首页 > 最新文献

Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society最新文献

英文 中文
A Study of Users' Privacy Preferences for Data Sharing on Symptoms-Tracking/Health App. 症状追踪/健康App用户数据共享隐私偏好研究
Hafiz Asif, Jaideep Vaidya

Symptoms-tracking applications allow crowdsensing of health and location related data from individuals to track the spread and outbreaks of infectious diseases. During the COVID-19 pandemic, for the first time in history, these apps were widely adopted across the world to combat the pandemic. However, due to the sensitive nature of the data collected by these apps, serious privacy concerns were raised and apps were critiqued for their insufficient privacy safeguards. The Covid Nearby project was launched to develop a privacy-focused symptoms-tracking app and to understand the privacy preferences of users in health emergencies. In this work, we draw on the insights from the Covid Nearby users' data, and present an analysis of the significantly varying trends in users' privacy preferences with respect to demographics, attitude towards information sharing, and health concerns, e.g. after being possibly exposed to COVID-19. These results and insights can inform health informatics researchers and policy designers in developing more socially acceptable health apps in the future.

症状跟踪应用程序允许对个人的健康和位置相关数据进行众包感知,以跟踪传染病的传播和爆发。在新冠肺炎大流行期间,这些应用程序有史以来第一次在世界各地被广泛采用,以抗击疫情。然而,由于这些应用程序收集的数据的敏感性,人们提出了严重的隐私问题,并批评这些应用程序的隐私保护不足。启动新冠肺炎附近项目是为了开发一款关注隐私的症状跟踪应用程序,并了解用户在突发卫生事件中的隐私偏好。在这项工作中,我们借鉴了新冠肺炎附近用户数据的见解,并分析了用户隐私偏好在人口统计、信息共享态度和健康问题方面的显著变化趋势,例如在可能接触新冠肺炎后。这些结果和见解可以为健康信息学研究人员和政策设计者在未来开发更多社会可接受的健康应用程序提供信息。
{"title":"A Study of Users' Privacy Preferences for Data Sharing on Symptoms-Tracking/Health App.","authors":"Hafiz Asif, Jaideep Vaidya","doi":"10.1145/3559613.3563202","DOIUrl":"10.1145/3559613.3563202","url":null,"abstract":"<p><p>Symptoms-tracking applications allow crowdsensing of health and location related data from individuals to track the spread and outbreaks of infectious diseases. During the COVID-19 pandemic, for the first time in history, these apps were widely adopted across the world to combat the pandemic. However, due to the sensitive nature of the data collected by these apps, serious privacy concerns were raised and apps were critiqued for their insufficient privacy safeguards. The Covid Nearby project was launched to develop a privacy-focused symptoms-tracking app and to understand the privacy preferences of users in health emergencies. In this work, we draw on the insights from the Covid Nearby users' data, and present an analysis of the significantly varying trends in users' privacy preferences with respect to demographics, attitude towards information sharing, and health concerns, e.g. after being possibly exposed to COVID-19. These results and insights can inform health informatics researchers and policy designers in developing more socially acceptable health apps in the future.</p>","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"2022 ","pages":"109-113"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9731474/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"10729960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preserving Genomic Privacy via Selective Sharing. 通过选择性共享保护基因组隐私。
Emre Yilmaz, Tianxi Ji, Erman Ayday, Pan Li

Although genomic data has significant impact and widespread usage in medical research, it puts individuals' privacy in danger, even if they anonymously or partially share their genomic data. To address this problem, we present a framework that is inspired from differential privacy for sharing individuals' genomic data while preserving their privacy. We assume an individual with some sensitive portion on her genome (e.g., mutations or single nucleotide polymorphisms - SNPs that reveal sensitive information about the individual) that she does not want to share. The goals of the individual are to (i) preserve the privacy of her sensitive data (considering the correlations between the sensitive and non-sensitive part), (ii) preserve the privacy of interdependent data (data that belongs to other individuals that is correlated with her data), and (iii) share as much non-sensitive data as possible to maximize utility of data sharing. As opposed to traditional differential privacy-based data sharing schemes, the proposed scheme does not intentionally add noise to data; it is based on selective sharing of data points. We observe that traditional differential privacy concept does not capture sharing data in such a setting, and hence we first introduce a privacy notation, ϵ-indirect privacy, that addresses data sharing in such settings. We show that the proposed framework does not provide sensitive information to the attacker while it provides a high data sharing utility. We also compare the proposed technique with the previous ones and show our advantage both in terms of privacy and data sharing utility.

