Calendário de Eventos

Flat View
Ver por ano
Vista mensal
Ver por mês
Weekly View
Ver por semana
Daily View
Ver Hoje
Search
Pesquisar
Download como arquivo ICAL
Seminário PESC: Matt Wright, Rochester Institute of Technology (RIT)
Segunda-feira, 05 Novembro 2018, 11:00 - 13:00

Estamos retomando o Ciclo de Seminários PESC com a presença do prof. Matt Wright, que trabalha com Segurança Cibernética e aplicações de Deep Learning (o tsunami da hora). Matt é um especialista em ataques e defesas de sistemas na Internet (com foco em privacidade), e vem ao Brasil também em busca de novas colaborações e potenciais alunos. Ele vai estar disponível para conversar com os interessados (professores e alunos) no dia 5/11.

 

Programe-se, participe e ajudem na divulgação! Mais detalhes abaixo ou clicando aqui.

 

-----

 

Palestrante:

Matt Wright, Director of the Center for Cybersecurity, Rochester Institute of Technology (RIT)

 

Título:

Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning

 

Dia/horário/local:

5 de novembro (segunda), 11h, sala H-324B

 

Resumo:

Website fingerprinting enables a local eavesdropper to determine which websites a user is visiting over an encrypted connection. State-of-the-art website fingerprinting attacks have been shown to be effective even against Tor. Recently, lightweight website fingerprinting defenses for Tor have been proposed that substantially degrade existing attacks: WTF-PAD and Walkie-Talkie. In this work, we present Deep Fingerprinting (DF), a new website fingerprinting attack against Tor that leverages a type of deep learning called Convolutional Neural Networks (CNN) with a sophisticated architecture design, and we evaluate this attack against WTF-PAD and Walkie-Talkie. The DF attack attains over 98% accuracy on Tor traffic without defenses, better than all prior attacks, and it is also the only attack that is effective against WTF-PAD with over 90% accuracy. Walkie-Talkie remains effective, holding the attack to just 49.7% accuracy. In the more realistic open-world setting, our attack remains effective, with 0.99 precision and 0.94 recall on undefended traffic. Against traffic defended with WTF-PAD in this setting, the attack still can get 0.96 precision and 0.68 recall. These findings highlight the need for effective defenses that protect against this new attack and that could be deployed in Tor.

 

Bio resumida:

Matt Wright is the Director of the Center for Cybersecurity at RIT and a Professor of Computing Security. He graduated with his PhD from the Department of Computer Science at the University of Massachusetts in May, 2005, where he earned his MS in 2002. His dissertation work examined attacks and defenses for systems that provide anonymity online. His other interests include adversarial machine learning, understanding the human element of security, and security and privacy in all sorts of distributed systems, including peer-to-peer, mobile, and Internet of Things. Previously, he earned his BS degree in Computer Science at Harvey Mudd College. He is a recipient of the NSF CAREER Award, the Outstanding Paper Award at the 2002 Symposium on Network and Distributed System Security, and the Outstanding Student Paper Award at the 2016 European Symposium on Research in Computer Security.

 

Voltar

Topo