Conference Reports Carl E. Landwehr, [email protected]

Privacy-Enhancing Technologies


he sixth annual Workshop on Privacy Enhancing Technologies (PET) was held in Cambridge, England, from 28–30 June 2006. The workshop included sessions focusing on real-world privacy,

cryptography, multiparty computation, and traffic analysis. This year’s PET workshop was colocated with the Workshop on Economics of Information Security (WEIS) and the Workshop on Trustworthy Elections (WOTE). Sun Microsystems’s Susan Landau delivered a keynote speech on the current state of data-collection privacy. Expressing concern over recent developments, such as the US National Security Agency’s wiretapping program, Landau called on researchers to consider the ethical and societal impact of their work with regard to individual privacy. She praised Pugwash organizations ( that educate scientists on ethical issues. Richard Clayton of Cambridge University presented a notable talk detailing how to circumvent the “great firewall of China” with which the Chinese government censors the Internet for its citizens. Based on a paper coauthored with Steven J. Murdoch and Robert N.M. Watson, also from Cambridge, Clayton described how China’s firewall searches for forbidden keywords such as “falun” (as in the Falun Gong group banned in China) inside TCP packets. Upon detecting a censored word, the firewall forges TCP reset messages to both ends of the connection. Standard TCP implementations honor the forged reset messages and

shut down the connections. The firewall then automatically forges reset messages to both parties for about 20 minutes. Yet, TCP stack implementations can easily detect and safely ignore the forged reset messages. If both ends of the connection ignore the forged reset packets, the forbidden traffic proceeds unmolested. Clayton described how sending messages containing verboten words to users inside the firewall triggers the 20minute “cool down” period. Clayton suggested that if TCP stacks ignored forged reset packets by default, Chinese users could circumvent the firewall with plausible deniability—they wouldn’t be running any special software. Simson Garfinkel of the US Naval Postgraduate School and David Malan of Harvard University, presented a paper discussing disk data sanitization. Garfinkel and Malan tested several standard sanitization tools on various file systems and measured how much data could be recovered. They also tested simply filling a disk with one big file as a sanitization technique. As the title of Garfinkel and Malan’s paper states, “One Big File Is Not Enough” to sanitize a disk because they reliably recovered file names and, often, slack space in spite of sanitization attempts.


Anonymizing mix networks, particularly Tor (, were the subject of multiple talks during the workshop. Tor inventors Roger Dingledine of the FreeHaven project and Paul Syverson from the US Naval Research Laboratory presented several mix network-related papers. Their paper, coauthored with Andrei Serjantov, also of the FreeHaven project, described alpha mixing, which lets users in a mix network like Tor specify performance and anonymity trade-offs on a per message basis. The University of Waterloo’s Ian Goldberg also presented a formal proof of security for the Tor authentication protocol. Tor uses its own custom protocol, rather than a well-established authentication protocol. Goldberg showed that Tor’s custom authentication protocol is in fact secure in the random oracle model and under standard cryptographic assumptions.

STEPHEN A. WEIS Independent Consultant

verall, the conference offered a broad range of both theoretical and practical privacy-enhancing constructions, attacks against existing schemes, and policy-framework analysis. The breadth of privacyrelated topics covered at PET 2006 made it an interesting, accessible, and educational conference to attend. The seventh PET workshop is scheduled to take place in 2007 and will likely be held in the US.


Stephen A. Weis is a software engineer. His research interests include cryptography, information security, and privacy. Weis has a PhD in computer science from the Massachusetts Institute of Technology. Contact him at [email protected].

1540-7993/06/$20.00 © 2006 IEEE



Privacy-Enhancing Technologies - IEEE Xplore

filling a disk with one big file as a san- ... “One Big File Is Not Enough” to ... analysis. The breadth of privacy- related topics covered at PET 2006 made it an ...

35KB Sizes 3 Downloads 351 Views

Recommend Documents

Fiber Optic Communication Technologies: What's ... - IEEE Xplore
tional search to online interactive maps, social networks ... more and more popular, and rapidly growing. ... Most of these network demands, although invisi-.

Fiber Optic Communication Technologies - IEEE Xplore
the deployment of broadband access networks around the world. The proliferation of access bandwidths offered by technologies such as fiber to the home (FTTH) has led to the mushroom- ing of many new web applications, from tradi- tional search to onli

IEEE Photonics Technology - IEEE Xplore
Abstract—Due to the high beam divergence of standard laser diodes (LDs), these are not suitable for wavelength-selective feed- back without extra optical ...

wright layout - IEEE Xplore
tive specifications for voice over asynchronous transfer mode (VoATM) [2], voice over IP. (VoIP), and voice over frame relay (VoFR) [3]. Much has been written ...