虽然基因组数据在医学研究中具有重大影响和广泛应用,但它会危及个人隐私,即使他们匿名或部分共享其基因组数据也是如此。为了解决这个问题,我们提出了一个框架,该框架的灵感来自于在共享个人基因组数据的同时保护个人隐私的差分隐私。我们假设一个人的基因组中有一些敏感部分(如突变或单核苷酸多态性--SNPs,可揭示个人的敏感信息)是她不想共享的。个人的目标是:(i) 保护其敏感数据的隐私(考虑敏感和非敏感部分之间的相关性),(ii) 保护相互依存数据(属于其他个人并与她的数据相关的数据)的隐私,(iii) 尽可能多地共享非敏感数据,以实现数据共享效用的最大化。与传统的基于差分隐私的数据共享方案不同,所提出的方案不会故意给数据添加噪音,而是基于数据点的选择性共享。我们发现,传统的差分隐私概念无法捕捉到这种情况下的数据共享,因此我们首先引入了一种隐私符号--ϵ-间接隐私,以解决这种情况下的数据共享问题。我们证明,所提出的框架不会向攻击者提供敏感信息,同时还能提供较高的数据共享效用。我们还将提出的技术与之前的技术进行了比较,并展示了我们在隐私和数据共享效用方面的优势。
{"title":"Preserving Genomic Privacy via Selective Sharing.","authors":"Emre Yilmaz, Tianxi Ji, Erman Ayday, Pan Li","doi":"10.1145/3411497.3420214","DOIUrl":"10.1145/3411497.3420214","url":null,"abstract":"<p><p>Although genomic data has significant impact and widespread usage in medical research, it puts individuals' privacy in danger, even if they anonymously or partially share their genomic data. To address this problem, we present a framework that is inspired from differential privacy for sharing individuals' genomic data while preserving their privacy. We assume an individual with some sensitive portion on her genome (e.g., mutations or single nucleotide polymorphisms - SNPs that reveal sensitive information about the individual) that she does not want to share. The goals of the individual are to (i) preserve the privacy of her sensitive data (considering the correlations between the sensitive and non-sensitive part), (ii) preserve the privacy of interdependent data (data that belongs to other individuals that is correlated with her data), and (iii) share as much non-sensitive data as possible to maximize utility of data sharing. As opposed to traditional differential privacy-based data sharing schemes, the proposed scheme does not intentionally add noise to data; it is based on selective sharing of data points. We observe that traditional differential privacy concept does not capture sharing data in such a setting, and hence we first introduce a privacy notation, <i>ϵ</i>-indirect privacy, that addresses data sharing in such settings. We show that the proposed framework does not provide sensitive information to the attacker while it provides a high data sharing utility. We also compare the proposed technique with the previous ones and show our advantage both in terms of privacy and data sharing utility.</p>","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"2020 ","pages":"163-179"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8411901/pdf/nihms-1705344.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"39387493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
What do online behavioral advertising privacy disclosures communicate to users? 在线行为广告隐私披露向用户传达了什么信息?
P. Leon, Justin Cranshaw, L. Cranor, Jim Graves, Manoj Hastak, Blase Ur, Guzi Xu
Online Behavioral Advertising (OBA), the practice of tailoring ads based on an individual's online activities, has led to privacy concerns. In an attempt to mitigate these privacy concerns, the online advertising industry has proposed the use of OBA disclosures: icons, accompanying taglines, and landing pages intended to inform users about OBA and provide opt-out options. We conducted a 1,505-participant online study to investigate Internet users' perceptions of OBA disclosures. The disclosures failed to clearly notify participants about OBA and inform them about their choices. Half of the participants remembered the ads they saw but only 12% correctly remembered the disclosure taglines attached to ads. When shown the disclosures again, the majority mistakenly believed that ads would pop up if they clicked on disclosures, and more participants incorrectly thought that clicking the disclosures would let them purchase advertisements than correctly understood that they could then opt out of OBA. "AdChoices", the most commonly used tagline, was particularly ineffective at communicating notice and choice. A majority of participants mistakenly believed that opting out would stop all online tracking, not just tailored ads. We dicuss challenges in crafting disclosures and provide suggestions for improvement.
