Devices That Tell On You: Privacy Trends in Consumer Ubiquitous Computing T. Scott Saponas Jonathan Lester Carl Hartung Sameer Agarwal Tadayoshi Kohno.

Slides:



Advertisements
Similar presentations
Devices That Tell On You: Privacy Trends in Consumer Ubiquitous Computing :
Advertisements

-Priyanka, Madhurima. IDEA of WIRELESS LEASH Your devices go…. Wherever you go!!
Expressive Privacy Control with Pseudonyms Seungyeop Han, Vincent Liu, Qifan Pu, Simon Peter, Thomas Anderson, Arvind Krishnamurthy, David Wetherall University.
Kien A. Hua Division of Computer Science University of Central Florida.
1 “Did you see Bob?”: Human Localization using Mobile Phones Ionut Constandache Co-authors: Xuan Bao, Martin Azizyan, and Romit Roy Choudhury Modified.
Beach Park Schools Beach Park, Illinois Introduces.
Daniel E. Holcomb, Wayne P. Burleson and Kevin Fu
FINGER PRINTING BASED AUDIO RETRIEVAL Query by example Content retrieval Srinija Vallabhaneni.
Digital Rights Management in Digital Libraries: an introduction to technology, effects and the available Open source tools Dr. N. S. Harinarayana Reader,
Trust and the Public Key Infrastructure (PKI) Sangyoon Oh Florida State University Computer Security Projects GS Spring 2001.
1 (Un)Trustworthy Wireless: What your wireless traffic says about you… Jeff Pang with Ben Greenstein, Ramki Gummadi, Tadayoshi Kohno, David Wetherall (UW/Intel.
Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis Presented by Yang Gao 11/2/2011 Charles V. Wright MIT Lincoln Laboratory Scott.
Presenting: Dafna Shahaf. Infranet: Circumventing Web Censorship and Surveillance Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan,
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
Using Digital Video in the Classroom Kevin O’Rourke Associate Production Coordinator Distance Learning and Video Production Center Kevin O’Rourke Associate.
CMSC 414 Computer (and Network) Security Lecture 16 Jonathan Katz.
1 CS 502: Computing Methods for Digital Libraries Lecture 26 Techniques of Access Management.
Link Setup Time (ms) Details : How do sender and receiver synchronize i ? Discovery/binding messages: infrequent and narrow interface  short term linkability.
User Fingerprinting Jeff Pang, Ben Greenstein, Ramki Gummadi, Srini Seshan, and David Wetherall Most slides borrowed from Ben.
seminar on Intrusion detection system
Biometrics: Identity Verification in a Networked World
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
0x1A Great Papers in Computer Security
Technical Issues in Library RFID Privacy David Molnar UC-Berkeley Computer Science.
David Molnar, David Wagner - Authors Eric McCambridge - Presenter.
Securing a Wireless Network
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
+ Hand Biometrics Measurement and biometric technologies for identification and security applications.
A Spotlight on Security and Privacy Risks with Future Household Robots: Attacks and Lessons Denning, T., Matuszek, C., Koscher, K., Smith, J. and Kohno,
Introducing Digital Rights Management Willms Buhse October 2002, Vilnius.
Module 8 Configuring and Securing SharePoint Services and Service Applications.
SET THE DISRUPTIVE SCENE David Minton Director of The Leisure Database Company.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
1 1 CSCE 5013: Hot Topics in Mobile and Pervasive Computing Discussion of LOC1 and LOC2 Nilanjan Banerjee Hot Topic in Mobile and Pervasive Computing University.
Security Testing Case Study 360logica Software Testing Services.
Fernando Falcon Managing Director Media Instruments S.A. AGB Nielsen Media Research.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Cellular Phones as Embedded Systems by Niam Amarnani.
Remote Physical Device Fingerprinting Authors: Tadayoshi Kohno, Andre Broido, KC Claffy Presented: IEEE Symposium on Security and Privacy, 2005 Kishore.
Security Analysis of a Cryptographically- Enabled RFID Device Steve Bono, Matthew Green, Adam Stubblefield, Ari Juels, Avi Rubin, Michael Szydlo Usenix.
Theory of Computation II Topic presented by: Alberto Aguilar Gonzalez.
Network Security David Lazăr.
User Fingerprinting Jeffrey Pang 1 Ben Greenstein 2 Ramakrishna Gummadi 3 Srinivasan Seshan 1 David Wetherall 2,4 Presenter: Nan Jiang Most Slides:
Doc.: IEEE psc Submission ETRI July 2011 Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.
Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era Authors: Ben Greenstein, Ramakrishna Gummadi, Jeffrey Pang, Mike Y. Chen,
Application Recognition Sam Larsen Determina. Process Control One method to improve computer security is through process control  Whitelist: user specifies.
UNIT 19 Data Security 2.
1 Lab 12: Spyware A Window’s User’s Worst Nightmare.
Authentication What you know? What you have? What you are?
28 April 2005 CS588 Spring 2005 David Evans Phun with Photons.
DIGITAL SIGNATURE(DS) IN VIDEO. Contents  What is Digital Signature(DS)?  General Signature Vs. Digital Signatures  How DS is Different from Encryption?
Endpoint Encryption Methodologies Ed Underwood Dell Data Protection.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Back to the Future… Austin Community College Strategic Planning Retreat 3 The Future Is NOW.
Audio Fingerprinting Overview: RARE Algorithms, Resources Chris Burges, John Platt, Jon Goldstein, Erin Renshaw
Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations Charles V. Wright Scott E. Coull Gerald M. Masson Lucas Ballard Fabian Monrose.
Audio Fingerprinting Wes Hatch MUMT-614 Mar.13, 2003.
An IoT Data Communication Framework for Authenticity and Integrity
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT
A review of audio fingerprinting (Cano et al. 2005)
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
0_kit End to End encryption in your app
How to Backup iTunes on External Hard Drive?
CIS 4930/6930, Spring 2018 Experiment 1: Encounter Tracing using Bluetooth Due Date: Feb 19, beginning of class Ph.D. student lead: Mimonah Al-Qathrady.
What is a Database? A collection of data organized in a manner that allows access, retrieval, and use of that data.
By: Anthony Gervasi & Adam Dickinson
Presentation transcript:

