1 / 14

The S uper S ecret F ile S ystem

The S uper S ecret F ile S ystem. CS851 – Web Application Security Seminar Chris Sosa Blake Sutton Howie Huang. Overview. Automatic Image Selection from Video. Implemented CovertFS on top of FUSE. Used Tor to further protect users. Motivation.

Download Presentation

The S uper S ecret F ile S ystem

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Super Secret File System CS851 – Web Application Security Seminar Chris Sosa Blake Sutton Howie Huang

  2. Overview Automatic Image Selection from Video Implemented CovertFS on top of FUSE Used Tor to further protect users

  3. Motivation We have the right and the desire for privacy We only trust our friends

  4. Plausible Deniability What can we do to provide privacy? We want Plausible Deniability • Privacy is threatened whenever private information is known to exist • We can mask private activities with non-private ones What do you do if Nina isn’t one of your friends?

  5. Related Work and their Issues • StegFS – Free Memory Blocks • Files were stored on the same system • No permanent storage guarantees • CovertFS – Online photo-sharing • Lacked way of getting images • Lacked implementation • User is compromised at same time as data He does not like bullets either

  6. Image Generation

  7. Anonymizing with Tor I <3 Privacy I AM A MEDIA SERVER Onion Routing in Action

  8. Image Access Patterns • Mask our private file access patterns with non-private online image access • Online sites have open API’s that encourage 3rd party applications • Mask our accesses to be similar to at least one such popular application • Techniques Used • See CovertFS • Image-based On-disk cache helps enormously here

  9. File System Implementation Insert “Sexy” On-disk cache here Ext2 • Based on Ext2 • Uses Fuse-J library to take advantage of Java Serialization • Steganographic Algorithm replaceable (uses F5) • Allocation Table has paths for efficiency • Allocation table is chained especially (does not follow normal direct – indirect linkage) • Implemented Media Server • Image-based On-Disk Cache • Looks just like a subset of images from the Media Server • Permanently deleted on unmount

  10. Implementation Issues • Allocation Table cannot act as a traditional special file (chicken-egg problem) • Flickr modifies uploaded images of Free Account holders • Grad students are poor • No restriction with $30 / year subscription • Easier to evaluate without Flickr • Tradeoff with privacy vs. efficiency between On-Demand downloading and Bulk Download

  11. Evaluation (Future Work) • Image Generation • How many images selected • “Uniqueness” of frames • Different video types (cartoon, home, television) • Traffic patterns • Media Server gathers data • Compare with existing API tools/apps I’m unique!

  12. Demo

  13. Conclusions • An anonyMizing Image-based Log File System is feasible! • Completely automatic image generation is practical if you have lots of videos ;) available as source material

  14. Questions?

More Related