Skip to main content

Showing 1–7 of 7 results for author: Sorniotti, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.05194  [pdf, other

    cs.RO cs.AI eess.SY

    Modelling, Positioning, and Deep Reinforcement Learning Path Tracking Control of Scaled Robotic Vehicles: Design and Experimental Validation

    Authors: Carmine Caponio, Pietro Stano, Raffaele Carli, Ignazio Olivieri, Daniele Ragone, Aldo Sorniotti, Umberto Montanaro

    Abstract: Mobile robotic systems are becoming increasingly popular. These systems are used in various indoor applications, raging from warehousing and manufacturing to test benches for assessment of advanced control strategies, such as artificial intelligence (AI)-based control solutions, just to name a few. Scaled robotic cars are commonly equipped with a hierarchical control acthiecture that includes task… ▽ More

    Submitted 10 January, 2024; originally announced January 2024.

    Comments: Under review on IEEE Transactions

  2. arXiv:2010.08274  [pdf, other

    cs.CR cs.DC

    Multi-Shard Private Transactions for Permissioned Blockchains

    Authors: Elli Androulaki, Angelo De Caro, Kaoutar Elkhiyaoui, Christian Gorenflo, Alessandro Sorniotti, Marko Vukolic

    Abstract: Traditionally, blockchain systems involve sharing transaction information across all blockchain network participants. Clearly, this introduces barriers to the adoption of the technology by the enterprise world, where preserving the privacy of the business data is a necessity. Previous efforts to bring privacy and blockchains together either still leak partial information, are restricted in their f… ▽ More

    Submitted 16 October, 2020; originally announced October 2020.

  3. arXiv:2003.05503  [pdf, other

    cs.CR

    Bypassing memory safety mechanisms through speculative control flow hijacks

    Authors: Andrea Mambretti, Alexandra Sandulescu, Alessandro Sorniotti, William Robertson, Engin Kirda, Anil Kurmus

    Abstract: The prevalence of memory corruption bugs in the past decades resulted in numerous defenses, such as stack canaries, control flow integrity (CFI), and memory safe languages. These defenses can prevent entire classes of vulnerabilities, and help increase the security posture of a program. In this paper, we show that memory corruption defenses can be bypassed using speculative execution attacks. We s… ▽ More

    Submitted 19 April, 2021; v1 submitted 11 March, 2020; originally announced March 2020.

    Comments: To appear at IEEE EuroS&P 2021 (https://www.ieee-security.org/TC/EuroSP2021/)

  4. SMoTherSpectre: exploiting speculative execution through port contention

    Authors: Atri Bhattacharyya, Alexandra Sandulescu, Matthias Neugschwandtner, Alessandro Sorniotti, Babak Falsafi, Mathias Payer, Anil Kurmus

    Abstract: Spectre, Meltdown, and related attacks have demonstrated that kernels, hypervisors, trusted execution environments, and browsers are prone to information disclosure through micro-architectural weaknesses. However, it remains unclear as to what extent other applications, in particular those that do not load attacker-provided code, may be impacted. It also remains unclear as to what extent these att… ▽ More

    Submitted 26 September, 2019; v1 submitted 5 March, 2019; originally announced March 2019.

  5. arXiv:1808.08406  [pdf, other

    cs.DC

    StreamChain: Rethinking Blockchain for Datacenters

    Authors: Lucas Kuhring, Zsolt István, Alessandro Sorniotti, Marko Vukolić

    Abstract: Permissioned blockchains promise secure decentralized data management in business-to-business use-cases. In contrast to Bitcoin and similar public blockchains which rely on Proof-of-Work for consensus and are deployed on thousands of geo-distributed nodes, business-to-business use-cases (such as supply chain management and banking) require significantly fewer nodes, cheaper consensus, and are ofte… ▽ More

    Submitted 10 February, 2020; v1 submitted 25 August, 2018; originally announced August 2018.

    Comments: 10 pages

  6. arXiv:1805.08541  [pdf, other

    cs.DC cs.CR

    Blockchain and Trusted Computing: Problems, Pitfalls, and a Solution for Hyperledger Fabric

    Authors: Marcus Brandenburger, Christian Cachin, Rüdiger Kapitza, Alessandro Sorniotti

    Abstract: A smart contract on a blockchain cannot keep a secret because its data is replicated on all nodes in a network. To remedy this problem, it has been suggested to combine blockchains with trusted execution environments (TEEs), such as Intel SGX, for executing applications that demand privacy. Untrusted blockchain nodes cannot get access to the data and computations inside the TEE. This paper first… ▽ More

    Submitted 22 May, 2018; originally announced May 2018.

  7. Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains

    Authors: Elli Androulaki, Artem Barger, Vita Bortnikov, Christian Cachin, Konstantinos Christidis, Angelo De Caro, David Enyeart, Christopher Ferris, Gennady Laventman, Yacov Manevich, Srinivasan Muralidharan, Chet Murthy, Binh Nguyen, Manish Sethi, Gari Singh, Keith Smith, Alessandro Sorniotti, Chrysoula Stathakopoulou, Marko Vukolić, Sharon Weed Cocco, Jason Yellick

    Abstract: Fabric is a modular and extensible open-source system for deploying and operating permissioned blockchains and one of the Hyperledger projects hosted by the Linux Foundation (www.hyperledger.org). Fabric is the first truly extensible blockchain system for running distributed applications. It supports modular consensus protocols, which allows the system to be tailored to particular use cases and… ▽ More

    Submitted 17 April, 2018; v1 submitted 30 January, 2018; originally announced January 2018.

    Comments: Appears in proceedings of EuroSys 2018 conference