Skip to main content

Showing 1–9 of 9 results for author: Siby, S

  1. arXiv:2405.17697  [pdf, other

    cs.LG

    P4: Towards private, personalized, and Peer-to-Peer learning

    Authors: Mohammad Mahdi Maheri, Sandra Siby, Sina Abdollahi, Anastasia Borovykh, Hamed Haddadi

    Abstract: Personalized learning is a proposed approach to address the problem of data heterogeneity in collaborative machine learning. In a decentralized setting, the two main challenges of personalization are client clustering and data privacy. In this paper, we address these challenges by developing P4 (Personalized Private Peer-to-Peer) a method that ensures that each client receives a personalized model… ▽ More

    Submitted 31 May, 2024; v1 submitted 27 May, 2024; originally announced May 2024.

  2. arXiv:2405.05196  [pdf, other

    cs.CR cs.LG

    SINBAD: Saliency-informed detection of breakage caused by ad blocking

    Authors: Saiid El Hajj Chehade, Sandra Siby, Carmela Troncoso

    Abstract: Privacy-enhancing blocking tools based on filter-list rules tend to break legitimate functionality. Filter-list maintainers could benefit from automated breakage detection tools that allow them to proactively fix problematic rules before deploying them to millions of users. We introduce SINBAD, an automated breakage detector that improves the accuracy over the state of the art by 20%, and is the f… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

    Comments: 19 pages, 13 figures, Appearing in IEEE S&P 2024

  3. arXiv:2404.00190  [pdf, other

    cs.CR

    GuaranTEE: Towards Attestable and Private ML with CCA

    Authors: Sandra Siby, Sina Abdollahi, Mohammad Maheri, Marios Kogias, Hamed Haddadi

    Abstract: Machine-learning (ML) models are increasingly being deployed on edge devices to provide a variety of services. However, their deployment is accompanied by challenges in model privacy and auditability. Model providers want to ensure that (i) their proprietary models are not exposed to third parties; and (ii) be able to get attestations that their genuine models are operating on edge devices in acco… ▽ More

    Submitted 29 March, 2024; originally announced April 2024.

    Comments: Accepted at the 4th Workshop on Machine Learning and Systems (EuroMLSys '24)

  4. arXiv:2308.03417  [pdf, other

    cs.CR cs.LG

    PURL: Safe and Effective Sanitization of Link Decoration

    Authors: Shaoor Munir, Patrick Lee, Umar Iqbal, Zubair Shafiq, Sandra Siby

    Abstract: While privacy-focused browsers have taken steps to block third-party cookies and mitigate browser fingerprinting, novel tracking techniques that can bypass existing countermeasures continue to emerge. Since trackers need to share information from the client-side to the server-side through link decoration regardless of the tracking technique they employ, a promising orthogonal approach is to detect… ▽ More

    Submitted 6 March, 2024; v1 submitted 7 August, 2023; originally announced August 2023.

  5. arXiv:2208.12370  [pdf, other

    cs.CR

    COOKIEGRAPH: Understanding and Detecting First-Party Tracking Cookies

    Authors: Shaoor Munir, Sandra Siby, Umar Iqbal, Steven Englehardt, Zubair Shafiq, Carmela Troncoso

    Abstract: As third-party cookie blocking is becoming the norm in browsers, advertisers and trackers have started to use first-party cookies for tracking. We conduct a differential measurement study on 10K websites with third-party cookies allowed and blocked. This study reveals that first-party cookies are used to store and exfiltrate identifiers to known trackers even when third-party cookies are blocked.… ▽ More

    Submitted 27 November, 2023; v1 submitted 25 August, 2022; originally announced August 2022.

  6. arXiv:2203.07806  [pdf, other

    cs.CR

    You get PADDING, everybody gets PADDING! You get privacy? Evaluating practical QUIC website fingerprinting protections for the masses

    Authors: Sandra Siby, Ludovic Barman, Christopher Wood, Marwan Fayed, Nick Sullivan, Carmela Troncoso

    Abstract: Website fingerprinting (WF) is a well-know threat to users' web privacy. New internet standards, such as QUIC, include padding to support defenses against WF. Previous work only analyzes the effectiveness of defenses when users are behind a VPN. Yet, this is not how most users browse the Internet. In this paper, we provide a comprehensive evaluation of QUIC-padding-based defenses against WF when u… ▽ More

    Submitted 15 December, 2022; v1 submitted 15 March, 2022; originally announced March 2022.

  7. arXiv:2107.11309  [pdf, other

    cs.CR

    WebGraph: Capturing Advertising and Tracking Information Flows for Robust Blocking

    Authors: Sandra Siby, Umar Iqbal, Steven Englehardt, Zubair Shafiq, Carmela Troncoso

    Abstract: Millions of web users directly depend on ad and tracker blocking tools to protect their privacy. However, existing ad and tracker blockers fall short because of their reliance on trivially susceptible advertising and tracking content. In this paper, we first demonstrate that the state-of-the-art machine learning based ad and tracker blockers, such as AdGraph, are susceptible to adversarial evasion… ▽ More

    Submitted 17 August, 2021; v1 submitted 23 July, 2021; originally announced July 2021.

  8. arXiv:1906.09682  [pdf, other

    cs.CR

    Encrypted DNS --> Privacy? A Traffic Analysis Perspective

    Authors: Sandra Siby, Marc Juarez, Claudia Diaz, Narseo Vallina-Rodriguez, Carmela Troncoso

    Abstract: Virtually every connection to an Internet service is preceded by a DNS lookup which is performed without any traffic-level protection, thus enabling manipulation, redirection, surveillance, and censorship. To address these issues, large organizations such as Google and Cloudflare are deploying recently standardized protocols that encrypt DNS traffic between end users and recursive resolvers such a… ▽ More

    Submitted 6 October, 2019; v1 submitted 23 June, 2019; originally announced June 2019.

  9. arXiv:1701.05007  [pdf, other

    cs.CR cs.NI

    IoTScanner: Detecting and Classifying Privacy Threats in IoT Neighborhoods

    Authors: Sandra Siby, Rajib Ranjan Maiti, Nils Tippenhauer

    Abstract: In the context of the emerging Internet of Things (IoT), a proliferation of wireless connectivity can be expected. That ubiquitous wireless communication will be hard to centrally manage and control, and can be expected to be opaque to end users. As a result, owners and users of physical space are threatened to lose control over their digital environments. In this work, we propose the idea of an… ▽ More

    Submitted 18 January, 2017; originally announced January 2017.

    Comments: 12 pages