<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Offtopia &#187; Computer Science</title>
	<atom:link href="http://www.offtopia.net/wp/?cat=4&#038;feed=rss2" rel="self" type="application/rss+xml" />
	<link>http://www.offtopia.net/wp</link>
	<description>nothing personal</description>
	<lastBuildDate>Mon, 01 Oct 2018 13:40:51 +0000</lastBuildDate>
	<generator>http://wordpress.org/?v=2.8.5</generator>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
			<item>
		<title>Social pal-based authentication</title>
		<link>http://www.offtopia.net/wp/?p=290</link>
		<comments>http://www.offtopia.net/wp/?p=290#comments</comments>
		<pubDate>Mon, 12 Jun 2017 05:01:49 +0000</pubDate>
		<dc:creator>dvd</dc:creator>
				<category><![CDATA[Computer Science]]></category>
		<category><![CDATA[Cup of coffee]]></category>

		<guid isPermaLink="false">http://www.offtopia.net/?p=290</guid>
		<description><![CDATA[We can make multi-factor authentication actually work by relying on human&#8217;s unparalleled ability to recognize acquaintances and detect impersonators.
Multi-factor authentication, a mechanism where the user provides two or more loosely coupled evidences of their identity, has become ubiquitous in access management of computer systems. Compared to a single factor authentication, no single piece of information [...]]]></description>
			<content:encoded><![CDATA[<p>We can make multi-factor authentication actually work by relying on human&#8217;s unparalleled ability to recognize acquaintances and detect impersonators.</p>
<p>Multi-factor authentication, a mechanism where the user provides two or more loosely coupled evidences of their identity, has become ubiquitous in access management of computer systems. Compared to a single factor authentication, no single piece of information about the user is sufficient for authentication, and account take-over requires obtaining multiple kinds of information about the user.</p>
<p>However, known multi-factor authentication schemes rely on a single user&#8217;s knowledge, possession, and inherence. Consequently, while breaking multi-factor authentication is harder than breaking single-factor, password or key based, authentication, it still requires access to a single entity only.</p>
<p><span id="more-290"></span></p>
<p>For example, if an additional authentication requires entering a code sent via an SMS to the user&#8217;s phone, stealing or observing the user&#8217;s phone allows unauthorized access. Similarly, the answer to a &#8217;secret question&#8217;, such as mother&#8217;s maiden name, can be obtained by getting access to the user&#8217;s personal file. With traditional multi-factor authentication, gaining unauthorized access to a computer system still depends on attacking and obtaining information about a single user.</p>
<p>A much harder to break would be an authentication scheme in which multiple people were involved in authentication, and in such a way that identity of people involved in authentication of a user&#8217;s access or action is not known in advance. In addition, human beings are notoriously good at identifying their acquaintances &#8212; in person or by phone, so that it is deemed beneficial to use person-to-person authentication in addition to person-to-computer authentication in a multi-factor authentication scheme with higher security.</p>
<p>Here, we propose to use a network of social connections of the user to establish a stronger multi-factor authentication scheme by requiring another person chosen among the user&#8217;s social connections, or <em>pals</em> to confirm the identity of the user and/or the genuineness of the user&#8217;s intent to perform the transaction.</p>
<p>In the following sections, we first describe the pal-based authentication scheme. Then, we analyse and discuss the added security it provides, as well as implementation issues.</p>
<h2 id="algorithm-outline">Algorithm Outline</h2>
<p>Let us consider a user undergoing access authorization to perform a certain transaction, such as payment, adding or updating financial details, money transfer, or access to sensitive information such as the user&#8217;s medical record.</p>
<p>When the user logs into the system, in addition to entering the password the user is presented with a random choice of a small subset (for example, 2 or 3 people) out of the list of their friends/relatives (whom they registered with the system) so that one of them also authorizes the transaction. Then, the following happens:</p>
<ul>
<li>The user chooses one person (the <em>authentication pal</em>) from the presented random subset.</li>
<li>The user contacts the other person asking to authorize the transaction or log-in, by phone, email, or in person.</li>
<li>The system sends the person the authentication link.</li>
</ul>
<p>From this point on, authentication passes if the other person decides to confirm that the user and the user&#8217;s intent to perform transaction are genuine and confirms the original user&#8217;s identity. The original user does not have to disclose details of the transaction to their authentication pal, just to convince the pal that they are who they pretend to be.</p>
<p>This is a powerful second factor because it involves &#8217;social authentication&#8217; &#8212; the other person must become convinced that the user asking to authenticate is indeed their friend/relative and not an impostor. This can be used selectively when a stronger authentication is required, for example when essential information is changed or disclosed, or when a high-volume transaction is performed.</p>
<h3 id="example">Example</h3>
<p>Consider the following example:</p>
<ul>
<li><em>A</em> logs into the system by sending their user id and password.</li>
<li>The system maintains a list of <em>A</em>&#8217;s pals (registered by A and confirmed by each member of the list, just like friendship in Facebook or connections in LinkedIn): <em>K</em>, <em>L</em>, <em>M</em>, <em>N</em>, <em>O</em>, <em>P</em>.</li>
<li>Out of the above list, the system chooses randomly two users: <em>L</em> and <em>N</em> and presents them to <em>A</em>.</li>
<li><em>A</em> chooses <em>N</em> for pal-based authentication.</li>
<li>The system sends the authentication link to <em>N</em> by email (or by other electronic communication means), along with an explanation that <em>N</em> should only authorize the authentication attempt if they are sure that <em>A</em> is genuine and not an impostor.</li>
<li><em>N</em> and <em>A</em> contact each other. Either side may initiate the interaction.</li>
<li>After talking to <em>A</em>, <em>N</em> becomes convinced that <em>A</em>&#8217;s identity is genuine, and follows the authentication link.</li>
<li><em>N</em> authenticates themself to the system (using any authentication scheme, such as single-factor, traditional multi-factor, or pal-based multi-factor authentication depending on risk level and environment) authorizes <em>A</em>&#8217;s identity.</li>
<li><em>A</em> gains access to the system.</li>
</ul>
<h2 id="special-cases">Special cases</h2>
<p>A problem arises with repeated failing attempts to authenticate using pal-based authentication.</p>
<ul>
<li>
<p>If the system presents a different random choice each time, the attacker must only gain access to the email and credentials of a single member of the pals&#8217; list.</p>
</li>
<li>
<p>On the other hand, if the system re-uses the same choice every time, then the attacker will know which other identity to steal in order to overcome pal-based authentication.</p>
</li>
</ul>
<p>Because of this, if pal-based authentication fails because the other party actively refuses to authenticate the use, the user&#8217;s access should be restricted until the user&#8217;s identity is verified using different means. This is not a major issue however if pal-based identification is used selectively, in cases of high risk or high potential loss.</p>
<p>Related to this are different types of rejection during pal-based authentication. The following scenarios are possible:</p>
<ul>
<li>
<p>The user refuses to use pal-based authentication.</p>
</li>
<li>
<p>The user agrees to use pal-based authentication, however the other party chosen by the user is unreachable or does not take an action (neither confirms nor rejects the user&#8217;s identity) &#8212; which is indistinguishable from the point of view of the system.</p>
</li>
<li>
<p>As discussed above, the other party rejects the authentication attempt.</p>
</li>
</ul>
<p>In each of the cases, a fallback authentication and re-validation mechanism must be provided.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.offtopia.net/wp/?feed=rss2&amp;p=290</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>anglican.ml</title>
		<link>http://www.offtopia.net/wp/?p=269</link>
		<comments>http://www.offtopia.net/wp/?p=269#comments</comments>
		<pubDate>Fri, 07 Oct 2016 13:14:30 +0000</pubDate>
		<dc:creator>dvd</dc:creator>
				<category><![CDATA[Computer Science]]></category>
		<category><![CDATA[Machine Learning]]></category>

