Workshop Program

All sessions will be held in Harbor C unless otherwise noted.

The full papers published by USENIX for the workshop are available for download as an archive or individually below. Copyright to the individual works is retained by the author[s].

FOCI '14 Additional Reviewers and Additional Information PDF

Attendee Files 

 

Monday, August 18, 2014

8:30 a.m.–9:00 a.m. Monday

Continental Breakfast

Harbor Foyer

9:00 a.m.–10:30 a.m. Monday

Welcome and Works-in-Progress

Program Co-Chairs: Jed Crandall, University of New Mexico, and Vern Paxson, University of California, Berkeley, and International Computer Science Institute

FOCI '14 will begin with 5-minute work-in-progress talks and accompanying discussion.  We encourage workshop participants to discuss their current work during this session.

10:30 a.m.–11:00 a.m. Monday

Break with Refreshments

Harbor Foyer

11:00 a.m.–12:30 p.m. Monday

Circumvention Technology

Session Chair: Bryan Ford, Yale University

ReClaim: a Privacy-Preserving Decentralized Social Network

Niels Zeilemaker and Johan Pouwelse, Delft University of Technology

The privacy concerns associated with the popularity of online social networks have given rise to numerous research papers which focus on either storing the data in encrypted form, or decentralizing the network. However, without the incentive of being able to read private data, a centralized system cannot be sustained. A decentralized network does not rely on such incentives and can continue to operate based solely on user contributed resources. Unfortunately, current proposals either still rely on centralized components, a pre-existing friend-tofriend network, or incur substantial bandwidth overhead. This renders them useless for actual deployment.

ReClaim employs an existing technique to the PSI problem to build a semantic network wherein peers have connections to friends and friends-of-friends. This is achieved by a handshake which uses homomorphic encryption to privately determine which friends are shared amongst two peers. Afterwards, peers synchronize messages destined for friends, providing them with easy access to replicas. Moreover, storing those messages allows ReClaim to handle excessive churn (peers joining and leaving the network at a high rate), overcome NATfirewalls (by allowing for indirect communication), and allow friends to communicate without being online at the same time.

After describing the design of ReClaim, we implement a proof-of-concept application and show during extensive emulation that peers can connect to more than 60% of their friends within 10 minutes in a network consisting of 4000 peers. Moreover, within 10 minutes, peers using ReClaim can establish an indirect connection to 95% of their friends

Available Media

TRIST: Circumventing Censorship with Transcoding-Resistant Image Steganography

Christopher Connolly, Patrick Lincoln, Ian Mason, and Vinod Yegneswaran, SRI International

We explore the viability of extending state-of-the-art image steganography techniques for bypassing censorship. Our quest for a scalable steganographic technique, which is robust against automated transcoders that reformat images in-flight, led to the implementation of a prototype system called TRIST that embeds data by selectively modifying bits in the frequency domain of the image. By choosing heavily quantized frequency components at low JPEG quality values, we can robustly embed information within images, and demonstrate how this information survives a number of transformations, including transcoding to higher JPEG quality levels and other perturbations, such as image resizing (within bounds).

We evaluate our system by building a prototype of a transcoding-resistant steganography library that we integrate with StegoTorus. Our evaluations demonstrate that StegoTorus integrated with TRIST provides reasonable bandwidth capable of supporting basic web surfing along with transcoding resilience. Finally, we describe how our system can be adapted to counter state-of-theart statistical attacks such as blockiness detectors.

Available Media

Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search

6:45 pm

Ben Jones, Sam Burnett, Nick Feamster, Sean Donovan, Sarthak Grover, Sathya Gunasekaran, and Karim Habak, Georgia Institute of Technology

Censorship circumvention systems that use HTTP as cover traffic make tradeoffs between deniability and performance by offering either deniability at the expense of performance (e.g., Infranet) or performance at the expense of deniability (e.g., StegoTorus). These systems do so because HTTP is typically very asymmetric, with very little capacity to carry covert data in each HTTP GET request; higher throughput channels achieve performance by generating sequences of HTTP GET requests that do not mimic normal user traffic patterns. Fortunately, the emergence of new web services makes it increasingly common for any individual HTTP GET requests to contain more entropy. For example, site-specific search services create GET requests that contain sequences of search terms that can encode more bits than a single deniable HTTP request otherwise would. In this paper, we design a new encoding technique that uses web search terms to encode hidden messages in an upstream channel for censorship circumvention; implement the encoding technique in a system that resists fingerprinting attacks; and compare the security and performance of Facade to existing censorship circumvention systems that use HTTP as cover traffic.

Available Media

12:30 p.m.–2:00 p.m. Monday

Luncheon for Workshop Attendees

Harbor GH

2:00 p.m.–3:30 p.m. Monday

Theory and Policy

Session Chair: Masashi Crete-Nishihata, Citizen Lab

Catching Bandits and Only Bandits: Privacy-Preserving Intersection Warrants for Lawful Surveillance

Aaron Segal, Bryan Ford, and Joan Feigenbaum, Yale University

Motivated in part by the Snowden revelations, we address the question of whether intelligence and lawenforcement agencies can gather actionable, relevant information about unknown electronic targets without conducting dragnet surveillance. We formulate principles that we believe effective, lawful surveillance protocols should adhere to in an era of big data and global communication networks. We then focus on intersection of cell-tower dumps, a specific surveillance operation that the FBI has used effectively. As a case study, we present a system that computes such intersections in a privacy-preserving, accountable fashion. Preliminary experiments indicate that such a system could be efficient and usable, suggesting that privacy and accountability need not be barriers to effective intelligence gathering.

