devices that tell on you: privacy trends in consumer ubiquitous computing
DESCRIPTION
Devices That Tell On You: Privacy Trends in Consumer Ubiquitous Computing. 16th USENIX Security Symposium. T. Scott Saponas Jonathan Lester Carl Hartung Sameer Agarwal Tadayoshi Kohno. August 8, 2007. Old Technology: Known Privacy Issues. Old Technology: Known Privacy Issues. - PowerPoint PPT PresentationTRANSCRIPT
Devices That Tell On You:Privacy Trends in Consumer Ubiquitous Computing
T. Scott SaponasJonathan LesterCarl HartungSameer AgarwalTadayoshi Kohno
August 8, 2007
16th USENIX Security Symposium
Old Technology: Known Privacy Issues
Old Technology: Known Privacy Issues
Old Technology: Known Privacy Issues
Old Technology: Known Privacy Issues
New Technology: “Unknown” Privacy Issues
RFID EEG Gaming large displaysmobile sensing platforms
wearables Health displayssmar t phonesambient displays
New Technology: “Unknown” Privacy Issues
Nike+iPod Sport Kit
Slingbox
unique identifier
spoofed MAC
Alice UnwantedMusic & Pictures
Bob
block
InterestingMusic & Pictures
Bob
Strong Identifiers
WeakIdentifiers
TrackingLocation
EvadingBlocking
Slingbox Streams (encrypted) Media
Network
Slingbox
Variable Data Rate Encoding
Slingbox
Movie Fingerprint From Throughput
100 ms throughput
5 sec throughput
trace 1
trace 2
trace 3
Collected 26 Movies Traces
Throughput for Content Identification
unaligned traces
aligned traces
average trace
DFT Feature Generation
movie signature
DFT Feature Generation
query
query signature
sliding window distance
minimum distance
26 Movie ExperimentMovie
A Bad Boys
B Bad Boys II
CBourne Supremacy
D Break-Up
E Harry Potter
F Harry Potter III
G Incredibles
H Men in Black II
I Ocean's Eleven
J Short Circuit
K X2
L X-Men
M Air Force One
N Bourne Identity
O Caddy Shack
P Clueless
Q Happy Gilmore
R Jurassic Park
S
Nightmare Before Christmas
T Office Space
U Red October
V Austin Powers
W Austin Powers II
X Bruce Almighty
Y Hurrican
Z Short Circuit II
best matchCompare
movie database
1 2… 50
ERROR
VBR Leaks Information• 10 Min: 62% true positive (chance 4%)• 40 Min: 77% true positive (chance 4%)• 40 Min: 15 movies ≥ 98% true positive
10 Minute 40 Minute
VBR Leaks Information
• Encryption is Not Enough– Traffic Analysis– Throughput Fingerprint
• Limitations– 26 movie library– Lab setting
• Extensions– Recognizing specific movies–Watermarking
Thanks!
Acknowledgements:Yaw Anokwa, Kate Everitt, Kevin Fu, J. Alex Halderman, Karl Koscher, Ed Lazowska, David Molnar, Fabian Monrose, Lincoln Ritter, Avi Rubin, Jason Schultz, Adam Stubblefield, Dan Wallach, and David Wetherall
http://www.cs.washington.edu/research/security/[email protected]
T. Scott Saponas, Jonathan Lester, Carl Hartung,
Sameer Agarwal, Tadayoshi Kohno