Device Ensembles - IEEE Xplore
Dec 2, 2004 - time, the computer and consumer electronics indus- tries are defining ... tered on data synchronization between desktops and personal digital ...

wright layout - IEEE Xplore
ACCEPTED FROM OPEN CALL. INTRODUCTION. Two trends motivate this article: first, the growth of telecommunications industry interest in the implementation ...

Evolutionary Computation, IEEE Transactions on - IEEE Xplore
search strategy to a great number of habitats and prey distributions. We propose to synthesize a similar search strategy for the massively multimodal problems of ...

I iJl! - IEEE Xplore
Email: [email protected]. Abstract: A ... consumptions are 8.3mA and 1.lmA for WCDMA mode .... 8.3mA from a 1.5V supply under WCDMA mode and.

Gigabit DSL - IEEE Xplore
(DSL) technology based on MIMO transmission methods finds that symmetric data rates of more than 1 Gbps are achievable over four twisted pairs (category 3) ...

IEEE CIS Social Media - IEEE Xplore
Feb 2, 2012 - interact (e.g., talk with microphones/ headsets, listen to presentations, ask questions, etc.) with other avatars virtu- ally located in the same ...

Grammatical evolution - Evolutionary Computation, IEEE ... - IEEE Xplore
definition are used in a genotype-to-phenotype mapping process to a program. ... evolutionary process on the actual programs, but rather on vari- able-length ...

SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services. ∗. Feiyi Wang, Frank Jou. Advanced Network Research Group. MCNC. Research Triangle Park, NC. Email: {fwang2,jou} Fengmin Gong. Intrusion Detection Technology Divi

striegel layout - IEEE Xplore
tant events can occur: group dynamics, network dynamics ... network topology due to link/node failures/addi- ... article we examine various issues and solutions.

Digital Fabrication - IEEE Xplore
we use on a daily basis are created by professional design- ers, mass-produced at factories, and then transported, through a complex distribution network, to ...

Iv~~~~~~~~W - IEEE Xplore
P. Arena, L. Fortuna, G. Vagliasindi. DIEES - Dipartimento di Ingegneria Elettrica, Elettronica e dei Sistemi. Facolta di Ingegneria - Universita degli Studi di Catania. Viale A. Doria, 6. 95125 Catania, Italy [email protected]. ABSTRACT. The no

Device Ensembles - IEEE Xplore
Dec 2, 2004 - Device. Ensembles. Notebook computers, cell phones, PDAs, digital cameras, music players, handheld games, set-top boxes, camcorders, and.

Fountain codes - IEEE Xplore
7 Richardson, T., Shokrollahi, M.A., and Urbanke, R.: 'Design of capacity-approaching irregular low-density parity check codes', IEEE. Trans. Inf. Theory, 2001 ...

Multipath Matching Pursuit - IEEE Xplore
Abstract—In this paper, we propose an algorithm referred to as multipath matching pursuit (MMP) that investigates multiple promising candidates to recover ...

Binder MIMO Channels - IEEE Xplore
Abstract—This paper introduces a multiple-input multiple- output channel model for the characterization of a binder of telephone lines. This model is based on ...

Low-power design - IEEE Xplore
tors, combine microcontroller architectures with some high- performance analog circuits, and are routinely produced in tens of millions per year with a power ...

ATC2012_Proceedings_core1-LAST FINAL - IEEE Xplore
Abstract—In the context of energy constrained wireless sensor networks where individual nodes can cooperate together to deploy the cooperative ...

Bandlimited Intensity Modulation - IEEE Xplore
Abstract—In this paper, the design and analysis of a new bandwidth-efficient signaling method over the bandlimited intensity-modulated direct-detection (IM/DD) ...

The Viterbi Algorithm - IEEE Xplore
HE VITERBI algorithm (VA) was proposed in 1967 as a method of decoding convolutional codes. Since that time, it has been recognized as an attractive solu-.

ex + 111+ ex - IEEE Xplore
[10] D. P. Standord, “Stability for a multi-rate sampled-data system,” SIAM ... thesis for the quadratic stabilization of a pair of unstable linear systems,”. Eur.