UFS › SIGAA - Sistema Integrado de Gestão de Atividades Acadêmicas São Cristóvão, 23 de Abril de 2024

A UFS preocupa-se com a sua privacidade

A UFS poderá coletar informações básicas sobre a(s) visita(s) realizada(s) para aprimorar a experiência de navegação dos visitantes deste site, segundo o que estabelece a Política de Privacidade de Dados Pessoais. Ao utilizar este site, você concorda com a coleta e tratamento de seus dados pessoais por meio de formulários e cookies.

Ciente


Notícias

Palestra: "Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning"
05/11/2018 14:14


Convidamos a todos os discentes para participar da palestra: Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning. Em visita a nossa universidade, o diretor do Centro de Segurança Cibernética da RIT e professor de Computação Matt Wright, estará palestrando no dia 08 de novembro de 2018 às 12hs da manhã no auditório do DCOMP. Palestra: "Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning" Abstract: Website fingerprinting enables a local eavesdropper to determine which websites a user is visiting over an encrypted connection. State-of-the-art website fingerprinting attacks have been shown to be effective even against Tor. Recently, lightweight website fingerprinting defenses for Tor have been proposed that substantially degrade existing attacks: WTF-PAD and Walkie-Talkie. In this work, we present Deep Fingerprinting (DF), a new website fingerprinting attack against Tor that leverages a type of deep learning called Convolutional Neural Networks (CNN) with a sophisticated architecture design, and we evaluate this attack against WTF-PAD and Walkie-Talkie. The DF attack attains over 98% accuracy on Tor traffic without defenses, better than all prior attacks, and it is also the only attack that is effective against WTF-PAD with over 90% accuracy. Walkie-Talkie remains effective, holding the attack to just 49.7% accuracy. In the more realistic open-world setting, our attack remains effective, with 0.99 precision and 0.94 recall on undefended traffic. Against traffic defended with WTF-PAD in this setting, the attack still can get 0.96 precision and 0.68 recall. These findings highlight the need for effective defenses that protect against this new attack and that could be deployed in Tor. Bio: Matt Wright is the Director of the Center for Cybersecurity at RIT and a Professor of Computing Security. He graduated with his PhD from the Department of Computer Science at the University of Massachusetts in May, 2005, where he earned his MS in 2002. His dissertation work examined attacks and defenses for systems that provide anonymity online. His other interests include adversarial machine learning, understanding the human element of security, and security and privacy in all sorts of distributed systems, including peer-to-peer, mobile, and Internet of Things. Previously, he earned his BS degree in Computer Science at Harvey Mudd College. He is a recipient of the NSF CAREER Award, the Outstanding Paper Award at the 2002 Symposium on Network and Distributed System Security, and the Outstanding Student Paper Award at the 2016 European Symposium on Research in Computer Security. Aguardamos vocês!!!!

SIGAA | Superintendência de Tecnologia da Informação/UFS | Telefonista/UFS (79)3194-6600 | Copyright © 2009-2024 - UFRN v3.5.16 -r19110-7eaa891a10