在线行为广告(OBA)是一种基于个人在线活动定制广告的做法,它引发了人们对隐私的担忧。为了减轻这些隐私问题,在线广告行业建议使用OBA披露:图标、附带的标语和登录页面,旨在告知用户OBA并提供选择退出选项。我们进行了一项1505名参与者的在线研究,以调查互联网用户对OBA披露的看法。这些披露没有清楚地告知参与者OBA,也没有告知他们自己的选择。一半的参与者记住了他们看过的广告,但只有12%的人正确记住了广告附带的披露标语。当再次显示披露信息时,大多数人错误地认为,如果他们点击披露信息,广告就会弹出,更多的参与者错误地认为点击披露信息会让他们购买广告,而不是正确地理解他们可以选择退出OBA。最常用的广告语“AdChoices”在传达通知和选择方面尤其无效。大多数参与者错误地认为,选择退出将阻止所有在线跟踪,而不仅仅是定制广告。我们讨论了制定披露的挑战,并提出了改进建议。
{"title":"What do online behavioral advertising privacy disclosures communicate to users?","authors":"P. Leon, Justin Cranshaw, L. Cranor, Jim Graves, Manoj Hastak, Blase Ur, Guzi Xu","doi":"10.1145/2381966.2381970","DOIUrl":"https://doi.org/10.1145/2381966.2381970","url":null,"abstract":"Online Behavioral Advertising (OBA), the practice of tailoring ads based on an individual's online activities, has led to privacy concerns. In an attempt to mitigate these privacy concerns, the online advertising industry has proposed the use of OBA disclosures: icons, accompanying taglines, and landing pages intended to inform users about OBA and provide opt-out options. We conducted a 1,505-participant online study to investigate Internet users' perceptions of OBA disclosures. The disclosures failed to clearly notify participants about OBA and inform them about their choices. Half of the participants remembered the ads they saw but only 12% correctly remembered the disclosure taglines attached to ads. When shown the disclosures again, the majority mistakenly believed that ads would pop up if they clicked on disclosures, and more participants incorrectly thought that clicking the disclosures would let them purchase advertisements than correctly understood that they could then opt out of OBA. \"AdChoices\", the most commonly used tagline, was particularly ineffective at communicating notice and choice. A majority of participants mistakenly believed that opting out would stop all online tracking, not just tailored ads. We dicuss challenges in crafting disclosures and provide suggestions for improvement.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"12 1","pages":"19-30"},"PeriodicalIF":0.0,"publicationDate":"2012-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85229319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
A machine learning solution to assess privacy policy completeness: (short paper) 一种评估隐私策略完整性的机器学习解决方案:(短文)
Elisa Costante, Yuanhao Sun, M. Petkovic, J. D. Hartog
A privacy policy is a legal document, used by websites to communicate how the personal data that they collect will be managed. By accepting it, the user agrees to release his data under the conditions stated by the policy. Privacy policies should provide enough information to enable users to make informed decisions. Privacy regulations support this by specifying what kind of information has to be provided. As privacy policies can be long and difficult to understand, users tend not to read them. Because of this, users generally agree with a policy without knowing what it states and whether aspects important to him are covered at all. In this paper we present a solution to assist the user by providing a structured way to browse the policy content and by automatically assessing the completeness of a policy, i.e. the degree of coverage of privacy categories important to the user. The privacy categories are extracted from privacy regulations, while text categorization and machine learning techniques are used to verify which categories are covered by a policy. The results show the feasibility of our approach; an automatic classifier, able to associate the right category to paragraphs of a policy with an accuracy approximating that obtainable by a human judge, can be effectively created.
隐私政策是一份法律文件,网站使用它来说明他们收集的个人数据将如何被管理。通过接受它,用户同意在政策规定的条件下发布他的数据。隐私政策应该提供足够的信息,使用户能够做出明智的决定。隐私法规通过指定必须提供的信息类型来支持这一点。由于隐私政策可能很长且难以理解,用户往往不会去阅读它们。正因为如此,用户通常会同意一项政策,而不知道它说了什么,也不知道它是否涵盖了对他重要的方面。在本文中,我们提出了一个解决方案,通过提供一种结构化的方式来浏览策略内容,并通过自动评估策略的完整性,即对用户重要的隐私类别的覆盖程度,来帮助用户。隐私类别从隐私规则中提取,而文本分类和机器学习技术用于验证策略涵盖哪些类别。结果表明了该方法的可行性;可以有效地创建一个自动分类器,该分类器能够将正确的类别与策略的段落关联起来,其精度接近人类判断所能获得的精度。
{"title":"A machine learning solution to assess privacy policy completeness: (short paper)","authors":"Elisa Costante, Yuanhao Sun, M. Petkovic, J. D. Hartog","doi":"10.1145/2381966.2381979","DOIUrl":"https://doi.org/10.1145/2381966.2381979","url":null,"abstract":"A privacy policy is a legal document, used by websites to communicate how the personal data that they collect will be managed. By accepting it, the user agrees to release his data under the conditions stated by the policy. Privacy policies should provide enough information to enable users to make informed decisions. Privacy regulations support this by specifying what kind of information has to be provided. As privacy policies can be long and difficult to understand, users tend not to read them. Because of this, users generally agree with a policy without knowing what it states and whether aspects important to him are covered at all. In this paper we present a solution to assist the user by providing a structured way to browse the policy content and by automatically assessing the completeness of a policy, i.e. the degree of coverage of privacy categories important to the user. The privacy categories are extracted from privacy regulations, while text categorization and machine learning techniques are used to verify which categories are covered by a policy. The results show the feasibility of our approach; an automatic classifier, able to associate the right category to paragraphs of a policy with an accuracy approximating that obtainable by a human judge, can be effectively created.