		<guid isPermaLink="false">http://www.offtopia.net/?p=269</guid>
		<description><![CDATA[http://anglican.ml/, the proper domain for the Anglican way of machine learning.
]]></description>
			<content:encoded><![CDATA[<p><a href="http://anglican.ml/">http://anglican.ml/</a>, the proper domain for the <a href="http://bitbucket.org/probprog/anglican/"><strong>Anglican</strong></a> way of <strong>m</strong>achine <strong>l</strong>earning.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.offtopia.net/wp/?feed=rss2&amp;p=269</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Immanuel Kant and Probability</title>
		<link>http://www.offtopia.net/wp/?p=255</link>
		<comments>http://www.offtopia.net/wp/?p=255#comments</comments>
		<pubDate>Thu, 08 Oct 2015 20:18:21 +0000</pubDate>
		<dc:creator>dvd</dc:creator>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Computer Science]]></category>
		<category><![CDATA[Machine Learning]]></category>
		<category><![CDATA[Philosophy]]></category>
		<category><![CDATA[Probability]]></category>

		<guid isPermaLink="false">http://www.offtopia.net/?p=255</guid>
		<description><![CDATA[ Kant said: there are two a priori intuitions &#x2014; space and time. There are also categories, and &#8220;the number of the categories in each class is always the same, namely, three&#8221;, like unity-plurality-modality, or possibility-existence-necessity. It would be fun to have three a priori intuitions, but only two exist, sigh. Really though?

