Download presentation
Presentation is loading. Please wait.
Published byShanna Green Modified over 9 years ago
1
Devices That Tell On You: Privacy Trends in Consumer Ubiquitous Computing T. Scott Saponas Jonathan Lester Carl Hartung Sameer Agarwal Tadayoshi Kohno August 8, 2007 16th USENIX Security Symposium
3
Old Technology: Known Privacy Issues
7
New Technology: “Unknown” Privacy Issues
8
RFIDEEG Gaminglarge displaysmobile sensing platforms wearablesHealth displayssmar t phonesambient displays New Technology: “Unknown” Privacy Issues
9
Nike+iPod Sport Kit Slingbox
10
unique identifier
11
spoofed MAC Alice Unwanted Music & Pictures Bob block Interesting Music & Pictures Bob
12
Strong Identifiers Weak Identifiers Tracking Location Evading Blocking
13
Slingbox Streams (encrypted) Media
14
Variable Data Rate Encoding Slingbox
15
Movie Fingerprint From Throughput 100 ms throughput5 sec throughput trace 1 trace 2 trace 3
16
Collected 26 Movies Traces
17
Throughput for Content Identification unaligned tracesaligned tracesaverage trace movie signature query query signature sliding window distance minimum distance
18
26 Movie Experiment Movie ABad Boys BBad Boys II CBourne Supremacy DBreak-Up EHarry Potter FHarry Potter III GIncredibles HMen in Black II IOcean's Eleven JShort Circuit KX2 LX-Men MAir Force One NBourne Identity OCaddy Shack PClueless QHappy Gilmore RJurassic Park S Nightmare Before Christmas TOffice Space URed October VAustin Powers WAustin Powers II XBruce Almighty YHurrican ZShort Circuit II best match Compare movie database 12… 50 ERROR
19
VBR Leaks Information 10 Min: 62% true positive (chance 4%) 40 Min: 77% true positive (chance 4%) 40 Min: 15 movies ≥ 98% true positive 10 Minute40 Minute
20
VBR Leaks Information Encryption is Not Enough – Traffic Analysis – Throughput Fingerprint Limitations – 26 movie library – Lab setting Extensions – Recognizing specific movies – Watermarking
22
Thanks! Acknowledgements: Yaw Anokwa, Kate Everitt, Kevin Fu, J. Alex Halderman, Karl Koscher, Ed Lazowska, David Molnar, Fabian Monrose, Lincoln Ritter, Avi Rubin, Jason Schultz, Adam Stubblefield, Dan Wallach, and David Wetherall http://www.cs.washington.edu/research/security/usenix07devices.html ssaponas@cs.washington.edu T. Scott Saponas, Jonathan Lester, Carl Hartung, Sameer Agarwal, Tadayoshi Kohno
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.