Show simple item record

dc.contributor.authorBock, Kevin
dc.date.accessioned2020-09-18T15:51:21Z
dc.date.available2020-09-18T15:51:21Z
dc.date.issued2020-09-11
dc.identifier.urihttp://hdl.handle.net/1853/63713
dc.descriptionPresented online via Bluejeans on September 11, 2020 at 12:00 p.m.en_US
dc.descriptionKevin is a Cyber Network Operations Developer with ManTech, developing new capabilities to support active cyber missions. He is an ACES alumni of the inaugural ACES class. He is also a computer science Ph.D. student at University of Maryland.en_US
dc.descriptionRuntime: 38:33 minutesen_US
dc.description.abstractResearchers and censoring regimes have long engaged in a cat-and-mouse game, leading to increasingly sophisticated censorship techniques and methods to evade them. Unfortunately, censors have long had an inherent advantage in this arms race, because discovering new censorship evasion techniques has, to date, been a laborious, manual process. Details of censors' infrastructure and implementation are generally not publicly known, and thus researchers typically must first measure and develop an understanding of how a particular censor works before they can develop strategies to evade them.I propose to evaluate the following thesis: It is possible to efficiently automate the discovery of censorship evasion techniques under all deployment scenarios. There are four possible ways to deploy a censorship evasion mechanism: at the client-side, at the server-side, at both, or at neither (via an o -path third-path). My work will develop techniques for automatically discovering evasion strategies in all of these deployment scenarios.The foundation of my approach is my prior work Geneva, a genetic algorithm that discovers novel censorship evasion strategies that run at either the client or the server. Geneva has discovered dozens of new censorship evasion strategies against real-world censors, including the rst ever strategies that can be run exclusively from the server. In the first part of my proposal, I review the design of Geneva and its results from real deployments. In the second part, I propose developing automated censorship evasion techniques for the remaining two deployment scenarios: joint client/server evasion and o -path third-party evasion. I also propose to extend Geneva to be able to automatically identify new application-layer evasion techniques exclusively at the client or the server.en_US
dc.format.extent38:33 minutes
dc.language.isoen_USen_US
dc.publisherGeorgia Institute of Technologyen_US
dc.relation.ispartofseriesCybersecurity Lecture Series
dc.subjectCensorshipen_US
dc.subjectGenetic Evasionen_US
dc.subjectGenevaen_US
dc.subjectMachine learningen_US
dc.titleAutomating the Discovery of Censorship Evasion Strategiesen_US
dc.typeMoving Image
dc.contributor.corporatenameGeorgia Institute of Technology. Institute for Information Security & Privacyen_US
dc.contributor.corporatenameUniversity of Maryland. Dept. of Computer Scienceen_US
dc.type.genreLecture


Files in this item

Thumbnail
Thumbnail
Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record