Kant probably did [...]]]></description>
			<content:encoded><![CDATA[<p> Kant said: there are two <em>a priori</em> intuitions &#x2014; space and time. There are also categories, and &#8220;the number of the categories in each class is always the same, namely, three&#8221;, like unity-plurality-modality, or possibility-existence-necessity. It would be fun to have three <em>a priori</em> intuitions, but only two exist, sigh. Really though?<br />
<span id="more-255"></span><br />
Kant probably did not realize: there is a third one &#x2014; probability, to wit, certainty of our experience. Just like space, probability precedes any experience. Every object is uncertain as much as it is extended. </p>
<p>The three <em>a priori</em> intuitions are related &#x2014; infinite and undirected space, infinite and directed time, finite and undirected probability.  Physics knows of <em>uncertainty principle</em>, we are uncertain about relation of time and space: both time and space cannot be intuited with certainty. Probability is as basic and fundamental as time and space for our cognition. </p>
<p>Just like geometry deals with <em>a priori</em> intuition of space, and mathematical analysis &#x2014; with intuition of time, theory of probability deals with intuition of probability. There is philosophical justification for studying uncertainty, probability, and bayesian inference.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.offtopia.net/wp/?feed=rss2&amp;p=255</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Maximum a Posteriori Estimation by Search in Probabilistic Programs</title>
		<link>http://www.offtopia.net/wp/?p=235</link>
		<comments>http://www.offtopia.net/wp/?p=235#comments</comments>
		<pubDate>Wed, 10 Jun 2015 20:33:25 +0000</pubDate>
		<dc:creator>dvd</dc:creator>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Computer Science]]></category>
		<category><![CDATA[Machine Learning]]></category>

		<guid isPermaLink="false">http://www.offtopia.net/?p=235</guid>
		<description><![CDATA[Paper, slides, and poster as presented at SOCS 2015.
We introduce an approximate search algorithm for fast maximum a posteriori probability estimation in probabilistic programs, which we call Bayesian ascent Monte Carlo (BaMC). Probabilistic programs represent probabilistic models with varying number of mutually dependent finite, countable, and continuous random variables. BaMC is an anytime MAP search [...]]]></description>
			<content:encoded><![CDATA[<p><a href="http://arxiv.org/abs/1504.06848">Paper</a>, <a href="http://offtopia.net/bamc-slides.pdf">slides</a>, and <a href="http://offtopia.net/bamc-poster/">poster</a> as presented at <a href="http://www.ise.bgu.ac.il/socs2015/">SOCS 2015</a>.</p>
<p>We introduce an approximate search algorithm for fast maximum a posteriori probability estimation in probabilistic programs, which we call Bayesian ascent Monte Carlo (BaMC).<span id="more-235"></span> Probabilistic programs represent probabilistic models with varying number of mutually dependent finite, countable, and continuous random variables. BaMC is an anytime MAP search algorithm applicable to any combination of random variables and dependencies. We compare BaMC to other MAP estimation algorithms and show that BaMC is faster and more robust on a range of probabilistic models.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.offtopia.net/wp/?feed=rss2&amp;p=235</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Path Finding under Uncertainty through Probabilistic Inference</title>
		<link>http://www.offtopia.net/wp/?p=225</link>
		<comments>http://www.offtopia.net/wp/?p=225#comments</comments>
		<pubDate>Mon, 08 Jun 2015 07:43:06 +0000</pubDate>
		<dc:creator>dvd</dc:creator>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Computer Science]]></category>
		<category><![CDATA[Machine Learning]]></category>
		<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://www.offtopia.net/?p=225</guid>
		<description><![CDATA[An early workshop paper, superseded by current research but still relevant,  slides, and a poster.
Abstract
We introduce a new approach to solving path-finding problems under uncertainty by representing them as probabilistic models and applying domain-independent inference algorithms to the models.   This approach  separates problem representation from the inference algorithm and provides a [...]]]></description>
			<content:encoded><![CDATA[<p>An early workshop <a href="http://arxiv.org/abs/1502.07314">paper</a>, superseded by current research but still relevant,  <a href="http://offtopia.net/ctp-pp-slides.pdf">slides</a>, and a <a href="http://offtopia.net/ctp-pp-poster/">poster</a>.</p>
<h3>Abstract</h3>
<p>We introduce a new approach to solving path-finding problems under uncertainty by representing them as probabilistic models and applying domain-independent inference algorithms to the models.  <span id="more-225"></span> This approach  separates problem representation from the inference algorithm and provides a framework for efficient learning of path-finding policies. We evaluate the new approach on the Canadian Traveller Problem, which we formulate as a  probabilistic model, and show how probabilistic inference allows efficient stochastic policies to be obtained for this problem.  </p>
]]></content:encoded>
			<wfw:commentRss>http://www.offtopia.net/wp/?feed=rss2&amp;p=225</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Anglican the Probabilistic Programming Concept</title>
		<link>http://www.offtopia.net/wp/?p=210</link>
		<comments>http://www.offtopia.net/wp/?p=210#comments</comments>
		<pubDate>Tue, 05 May 2015 22:44:57 +0000</pubDate>
		<dc:creator>dvd</dc:creator>
				<category><![CDATA[Computer Science]]></category>
		<category><![CDATA[Machine Learning]]></category>

