Zum Hauptinhalt springen

Showing 1–9 of 9 results for author: Crandall, J R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.06483  [pdf, other

    cs.NI cs.CR

    A Taxonomy and Comparative Analysis of IPv4 ID Selection Correctness, Security, and Performance

    Authors: Joshua J. Daymude, Antonio M. Espinoza, Sean Bergen, Benjamin Mixon-Baca, Jeffrey Knockel, Jedidiah R. Crandall

    Abstract: The battle for a more secure Internet is waged on many fronts, including the most basic of networking protocols. Our focus is the IPv4 Identifier (IPID), an IPv4 header field as old as the Internet with an equally long history as an exploited side channel for scanning network properties, inferring off-path connections, and poisoning DNS caches. This article taxonomizes the 25-year history of IPID-… ▽ More

    Submitted 12 July, 2024; v1 submitted 10 June, 2024; originally announced June 2024.

    Comments: 32 pages, 10 figures, 1 table, 1 algorithm

  2. arXiv:2403.03998  [pdf, other

    cs.CR

    OpenVPN is Open to VPN Fingerprinting

    Authors: Diwen Xue, Reethika Ramesh, Arham Jain, Michalis Kallitsis, J. Alex Halderman, Jedidiah R. Crandall, Roya Ensafi

    Abstract: VPN adoption has seen steady growth over the past decade due to increased public awareness of privacy and surveillance threats. In response, certain governments are attempting to restrict VPN access by identifying connections using "dual use" DPI technology. To investigate the potential for VPN blocking, we develop mechanisms for accurately fingerprinting connections using OpenVPN, the most popula… ▽ More

    Submitted 6 March, 2024; originally announced March 2024.

    Comments: In: USENIX Security Symposium 2022 (USENIX Security '22)

    Journal ref: 31st USENIX Security Symposium (USENIX Security 22). 2022

  3. arXiv:2007.15759  [pdf, other

    cs.CR

    The Program with a Personality: Analysis of Elk Cloner, the First Personal Computer Virus

    Authors: Scott Levy, Jedidiah R. Crandall

    Abstract: Although self-replicating programs and viruses have existed since the 1960s and 70s, Elk Cloner was the first virus to circulate among personal computers in the wild. Despite its historical significance, it received comparatively little attention when it first appeared in 1982. In this paper, we: present the first detailed examination of the operation and structure of Elk Cloner; discuss the effec… ▽ More

    Submitted 30 July, 2020; originally announced July 2020.

  4. arXiv:1906.10861  [pdf, other

    cs.SI cs.CR cs.LG

    Assessing Post Deletion in Sina Weibo: Multi-modal Classification of Hot Topics

    Authors: Meisam Navaki Arefi, Rajkumar Pandi, Michael Carl Tschantz, Jedidiah R. Crandall, King-wa Fu, Dahlia Qiu Shi, Miao Sha

    Abstract: Widespread Chinese social media applications such as Weibo are widely known for monitoring and deleting posts to conform to Chinese government requirements. In this paper, we focus on analyzing a dataset of censored and uncensored posts in Weibo. Despite previous work that only considers text content of posts, we take a multi-modal approach that takes into account both text and image content. We c… ▽ More

    Submitted 3 July, 2019; v1 submitted 26 June, 2019; originally announced June 2019.

  5. arXiv:1410.0735  [pdf, other

    cs.NI

    Large-scale Spatiotemporal Characterization of Inconsistencies in the World's Largest Firewall

    Authors: Roya Ensafi, Philipp Winter, Abdullah Mueen, Jedidiah R. Crandall

    Abstract: A nation-scale firewall, colloquially referred to as the "Great Firewall of China," implements many different types of censorship and content filtering to control China's Internet traffic. Past work has shown that the firewall occasionally fails. In other words, sometimes clients in China are able to reach blacklisted servers outside of China. This phenomenon has not yet been characterized because… ▽ More

    Submitted 2 October, 2014; originally announced October 2014.

  6. arXiv:1312.5739  [pdf, other

    cs.NI

    Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels: Extended Version

    Authors: Roya Ensafi, Jeffrey Knockel, Geoffrey Alexander, Jedidiah R. Crandall

    Abstract: We describe a method for remotely detecting intentional packet drops on the Internet via side channel inferences. That is, given two arbitrary IP addresses on the Internet that meet some simple requirements, our proposed technique can discover packet drops (e.g., due to censorship) between the two remote machines, as well as infer in which direction the packet drops are occurring. The only major r… ▽ More

    Submitted 19 December, 2013; originally announced December 2013.

    Comments: This is the extended version of a paper from the 2014 Passive and Active Measurements Conference (PAM), March 10th-11th, 2014, Los Angeles, California

  7. arXiv:1303.0597  [pdf

    cs.CY cs.IR cs.SI

    The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions

    Authors: Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall, Dan S. Wallach

    Abstract: Weibo and other popular Chinese microblogging sites are well known for exercising internal censorship, to comply with Chinese government requirements. This research seeks to quantify the mechanisms of this censorship: how fast and how comprehensively posts are deleted.Our analysis considered 2.38 million posts gathered over roughly two months in 2012, with our attention focused on repeatedly visit… ▽ More

    Submitted 9 July, 2013; v1 submitted 3 March, 2013; originally announced March 2013.

    Comments: arXiv admin note: substantial text overlap with arXiv:1211.6166

  8. arXiv:1211.6166  [pdf

    cs.IR cs.CR

    Tracking and Quantifying Censorship on a Chinese Microblogging Site

    Authors: Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall, Dan S. Wallach

    Abstract: We present measurements and analysis of censorship on Weibo, a popular microblogging site in China. Since we were limited in the rate at which we could download posts, we identified users likely to participate in sensitive topics and recursively followed their social contacts. We also leveraged new natural language processing techniques to pick out trending topics despite the use of neologisms, na… ▽ More

    Submitted 26 November, 2012; originally announced November 2012.

    ACM Class: H.3.3; H.3.5; I.2.7

  9. arXiv:1206.4958  [pdf

    cs.IR cs.CL cs.SI

    A Pointillism Approach for Natural Language Processing of Social Media

    Authors: Peiyou Song, Anhei Shu, Anyu Zhou, Dan Wallach, Jedidiah R. Crandall

    Abstract: The Chinese language poses challenges for natural language processing based on the unit of a word even for formal uses of the Chinese language, social media only makes word segmentation in Chinese even more difficult. In this document we propose a pointillism approach to natural language processing. Rather than words that have individual meanings, the basic unit of a pointillism approach is trigra… ▽ More

    Submitted 21 June, 2012; originally announced June 2012.

    Comments: 8 pages, 5 figures