Browsing Mathematics (Faculty of) by Supervisor "Goldberg, Ian"
Now showing items 1-11 of 11
-
Building a Better Tor Experimentation Platform from the Magic of Dynamic ELFs
(University of Waterloo, 2017-10-30)Tor is the most popular tool for providing online anonymity. It is used by journalists, activists, and privacy-conscious individuals to provide low-latency private access to the Internet. However, Tor’s specific design and ... -
End-to-End Encrypted Group Messaging with Insider Security
(University of Waterloo, 2021-08-11)Our society has become heavily dependent on electronic communication, and preserving the integrity of this communication has never been more important. Cryptography is a tool that can help to protect the security and privacy ... -
Lox: Protecting the Social Graph in Bridge Distribution
(University of Waterloo, 2022-05-26)Access to the open Internet, free from surveillance and censorship, is an important part of fulfilling the right to privacy. Despite this, in many regions of the world, censorship of the Internet is used to limit access ... -
Mitigator: Privacy policy compliance using Intel SGX
(University of Waterloo, 2019-06-19)Privacy policies have been known to be hard to read and understand by internet users and yet users are obliged to accept these one-sided terms of usage of their data before they can effectively use websites. Although ... -
PRSONA: Private Reputation Supporting Ongoing Network Avatars
(University of Waterloo, 2021-12-09)Trust and user-generated feedback have become increasingly vital to the normal functioning of the modern internet. However, deployed systems that currently incorporate such feedback do not guarantee users much in the way ... -
Recipes for Resistance: A Censorship Circumvention Cookbook
(University of Waterloo, 2018-08-16)The increasing centralization of Internet infrastructure and web services, along with advancements in the application of machine learning techniques to analyze and classify network traffic, have enabled the growth and ... -
Robot Social Engineering
(University of Waterloo, 2020-07-06)This thesis establishes the new field of Robot Social Engineering. We define Robot Social Engineering as the use of social abilities and techniques by robots to manipulate others in order to achieve a goal. We build the ... -
StyleCounsel: Seeing the (Random) Forest for the Trees in Adversarial Code Stylometry
(University of Waterloo, 2018-01-12)Authorship attribution has piqued the interest of scholars for centuries, but had historically remained a matter of subjective opinion, based upon examination of handwriting and the physical document. Midway through the ... -
Walking Onions: Scaling Distribution of Information Safely in Anonymity Networks
(University of Waterloo, 2020-08-07)Scaling anonymity networks offers unique security challenges, as attackers can exploit differing views of the network’s topology to perform epistemic and route capture attacks. Anonymity networks in practice, such as ... -
Weaving a Faster Tor: A Multi-Threaded Relay Architecture for Improved Throughput
(University of Waterloo, 2020-08-10)The Tor anonymity network has millions of daily users and thousands of volunteer-run relays, but growing it further has several research and deployment challenges. One such challenge is supporting the increase in bandwidth ... -
Website Fingerprinting: Attacks and Defenses
(University of Waterloo, 2016-01-13)Website fingerprinting attacks allow a local, passive eavesdropper to determine a client's web activity by leveraging features from her packet sequence. These attacks break the privacy expected by users of privacy technologies, ...