Workshop Program

All sessions will be held in the Texas Ballroom 5-7 unless otherwise noted.

The workshop papers are available for download below. Copyright to the individual works is retained by the author[s].

Downloads for Registered Attendees

Attendee Files 
FOCI '16 Paper Archive (ZIP)
FOCI '16 Attendee List (PDF)

 

Monday, August 8, 2016

8:00 am–9:00 am Monday

Continental Breakfast

Texas Ballroom Foyer

9:00 am–9:10 am Monday

Opening Remarks

Program Co-Chairs: Amir Houmansadr, University of Massachusetts Amherst, and Prateek Mittal, Princeton University

9:10 am–10:30 am Monday

Keynote Address

Session Chair: Jed Crandall, University of New Mexico

10:30 am–11:00 am Monday

Break with Refreshments

Texas Ballroom Foyer

11:00 am–12:30 pm Monday

Designing Circumvention Systems

Session Chair: Phillipa Gill, Stony Brook University

DNS-sly: Avoiding Censorship through Network Complexity

Qurat-Ul-Ann Danyal Akbar, Marcel Flores, and Aleksandar Kuzmanovic, Northwestern University

We design DNS-sly, a counter-censorship system which enables a covert channel between a DNS client and server. To achieve covertness and deniability in the upstream direction, DNS-sly applies user personalization, adapting to individual behaviors. In the downstream direction, it utilizes CDN-related DNS responses to embed data, while retaining statistical covertness. We show DNS-sly achieves downstream throughput of up to 600 Bytes of raw hidden data per click on a regular Web page, making it a practical system in the context of a covert Web proxy service. We implement DNS-sly and evaluate it in a known censorship environment, demonstrating its real-world usability.

Available Media

Matryoshka: Hiding Secret Communication in Plain Sight

Iris Safaka, École Polytechnique Fédérale de Lausanne (EPFL); Christina Fragouli, University of California, Los Angeles; Katerina Argyraki, École Polytechnique Fédérale de Lausanne (EPFL)

We want to enable a pair of communicating users to exchange secret messages while hiding the fact that secret communication is taking place. We propose a linguistic steganography approach, where each human message is hidden in another human-like message. A hard open question is how to keep the steganographic message small – existing related tools tend to blow up its size, thereby revealing the use of steganography. We encrypt by compressing each message, mapping it to a plausible sequence of words (using a language model), and letting the human user edit the outcome to produce a human-like message; we decrypt with a Viterbi-like state decoder. Our approach aims in producing text that a human can edit and fix with minimal effort. As a first step, we build a prototype of our system that helps users encrypt English messages (into English messages), and we report on first experiments on Mechanical Turk.

Available Media

GhostPost: Seamless Restoration of Censored Social Media Posts

Frederick Douglas and Matthew Caesar, University of Illinois at Urbana–Champaign

The control of voices within a country is as important to a censor as blocking information from outside. This control must extend to social media. Screening every post prior to publication is not practical; instead, censors find and delete objectionable content after it has been posted. This paper presents GhostPost, a distributed system that conveniently and safely restores deleted posts on any social media platform, with an implementation for Sina Weibo. Our simulations show that even if the censor deletes most posts within two hours (roughly the capability of Sina Weibo’s censor), it cannot prevent a well established GhostPost deployment from preserving a majority of the posts our users would want to see.

Available Media
12:30 pm–2:00 pm Monday

Luncheon for Workshop Attendees

Zilker Ballroom 1

2:00 pm–3:00 pm Monday

Measuring Network Censorship

Session Chair: Joss Wright, University of Oxford

Censors’ Delay in Blocking Circumvention Proxies

David Fifield and Lynn Tsai, University of California, Berkeley

Censors of the Internet must continually discover and block new circumvention proxy servers. We seek to understand this process; specifically, the length of the delay between when a proxy first becomes discoverable and when it is actually blocked. We measure this delay in the case of obfuscated Tor bridges, by testing their reachability before and after their introduction into Tor Browser. We test from sites in the U.S., China, and Iran, over a period of five months. China’s national firewall blocked new bridges after a varying delay of between 2 and 36 days. Blocking occurred only after end-user software releases, despite bridges being potentially discoverable earlier through other channels. While the firewall eventually discovered the bridges of Tor Browser, those that appeared only in Orbot, a version of Tor for mobile devices, remained unblocked. Our findings highlight the fact that censors can behave in ways that defy intuition, presenting difficulties for threat modeling but also opportunities for evasion.