Devices That Tell On You: Privacy Trends in Consumer Ubiquitous Computing T. Scott Saponas Jonathan Lester Carl Hartung Sameer Agarwal Tadayoshi Kohno August 8, th USENIX Security Symposium

Old Technology: Known Privacy Issues

New Technology: “Unknown” Privacy Issues

RFIDEEG Gaminglarge displaysmobile sensing platforms wearablesHealth displayssmar t phonesambient displays New Technology: “Unknown” Privacy Issues

Nike+iPod Sport Kit Slingbox

unique identifier

spoofed MAC Alice Unwanted Music & Pictures Bob block Interesting Music & Pictures Bob

Strong Identifiers Weak Identifiers Tracking Location Evading Blocking

Slingbox Streams (encrypted) Media

Variable Data Rate Encoding Slingbox

Movie Fingerprint From Throughput 100 ms throughput5 sec throughput trace 1 trace 2 trace 3

Collected 26 Movies Traces

Throughput for Content Identification unaligned tracesaligned tracesaverage trace movie signature query query signature sliding window distance minimum distance

26 Movie Experiment Movie ABad Boys BBad Boys II CBourne Supremacy DBreak-Up EHarry Potter FHarry Potter III GIncredibles HMen in Black II IOcean's Eleven JShort Circuit KX2 LX-Men MAir Force One NBourne Identity OCaddy Shack PClueless QHappy Gilmore RJurassic Park S Nightmare Before Christmas TOffice Space URed October VAustin Powers WAustin Powers II XBruce Almighty YHurrican ZShort Circuit II best match Compare movie database 12… 50 ERROR

VBR Leaks Information 10 Min: 62% true positive (chance 4%) 40 Min: 77% true positive (chance 4%) 40 Min: 15 movies ≥ 98% true positive 10 Minute40 Minute

VBR Leaks Information Encryption is Not Enough – Traffic Analysis – Throughput Fingerprint Limitations – 26 movie library – Lab setting Extensions – Recognizing specific movies – Watermarking

Thanks! Acknowledgements: Yaw Anokwa, Kate Everitt, Kevin Fu, J. Alex Halderman, Karl Koscher, Ed Lazowska, David Molnar, Fabian Monrose, Lincoln Ritter, Avi Rubin, Jason Schultz, Adam Stubblefield, Dan Wallach, and David Wetherall T. Scott Saponas, Jonathan Lester, Carl Hartung, Sameer Agarwal, Tadayoshi Kohno