		<guid isPermaLink="false">http://www.offtopia.net/?p=210</guid>
		<description><![CDATA[Anglican is a probabilistic programming language, or better yet, a concept, living in symbiosis with Clojure. Anglican stands for Church of England (because we are here in Oxford). To create your Turing-complete probabilistic models, clone anglican-user and hack away. Or, look at cool examples.
Read more&#8230;
]]></description>
			<content:encoded><![CDATA[<p><a href="https://bitbucket.org/dtolpin/anglican">Anglican</a> is a probabilistic programming language, or better yet, a concept, living in symbiosis with <a href="http://clojure.org" target="_blank">Clojure</a>. Anglican stands for <a href="http://projects.csail.mit.edu/church/wiki/Church" target="_blank">Church</a> of England (because we are here in <a href="http://www.robots.ox.ac.uk/">Oxford</a>). To create your Turing-complete probabilistic models, clone <a href="https://bitbucket.org/dtolpin/angllican-user">anglican-user</a> and <a href="https://bitbucket.org/dtolpin/anglican-user/src/HEAD/doc/intro.md">hack away</a>. Or, look at cool <a href="http://www.robots.ox.ac.uk/~fwood/anglican/examples/index.html" target="_blank">examples</a>.</p>
<p><a href="https://bitbucket.org/dtolpin/anglican-demo-paper/src/HEAD/paper/paper.pdf">Read more&#8230;</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.offtopia.net/wp/?feed=rss2&amp;p=210</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Old Job Talk Slides</title>
		<link>http://www.offtopia.net/wp/?p=208</link>
		<comments>http://www.offtopia.net/wp/?p=208#comments</comments>
		<pubDate>Tue, 05 May 2015 22:27:53 +0000</pubDate>
		<dc:creator>dvd</dc:creator>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Computer Science]]></category>
		<category><![CDATA[slides]]></category>

		<guid isPermaLink="false">http://www.offtopia.net/?p=208</guid>
		<description><![CDATA[Found my own slides from a talk I gave a year ago, about rational meta-reasoning. Do they seem interesting to me because I have degraded during this year?
]]></description>
			<content:encoded><![CDATA[<p>Found <a href="http://www.offtopia.net/job-talk-2014.pdf">my own slides</a> from a talk I gave a year ago, about <em>rational meta-reasoning</em>. Do they seem interesting to me because I have degraded during this year?</p>
]]></content:encoded>
			<wfw:commentRss>http://www.offtopia.net/wp/?feed=rss2&amp;p=208</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Output-Sensitive Adaptive MH for Probabilistic Programs</title>
		<link>http://www.offtopia.net/wp/?p=200</link>
		<comments>http://www.offtopia.net/wp/?p=200#comments</comments>
		<pubDate>Wed, 10 Dec 2014 10:20:18 +0000</pubDate>
		<dc:creator>dvd</dc:creator>
				<category><![CDATA[Machine Learning]]></category>