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"14 1","pages":"91-96"},"PeriodicalIF":0.0,"publicationDate":"2012-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77096843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 86
Ace: an efficient key-exchange protocol for onion routing 用于洋葱路由的高效密钥交换协议
M. Backes, Aniket Kate, Esfandiar Mohammadi
The onion routing (OR) network Tor provides privacy to Internet users by facilitating anonymous web browsing. It achieves anonymity by routing encrypted traffic across a few routers, where the required encryption keys are established using a key exchange protocol. Goldberg, Stebila and Ustaoglu recently characterized the security and privacy properties required by the key exchange protocol used in the OR network. They defined the concept of one-way authenticated key exchange (1W-AKE) and presented a provably secure 1W-AKE protocol called ntor, which is under consideration for deployment in Tor. In this paper, we present a novel 1W-AKE protocol Ace that improves on the computation costs of ntor: in numbers, the client has an efficiency improvement of 46% and the server of nearly 19%. As far as communication costs are concerned, our protocol requires a client to send one additional group element to a server, compared to the ntor protocol. However, an additional group element easily fits into the 512 bytes fix-sized Tor packets (or cell) in the elliptic curve cryptography (ECC) setting. Consequently, our protocol does not produce a communication overhead in the Tor protocol. Moreover, we prove that our protocol Ace constitutes a 1W-AKE. Given that the ECC setting is under consideration for the Tor system, the improved computational efficiency, and the proven security properties make our 1W-AKE an ideal candidate for use in the Tor protocol.
洋葱路由(Tor)网络通过方便匿名浏览网页,为互联网用户提供隐私保护。它通过在几个路由器上路由加密流量来实现匿名性,其中使用密钥交换协议建立所需的加密密钥。Goldberg, Stebila和Ustaoglu最近描述了OR网络中使用的密钥交换协议所要求的安全性和隐私性。他们定义了单向认证密钥交换(1W-AKE)的概念,并提出了一个可证明安全的1W-AKE协议,称为ntor,正在考虑在Tor中部署。在本文中,我们提出了一种新的1W-AKE协议Ace,它提高了ntor的计算成本:在数量上,客户端效率提高了46%,服务器效率提高了近19%。就通信成本而言,与ntor协议相比,我们的协议要求客户端向服务器发送一个额外的组元素。但是,在椭圆曲线加密(ECC)设置中,一个额外的组元素很容易适合512字节固定大小的Tor数据包(或单元)。因此,我们的协议不会在Tor协议中产生通信开销。此外,我们证明了我们的协议Ace构成了一个1W-AKE。考虑到ECC设置正在考虑Tor系统中,改进的计算效率和经过验证的安全特性使我们的1W-AKE成为Tor协议中使用的理想候选。
{"title":"Ace: an efficient key-exchange protocol for onion routing","authors":"M. Backes, Aniket Kate, Esfandiar Mohammadi","doi":"10.1145/2381966.2381974","DOIUrl":"https://doi.org/10.1145/2381966.2381974","url":null,"abstract":"The onion routing (OR) network Tor provides privacy to Internet users by facilitating anonymous web browsing. It achieves anonymity by routing encrypted traffic across a few routers, where the required encryption keys are established using a key exchange protocol. Goldberg, Stebila and Ustaoglu recently characterized the security and privacy properties required by the key exchange protocol used in the OR network. They defined the concept of one-way authenticated key exchange (1W-AKE) and presented a provably secure 1W-AKE protocol called ntor, which is under consideration for deployment in Tor.\u0000 In this paper, we present a novel 1W-AKE protocol Ace that improves on the computation costs of ntor: in numbers, the client has an efficiency improvement of 46% and the server of nearly 19%. As far as communication costs are concerned, our protocol requires a client to send one additional group element to a server, compared to the ntor protocol. However, an additional group element easily fits into the 512 bytes fix-sized Tor packets (or cell) in the elliptic curve cryptography (ECC) setting. Consequently, our protocol does not produce a communication overhead in the Tor protocol. Moreover, we prove that our protocol Ace constitutes a 1W-AKE. Given that the ECC setting is under consideration for the Tor system, the improved computational efficiency, and the proven security properties make our 1W-AKE an ideal candidate for use in the Tor protocol.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"1 1","pages":"55-64"},"PeriodicalIF":0.0,"publicationDate":"2012-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88603639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
How many eyes are spying on your shared folders? 有多少人在监视你的共享文件夹?