Available Media

The Politics of Routing: Investigating the Relationship between AS Connectivity and Internet Freedom

Rachee Singh, Hyungjoon Koo, Najmehalsadat Miramirkhani, Fahimeh Mirhaj, Phillipa Gill, and Leman Akoglu, Stony Brook University

The Internet’s importance in promoting free and open communication has led to widespread crackdowns on its use in countries around the world. In this study, we investigate the relationship between national policies around freedom of speech and Internet topology in various countries. We combine techniques from network measurement and machine learning to identify features of Internet structure at the national level that are the best indicators of a country’s level of freedom. We find that IP density and path lengths to other countries are the best indicators of a country’s freedom. We also find that our methods predict the freedom category (Free/Partly Free/Not Free) of a country with 95% accuracy.

Available Media
3:00 pm–3:30 pm Monday

Break with Refreshments

Texas Ballroom Foyer

3:30 pm–4:30 pm Monday

Assessing Deployed Technologies

Session Chair: Masashi Crete-Nishihata, Citizen Lab, University of Toronto

Adblocking and Counter Blocking: A Slice of the Arms Race

Rishab Nithyanand, Stony Brook University; Sheharbano Khattak, University of Cambridge; Mobin Javed, University of California, Berkeley; Narseo Vallina-Rodriguez, International Computer Science Institute; Marjan Falahrastegar, Queen Mary University of London; Julia E. Powles, University of Cambridge; Emiliano De Cristofaro, University College London; Hamed Haddadi, Queen Mary University of London; Steven J. Murdoch, University College London

Adblocking tools like Adblock Plus continue to rise in popularity, potentially threatening the dynamics of advertising revenue streams. In response, a number of publishers have ramped up efforts to develop and deploy mechanisms for detecting and/or counter-blocking adblockers (which we refer to as anti-adblockers), effectively escalating the online advertising arms race. In this paper, we develop a scalable approach for identifying third-party services shared across multiple websites and use it to provide a first characterization of antiadblocking across the Alexa Top-5K websites. We map websites that perform anti-adblocking as well as the entities that provide anti-adblocking scripts. We study the modus operandi of these scripts and their impact on popular adblockers. We find that at least 6.7% of websites in the Alexa Top-5K use anti-adblocking scripts, acquired from 12 distinct entities – some of which have a direct interest in nourishing the online advertising industry

Available Media

Privacy and Security Issues in BAT Web Browsers

Jeffrey Knockel, Citizen Lab, University of Toronto and University of New Mexico; Adam Senft and Ronald Deibert, Citizen Lab, University of Toronto

In this position paper, we summarize our technical analysis of the security and privacy vulnerabilities in three web browsers developed by China’s three biggest web companies: UC Browser, QQ Browser and Baidu Browser; developed by UCWeb (owned by Alibaba), Tencent and Baidu, respectively. We found them to consistently contain sensitive data leaks and remote code execution vulnerabilities in their update processes. Despite the massive user bases of these browsers, particularly in China, there has been limited attention paid to the applications by the information security research community. This lack of attention is problematic, as it is known that the insecure transmission of personal user data by UC Browser has been used by the intelligence community to perform surveillance. We conclude by evaluating explanations for why this class of apps has such uniform security and privacy issues, and recommend researchers better engage software development companies in developing and newly industrialized economies.

Available Media
4:30 pm–4:45 pm Monday

Mini Break

4:45 pm–5:30 pm Monday

Rump Session and Closing Remarks

Session Chair: Roger Dingledine, Tor Project