COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring. |
University of Cambridge > Talks.cam > Microsoft Research Cambridge, public talks > Censorship Circumvention: Staying Ahead in a Cat-and-Mouse Game
Censorship Circumvention: Staying Ahead in a Cat-and-Mouse GameAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Microsoft Research Cambridge Talks Admins. This event may be recorded and made available internally or externally via http://research.microsoft.com. Microsoft will own the copyright of any recordings made. If you do not wish to have your image/voice recorded please consider this before attending The Internet enables access to a wide variety of information sources; many countries and organizations, however, try to restrict such access for political and social reasons. People whose access has been censored make use of a variety of circumvention technologies to find the information they need; in turn, the censors use increasingly sophisticated tools to render these technologies ineffective. One of the most powerful techniques available to the censors has been the insider attack, wherein the censor pretends to be a user of a system in order to learn secret information about its functions. For example, censors continually update a blacklist of IP addresses belonging to circumvention proxies. I will discuss some new techniques designed specifically resist this insider threat. rBridge focuses on the distribution of proxy addresses to users. It tracks the reputation score of each user, representing the likelihood of this user revealing a proxy address to the censors, and uses an introduction mechanism to resist Sybil attacks. A particular challenge of rBridge is to preserve the privacy of its users by keeping the knowledge about which users know which proxies secret. Cirripede is an alternate approach that seeks to eliminate the insider threat entirely. It uses redirection proxies that are activated by a special cryptographic signal, which can be generated using only public information but can only be recognized by the proxies. Instead of hiding the location of the proxies, Cirripede places them in highly connected ISPs, such that blocking Cirripede would result in high collateral damage. This talk is part of the Microsoft Research Cambridge, public talks series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsCambridge Usability Group Cambridge University Data Science Society CUEX Presents: On Foot Across China And Other Human Powered Adventures CMS Seminars from business and industry Introducing the Cambridge Migration Research Forum (CAMMIGRES): An Event for New Graduates Graduate Workshop in Economic and Social HistoryOther talksVision Journal Club: feedforward vs back in figure ground segmentation Michael Alexander Gage and the mapping of Liverpool, 1828–1836 Constraint Analysis and Optimization in Medicine Development and Supply Streptococcus suis - managing a global zoonotic pathogen of pigs All-resolutions inference for brain imaging Developing and Selecting Tribological Coatings Dynamics of Phenotypic and Genomic Evolution in a Long-Term Experiment with E. coli Lunchtime Talk: Helen's Bedroom 'Walking through Language – Building Memory Palaces in Virtual Reality' Microtubule Modulation of Myocyte Mechanics Towards a whole brain model of perceptual learning Open as a Tool to Change Ecosystems |