Matches in SemOpenAlex for { <https://semopenalex.org/work/W2809366232> ?p ?o ?g. }
Showing items 1 to 83 of
83
with 100 items per page.
- W2809366232 abstract "At the first Information Hiding Workshop in 1996 we tried to clarify the models and assumptions behind information hiding. We agreed the terminology of cover text and stego text against a background of the game proposed by our keynote speaker Gus Simmons: that Alice and Bob are in jail and wish to hatch an escape plan without the fact of their communication coming to the attention of the warden, Willie. Since then there have been significant strides in developing technical mechanisms for steganography and steganalysis, with new techniques from machine learning providing ever more powerful tools for the analyst, such as the ensemble classifier. There have also been a number of conceptual advances, such as the square root law and effective key length. But there always remains the question whether we are using the right security metrics for the application. In this talk I plan to take a step backwards and look at the systems context. When can stegosystems actually be used? The deployment history is patchy, with one being Trucrypt's hidden volumes, inspired by the steganographic file system. Image forensics also find some use, and may be helpful against some adversarial machine learning attacks (or at least help us understand them). But there are other contexts in which patterns of activity have to be hidden for that activity to be effective. I will discuss a number of examples starting with deception mechanisms such as honeypots, Tor bridges and pluggable transports, which merely have to evade detection for a while; then moving on to the more challenging task of designing deniability mechanisms, from leaking secrets to a newspaper through bitcoin mixes, which have to withstand forensic examination once the participants come under suspicion. We already know that, at the system level, anonymity is hard. However the increasing quantity and richness of the data available to opponents may move a number of applications from the deception category to that of deniability. To pick up on our model of 20 years ago, Willie might not just put Alice and Bob in solitary confinement if he finds them communicating, but torture them or even execute them. Changing threat models are historically one of the great disruptive forces in security engineering. This leads me to suspect that a useful research area may be the intersection of deception and forensics, and how information hiding systems can be designed in anticipation of richer and more complex threat models. The ever-more-aggressive censorship systems deployed in some parts of the world also raise the possibility of using information hiding techniques in censorship circumvention. As an example of recent practical work, I will discuss Covertmark, a toolkit for testing pluggable transports that was partly inspired by Stirmark, a tool we presented at the second Information Hiding Workshop twenty years ago." @default.
- W2809366232 created "2018-06-29" @default.
- W2809366232 creator A5046983053 @default.
- W2809366232 date "2018-06-14" @default.
- W2809366232 modified "2023-09-27" @default.
- W2809366232 title "Covert and Deniable Communications" @default.
- W2809366232 doi "https://doi.org/10.1145/3206004.3206023" @default.
- W2809366232 hasPublicationYear "2018" @default.
- W2809366232 type Work @default.
- W2809366232 sameAs 2809366232 @default.
- W2809366232 citedByCount "1" @default.
- W2809366232 countsByYear W28093662322022 @default.
- W2809366232 crossrefType "proceedings-article" @default.
- W2809366232 hasAuthorship W2809366232A5046983053 @default.
- W2809366232 hasConcept C103377522 @default.
- W2809366232 hasConcept C107368093 @default.
- W2809366232 hasConcept C108801101 @default.
- W2809366232 hasConcept C111919701 @default.
- W2809366232 hasConcept C115961682 @default.
- W2809366232 hasConcept C136764020 @default.
- W2809366232 hasConcept C138885662 @default.
- W2809366232 hasConcept C151730666 @default.
- W2809366232 hasConcept C154945302 @default.
- W2809366232 hasConcept C15744967 @default.
- W2809366232 hasConcept C184842701 @default.
- W2809366232 hasConcept C191267431 @default.
- W2809366232 hasConcept C26517878 @default.
- W2809366232 hasConcept C2779267917 @default.
- W2809366232 hasConcept C2779338814 @default.
- W2809366232 hasConcept C2779343474 @default.
- W2809366232 hasConcept C29024540 @default.
- W2809366232 hasConcept C3073032 @default.
- W2809366232 hasConcept C37736160 @default.
- W2809366232 hasConcept C38652104 @default.
- W2809366232 hasConcept C41008148 @default.
- W2809366232 hasConcept C41895202 @default.
- W2809366232 hasConcept C547195049 @default.
- W2809366232 hasConcept C77805123 @default.
- W2809366232 hasConcept C79974875 @default.
- W2809366232 hasConcept C86803240 @default.
- W2809366232 hasConceptScore W2809366232C103377522 @default.
- W2809366232 hasConceptScore W2809366232C107368093 @default.
- W2809366232 hasConceptScore W2809366232C108801101 @default.
- W2809366232 hasConceptScore W2809366232C111919701 @default.
- W2809366232 hasConceptScore W2809366232C115961682 @default.
- W2809366232 hasConceptScore W2809366232C136764020 @default.
- W2809366232 hasConceptScore W2809366232C138885662 @default.
- W2809366232 hasConceptScore W2809366232C151730666 @default.
- W2809366232 hasConceptScore W2809366232C154945302 @default.
- W2809366232 hasConceptScore W2809366232C15744967 @default.
- W2809366232 hasConceptScore W2809366232C184842701 @default.
- W2809366232 hasConceptScore W2809366232C191267431 @default.
- W2809366232 hasConceptScore W2809366232C26517878 @default.
- W2809366232 hasConceptScore W2809366232C2779267917 @default.
- W2809366232 hasConceptScore W2809366232C2779338814 @default.
- W2809366232 hasConceptScore W2809366232C2779343474 @default.
- W2809366232 hasConceptScore W2809366232C29024540 @default.
- W2809366232 hasConceptScore W2809366232C3073032 @default.
- W2809366232 hasConceptScore W2809366232C37736160 @default.
- W2809366232 hasConceptScore W2809366232C38652104 @default.
- W2809366232 hasConceptScore W2809366232C41008148 @default.
- W2809366232 hasConceptScore W2809366232C41895202 @default.
- W2809366232 hasConceptScore W2809366232C547195049 @default.
- W2809366232 hasConceptScore W2809366232C77805123 @default.
- W2809366232 hasConceptScore W2809366232C79974875 @default.
- W2809366232 hasConceptScore W2809366232C86803240 @default.
- W2809366232 hasLocation W28093662321 @default.
- W2809366232 hasOpenAccess W2809366232 @default.
- W2809366232 hasPrimaryLocation W28093662321 @default.
- W2809366232 hasRelatedWork W11355709 @default.
- W2809366232 hasRelatedWork W1570806378 @default.
- W2809366232 hasRelatedWork W1578572215 @default.
- W2809366232 hasRelatedWork W1873599822 @default.
- W2809366232 hasRelatedWork W1895344488 @default.
- W2809366232 hasRelatedWork W2001809135 @default.
- W2809366232 hasRelatedWork W2086725848 @default.
- W2809366232 hasRelatedWork W2278749180 @default.
- W2809366232 hasRelatedWork W3039521316 @default.
- W2809366232 hasRelatedWork W3079675143 @default.
- W2809366232 isParatext "false" @default.
- W2809366232 isRetracted "false" @default.
- W2809366232 magId "2809366232" @default.
- W2809366232 workType "article" @default.