Accessibility Tools
Os Seminários PESC têm como objetivo trazer palestras acessíveis a um público mais amplo, ministradas por pesquisadores e professores mais experientes (tanto do PESC como de instituições externas). Ao longo do ano, teremos temas e focos variados, podendo ser mais específicos ou mais abrangentes.
A apresentação e discussão de ideias novas e antigas de diferentes temas contribui de maneira fundamental para a formação e pesquisa desenvolvida por alunos e professores, sendo muitas vezes de interesse de um público mais amplo.
Os Seminários que são on-line ou híbridos ficam gravados no Canal do PESC no YouTube, que apresenta muitas outras gravações importantes sobre o que acontece no PESC.
Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning
Matt Wright, Director of the Center for Cybersecurity, Rochester Institute of Technology (RIT)
5 de novembro (segunda), 11h, sala H-324B
Website fingerprinting enables a local eavesdropper to determine which websites a user is visiting over an encrypted connection. State-of-the-art website fingerprinting attacks have been shown to be effective even against Tor. Recently, lightweight website fingerprinting defenses for Tor have been proposed that substantially degrade existing attacks: WTF-PAD and Walkie-Talkie. In this work, we present Deep Fingerprinting (DF), a new website fingerprinting attack against Tor that leverages a type of deep learning called Convolutional Neural Networks (CNN) with a sophisticated architecture design, and we evaluate this attack against WTF-PAD and Walkie-Talkie. The DF attack attains over 98% accuracy on Tor traffic without defenses, better than all prior attacks, and it is also the only attack that is effective against WTF-PAD with over 90% accuracy. Walkie-Talkie remains effective, holding the attack to just 49.7% accuracy. In the more realistic open-world setting, our attack remains effective, with 0.99 precision and 0.94 recall on undefended traffic. Against traffic defended with WTF-PAD in this setting, the attack still can get 0.96 precision and 0.68 recall. These findings highlight the need for effective defenses that protect against this new attack and that could be deployed in Tor.
Matt Wright is the Director of the Center for Cybersecurity at RIT and a Professor of Computing Security. He graduated with his PhD from the Department of Computer Science at the University of Massachusetts in May, 2005, where he earned his MS in 2002. His dissertation work examined attacks and defenses for systems that provide anonymity online. His other interests include adversarial machine learning, understanding the human element of security, and security and privacy in all sorts of distributed systems, including peer-to-peer, mobile, and Internet of Things. Previously, he earned his BS degree in Computer Science at Harvey Mudd College. He is a recipient of the NSF CAREER Award, the Outstanding Paper Award at the 2002 Symposium on Network and Distributed System Security, and the Outstanding Student Paper Award at the 2016 European Symposium on Research in Computer Security.