Hang with Your Buddies to Resist Intersection Attacks David Wolinsky, Ewa Syta, Bryan Ford Yale University.

Slides:



Advertisements
Similar presentations
Cipher Techniques to Protect Anonymized Mobility Traces from Privacy Attacks Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip and Nageswara S. V. Rao.
Advertisements

Conscript Your Friends into Larger Anonymity Sets with JavaScript ACM Workshop on Privacy in the Electronic Society 4 November 2013 Henry Corrigan-Gibbs.
Anonymity without Sacrificing Performance Enhanced Nymble System with Distributed Architecture CS 858 Project Presentation Omid Ardakanian * Nam Pham *
Scalable Anonymous Group Communication in the Anytrust Model David Wolinsky 1, Henry Corrigan-Gibbs 1, Bryan Ford 1, and Aaron Johnson 2 1 Yale University,
Dissent in Numbers: Making Strong Anonymity Scale David Wolinsky 1, Henry Corrigan-Gibbs 1, Bryan Ford 1, and Aaron Johnson 2 1 Yale University, 2 US Naval.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
 Cyber Ecosystem & Data Security Subhro Kar CSCE 824, Spring 2013 University of South Carolina, Columbia.
Authors Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman Presented by: Jonathan di Costanzo & Muhammad Atif Qureshi 1.
Usable Privacy and Security Carnegie Mellon University Spring 2006 Cranor/Hong/Reiter 1 Visualizing Privacy II.
Message Splitting Against the Partial Adversary Andrei Serjantov The Free Haven Project (UK) Steven J Murdoch University of Cambridge Computer Laboratory.
Towards efficient traffic-analysis resistant anonymity networks Stevens Le Blond David Choffnes Wenxuan Zhou Peter Druschel Hitesh Ballani Paul Francis.
Reusable Anonymous Return Channels
Identity Federation: Some Challenges and Thoughts OGF 19 Jan 30, 2007 Von Welch
Real-Time Authentication Using Digital Signature Schema Marissa Hollingsworth BOISECRYPT ‘09.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Building a Peer-to-Peer Anonymizing Network Layer Michael J. Freedman NYU Dept of Computer Science Public Design Workshop September 13,
1 Modeling and Analysis of Anonymous-Communication Systems Joan Feigenbaum WITS’08; Princeton NJ; June 18, 2008 Acknowledgement:
Explorations in Anonymous Communication Andrew Bortz with Luis von Ahn Nick Hopper Aladdin Center, Carnegie Mellon University, 8/19/2003.
Parallel Mixing Philippe Golle, PARC Ari Juels, RSA Labs.
The Case for Network-Layer, Peer-to-Peer Anonymization Michael J. Freedman Emil Sit, Josh Cates, Robert Morris MIT Lab for Computer Science IPTPS’02March.
Analysis of Onion Routing Presented in by Jayanthkumar Kannan On 10/8/03.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
WiFi-Reports: Improving Wireless Network Selection Jeffrey Pang (CMU) with Ben Greenstein (IRS) Michael Kaminsky (IRP) Damon McCoy (U. Colorado) Srinivasan.
More on AuthenticationCS-4513 D-term More on Authentication CS-4513 Distributed Computing Systems (Slides include materials from Operating System.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
TEMPLATE DESIGN © Privacy Issues of Vehicular Ad-hoc Networks (VANETs) Hang Dok and Ruben Echevarria Advisor: Dr. Huirong.
Anonymous Communication Luis von Ahn Andrew Bortz Nick Hopper The Aladdin Center Carnegie Mellon University.
The Union-Split Algorithm and Cluster-Based Anonymization of Social Networks Brian Thompson Danfeng Yao Rutgers University Dept. of Computer Science Piscataway,
Anonymity on the Web: A Brief Overview By: Nipun Arora uni-na2271.
Hashing it Out in Public Common Failure Modes of DHT-based Anonymity Schemes Andrew Tran, Nicholas Hopper, Yongdae Kim Presenter: Josh Colvin, Fall 2011.
Toward Prevention of Traffic Analysis Fengfeng Tu 11/26/01.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presentation by Theodore Mao CS294-4: Peer-to-peer Systems August 27, 2003.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
Programming Satan’s Computer
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms David Chaum CACM Vol. 24 No. 2 February 1981 Presented by: Adam Lee 1/24/2006 David.
Anonymous Communication -- a brief survey
Ryan Lackey Dynamic Locations: Secure Mobile Services Discovery and Dynamic Group Membership Ryan Lackey
Protecting Sensitive Labels in Social Network Data Anonymization.
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
Denial-of-Service Flooding Detection in Anonymity Networks Computer Networks & Communications Group Institute for IT-Security and Security Law University.
Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman
CoBrow Collaborative Browsing A Virtual Presence Service RE 1003 RE 4003.
Presented by: Sanketh Beerabbi University of Central Florida.
On the Communication Complexity of SFE with Long Output Daniel Wichs (Northeastern) joint work with Pavel Hubáček.
An Analysis of Parallel Mixing with Attacker-Controlled Inputs Nikita Borisov formerly of UC Berkeley.
Protocols for public-key management. Key management –two problems Distribution of public keys (for public- key cryptography) Distribution of secret keys.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
SybilGuard: Defending Against Sybil Attacks via Social Networks.
A Scalable Virtual Registry Service for jGMA Matthew Grove DSG Seminar 3 rd May 2005.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 19 PHILLIPA GILL - STONY BROOK U.
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
Information Systems in Organizations Managing the business: decision-making Growing the business: knowledge management, R&D, and social business.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
OblivP2P: An Oblivious Peer-to-Peer Content Sharing System
OblivP2P: An Oblivious Peer-to-Peer Content Sharing System
CONTRA Camouflage of Network Traffic to Resist Attack (Intrusion Tolerance Using Masking, Redundancy and Dispersion) DARPA OASIS PI Meeting – Hilton Head.
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
0x1A Great Papers in Computer Security
Anupam Das , Nikita Borisov
Free-route Mixes vs. Cascades
Presentation by Theodore Mao CS294-4: Peer-to-peer Systems
Presentation transcript:

