Advertisement · 728 × 90

Posts by Siamak Shahandashti

Preview
Why Meta is retreating from encryption In 2019, Mark Zuckerberg called privacy the future of social networking. Not anymore

This is the first time a major platform has rolled back encryption. The justification: few people were opting in to end-to-end encrypted messaging; that's BS; E2EE wasn't set as the default - everyone knows that the default is what most people "choose". #privacy

www.platformer.news/instagram-en...

1 month ago 16 10 1 0
Abstract. The study of memory-hard functions (MHFs) so far has mainly focused on providing provable guarantees on the expected minimum cumulative memory complexity (CMC) required per evaluation when amortized over multiple instances. Such results, however, do not provide any guarantees for the security of compromised password banks in the sense of passwords remaining unrecoverable. Indeed, a construction can be memory-hard while still leaking information about its input. We provide the first formal treatment of the unrecoverability of graph-based data-independent MHFs (iMHFs) in the multi-instance setting. Multi-instance security is the accepted security model when inputs have low-entropy or are correlated, and require the adversarial effort to linearly scale with the number of instances broken.

To prove these results, we appropriately extend the ex-post-facto pebbling technique of Alwen and Serbinenko (STOC’15) and the unguessability reductions of Farshim and Tessaro (EUROCRYPT’21). We then use the resulting compatible frameworks to bound the number of guesses of adversaries with a given CMC in terms of the pebbling complexity of the graph underlying the iMHF. Combined with known lower bounds for the pebbling complexities of their graphs, we obtain, as corollaries, concrete unrecoverability bounds for the Argon2i, Catena, and Balloon hashing, showing in particular that the advantage indeed scales linearly with the number of instances and the cumulative memory complexity of the attacker.

Abstract. The study of memory-hard functions (MHFs) so far has mainly focused on providing provable guarantees on the expected minimum cumulative memory complexity (CMC) required per evaluation when amortized over multiple instances. Such results, however, do not provide any guarantees for the security of compromised password banks in the sense of passwords remaining unrecoverable. Indeed, a construction can be memory-hard while still leaking information about its input. We provide the first formal treatment of the unrecoverability of graph-based data-independent MHFs (iMHFs) in the multi-instance setting. Multi-instance security is the accepted security model when inputs have low-entropy or are correlated, and require the adversarial effort to linearly scale with the number of instances broken. To prove these results, we appropriately extend the ex-post-facto pebbling technique of Alwen and Serbinenko (STOC’15) and the unguessability reductions of Farshim and Tessaro (EUROCRYPT’21). We then use the resulting compatible frameworks to bound the number of guesses of adversaries with a given CMC in terms of the pebbling complexity of the graph underlying the iMHF. Combined with known lower bounds for the pebbling complexities of their graphs, we obtain, as corollaries, concrete unrecoverability bounds for the Argon2i, Catena, and Balloon hashing, showing in particular that the advantage indeed scales linearly with the number of instances and the cumulative memory complexity of the attacker.

Image showing part 2 of abstract.

Image showing part 2 of abstract.

Multi-Instance Unrecoverability of iMHF-Based Password Hashing (Charles Dodd, Pooya Farshim, Siamak F. Shahandashti, Karl Southern) ia.cr/2026/018

3 months ago 1 1 0 0
title of paper

title of paper

abstract of paper

abstract of paper

result diagram showing reduction in mempool size

result diagram showing reduction in mempool size

Looking forward to presenting our work (led by Hina Binte Haq and with Syed Taha Ali) on designing a lightweight memory pool for #Bitcoin at IEEE #ICBC tomorrow, using cuckoo filters in lightweight nodes, reducing mempool size from 300MB to 12MB.

Paper e-print: www-users.york.ac.uk/~sfs521/pape...

10 months ago 1 0 2 0
SOUPS 2025 The Twenty-First Symposium on Usable Privacy and Security (SOUPS 2025), August 10–12, 2025, Seattle, WA, USA.

Today, May 22nd (Anywhere on Earth) is the last day to submit to our Workshops, Lightning Talks, and Posters. We're really excited to showcase all your work this August in Seattle.

www.usenix.org/conference/s...

(If there are any deadline extensions, we will have updates soon!)

11 months ago 0 1 0 0
PoPETs 2026.1

📢Hello fellow researchers! We are now accepting submissions for PETS 2026, Issue 1. Submit your work by May 31, 2025 (AOE) using the link below: submit.petsymposium.org
#PETS2026 #CallForPapers

11 months ago 0 1 0 0

Hina Binte Haq, Syed Taha Ali, Asad Salman, Patrick McCorry, Siamak F. Shahandashti
Carbyne: An Ultra-Lightweight DoS-Resilient Mempool for Bitcoin
https://arxiv.org/abs/2504.16089

11 months ago 1 1 0 0

Hina Binte Haq, Syed Taha Ali, Asad Salman, Patrick McCorry, Siamak F. Shahandashti: Carbyne: An Ultra-Lightweight DoS-Resilient Mempool for Bitcoin https://arxiv.org/abs/2504.16089 https://arxiv.org/pdf/2504.16089 https://arxiv.org/html/2504.16089

11 months ago 1 1 1 0

Ali Cherry, Konstantinos Barmpis, Siamak F. Shahandashti
The Emperor is Now Clothed: A Secure Governance Framework for Web User Authentication through Password Managers
https://arxiv.org/abs/2407.07205

1 year ago 1 1 0 0
Advertisement
Preview
Copilot Recall: Microsoft rolls out AI screenshot tool Recall had been dubbed a

#Microsoft #Recall is a #privacy nightmare. It's a big step closer to Black Mirror. It circumvents encryption. You can have a secure messaging app like Signal, and you can have disappearing messages, but if Microsoft immediately takes screenshots of everything, we might as well not have encryption.

1 year ago 64 36 4 5
Preview
How a bankruptcy judge can stop a genetic privacy disaster Any new owner of 23AndMe’s data will want to find ways to make money from it. Lawmakers have a big opportunity to help keep it safe

"Why should anyone be able to buy the genetic data of millions of Americans in a bankruptcy proceeding? The answer is simple: Lawmakers allow them to." They shouldn't. And judges can stop it. #privacy #23andMe

www.technologyreview.com/2025/03/28/1...

1 year ago 30 14 1 0

10 June: Jean-François Blanchette Talk and Discussion on "Burdens of Proof" in London

martinralbrecht.wordpress.com/2025/04/15/1...

1 year ago 1 3 1 0
Log in to EasyChair for E-Vote-ID 2025

⏳ Only 1 month left to submit to #EvoteID25!
Track 1: Security, Usability & Technical Issues
Track 2: Governance Issues

📩 Submit now: easychair.org/conferences/...
ℹ️ More info: e-vote-id-2025.inria.fr

Don't miss your chance to be part of it! 🗳️
#EVoting #CyberSecurity #Research

1 year ago 2 1 0 0
Slopsquatting As AI coding assistants invent nonexistent software libraries to download and use, enterprising attackers create and upload libraries with those names -- laced with malware, of course.

Slopsquatting

As AI coding assistants invent nonexistent software libraries to download and use, enterprising attackers create and upload libraries with those names -- laced with malware, of course.

1 year ago 10 5 2 2
Preview
X’s dominance ‘over’ as Bluesky becomes new hub for research Data indicates more scholars turning to alternative social media site to post about their work after Elon Musk’s Twitter takeover

'Bluesky has overtaken its flailing rival X in hosting posts related to new academic research, indicating the platform is fast becoming the go-to place for scholars to share their work.'

1 year ago 17516 4406 131 317