Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping
- Noah J. Apthorpe, D. Huang, D. Reisman, Arvind Narayanan, N. Feamster
- Computer ScienceProceedings on Privacy Enhancing Technologies
- 3 December 2018
This paper develops a new defense, “stochastic traffic padding” (STP), that makes it difficult for a passive network adversary to reliably distinguish genuine user activities from generated traffic patterns designed to look like user interactions.
High-fidelity switch models for software-defined network emulation
- D. Huang, K. Yocum, A. Snoeren
- Computer ScienceHotSDN '13
- 16 August 2013
A measurement methodology and emulator extension is presented to reproduce these control-path performance artifacts, restoring the fidelity of emulation in SDN switch control path.
Tracking Ransomware End-to-end
- D. Huang, M. Aliapoulios, Damon McCoy
- Computer ScienceIEEE Symposium on Security and Privacy
- 20 May 2018
This paper creates a measurement framework that is used to perform a large-scale, two-year, end-to-end measurement of ransomware payments, victims, and operators, and finds that many ransomware operators cashed out using BTC-e, a now-defunct Bitcoin exchange.
IoT Inspector: Crowdsourcing Labeled Network Traffic from Smart Home Devices at Scale
- D. Huang, Noah J. Apthorpe, Gunes Acar, Frank H. Li, N. Feamster
- Computer ScienceArXiv
- 21 September 2019
This work crowdsource the largest known dataset of labeled network traffic from smart home devices from within real-world home networks and demonstrates how this data enables new research into smart homes through two case studies focused on security and privacy.
Framing Dependencies Introduced by Underground Commoditization
- Kurt Thomas, D. Huang, G. Vigna
- Computer ScienceWorkshop on the Economics of Information Security
- 22 June 2015
This paper surveys a wealth of existing research in order to systematize the community’s understanding of the underground economy and develops a taxonomy of profit centers and support centers for reasoning about the flow of capital within the black market.
Stressing Out: Bitcoin "Stress Testing"
- Khaled Baqer, D. Huang, Damon McCoy, N. Weaver
- Computer ScienceFinancial Cryptography Workshops
- 22 February 2016
An empirical study of a recent spam campaign that resulted in a DoS attack on Bitcoin, using a clustering based method to detect spam transactions and pointing out changes that could be made to Bitcoin transaction fees that would mitigate some of the spam techniques used to effectively DoS Bitcoin.
Botcoin: Monetizing Stolen Cycles
- D. Huang, Hitesh Dharmdasani, Kirill Levchenko
- Computer ScienceNetwork and Distributed System Security Symposium
This work conducts the first comprehensive study of Bitcoin mining malware, and deduces the amount of money a number of mining botnets have made by carefully reconstructing the Bitcoin transaction records.
Backpage and Bitcoin: Uncovering Human Traffickers
- Rebecca S. Portnoff, D. Huang, Periwinkle Doerfler, Sadia Afroz, Damon McCoy
- Computer ScienceKnowledge Discovery and Data Mining
- 13 August 2017
A machine learning classifier that uses stylometry to distinguish between ads posted by the same vs. different authors with 90% TPR and 1% FPR is developed and a linking technique that takes advantage of leakages from the Bitcoin mempool, blockchain and sex ad site, to link a subset of sex ads to Bitcoin public wallets and transactions is designed.
Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices
- H. M. Moghaddam, Gunes Acar, Arvind Narayanan
- Computer ScienceConference on Computer and Communications…
- 6 November 2019
A system that can automatically download OTT apps and interact with them while intercepting the network traffic and performing best-effort TLS interception reveals widespread practice of collecting and transmitting unique identifiers, such as device IDs, serial numbers, WiFi MAC addresses and SSIDs, at times over unencrypted connections.
Managing Distributed Applications Using Gush
- Jeannie R. Albrecht, D. Huang
- Computer ScienceTestbeds and Research Infrastructures for the…
- 18 May 2010
The functionality of Gush, an experiment control system, is explored, and how it supports execution on three of the four GENI control frameworks is discussed.