Bingshuang Liu, Zhaoyang Liu, Jianyu Zhang, Tao Wei, Wei Zou
Today peer-to-peer (P2P) file sharing networks help tens of millions of users to share contents on the Internet. However, users' private files in their shared folders might become accessible to everybody inadvertently. In this paper, we investigate this kind of user privacy exposures in Kad, one of the biggest P2P file sharing networks, and try to answer two questions: Q1. Whether and to what extent does this problem exist in current systems? Q2. Are attackers aware of this privacy vulnerability and are they abusing obtained private infortion? We build a monitoring system called Dragonfly based on the eclipse mechanism to passively monitor sharing and downloading events in Kad. We also use the Honeyfile approach to share forged private information to observe attackers' behaviors. Based on Dragonfly and Honeyfiles, we give affirmative answers to the above two questions. Within two weeks, more than five thousand private files related to ten sensitive keywords were shared by Kad users, and over half of them come from Italy and Spain. Within one month, each honey file was downloaded for about 40 times in average, and its inner password information was exploited for 25 times. These results show that this privacy problem has become a serious threat for P2P users. Finally, we design and implement Numen, a plug-in for eMule, which can effectively protect user private files from being shared without notice.
今天,点对点(P2P)文件共享网络帮助数千万用户在互联网上共享内容。但是,用户共享文件夹中的私有文件可能会在不经意间被所有人访问。在本文中,我们研究了最大的P2P文件共享网络之一Kad的这种用户隐私暴露,并试图回答两个问题:这个问题在当前的系统中是否存在以及在多大程度上存在?Q2。攻击者是否意识到这个隐私漏洞,他们是否滥用获得的隐私信息?我们基于eclipse机制构建了一个名为Dragonfly的监控系统,对Kad中的共享和下载事件进行被动监控。我们还使用Honeyfile方法共享伪造的私人信息,以观察攻击者的行为。基于Dragonfly和Honeyfiles,我们对上述两个问题给出了肯定的答案。在两周内,Kad用户分享了5000多个与10个敏感关键词相关的私人文件,其中一半以上来自意大利和西班牙。在一个月内,每个蜂蜜文件平均被下载约40次,其内部密码信息被利用25次。这些结果表明,这一隐私问题已经成为P2P用户的严重威胁。最后,我们设计并实现了eMule的插件Numen,它可以有效地保护用户的私人文件不被未经通知的共享。
{"title":"How many eyes are spying on your shared folders?","authors":"Bingshuang Liu, Zhaoyang Liu, Jianyu Zhang, Tao Wei, Wei Zou","doi":"10.1145/2381966.2381982","DOIUrl":"https://doi.org/10.1145/2381966.2381982","url":null,"abstract":"Today peer-to-peer (P2P) file sharing networks help tens of millions of users to share contents on the Internet. However, users' private files in their shared folders might become accessible to everybody inadvertently. In this paper, we investigate this kind of user privacy exposures in Kad, one of the biggest P2P file sharing networks, and try to answer two questions: Q1. Whether and to what extent does this problem exist in current systems? Q2. Are attackers aware of this privacy vulnerability and are they abusing obtained private infortion?\u0000 We build a monitoring system called Dragonfly based on the eclipse mechanism to passively monitor sharing and downloading events in Kad. We also use the Honeyfile approach to share forged private information to observe attackers' behaviors. Based on Dragonfly and Honeyfiles, we give affirmative answers to the above two questions. Within two weeks, more than five thousand private files related to ten sensitive keywords were shared by Kad users, and over half of them come from Italy and Spain. Within one month, each honey file was downloaded for about 40 times in average, and its inner password information was exploited for 25 times. These results show that this privacy problem has become a serious threat for P2P users. Finally, we design and implement Numen, a plug-in for eMule, which can effectively protect user private files from being shared without notice.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"36 1","pages":"109-116"},"PeriodicalIF":0.0,"publicationDate":"2012-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87273522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
An approach for identifying JavaScript-loaded advertisements through static program analysis 一种通过静态程序分析识别javascript加载广告的方法
Caitlin R. Orr, A. Chauhan, Minaxi Gupta, Chris Frisz, Christopher W. Dunn
Motivated by reasons related to privacy, obtrusiveness, and security, there is great interest in the prospect of blocking advertisements. Current approaches to this goal involve keeping sets of URL-based regular expressions, which are matched against every URL fetched on a web page. While generally effective, this approach is not scalable and requires constant manual maintenance of the filtering lists. To counter these shortcomings, we present a fundamentally different approach with which we demonstrate that static program analysis on JavaScript source code can be used to identify JavaScript that loads and displays ads. Our use of static analysis lets us flag and block ad-related scripts before runtime, offering security in addition to blocking ads. Preliminary results from a classifier trained on the features we develop achieve 98% accuracy in identifying ad-related scripts.
