Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–20 of 20 results for author: Snyder, P

Searching in archive cs. Search in all archives.
.
  1. A First Look at Related Website Sets

    Authors: Stephen McQuistin, Peter Snyder, Hamed Haddadi, Gareth Tyson

    Abstract: We present the first measurement of the user-effect and privacy impact of "Related Website Sets," a recent proposal to reduce browser privacy protections between two sites if those sites are related to each other. An assumption (both explicitly and implicitly) underpinning the Related Website Sets proposal is that users can accurately determine if two sites are related via the same entity. In this… ▽ More

    Submitted 14 August, 2024; originally announced August 2024.

  2. Unbundle-Rewrite-Rebundle: Runtime Detection and Rewriting of Privacy-Harming Code in JavaScript Bundles

    Authors: Mir Masood Ali, Peter Snyder, Chris Kanich, Hamed Haddadi

    Abstract: This work presents Unbundle-Rewrite-Rebundle (URR), a system for detecting privacy-harming portions of bundled JavaScript code and rewriting that code at runtime to remove the privacy-harming behavior without breaking the surrounding code or overall application. URR is a novel solution to the problem of JavaScript bundles, where websites pre-compile multiple code units into a single file, making i… ▽ More

    Submitted 3 September, 2024; v1 submitted 1 May, 2024; originally announced May 2024.

    Comments: In Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security (CCS '24)

  3. arXiv:2308.15309  [pdf, other

    cs.CY

    Understanding the Privacy Risks of Popular Search Engine Advertising Systems

    Authors: Salim Chouaki, Oana Goga, Hamed Haddadi, Peter Snyder

    Abstract: We present the first extensive measurement of the privacy properties of the advertising systems used by privacy-focused search engines. We propose an automated methodology to study the impact of clicking on search ads on three popular private search engines which have advertising-based business models: StartPage, Qwant, and DuckDuckGo, and we compare them to two dominant data-harvesting ones: Goog… ▽ More

    Submitted 23 September, 2023; v1 submitted 29 August, 2023; originally announced August 2023.

  4. arXiv:2203.10188  [pdf, other

    cs.CR

    Trackers Bounce Back: Measuring Evasion of Partitioned Storage in the Wild

    Authors: Audrey Randall, Peter Snyder, Alisha Ukani, Alex Snoeren, Geoff Voelker, Stefan Savage, Aaron Schulman

    Abstract: This work presents a systematic study of navigational tracking, the latest development in the cat-and-mouse game between browsers and online trackers. Navigational tracking allows trackers to 'aggregate users' activities and behaviors across sites by modifying their navigation requests. This technique is particularly important because it circumvents the increasing efforts by browsers to partition… ▽ More

    Submitted 12 July, 2022; v1 submitted 18 March, 2022; originally announced March 2022.

  5. arXiv:2203.03528  [pdf, other

    cs.CR

    Blocked or Broken? Automatically Detecting When Privacy Interventions Break Websites

    Authors: Michael Smith, Peter Snyder, Moritz Haller, Benjamin Livshits, Deian Stefan, Hamed Haddadi

    Abstract: A core problem in the development and maintenance of crowd-sourced filter lists is that their maintainers cannot confidently predict whether (and where) a new filter list rule will break websites. This is a result of enormity of the Web, which prevents filter list authors from broadly understanding the impact of a new blocking rule before they ship it to millions of users. The inability of filter… ▽ More

    Submitted 2 May, 2022; v1 submitted 7 March, 2022; originally announced March 2022.

  6. arXiv:2112.06324  [pdf, other

    cs.CR

    Pool-Party: Exploiting Browser Resource Pools as Side-Channels for Web Tracking

    Authors: Peter Snyder, Soroush Karami, Arthur Edelstein, Benjamin Livshits, Hamed Haddadi

    Abstract: We identify class of covert channels in browsers that are not mitigated by current defenses, which we call "pool-party" attacks. Pool-party attacks allow sites to create covert channels by manipulating limited-but-unpartitioned resource pools. These class of attacks have been known, but in this work we show that they are both more prevalent, more practical for exploitation, and allow exploitation… ▽ More

    Submitted 21 March, 2023; v1 submitted 12 December, 2021; originally announced December 2021.

  7. STAR: Secret Sharing for Private Threshold Aggregation Reporting

    Authors: Alex Davidson, Peter Snyder, E. B. Quirk, Joseph Genereux, Benjamin Livshits, Hamed Haddadi

    Abstract: Threshold aggregation reporting systems promise a practical, privacy-preserving solution for developers to learn how their applications are used "\emph{in-the-wild}". Unfortunately, proposed systems to date prove impractical for wide scale adoption, suffering from a combination of requiring: \emph{i)} prohibitive trust assumptions; \emph{ii)} high computation costs; or \emph{iii)} massive user bas… ▽ More

    Submitted 7 September, 2022; v1 submitted 21 September, 2021; originally announced September 2021.

