Seda Gürses, University of Leuven Obfuscation has proven to be a successful strategy in preserving location privacy, and yet, we may have only scratched the surface of its potential in […]
report2017
HyperFace: Emerging Strategies for Obfuscating Computer Vision Algorithms
Adam Harvey HyperFace is a new type of camouflage to obfuscate computer vision algorithms. It is being designed to decrease the efficiency and accuracy of automated facial recognition. As an […]
Obfuscation and the Threat of Centralized Distribution
Daniel C. Howe, School of Creative Media, City University of Hong Kong Earlier this year, Helen Nissenbaum, Mushon Zer-Aviv, and I released an updated version of AdNauseam with a number […]
Obfuscation in Bitcoin: Techniques and Politics
Arvind Narayanan & Malte Möser, Princeton University Obfuscation Techniques Bitcoin’s design is centered around a widely distributed, global database which stores all transactions that have ever taken place in the […]
Obfuscating 15M US Criminal Records and Mugshots for the Right to Remove Them
Paolo Cirio Figure 1: Obscurity installation view About the Artwork Control and access to information, the right to privacy, mass surveillance and profiling, and the system of participation within social […]
On Missing Datasets
Mimi Onuoha Figure 1: Missing Datasets repository To talk about obfuscation is to talk about negotiations of access to data. But what about cases where the presence of data itself […]
Software (De-)Obfuscation: How Good Is It?
Alexander Pretschner, Technische Universität München, Germany joint work with Sebastian Banescu Software obfuscation aims at hiding data, code, or logic. Examples for obfuscating data include license or cryptographic keys. Code […]
Software Diversification as an Obfuscation Technique
Nicolas Harrand and Benoit Baudry, Inria Context: worms and botnets Along the ever increasing number of devices connected to the Internet comes an everlasting plague: computer worms. From the notorious […]
Hiding Data Flows with Covert Channels
Saumya Debray and Jon Stephens, University of Arizona Secure information flow ensures the confidentiality and privacy of sensitive data from being publicly leaked or illegitimately being accessed by attackers. This […]
Go Rando: Resisting Emotional Surveillance with Noisy Feelings
Ben Grosser, University of Illinois at Urbana-Champaign Facebook’s “reactions” let users express how they feel about a link, photo, or status. While such data might be helpful for one’s friends, […]