Due to the great turnout and interest at this year's event, we have decided to make the meet up an annual event. Please see http://www.bayareasrs.org/2015/ for the most up to date information on this event.

Berkeley-Stanford Security Meetup 2015

Apr 10, 2015 at 2:00 PM at Dropbox SF Office

Title: "How to Spread Rumours Anonymously"
Speaker: Giulia Fanti (Berkeley PhD student)

Abstract: Anonymous messaging platforms, such as Secret, Whisper, and Yik Yak, allow people to share their thoughts without fear of judgment by friends, family, or the public. Such anonymous platforms are particularly useful in nations with authoritarian governments, where the right to free expression and sometimes the personal safety of message authors depend on anonymity. We address the problem of anonymously broadcasting a message over a network, such as a social network. Recent advances in rumor source detection imply that existing messaging protocols could allow a moderately strong adversary to infer the source of a message with high probability, using only knowledge of the underlying social graph and limited information about who saw the message. We introduce a novel messaging protocol, which we call adaptive diffusion, and show that it spreads messages quickly while hiding the source node with provable anonymity guarantees. In particular, when the underlying contact network is an infinite regular tree, nearly all users with the message are equally likely to have originated the message. We show through simulation that adaptive diffusion effectively hides the location of the source even when the graph is finite, irregular and has cycles.


Title: "Privacy-Preserving Shortest Path Computation”
Speaker: David Wu (Stanford PhD student)

Abstract: Navigation is one of the most popular location-based services today. But in virtually all cloud-based navigation systems, the client must reveal her location or intended destination to the cloud in order to learn the fastest route. In this talk, I will describe a new protocol for computing shortest paths in road networks that provides privacy for both the client’s query and for the map provider’s routing data. First, I will describe an efficient method for compressing the next-hop routing matrices for road networks. Applying this method to the map of Los Angeles, I show that we can achieve over tenfold reduction in the representation size. Moreover, the structure of our compressed representation enables an efficient cryptographic protocol suitable for real-time navigation in cities. To conclude the talk, I will describe our implementation of our private routing protocol and discuss some of the benchmarks we performed on real road networks for major cities such as Washington D.C. and Los Angeles. Joint work with Joe Zimmerman, Jeremy Planul, and John Mitchell


Title: "BlindBox: Deep Packet Inspection over Encrypted Data"
Speaker: Justine Sherry (Berkeley PhD student)

Abstract: Many network middleboxes perform deep packet inspection, a set of useful tasks which examine packet payloads. These tasks include intrusion detection (IDS), exfiltration detec- tion, and parental filtering. However, a long-standing issue is that once packets are sent over https, the middleboxes can no longer accomplish their tasks because the payloads are encrypted. Hence, one is faced with choosing at most one of two desirable properties: the functionality of the middleboxes and the privacy of encryption.
We propose BlindBox, a novel system that for the first time enables both properties together. The approach of Blind- Box is to perform the deep-packet inspection directly on the encrypted traffic. We demonstrate how BlindBox enables applications such as IDS, exfiltration detection and parental filtering; BlindBox supports real rulesets from both open source (Snort) DPI systems as well as rulesets from industrial DPI systems developed by two security companies. While BlindBox’s performance is not yet ready for real deployment, BlindBox is nearly practical and improves performance by more than 106 times as compared to a direct application of cryptography.

Bio: Justine Sherry is a doctoral candidate at UC Berkeley. Her interests are in computer networking; she has published on middleboxes, measurement, Internet architecture, and congestion control. Her dissertation focuses on the new challenges presented by the wide deployment of middleboxes such as firewalls, proxies, and WAN Optimizers. Although these devices can make networks faster and more secure, they also introduced new manageability, complexity, reliability, and privacy challenges -- challenges which Justine's dissertation addresses through adapting techniques from classical software systems and cloud computing. Justine received her MS from UC Berkeley in 2012, and her BS and BA from the University of Washington in 2010. She is an NSF Graduate Research Fellow and is always on the lookout for a great cappuccino.


Title: "Building a key directory with verifiable global consistency"
Speaker: Joe Bonneau (Stanford Post-doc)

Abstract: Mass data collection can only be countered by mass encryption. Apple iMessage and WhatsApp have shown that end-to-end encryption can be deployed transparently to messaging applications with hundreds of millions of users, but key management remains centralized in both systems and vulnerable to manipulation by the service provider. This talk will discuss a new protocol to address this by allowing a central key server to prove to all participants that it is serving keys consistently to all users. Our proposed protocol, CONIKS, has been developed in consort with several major messaging providers and we are expecting significant deployment in 2015. This partnership has introduced us to many difficult practical problems, including allowing participants to efficiently verify the consistency of their own data, minimizing bandwidth requirements, allowing new users to be enrolled with no latency, and ensuring privacy by not leaking the list of usernames in the system or the total number of users in the system.


Title: "PowerSpy: Location Tracking using Mobile Device Power Analysis"
Speaker: Yan Michalevsky (Stanford PhD student)

Abstract: Modern mobile platforms like Android enable applications to read aggregate power usage on the phone. This information is considered harmless and reading it requires no user permission or notification. We show that by simply reading the phone's aggregate power consumption over a period of a few minutes an application can learn information about the user's location. Aggregate phone power consumption data is extremely noisy due to the multitude of components and applications that simultaneously consume power. Nevertheless, by using machine learning algorithms we are able to successfully infer the phone’s location. We discuss several ways in which this privacy leak can be remedied.

Bio: Yan Michalevsky is a PhD student at Stanford University, advised by Dan Boneh. He recently focused on mobile security and privacy. His works on side-channel attacks on mobile devices were presented at Usenix and BlackHat security conferences. Previously, he held several positions in industry as a team manager, independent contractor, and software architect and developer, mostly in the fields of networks, embedded software and security. He holds a BSc in Electrical Engineering from the Technion, and an MS in Electrical Engineering from Stanford University.


Title: "Smart Locks: Lessons for Securing Cyber-Physical Authentication in the Internet of Things"
Speaker: Grant Ho (Berkeley PhD student)

Abstract: Recently, many lock manufacturers and startups have begun selling commodity home smart locks: cyber-physical devices that replace traditional door locks with electronically-controlled deadbolts. We present five categories of general attacks against smart lock systems and analyze the security of two commercially-available smart locks with respect to these attacks. Our security analysis reveals that flaws in the predominant system design used by many existing smart locks leaves them vulnerable to our attacks.
While several of these vulnerabilities can be remedied by the defenses we suggest, a number of attacks do not have clear, known solutions and may require significant system design changes; in some cases, there also appears to be a tension between usability and security. These weaknesses highlight interesting problems for future research on the security of the Internet of Things. We take a first step towards resolving one of these open problems by proposing Touch Verified Intent Communication, a mechanism that achieves strong security guarantees without disrupting the user's natural behavior and interaction process.

Bio: Grant Ho is a first-year Ph.D. student at UC Berkeley, where he is advised by Vern Paxson, David Wagner, and Dawn Song. His research focuses on large-scale systems security, with a particular interest in studying the security of the Internet of Things and making authentication mechanisms usably secure against even sophisticated, nation-state adversaries. Grant received his BS from Stanford University in 2014, where he researched novel topics in web malware and mobile authentication with Dan Boneh. Over the past few years, he has also worked closely with Google's Safe Browsing team, led by Niels Provos.

Security Lab