    Journal ref: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS '22), November 7--11, 2022, Los Angeles, CA, USA

  8. arXiv:2109.06836  [pdf, other

    cs.CR

    Security, Privacy, and Decentralization in Web3

    Authors: Philipp Winter, Anna Harbluk Lorimer, Peter Snyder, Benjamin Livshits

    Abstract: Much of the recent excitement around decentralized finance (DeFi) comes from hopes that DeFi can be a secure, private, less centralized alternative to traditional finance systems. However, people moving to DeFi sites in hopes of improving their security and privacy may end up with less of both as recent attacks have demonstrated. In this work, we improve the understanding of DeFi by conducting the… ▽ More

    Submitted 6 February, 2023; v1 submitted 14 September, 2021; originally announced September 2021.

  9. arXiv:2011.04128  [pdf, other

    stat.ML cs.LG

    Stable predictions for health related anticausal prediction tasks affected by selection biases: the need to deconfound the test set features

    Authors: Elias Chaibub Neto, Phil Snyder, Solveig K Sieberts, Larsson Omberg

    Abstract: In health related machine learning applications, the training data often corresponds to a non-representative sample from the target populations where the learners will be deployed. In anticausal prediction tasks, selection biases often make the associations between confounders and the outcome variable unstable across different target environments. As a consequence, the predictions from confounded… ▽ More

    Submitted 8 November, 2020; originally announced November 2020.

    Comments: Machine Learning for Health (ML4H) at NeurIPS 2020 - Extended Abstract. This workshop paper draws some material from arXiv:2001.03998 and arXiv:2004.09466

  10. arXiv:2011.01267  [pdf, other

    cs.CR

    There's No Trick, Its Just a Simple Trick: A Web-Compat and Privacy Improving Approach to Third-party Web Storage

    Authors: Jordan Jueckstock, Peter Snyder, Shaown Sarker, Alexandros Kapravelos, Benjamin Livshits

    Abstract: While much current web privacy research focuses on browser fingerprinting, the boring fact is that the majority of current third-party web tracking is conducted using traditional, persistent-state identifiers. One possible explanation for the privacy community's focus on fingerprinting is that to date browsers have faced a lose-lose dilemma when dealing with third-party stateful identifiers: block… ▽ More

    Submitted 2 November, 2020; originally announced November 2020.

  11. arXiv:2005.11910  [pdf, other

    cs.CR

    Improving Web Content Blocking With Event-Loop-Turn Granularity JavaScript Signatures

    Authors: Quan Chen, Peter Snyder, Ben Livshits, Alexandros Kapravelos

    Abstract: Content blocking is an important part of a performant, user-serving, privacy respecting web. Most content blockers build trust labels over URLs. While useful, this approach has well understood shortcomings. Attackers may avoid detection by changing URLs or domains, bundling unwanted code with benign code, or inlining code in pages. The common flaw in existing approaches is that they evaluate code… ▽ More

    Submitted 24 May, 2020; originally announced May 2020.

  12. Filter List Generation for Underserved Regions

    Authors: Alexander Sjosten, Peter Snyder, Antonio Pastor, Panagiotis Papadopoulos, Benjamin Livshits

    Abstract: Filter lists play a large and growing role in protecting and assisting web users. The vast majority of popular filter lists are crowd-sourced, where a large number of people manually label resources related to undesirable web resources (e.g., ads, trackers, paywall libraries), so that they can be blocked by browsers and extensions. Because only a small percentage of web users participate in the ge… ▽ More

    Submitted 24 January, 2020; v1 submitted 16 October, 2019; originally announced October 2019.

    Journal ref: WWW'20, April 20-24, 2020, Taipei, Taiwan

  13. arXiv:1910.01165  [pdf

    stat.AP cs.CY

    Indicators of retention in remote digital health studies: A cross-study evaluation of 100,000 participants

    Authors: Abhishek Pratap, Elias Chaibub Neto, Phil Snyder, Carl Stepnowsky, Noémie Elhadad, Daniel Grant, Matthew H. Mohebbi, Sean Mooney, Christine Suver, John Wilbanks, Lara Mangravite, Patrick Heagerty, Pat Arean, Larsson Omberg

    Abstract: Digital technologies such as smartphones are transforming the way scientists conduct biomedical research using real-world data. Several remotely-conducted studies have recruited thousands of participants over a span of a few months. Unfortunately, these studies are hampered by substantial participant attrition, calling into question the representativeness of the collected data including generaliza… ▽ More

    Submitted 2 October, 2019; originally announced October 2019.