		<guid isPermaLink="false">http://www.offtopia.net/?p=200</guid>
		<description><![CDATA[We introduce an adaptive output-sensitive inference algorithm for MCMC and probabilistic programming, Adaptive Random
Database. The algorithm is based on a single-site updating Metropolis-Hasting sampler, the Random Database (RDB)
algorithm. Adaptive RDB (ARDB) differs from the original RDB in that the schedule of selecting variables proposed for modification
is adapted based on the output of of the probabilistic program, rather than being fixed and uniform.  We show that ARDB still
converges to the correct distribution. We compare ARDB to RDB on several test problems highlighting different aspects of the adaptation
scheme.]]></description>
			<content:encoded><![CDATA[<p>A <a href="http://www.offtopia.net/nips-pp-ws-2014-ardb-poster/">poster</a>  for the <a href="http://probabilistic-programming.org/wiki/NIPS*2014_Workshop">3rd NIPS Workshop on Probabilistic Programming</a>; also available as <a href="http://www.offtopia.net/nips-pp-ws-2014-ardb-poster/poster.pdf">A0 PDF</a>. <a href="http://www.offtopia.net/almh-slides.pdf">Slides</a> for a 15-minute talk.</a></p>
<h4>Abstract</h4>
<p><span id="more-200"></span></p>
<p>We introduce an adaptive output-sensitive Metropolis-Hastings algorithm for probabilistic models expressed as programs, Adaptive Lightweight Metropolis-Hastings (AdLMH). The algorithm extends Lightweight Metropolis-Hastings (LMH) by adjusting the probabilities of proposing random variables for modification to improve convergence of the program output. We show that AdLMH converges to the correct equilibrium distribution and compare convergence of AdLMH to that of LMH on several test problems to highlight different aspects of the adaptation scheme. We observe consistent improvement in convergence on the test problems.</p>
<p><a href="http://arxiv.org/abs/1501.05677">Full paper.</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.offtopia.net/wp/?feed=rss2&amp;p=200</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Merge-and-Restart Meta-Agent Conflict-Based Searchfor Multi-agent Path Finding</title>
		<link>http://www.offtopia.net/wp/?p=189</link>
		<comments>http://www.offtopia.net/wp/?p=189#comments</comments>
		<pubDate>Wed, 19 Nov 2014 16:48:07 +0000</pubDate>
		<dc:creator>dvd</dc:creator>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Computer Science]]></category>
		<category><![CDATA[Search]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[ma-cbs]]></category>
		<category><![CDATA[mapf]]></category>
		<category><![CDATA[paper]]></category>

		<guid isPermaLink="false">http://www.offtopia.net/?p=189</guid>
		<description><![CDATA[We introduce a new algorithm for multi-agent path finding, derived from the idea of meta-agent conflict-based search (MA-CBS). MA-CBS is a recently proposed algorithm for the multi-agent path finding problem. The algorithm is an extension of Conflict-Based Search (CBS), which automatically merges conflicting agents into meta-agents if the number of conflicts exceeds a certain threshold. [...]]]></description>
			<content:encoded><![CDATA[<p>We introduce a new algorithm for multi-agent path finding, derived from the idea of meta-agent conflict-based search (MA-CBS). <span id="more-189"></span>MA-CBS is a recently proposed algorithm for the multi-agent path finding problem. The algorithm is an extension of Conflict-Based Search (CBS), which automatically merges conflicting agents into meta-agents if the number of conflicts exceeds a certain threshold. However, the decision to merge agents is made according to an empirically chosen fixed threshold on the number of conflicts. The best threshold depends both on the domain and on the number of agents, and the nature of the dependence is not clearly understood.</p>
<p>We suggest a justification for the use of a fixed threshold on the number of conflicts based on the analysis of a model problem. Following the suggested justification, we introduce a new algorithm, which differs in the ways when and how meta-agents are created and handled during search. The new algorithm exhibits considerably better performance compared to the original algorithm. The new algorithm is evaluated on several sets of problems, chosen to highlight different aspects of the algorithm.</p>
<p><a href="http://www.offtopia.net/papers/mr-cbs.pdf"><strong>Full PDF</strong></a></p>
<p><small>This is a short version of <a href="http://arxiv.org/abs/1410.6519">Justifying and Improving MA-CBS</a>.</small></p>
]]></content:encoded>
			<wfw:commentRss>http://www.offtopia.net/wp/?feed=rss2&amp;p=189</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Slides for my Tea Talk</title>
		<link>http://www.offtopia.net/wp/?p=187</link>
		<comments>http://www.offtopia.net/wp/?p=187#comments</comments>
		<pubDate>Wed, 01 Oct 2014 22:55:22 +0000</pubDate>
		<dc:creator>dvd</dc:creator>
				<category><![CDATA[Computer Science]]></category>
		<category><![CDATA[Machine Learning]]></category>

		<guid isPermaLink="false">http://www.offtopia.net/?p=187</guid>
		<description><![CDATA[My Tea Talk slides, on October 1st, 2014.
]]></description>
			<content:encoded><![CDATA[<p>My <a href="http://offtopia.net/60days-of-research.pdf">Tea Talk slides</a>, on October 1st, 2014.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.offtopia.net/wp/?feed=rss2&amp;p=187</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