出于与隐私、突兀性和安全性相关的原因,人们对屏蔽广告的前景非常感兴趣。目前实现这一目标的方法包括保持基于URL的正则表达式集,这些正则表达式与从网页上获取的每个URL进行匹配。虽然这种方法通常是有效的,但它是不可伸缩的,并且需要经常手工维护过滤列表。为了克服这些缺点,我们提出了一种完全不同的方法,我们展示了JavaScript源代码的静态程序分析可以用来识别加载和显示广告的JavaScript。我们使用静态分析可以让我们在运行前标记和阻止广告相关的脚本,除了阻止广告之外,还提供了安全性。我们开发的特征训练的分类器的初步结果在识别广告相关脚本方面达到98%的准确率。
{"title":"An approach for identifying JavaScript-loaded advertisements through static program analysis","authors":"Caitlin R. Orr, A. Chauhan, Minaxi Gupta, Chris Frisz, Christopher W. Dunn","doi":"10.1145/2381966.2381968","DOIUrl":"https://doi.org/10.1145/2381966.2381968","url":null,"abstract":"Motivated by reasons related to privacy, obtrusiveness, and security, there is great interest in the prospect of blocking advertisements. Current approaches to this goal involve keeping sets of URL-based regular expressions, which are matched against every URL fetched on a web page. While generally effective, this approach is not scalable and requires constant manual maintenance of the filtering lists. To counter these shortcomings, we present a fundamentally different approach with which we demonstrate that static program analysis on JavaScript source code can be used to identify JavaScript that loads and displays ads. Our use of static analysis lets us flag and block ad-related scripts before runtime, offering security in addition to blocking ads. Preliminary results from a classifier trained on the features we develop achieve 98% accuracy in identifying ad-related scripts.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"68 1","pages":"1-12"},"PeriodicalIF":0.0,"publicationDate":"2012-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82452110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Changing of the guards: a framework for understanding and improving entry guard selection in tor 警卫的改变:一个理解和改进进入警卫选择的框架
T. Elahi, Kevin S. Bauer, Mashael Alsabah, Roger Dingledine, I. Goldberg
Tor is the most popular low-latency anonymity overlay network for the Internet, protecting the privacy of hundreds of thousands of people every day. To ensure a high level of security against certain attacks, Tor currently utilizes special nodes called entry guards as each client's long-term entry point into the anonymity network. While the use of entry guards provides clear and well-studied security benefits, it is unclear how well the current entry guard design achieves its security goals in practice. We design and implement Changing of the Guards (COGS), a simulation-based research framework to study Tor's entry guard design. Using COGS, we empirically demonstrate that natural, short-term entry guard churn and explicit time-based entry guard rotation contribute to clients using more entry guards than they should, and thus increase the likelihood of profiling attacks. This churn significantly degrades Tor clients' anonymity. To understand the security and performance implications of current and alternative entry guard selection algorithms, we simulate tens of thousands of Tor clients using COGS based on Tor's entry guard selection and rotation algorithms, with real entry guard data collected over the course of eight months from the live Tor network.