  14. arXiv:1905.08767  [pdf, other

    cs.NI

    The Blind Men and the Internet: Multi-Vantage Point Web Measurements

    Authors: Jordan Jueckstock, Shaown Sarker, Peter Snyder, Panagiotis Papadopoulos, Matteo Varvello, Benjamin Livshits, Alexandros Kapravelos

    Abstract: In this paper, we design and deploy a synchronized multi-vantage point web measurement study to explore the comparability of web measurements across vantage points (VPs). We describe in reproducible detail the system with which we performed synchronized crawls on the Alexa top 5K domains from four distinct network VPs: research university, cloud datacenter, residential network, and Tor gateway pro… ▽ More

    Submitted 21 May, 2019; originally announced May 2019.

  15. arXiv:1903.01406  [pdf, other

    cs.CY cs.CR cs.DL

    Keeping out the Masses: Understanding the Popularity and Implications of Internet Paywalls

    Authors: Panagiotis Papadopoulos, Peter Snyder, Dimitrios Athanasakis, Benjamin Livshits

    Abstract: Funding the production of quality online content is a pressing problem for content producers. The most common funding method, online advertising, is rife with well-known performance and privacy harms, and an intractable subject-agent conflict: many users do not want to see advertisements, depriving the site of needed funding. Because of these negative aspects of advertisement-based funding, payw… ▽ More

    Submitted 7 May, 2020; v1 submitted 18 February, 2019; originally announced March 2019.

  16. arXiv:1811.03661  [pdf, other

    cs.IR cs.CR

    SpeedReader: Reader Mode Made Fast and Private

    Authors: Mohammad Ghasemisharif, Peter Snyder, Andrius Aucinas, Benjamin Livshits

    Abstract: Most popular web browsers include "reader modes" that improve the user experience by removing un-useful page elements. Reader modes reformat the page to hide elements that are not related to the page's main content. Such page elements include site navigation, advertising related videos and images, and most JavaScript. The intended end result is that users can enjoy the content they are interested… ▽ More

    Submitted 8 November, 2018; originally announced November 2018.

  17. arXiv:1810.09160  [pdf, other

    cs.CR

    Who Filters the Filters: Understanding the Growth, Usefulness and Efficiency of Crowdsourced Ad Blocking

    Authors: Peter Snyder, Antoine Vastel, Benjamin Livshits

    Abstract: Ad and tracking blocking extensions are popular tools for improving web performance, privacy and aesthetics. Content blocking extensions typically rely on filter lists to decide whether a web request is associated with tracking or advertising, and so should be blocked. Millions of web users rely on filter lists to protect their privacy and improve their browsing experience. Despite their importa… ▽ More

    Submitted 20 May, 2020; v1 submitted 22 October, 2018; originally announced October 2018.

  18. arXiv:1805.09155  [pdf, other

    cs.CY cs.LG

    AdGraph: A Graph-Based Approach to Ad and Tracker Blocking

    Authors: Umar Iqbal, Peter Snyder, Shitong Zhu, Benjamin Livshits, Zhiyun Qian, Zubair Shafiq

    Abstract: User demand for blocking advertising and tracking online is large and growing. Existing tools, both deployed and described in research, have proven useful, but lack either the completeness or robustness needed for a general solution. Existing detection approaches generally focus on only one aspect of advertising or tracking (e.g. URL patterns, code structure), making existing approaches susceptibl… ▽ More

    Submitted 30 May, 2019; v1 submitted 21 May, 2018; originally announced May 2018.

    Comments: To appear in the Proceedings of the IEEE Symposium on Security & Privacy, May 2020

  19. arXiv:1708.08510  [pdf, other

    cs.CR

    Most Websites Don't Need to Vibrate: A Cost-Benefit Approach to Improving Browser Security

    Authors: Peter Snyder, Cynthia Taylor, Chris Kanich

    Abstract: Modern web browsers have accrued an incredibly broad set of features since being invented for hypermedia dissemination in 1990. Many of these features benefit users by enabling new types of web applications. However, some features also bring risk to users' privacy and security, whether through implementation error, unexpected composition, or unintended use. Currently there is no general methodolog… ▽ More

    Submitted 4 September, 2017; v1 submitted 28 August, 2017; originally announced August 2017.

  20. arXiv:1605.06467  [pdf, other

    cs.NI cs.CR

    Browser Feature Usage on the Modern Web

    Authors: Peter Snyder, Lara Ansari, Cynthia Taylor, Chris Kanich

    Abstract: Modern web browsers are incredibly complex, with millions of lines of code and over one thousand JavaScript functions and properties available to website authors. This work investigates how these browser features are used on the modern, open web. We find that JavaScript features differ wildly in popularity, with over 50% of provided features never used in the Alexa 10k. We also look at how popul… ▽ More

    Submitted 20 May, 2016; originally announced May 2016.