Presentation is loading. Please wait.

Presentation is loading. Please wait.

The Super Secret File System CS851 – Web Application Security Seminar Chris Sosa Blake Sutton Howie Huang.

Similar presentations


Presentation on theme: "The Super Secret File System CS851 – Web Application Security Seminar Chris Sosa Blake Sutton Howie Huang."— Presentation transcript:

1 The Super Secret File System CS851 – Web Application Security Seminar Chris Sosa Blake Sutton Howie Huang

2 Overview Implemented CovertFS on top of FUSE Automatic Image Selection from Video Used Tor to further protect users

3 Motivation We have the right and the desire for privacy We only trust our friends

4 Plausible Deniability What can we do to provide privacy? We want Plausible Deniability –Privacy is threatened whenever private information is known to exist –We can mask private activities with non- private ones What do you do if Nina isn’t one of your friends?

5 Related Work and their Issues StegFS – Free Memory Blocks StegFS – Free Memory Blocks –Files were stored on the same system –No permanent storage guarantees CovertFS – Online photo- sharing CovertFS – Online photo- sharing –Lacked way of getting images –Lacked implementation –User is compromised at same time as data He does not like bullets either

6 Image Generation

7 Anonymizing with Tor Onion Routing in Action I AM A MEDIA SERVER I <3 Privac y

8 Image Access Patterns Mask our private file access patterns with non- private online image access Mask our private file access patterns with non- private online image access –Online sites have open API’s that encourage 3 rd party applications –Mask our accesses to be similar to at least one such popular application Techniques Used Techniques Used –See CovertFS –Image-based On-disk cache helps enormously here

9 File System Implementation Based on Ext2 Based on Ext2 Uses Fuse-J library to take advantage of Java Serialization Uses Fuse-J library to take advantage of Java Serialization Steganographic Algorithm replaceable (uses F5) Steganographic Algorithm replaceable (uses F5) Allocation Table has paths for efficiency Allocation Table has paths for efficiency Allocation table is chained especially (does not follow normal direct – indirect linkage) Allocation table is chained especially (does not follow normal direct – indirect linkage) Implemented Media Server Implemented Media Server Image-based On-Disk Cache Image-based On-Disk Cache –Looks just like a subset of images from the Media Server –Permanently deleted on unmount Insert “Sexy” On- disk cache here Ext2

10 Implementation Issues Allocation Table cannot act as a traditional special file (chicken-egg problem) Allocation Table cannot act as a traditional special file (chicken-egg problem) Flickr modifies uploaded images of Free Account holders Flickr modifies uploaded images of Free Account holders –Grad students are poor –No restriction with $30 / year subscription –Easier to evaluate without Flickr Tradeoff with privacy vs. efficiency between On- Demand downloading and Bulk Download Tradeoff with privacy vs. efficiency between On- Demand downloading and Bulk Download

11 Evaluation (Future Work) Image Generation Image Generation –How many images selected –“Uniqueness” of frames –Different video types (cartoon, home, television) I’m unique! Traffic patterns -Media Server gathers data -Compare with existing API tools/apps

12 Demo

13 Conclusions An anonyMizing Image-based Log File System is feasible! An anonyMizing Image-based Log File System is feasible! Completely automatic image generation is practical if you have lots of videos ;) available as source material Completely automatic image generation is practical if you have lots of videos ;) available as source material

14 Questions?


Download ppt "The Super Secret File System CS851 – Web Application Security Seminar Chris Sosa Blake Sutton Howie Huang."

Similar presentations


Ads by Google