Hang with Your Buddies to Resist Intersection Attacks David Wolinsky, Ewa Syta, Bryan Ford Yale University

Need for Anonymity Nofunistan Meet Tuesday at 7 PM in the park for pizza and beer! Hahaha! Got you! No fun for you!!!

Need for Anonymity Funland Meet Tuesday at 7 PM in the park for pizza and beer! Nofunistan

Need for Anonymity

Hahaha! Got you! No fun for you!!! Funland Meet Tuesday at 7 PM in the park for pizza and beer! Nofunistan

Need for Anonymity They Know What You're Shopping For 'You're looking at the premium package, right?' Companies today are increasingly tying people's real-life identities to their online browsing habits.

Anonymity in Action Funland Meet Tuesday at 7 PM in the park for pizza and beer! Anonymizer You win this time! Nofunistan

Attacks Against Anonymity

The Intersection Attack Meet Tuesday at 7 PM in the park for pizza and beer! Anonymizer X X X X X

The Intersection Attack Meet Tuesday at 7 PM in the park for pizza and beer! Anonymizer X X X X X X X X X X Meet Friday at 7 PM in the park for pizza and beer! U

The Intersection Attack Meet Tuesday at 7 PM in the park for pizza and beer! Anonymizer X X X X X X X X X X Meet Friday at 7 PM in the park for pizza and beer! X X X X X X X Meet Monday at 7 PM in the park for pizza and beer! But I got you this time! = UU

Buddies Overview Buddies Goal: Prevent intersection attacks given a global, active adversary

Buddies Overview Buddies Goal: Prevent intersection attacks given a global, active adversary Insight: Indistinguishable behavior among a k-set of users or “buddies” – a buddy set

Buddies Overview Buddies Goal: Prevent intersection attacks given a global, active adversary Insight: Indistinguishable behavior among a k-set of users or “buddies” – a buddy set Similar concept to k-anonymity Our contributions First design to resist intersection attacks in practical anonymity system Two metrics to measure anonymity: possinymity and indinymity Implemented in Dissent

Organization Motivation The Buddies Insight Buddies Design Buddies in Practice Conclusions

Possinymity Meet Tuesday at 7 PM in the park for pizza and beer! Anonymizer X X X X X X X X X No message, no change in status Message, change in status Too few users, no message No protection from statistical disclosure I’ll get you yet! Possinymity is the set of users who possibly own a pseudonym!

Limitations of Possinymity

Statistical Disclosure Meet Tuesday at 7 PM in the park for pizza and beer! Anonymizer Meet Friday at 7 PM in the park for pizza and beer! Meet Monday at 7 PM in the park for pizza and beer! No message, no change in status Message, change in status Too few users, no message No protection from statistical disclosure One week later…A few moments later… Ahh… I think it’s you!

Example Statistical Disclosure Adversary Not very anonymous Seems anonymous Measured possinymity Effective anonymity

A Greater Challenge Possinymity provides plausible deniability May be sufficient as a legal defense May be insufficient in Nofunistan Conclusion: Anonymity sets alone are not sufficient for buddies Next step: Indistinguishability!

