WORKSHOP REPORT
We're pleased to release the Workshop Report from the International Workshop on Obfuscation, now available to view as individual articles below as well as in a printer-friendly PDF. Whether you were able to attend or couldn't make it, we hope this report will provide further resources towards developing obfuscation both as a theory and praxis.
We have asked our panelists to each provide a brief essay summarizing their project, concept, application—with an emphasis on the questions, challenges, and discussions raised during the weekend. As with the workshop itself, this report is a starting point rather than an end point.
Introduction — Obfuscation Going Forward: A Research Agenda
Finn Brunton, New York University; Helen Nissenbaum, Cornell Tech and New York University
PrivacyVisor: Privacy Protection for Preventing Face Detection from Camera Images
Isao Echizen, National Institute of Informatics, Tokyo
Circumvention Through Obfuscation
Amir Houmansadr, University of Massachusetts Amherst
Political Rhetoric as Obfuscation and Finding Solutions with Neural Networks
Nicole Cote and Rob Hammond, New York University
Obfuscating Data to Prevent Discrimination
Sorelle Friedler, Haverford College
Using Ethically-Constrained Game Theory to Protect Our Privacy
Jeffrey Pawlick and Quanyan Zhu, New York University Tandon School of Engineering
Identity Obfuscation Through Fully Functional Avatars
Paul Ashley, Anonyome Labs
Go Rando: Resisting Emotional Surveillance with Noisy Feelings
Ben Grosser, University of Illinois at Urbana-Champaign
Hiding Data Flows with Covert Channels
Saumya Debray and Jon Stephens, University of Arizona
Software Diversification as an Obfuscation TechniqueSoftware Diversification as an Obfuscation Technique
Nicolas Harrand and Benoit Baudry, Inria
Software (De-)Obfuscation: How Good Is It?
Alexander Pretschner, Technische Universität München, Germany
On Missing Datasets
Mimi Onuoha
Obfuscating 15M US Criminal Records and Mugshots for the Right to Remove Them
Paolo Cirio
HyperFace: Emerging Strategies for Obfuscating Computer Vision Algorithms
Adam Harvey
Place vs. Space: On the Future of Location Obfuscation
Seda Gürses, University of Leuven
Obfuscation in Bitcoin: Techniques and Politics
Arvind Narayanan & Malte Möser, Princeton University
Obfuscation and the Threat of Centralized Distribution
Daniel C. Howe, School of Creative Media, City University of Hong Kong
Stay in Touch
We'll send occasional announcements about conference details and follow-up initiatives.
Sponsored by:
International Program and Organizing Committee:
Paul Ashley, Anonyome Labs
Benoît Baudry, INRIA, France
Finn Brunton, New York University
Saumya Debray, University of Arizona
Cynthia Dwork, Harvard University
Rachel Greenstadt, Drexel University
Seda Gürses, Princeton University
Anna Lysyanskaya, Brown University
Helen Nissenbaum, Cornell Tech & New York University
Alexander Pretschner, Technische Universität München
Reza Shokri, Cornell Tech