Tor是互联网上最流行的低延迟匿名覆盖网络,每天保护数十万人的隐私。为了确保对某些攻击的高度安全性,Tor目前使用称为入口守卫的特殊节点作为每个客户端进入匿名网络的长期入口点。虽然使用门禁系统提供了明确且经过充分研究的安全好处,但目前尚不清楚当前的门禁系统设计在实践中如何实现其安全目标。我们设计并实现了一个基于仿真的研究框架——警卫更换(COGS)来研究Tor的入口警卫设计。使用COGS,我们凭经验证明,自然的、短期的进入守卫流失和明确的基于时间的进入守卫轮换会导致客户使用比他们应该使用的更多的进入守卫,从而增加分析攻击的可能性。这种混乱大大降低了Tor客户端的匿名性。为了了解当前和替代入口守卫选择算法的安全性和性能影响,我们使用基于Tor的入口守卫选择和轮换算法的COGS模拟了成千上万的Tor客户端,并从实时Tor网络中收集了八个月的真实入口守卫数据。
{"title":"Changing of the guards: a framework for understanding and improving entry guard selection in tor","authors":"T. Elahi, Kevin S. Bauer, Mashael Alsabah, Roger Dingledine, I. Goldberg","doi":"10.1145/2381966.2381973","DOIUrl":"https://doi.org/10.1145/2381966.2381973","url":null,"abstract":"Tor is the most popular low-latency anonymity overlay network for the Internet, protecting the privacy of hundreds of thousands of people every day. To ensure a high level of security against certain attacks, Tor currently utilizes special nodes called entry guards as each client's long-term entry point into the anonymity network. While the use of entry guards provides clear and well-studied security benefits, it is unclear how well the current entry guard design achieves its security goals in practice.\u0000 We design and implement Changing of the Guards (COGS), a simulation-based research framework to study Tor's entry guard design. Using COGS, we empirically demonstrate that natural, short-term entry guard churn and explicit time-based entry guard rotation contribute to clients using more entry guards than they should, and thus increase the likelihood of profiling attacks. This churn significantly degrades Tor clients' anonymity. To understand the security and performance implications of current and alternative entry guard selection algorithms, we simulate tens of thousands of Tor clients using COGS based on Tor's entry guard selection and rotation algorithms, with real entry guard data collected over the course of eight months from the live Tor network.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"66 1","pages":"43-54"},"PeriodicalIF":0.0,"publicationDate":"2012-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85631893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 93
Understanding what they do with what they know 了解他们用他们所知道的做什么
C. Wills, Can Tatar
This work seeks to understand what "they" (Web advertisers) actually do with the information available to them. We analyze the ads shown to users during controlled browsing as well as examine the inferred demographics and interests shown in Ad Preference Managers provided by advertisers. In an initial study of ad networks and a focused study of the Google ad network, we found many expected contextual, behavioral and location-based ads along with combinations of these types of ads. We also observed profile-based ads. Most behavioral ads were shown as categories in the Ad Preference Manager (APM) of the ad network, but we found unexpected cases where the interests were not visible in the APM. We also found unexpected behavior for the Google ad network in that non-contextual ads were shown related to induced sensitive topics regarding sexual orientation, health and financial matters. In a smaller study of Facebook, we did not find clear evidence that a user's browsing behavior on non-Facebook sites influences the ads shown to the user on Facebook, but we did observe such influence when the Facebook Like button is used to express interest in content. We did observe Facebook ads appearing to target users for sensitive interests with some ads even asserting such sensitive information, which appears to be a violation of Facebook's stated policy.
这项工作旨在了解“他们”(网络广告商)实际上对他们可用的信息做了什么。我们分析在受控浏览期间向用户显示的广告,并检查广告商提供的广告偏好管理器中显示的推断人口统计数据和兴趣。在对广告网络的初步研究和对谷歌广告网络的重点研究中,我们发现了许多预期的基于上下文、行为和位置的广告,以及这些类型广告的组合。我们还观察到基于个人资料的广告。大多数行为广告在广告网络的广告偏好管理器(APM)中显示为类别,但我们发现了意想不到的情况,即兴趣在APM中不可见。我们还发现,在谷歌广告网络中,与性取向、健康和财务等敏感话题相关的非上下文广告显示出了意想不到的行为。在一项针对Facebook的小型研究中,我们没有发现明确的证据表明,用户在非Facebook网站上的浏览行为会影响Facebook上向用户展示的广告,但我们确实观察到,当Facebook上的“喜欢”按钮被用来表达对内容的兴趣时,会产生这种影响。我们确实观察到Facebook的广告似乎针对用户的敏感兴趣,有些广告甚至声称这些敏感信息,这似乎违反了Facebook的声明政策。
