Skip to content

Workshop on Obfuscation

  • WO 2021
  • About
  • Call for participation
  • WO 2017
    • About
    • Report
    • Participants
    • Schedule
    • CFP

International Workshop
on Obfuscation:
Science, Technology, and Theory
April 7-8, 2017  •  New York University

ExploreCall for Submissions
Workshop on Obfuscation Workshop on Obfuscation

report2017

Place vs. Space: On the Future of Location Obfuscation

Seda Gürses, University of Leuven Obfuscation has proven to be a successful strategy in preserving location privacy, and yet, we may have only scratched the surface of its potential in […]

Posted on October 15, 2017February 12, 2020 by admin Continue reading

HyperFace: Emerging Strategies for Obfuscating Computer Vision Algorithms

Adam Harvey HyperFace is a new type of camouflage to obfuscate computer vision algorithms. It is being designed to decrease the efficiency and accuracy of automated facial recognition. As an […]

Posted on October 13, 2017February 12, 2020 by admin Continue reading

Obfuscation and the Threat of Centralized Distribution

Daniel C. Howe, School of Creative Media, City University of Hong Kong Earlier this year, Helen Nissenbaum, Mushon Zer-Aviv, and I released an updated version of AdNauseam with a number […]

Posted on October 5, 2017February 12, 2020 by admin Continue reading

Obfuscation in Bitcoin: Techniques and Politics

Arvind Narayanan & Malte Möser, Princeton University Obfuscation Techniques Bitcoin’s design is centered around a widely distributed, global database which stores all transactions that have ever taken place in the […]

Posted on October 5, 2017February 12, 2020 by admin Continue reading

Obfuscating 15M US Criminal Records and Mugshots for the Right to Remove Them

Paolo Cirio Figure 1: Obscurity installation view About the Artwork Control and access to information, the right to privacy, mass surveillance and profiling, and the system of participation within social […]

Posted on October 5, 2017February 12, 2020 by admin Continue reading

On Missing Datasets

Mimi Onuoha Figure 1: Missing Datasets repository To talk about obfuscation is to talk about negotiations of access to data. But what about cases where the presence of data itself […]

Posted on October 5, 2017February 12, 2020 by admin Continue reading

Software (De-)Obfuscation: How Good Is It?

Alexander Pretschner, Technische Universität München, Germany joint work with Sebastian Banescu Software obfuscation aims at hiding data, code, or logic. Examples for obfuscating data include license or cryptographic keys. Code […]

Posted on October 5, 2017February 12, 2020 by admin Continue reading

Software Diversification as an Obfuscation Technique

Nicolas Harrand and Benoit Baudry, Inria Context: worms and botnets Along the ever increasing number of devices connected to the Internet comes an everlasting plague: computer worms. From the notorious […]

Posted on October 5, 2017February 12, 2020 by admin Continue reading

Hiding Data Flows with Covert Channels

Saumya Debray and Jon Stephens, University of Arizona Secure information flow ensures the confidentiality and privacy of sensitive data from being publicly leaked or illegitimately being accessed by attackers. This […]

Posted on October 5, 2017February 12, 2020 by admin Continue reading

Go Rando: Resisting Emotional Surveillance with Noisy Feelings

Ben Grosser, University of Illinois at Urbana-Champaign Facebook’s “reactions” let users express how they feel about a link, photo, or status. While such data might be helpful for one’s friends, […]

Posted on October 5, 2017February 12, 2020 by admin Continue reading

Posts navigation

Older posts

Recent Posts

  • Place vs. Space: On the Future of Location Obfuscation
  • HyperFace: Emerging Strategies for Obfuscating Computer Vision Algorithms
  • Obfuscation and the Threat of Centralized Distribution
  • Obfuscation in Bitcoin: Techniques and Politics
  • Obfuscating 15M US Criminal Records and Mugshots for the Right to Remove Them

Recent Comments

  • A WordPress Commenter on Hello world!

Archives

  • October 2017
  • October 2016
  • October 2015

Categories

  • report2017
  • Tech
  • Uncategorized

Meta

  • Log in
  • Entries RSS
  • Comments RSS
  • WordPress.org
© 2020 Workshop on Obfuscation.