8:00 am–9:00 am |
Monday |
Continental Breakfast
Texas Ballroom Foyer
|
9:00 am–9:10 am |
Monday |
Program Co-Chairs: Amir Houmansadr, University of Massachusetts Amherst, and Prateek Mittal, Princeton University
|
9:10 am–10:30 am |
Monday |
Session Chair: Jed Crandall, University of New Mexico
Matt Blaze, University of Pennsylvania
|
10:30 am–11:00 am |
Monday |
Break with Refreshments
Texas Ballroom Foyer
|
11:00 am–12:30 pm |
Monday |
Session Chair: Phillipa Gill, Stony Brook University
Qurat-Ul-Ann Danyal Akbar, Marcel Flores, and Aleksandar Kuzmanovic, Northwestern University We design DNS-sly, a counter-censorship system which enables a covert channel between a DNS client and server. To achieve covertness and deniability in the upstream direction, DNS-sly applies user personalization, adapting to individual behaviors. In the downstream direction, it utilizes CDN-related DNS responses to embed data, while retaining statistical covertness. We show DNS-sly achieves downstream throughput of up to 600 Bytes of raw hidden data per click on a regular Web page, making it a practical system in the context of a covert Web proxy service. We implement DNS-sly and evaluate it in a known censorship environment, demonstrating its real-world usability.
Iris Safaka, École Polytechnique Fédérale de Lausanne (EPFL); Christina Fragouli, University of California, Los Angeles; Katerina Argyraki, École Polytechnique Fédérale de Lausanne (EPFL) We want to enable a pair of communicating users to exchange secret messages while hiding the fact that secret communication is taking place. We propose a linguistic steganography approach, where each human message is hidden in another human-like message. A hard open question is how to keep the steganographic message small – existing related tools tend to blow up its size, thereby revealing the use of steganography. We encrypt by compressing each message, mapping it to a plausible sequence of words (using a language model), and letting the human user edit the outcome to produce a human-like message; we decrypt with a Viterbi-like state decoder. Our approach aims in producing text that a human can edit and fix with minimal effort. As a first step, we build a prototype of our system that helps users encrypt English messages (into English messages), and we report on first experiments on Mechanical Turk.
Frederick Douglas and Matthew Caesar, University of Illinois at Urbana–Champaign The control of voices within a country is as important to a censor as blocking information from outside. This control must extend to social media. Screening every post prior to publication is not practical; instead, censors find and delete objectionable content after it has been posted. This paper presents GhostPost, a distributed system that conveniently and safely restores deleted posts on any social media platform, with an implementation for Sina Weibo. Our simulations show that even if the censor deletes most posts within two hours (roughly the capability of Sina Weibo’s censor), it cannot prevent a well established GhostPost deployment from preserving a majority of the posts our users would want to see.
|
12:30 pm–2:00 pm |
Monday |
Luncheon for Workshop Attendees
Zilker Ballroom 1
|
2:00 pm–3:00 pm |
Monday |
Session Chair: Joss Wright, University of Oxford
David Fifield and Lynn Tsai, University of California, Berkeley Censors of the Internet must continually discover and block new circumvention proxy servers. We seek to understand this process; specifically, the length of the delay between when a proxy first becomes discoverable and when it is actually blocked. We measure this delay in the case of obfuscated Tor bridges, by testing their reachability before and after their introduction into Tor Browser. We test from sites in the U.S., China, and Iran, over a period of five months. China’s national firewall blocked new bridges after a varying delay of between 2 and 36 days. Blocking occurred only after end-user software releases, despite bridges being potentially discoverable earlier through other channels. While the firewall eventually discovered the bridges of Tor Browser, those that appeared only in Orbot, a version of Tor for mobile devices, remained unblocked. Our findings highlight the fact that censors can behave in ways that defy intuition, presenting difficulties for threat modeling but also opportunities for evasion.
Rachee Singh, Hyungjoon Koo, Najmehalsadat Miramirkhani, Fahimeh Mirhaj, Phillipa Gill, and Leman Akoglu, Stony Brook University The Internet’s importance in promoting free and open communication has led to widespread crackdowns on its use in countries around the world. In this study, we investigate the relationship between national policies around freedom of speech and Internet topology in various countries. We combine techniques from network measurement and machine learning to identify features of Internet structure at the national level that are the best indicators of a country’s level of freedom. We find that IP density and path lengths to other countries are the best indicators of a country’s freedom. We also find that our methods predict the freedom category (Free/Partly Free/Not Free) of a country with 95% accuracy.
|
3:00 pm–3:30 pm |
Monday |
Break with Refreshments
Texas Ballroom Foyer
|
3:30 pm–4:30 pm |
Monday |
Session Chair: Masashi Crete-Nishihata, Citizen Lab, University of Toronto
Rishab Nithyanand, Stony Brook University; Sheharbano Khattak, University of Cambridge; Mobin Javed, University of California, Berkeley; Narseo Vallina-Rodriguez, International Computer Science Institute; Marjan Falahrastegar, Queen Mary University of London; Julia E. Powles, University of Cambridge; Emiliano De Cristofaro, University College London; Hamed Haddadi, Queen Mary University of London; Steven J. Murdoch, University College London Adblocking tools like Adblock Plus continue to rise in popularity, potentially threatening the dynamics of advertising revenue streams. In response, a number of publishers have ramped up efforts to develop and deploy mechanisms for detecting and/or counter-blocking adblockers (which we refer to as anti-adblockers), effectively escalating the online advertising arms race. In this paper, we develop a scalable approach for identifying third-party services shared across multiple websites and use it to provide a first characterization of antiadblocking across the Alexa Top-5K websites. We map websites that perform anti-adblocking as well as the entities that provide anti-adblocking scripts. We study the modus operandi of these scripts and their impact on popular adblockers. We find that at least 6.7% of websites in the Alexa Top-5K use anti-adblocking scripts, acquired from 12 distinct entities – some of which have a direct interest in nourishing the online advertising industry
Jeffrey Knockel, Citizen Lab, University of Toronto and University of New Mexico; Adam Senft and Ronald Deibert, Citizen Lab, University of Toronto In this position paper, we summarize our technical analysis of the security and privacy vulnerabilities in three web browsers developed by China’s three biggest web companies: UC Browser, QQ Browser and Baidu Browser; developed by UCWeb (owned by Alibaba), Tencent and Baidu, respectively. We found them to consistently contain sensitive data leaks and remote code execution vulnerabilities in their update processes. Despite the massive user bases of these browsers, particularly in China, there has been limited attention paid to the applications by the information security research community. This lack of attention is problematic, as it is known that the insecure transmission of personal user data by UC Browser has been used by the intelligence community to perform surveillance. We conclude by evaluating explanations for why this class of apps has such uniform security and privacy issues, and recommend researchers better engage software development companies in developing and newly industrialized economies.
|
4:30 pm–4:45 pm |
Monday |
Mini Break
|
4:45 pm–5:30 pm |
Monday |
Session Chair: Roger Dingledine, Tor Project
|