{"title":"Understanding what they do with what they know","authors":"C. Wills, Can Tatar","doi":"10.1145/2381966.2381969","DOIUrl":"https://doi.org/10.1145/2381966.2381969","url":null,"abstract":"This work seeks to understand what \"they\" (Web advertisers) actually do with the information available to them. We analyze the ads shown to users during controlled browsing as well as examine the inferred demographics and interests shown in Ad Preference Managers provided by advertisers.\u0000 In an initial study of ad networks and a focused study of the Google ad network, we found many expected contextual, behavioral and location-based ads along with combinations of these types of ads. We also observed profile-based ads. Most behavioral ads were shown as categories in the Ad Preference Manager (APM) of the ad network, but we found unexpected cases where the interests were not visible in the APM. We also found unexpected behavior for the Google ad network in that non-contextual ads were shown related to induced sensitive topics regarding sexual orientation, health and financial matters.\u0000 In a smaller study of Facebook, we did not find clear evidence that a user's browsing behavior on non-Facebook sites influences the ads shown to the user on Facebook, but we did observe such influence when the Facebook Like button is used to express interest in content. We did observe Facebook ads appearing to target users for sensitive interests with some ads even asserting such sensitive information, which appears to be a violation of Facebook's stated policy.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"25 1","pages":"13-18"},"PeriodicalIF":0.0,"publicationDate":"2012-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80637320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 77
Secure communication over diverse transports: [short paper] 不同传输方式的安全通信:[短文]
M. Rogers, Eleanor Saitta
This paper describes BTP, a protocol that ensures the confidentiality, integrity, authenticity and forward secrecy of communication over diverse underlying transports, from low-latency, bidirectional transports like TCP to high-latency, unidirectional transports like DVDs sent through the mail. BTP is designed for use in censorship-resistant delay-tolerant overlays that operate over heterogeneous mixtures of underlying transports. By providing consistent security properties for a very wide range of transports, BTP simplifies the design and implementation of such overlays. Forward secrecy is achieved by establishing an initial shared secret between each pair of endpoint devices and using a one-way key derivation function to generate a series of temporary shared secrets from the initial shared secret. Once both devices have destroyed a given temporary secret, any keys derived from it cannot be re-derived if the devices are later compromised. BTP is designed to be compatible with traffic analysis prevention techniques such as traffic morphing: the protocol includes optional padding and uses no timeouts, handshakes or plaintext headers, with the goal of making it difficult to distinguish BTP from other protocols. If unlinkability between communicating devices is required, BTP can use anonymity systems such as Tor and Mixminion as underlying transports.
本文描述了BTP协议,它确保了各种底层传输通信的机密性、完整性、真实性和前向保密性,从低延迟、双向传输(如TCP)到高延迟、单向传输(如通过邮件发送的dvd)。BTP被设计用于在基础传输的异构混合上操作的抗审查容忍延迟覆盖。通过为广泛的传输提供一致的安全属性,BTP简化了这种覆盖的设计和实现。前向保密是通过在每对端点设备之间建立初始共享秘密,并使用单向密钥派生函数从初始共享秘密生成一系列临时共享秘密来实现的。一旦两个设备都销毁了给定的临时密钥,那么如果设备后来被入侵,则无法重新获得从中获得的任何密钥。BTP被设计为兼容流量分析预防技术,如流量变形:该协议包括可选填充,不使用超时、握手或明文头,目的是使BTP与其他协议难以区分。如果需要通信设备之间的不可链接性,BTP可以使用Tor和Mixminion等匿名系统作为底层传输。
{"title":"Secure communication over diverse transports: [short paper]","authors":"M. Rogers, Eleanor Saitta","doi":"10.1145/2381966.2381977","DOIUrl":"https://doi.org/10.1145/2381966.2381977","url":null,"abstract":"This paper describes BTP, a protocol that ensures the confidentiality, integrity, authenticity and forward secrecy of communication over diverse underlying transports, from low-latency, bidirectional transports like TCP to high-latency, unidirectional transports like DVDs sent through the mail.\u0000 BTP is designed for use in censorship-resistant delay-tolerant overlays that operate over heterogeneous mixtures of underlying transports. By providing consistent security properties for a very wide range of transports, BTP simplifies the design and implementation of such overlays.\u0000 Forward secrecy is achieved by establishing an initial shared secret between each pair of endpoint devices and using a one-way key derivation function to generate a series of temporary shared secrets from the initial shared secret. Once both devices have destroyed a given temporary secret, any keys derived from it cannot be re-derived if the devices are later compromised.\u0000 BTP is designed to be compatible with traffic analysis prevention techniques such as traffic morphing: the protocol includes optional padding and uses no timeouts, handshakes or plaintext headers, with the goal of making it difficult to distinguish BTP from other protocols. If unlinkability between communicating devices is required, BTP can use anonymity systems such as Tor and Mixminion as underlying transports.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"15 1","pages":"75-80"},"PeriodicalIF":0.0,"publicationDate":"2012-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74424010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1