of available paths and embeds forwarding information in packets. Future Internet proposals have employed this scheme realize benefits source routing without inherent scalability problems computation at source. Furthermore, address security concerns packet-carried state, these leverage cryptographic primitives (e.g., Message Authentication Codes) per packet data plane. However, implications on performance novel...

10.1145/2775088.2775090 article EN 2015-06-08

Motivated by the weaknesses of today's TLS public-key infrastructure (PKI), recent studies have proposed numerous enhancements to fortify PKI ecosystem. Deploying one particular enhancement is no panacea, since each solves only a subset problems. At same time, high deployment barrier makes benefit-cost ratio tilt in wrong direction, leading disappointing adoption rates for most proposals.

10.1145/3196494.3196520 article EN 2018-05-29

Is it possible to design a packet-sampling algorithm that prevents the network node performs sampling from treating sampled packets preferentially? We study this problem in context of designing "network-transparency'' system. In system, networks emit receipts for small sample they observe, and monitor collects these estimate each network's loss delay performance. Sampling is good building block because enables solution flexible combines low resource cost with quantifiable accuracy. The...

10.1145/3309697.3331485 article EN 2019-06-20

Is it possible to design a packet-sampling algorithm that prevents the network node performs sampling from treating sampled packets preferentially? We study this problem in context of designing "network transparency'' system. In system, networks emit receipts for small sample they observe, and monitor collects these estimate each network's loss delay performance. Sampling is good building block because enables solution flexible combines low resource cost with quantifiable accuracy. The...

10.1145/3322205.3311090 article EN Proceedings of the ACM on Measurement and Analysis of Computing Systems 2019-03-26

Internet users today have few solutions to cover a large space of diverse privacy requirements. We introduce the concept domains, which provide flexibility in expressing users' Then, we propose three services that construct meaningful domains and can be offered by ISPs. Furthermore, illustrate these little overhead for communication sessions they come with low deployment barrier

10.1145/3310165.3310169 article EN ACM SIGCOMM Computer Communication Review 2019-01-28

The lack of transparency for Internet communication prevents effective mitigation today's security threats: i) Source addresses cannot be trusted and enable untraceable reflection attacks. ii) Malicious is opaque to all network entities, except the receiver; although ISPs are control points that can stop such attacks, detection requires information available only at end hosts. We propose TRIS, an architecture bootstraps communication. TRIS enables definition misbehavior according unique...

10.1109/tnet.2019.2937132 article EN IEEE/ACM Transactions on Networking 2019-09-11

Is it possible to design a packet-sampling algorithm that prevents the network node performs sampling from treating sampled packets preferentially? We study this problem in context of designing "network-transparency" system. In system, networks emit receipts for small sample they observe, and monitor collects these estimate each network's loss delay performance. Sampling is good building block because enables solution flexible combines low resource cost with quantifiable accuracy. The...

10.1145/3376930.3376942 article EN ACM SIGMETRICS Performance Evaluation Review 2019-12-17

Future Internet proposals have employed edge-directed routing to realize the benefits of path choice by sources (e.g., end users). However, economic issues hamper adoption ISPs: 1) ISPs' costs increase when choose paths that are not economically optimal for ISPs, and 2) ISPs overprovision their links aggressively since traffic engineering is shifted users congestion more likely occur. We implement a path-based dynamic pricing scheme addresses these challenges. can dynamically adjust prices...

10.1109/apcc.2016.7581427 article EN 2016-08-01
Coming Soon ...