Available Media

Symmetric Disclosure: a Fresh Look at k-anonymity

EJ Infeld, Dartmouth College

We analyze how the sparsity of a typical aggregate social relation impacts the network overhead of online communication systems designed to provide k-anonymity. Once users are grouped in anonymity sets there will likely be few related pairs of users between any two particular sets, and so the sets need to be large in order to provide cover traffic between them. We can reduce the associated overhead by having both parties in a communication specify both the origin and the target sets of the communication. We propose to call this communication primitive “symmetric disclosure.” If in order to retrieve messages a user specifies a group from which he expects to receive them, the negative impact of the sparsity is offset.

Available Media

An Internet with BRICS Characteristics: Data Sovereignty and the Balkanisation of the Internet

Dana Polatin-Reuben and Joss Wright, University of Oxford

Data sovereignty, a catch-all term to describe different state behaviours towards data generated in or passing through national internet infrastructure, has become a topic of significant international debate in the wake of the Snowden revelations. A spectrum of approaches has emerged, with the United States and its allies viewing data 'localisation' as a threat to a free and open global internet and countries such as Russia, China and Brazil advocating for data sovereignty as a way of securing sensitive national data from foreign surveillance. This paper will examine BRICS-country approaches to data sovereignty, both by individual countries and as a group. Past participation by BRICS countries in internet governance forums will be examined, and a requirements analysis will be undertaken of data sovereignty needs. The risks posed by different interpretations of data sovereignty will be reviewed, with an assessment of whether the creation of a virtual 'BRICS bloc' would necessarily amount to full-scale internet Balkanisation.

Available Media

3:30 p.m.–4:00 p.m. Monday

Break with Refreshments

Harbor Foyer

4:00 p.m.–5:30 p.m. Monday

Measurement and Analysis

Session Chair: Phillipa Gill, Stony Brook University

Global Network Interference Detection Over the RIPE Atlas Network

Collin Anderson, University of Pennsylvania; Philipp Winter, Karlstad University; Roya, Independent Researcher

Existing censorship measurement platforms frequently suffer from poor adoption, insufficient geographic coverage, and scalability problems. In order to outline an analytical framework and data collection needs for future ubiquitous measurements initiatives, we build on top of the existent and widely-deployed RIPE Atlas platform. In particular, we propose methods for monitoring the reachability of vital services through an algorithm that balances timeliness, diversity, and cost. We then use Atlas to investigate blocking events in Turkey and Russia. Our measurements identify under-examined forms of interference and provide evidence of cooperation between a well-known blogging platform and government authorities for purposes of blocking hosted content.

Available Media

Towards a Comprehensive Picture of the Great Firewall’s DNS Censorship

Anonymous

China's Great Firewall passively inspects network traffic and disrupts unwanted communication by injecting forged DNS replies or TCP resets. We attempted to comprehensively examine the structure of the DNS injector, using queries from both within and outside China. Using these probes, we were able to localize the DNS monitors' locations, extract the firewall's DNS blacklist of approximately 15,000 keywords, and estimate the cluster structure and active response rate by utilizing an information leakage in the Great Firewall's design.

Available Media

Counting Packets Sent Between Arbitrary Internet Hosts

Jeffrey Knockel and Jedidiah R. Crandall, University of New Mexico

In this paper we demonstrate a side-channel technique to infer whether two machines are exchanging packets on the Internet provided that one of them is a Linux machine. For ICMP and UDP exchanges, we require that at least one machine is a Linux machine, and for TCP connections, we require that at least the server is a Linux machine. Unlike many side-channel measurement techniques, our method does not require that either machine be idle. That is, we make no assumptions about either machines’ traffic patterns with respect to other hosts on the Internet. We have implemented our technique, and we present the results of a proof-of-concept experiment showing that it can effectively measure whether hosts are communicating.

Available Media

Security Audit of Safeplug "Tor in a Box"

9:30 am

Anne Edmundson, Anna Kornfeld Simpson, Joshua A. Kroll, and Edward W. Felten, Princeton University

We present the first public third-party security audit of Pogoplug’s Safeplug device, which markets “complete security and anonymity online” by using Tor technology to protect users’ IP addresses. We examine the hardware, software, and network behavior of the Safeplug device, as well as the user experience in comparison to other forms of web browsing. Although the Safeplug appears to use Tor as advertised, users may still be identified in ways they may not expect. Furthermore, an engineering vulnerability in how the Safeplug accepts settings changes would allow an adversary internal or external to a user’s home network to silently disable Tor or modify other Safeplug settings, which completely invalidates the security claims of the device. Beyond this problem, the user experience challenges of this type of device make it inferior to the existing gold standard for anonymous browsing: the Tor Browser Bundle.

Available Media