Show simple item record

dc.contributor.author
Sommer, David
dc.contributor.author
Dhar, Aritra
dc.contributor.author
Malisa, Luka
dc.contributor.author
Mohammadi, Esfandiar
dc.contributor.author
Ronzani, Daniel
dc.contributor.author
Capkun, Srdjan
dc.date.accessioned
2019-08-06T10:44:35Z
dc.date.available
2019-08-06T10:35:19Z
dc.date.available
2019-08-06T10:44:35Z
dc.date.issued
2019
dc.identifier.isbn
978-1-931971-49-2
en_US
dc.identifier.uri
http://hdl.handle.net/20.500.11850/356819
dc.identifier.doi
10.3929/ethz-b-000286317
dc.description.abstract
Downloading or uploading controversial information can put users at risk, making them hesitant to access or share such information. While anonymous communication networks (ACNs) are designed to hide communication meta-data, already connecting to an ACN can raise suspicion. In order to enable plausible deniability while providing or accessing controversial information, we design CoverUp: a system that enables users to asynchronously upload and download data. The key idea is to involve visitors from a collaborating website. This website serves a JavaScript snippet, which, after user's consent produces cover traffic for the controversial site / content. This cover traffic is indistinguishable from the traffic of participants interested in the controversial content; hence, they can deny that they actually up- or downloaded any data. CoverUp provides a feed-receiver that achieves a downlink rate of 10 to 50 Kbit/s. The indistinguishability guarantee of the feed-receiver holds against strong global network-level attackers who control everything except for the user's machine. We extend CoverUp to a full upload and download system with a rate of 10 up to 50 Kbit/s. In this case, we additionally need the integrity of the JavaScript snippet, for which we introduce a trusted party. The analysis of our prototype shows a very small timing leakage, even after half a year of continual observation. Finally, as passive participation raises ethical and legal concerns for the collaborating websites and the visitors of the collaborating website, we discuss these concerns and describe how they can be addressed.
en_US
dc.format
application/pdf
en_US
dc.language.iso
en
en_US
dc.publisher
USENIX Association
en_US
dc.rights.uri
http://rightsstatements.org/page/InC-NC/1.0/
dc.title
Deniable upload and download via passive participation
en_US
dc.type
Conference Paper
dc.rights.license
In Copyright - Non-Commercial Use Permitted
ethz.book.title
Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation
en_US
ethz.pages.start
649
en_US
ethz.pages.end
666
en_US
ethz.size
18 p.
en_US
ethz.version.deposit
acceptedVersion
en_US
ethz.event
16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2019)
en_US
ethz.event.location
Boston, MA, USA
en_US
ethz.event.date
February 26-28, 2019
en_US
ethz.identifier.wos
ethz.publication.place
Berkeley, CA
en_US
ethz.publication.status
published
en_US
ethz.leitzahl
ETH Zürich::00002 - ETH Zürich::00012 - Lehre und Forschung::00007 - Departemente::02150 - Dep. Informatik / Dep. of Computer Science::02660 - Institut für Informationssicherheit::03634 - Basin, David / Basin, David
en_US
ethz.leitzahl
ETH Zürich::00002 - ETH Zürich::00012 - Lehre und Forschung::00007 - Departemente::02150 - Dep. Informatik / Dep. of Computer Science::02660 - Institut für Informationssicherheit::03755 - Capkun, Srdan / Capkun, Srdan
en_US
ethz.leitzahl.certified
ETH Zürich::00002 - ETH Zürich::00012 - Lehre und Forschung::00007 - Departemente::02150 - Dep. Informatik / Dep. of Computer Science::02660 - Institut für Informationssicherheit::03634 - Basin, David / Basin, David
en_US
ethz.leitzahl.certified
ETH Zürich::00002 - ETH Zürich::00012 - Lehre und Forschung::00007 - Departemente::02150 - Dep. Informatik / Dep. of Computer Science::02660 - Institut für Informationssicherheit::03755 - Capkun, Srdan / Capkun, Srdan
ethz.date.deposited
2018-08-31T22:03:53Z
ethz.source
WOS
ethz.source
FORM
ethz.eth
yes
en_US
ethz.availability
Open access
en_US
ethz.rosetta.installDate
2019-08-06T10:44:45Z
ethz.rosetta.lastUpdated
2019-08-06T10:44:45Z
ethz.rosetta.versionExported
true
dc.identifier.olduri
http://hdl.handle.net/20.500.11850/355884
dc.identifier.olduri
http://hdl.handle.net/20.500.11850/355883
dc.identifier.olduri
http://hdl.handle.net/20.500.11850/286317
ethz.COinS
ctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.atitle=Deniable%20upload%20and%20download%20via%20passive%20participation&rft.date=2019&rft.spage=649&rft.epage=666&rft.au=Sommer,%20David&Dhar,%20Aritra&Malisa,%20Luka&Mohammadi,%20Esfandiar&Ronzani,%20Daniel&rft.isbn=978-1-931971-49-2&rft.genre=proceeding&rft_id=info:doi/978-1-931971-49-2&rft.btitle=Proceedings%20of%20the%2016th%20USENIX%20Symposium%20on%20Networked%20Systems%20Design%20and%20Implementation
 Search via SFX

Files in this item

Thumbnail

Publication type

Show simple item record