Indinymity Meet Tuesday at 7 PM in the park for pizza and beer! Anonymizer Meet Friday at 7 PM in the park for pizza and beer! Meet Monday at 7 PM in the park for pizza and beer! One member goes offline, others follow – buddy set All buddies in a set must be online for any to post One week later…A few moments later… I have my doubts…

Organization Motivation The Buddies Insight Buddies Design Buddies in Practice Conclusions

Buddies Bird’s Eye View Meet Tuesday at 7 PM in the park for pizza and beer! Anonymizer Meet Friday at 7 PM in the park for pizza and beer! Meet Monday at 7 PM in the park for pizza and beer! Knows online state of all members Implements a global passive adversary Filters online buddies in sets with offline users Policy Oracle

Buddies Design Summary

Putting It Together Anonymizer Registration – Attempt to be Sybil resistant Pseudonyms Linkable communication from a single user Distributed independently

Putting It Together Anonymizer Scheduling – Anonymizer announces which pseudonym(s) will post

Putting It Together Anonymizer Scheduling – Anonymizer announces which pseudonym(s) will post

Putting It Together Anonymizer Users post a ciphertext for each pseudonym Pseudonym Owner posts nothing or a real message Others post cover traffic User ciphertexts Pseudonyms

Putting It Together Policy Oracle Anonymizer User ciphertexts Anonymizer shares online state with Policy Oracle Policy Oracle tells Anonymizer which members’ ciphertext to ignore on a per-pseudonym basis Pseudonyms

Putting It Together Policy Oracle Anonymizer User ciphertexts Anonymizer reveals cleartext from remaining posts Not every scheduled pseudonym posts Owner may be offline, filtered, or have nothing to say Pseudonyms I like fish sticks! All hail Boring Bob! Meet Monday at 7 PM in the park for pizza and beer!

Policy Oracle – Challenges Forming buddy sets Before we start? When a user goes offline After a user has been offline for a while Organizing buddy sets By user sign-on time User historical online / offline time Random Setting buddy set size

Static Buddy Sets Static policies assign buddy sets before first transmission (T0) Unable to adjust to unpredictable nature of users … Time User Ciphertexts Owner T0 T1 T2 Cleartext output Ti

Dynamic Buddy Sets Dynamic policy places all buddies into a single set Makes sets as client behavior changes Able to provide better utility as an owner is more likely to be kept online … Time User Ciphertexts Owner T0 T1 T2 Cleartext output Ti

Organization Motivation The Buddies Insight Buddies Design Buddies in Practice Conclusions

Buddies in Practice Anonymizer – Dissent Scalable Group Anonymous Communication Dissent – Corrigan-Gibbs CCS’10 Scalable Dissent – Wolinsky OSDI’12 Policy Oracle Simulator – Python Extension to Dissent – C++

Experimental Dataset Unreliable users Reliable Users Dataset info: EFnet IRC #football channel 1 Month continuous monitoring 1207 total users, 300 users online most of the time sorted by online time

Buddy set size Maintains decent anonymity Indinymity in Practice

Good anonymity Great anonymity Poor anonymity

Indinymity in Practice Nearly perfect Not so useful Decent

Organization Motivation The Buddies Insight Buddies Design Buddies in Practice Conclusions

Related Work K-Anonymity in Mix-Nets – Hopper ’06 K-Anonymity for cover traffic in Tarzan – Freedman ‘02 K-Anonymity for cover traffic in Aqua – Le Blond ‘13 Anonym-O-Meter in Java Anonymous Proxy (JAP) Buddies provides users control over intersection attacks through availability / anonymity trade-offs

Conclusions Buddies can resist the intersection attack! Two new metrics for measuring anonymity Implemented in Dissent Research into different buddy set policies necessary: A short-term policy for quick, efficient web browsing A long-term policy for short, infrequent posts Optimizing usability and anonymity oppose each other

Thanks, questions? Find out more at

Adversary

Creating Nyms Each user provides a public key Anonymizer re-encrypts keys and publishes User produces re-encrypted private key Anonymizer produces a nym (key-pair), randomly selects a re-encrypted key, encrypts the private key and distributes the key-pair Owner can decrypt and claim, anonymously

The Anonymizer Expectations Resistant traffic analysis and timing attacks Anytrust – protocol runs across a set of servers, a user need only trust that one server is honest without knowing which one Not Tor – not resistant to traffic analysis / timing attacks MIXes – Yes, if users transmit empty messages DC-nets / Dissent – YES!

NofunistanFunland Anonymizer

Anonymity in Action NofunistanFunland Meet Tuesday at 7 PM in the park for pizza and beer! Anonymizer You win this time!