Tag: Research

  •  A Multi-pronged Strategy for Securing Internet Routing

    By Henry Birge-Lee, Nick Feamster, Mihir Kshirsagar, Prateek Mittal, Jennifer Rexford The Federal Communications Commission (FCC) is conducting an inquiry into how it can help protect against security vulnerabilities in the internet routing infrastructure. A number of large communication companies have weighed in on the approach the FCC should take.  CITP’s Tech Policy Clinic convened…

  • How to constructively review a research paper

    Any piece of research can be evaluated on three axes: Correctness/validity — are the claims justified by evidence? Impact/significance — how will the findings affect the research field (and the world)? Novelty/originality — how big a leap are the ideas, especially the methods, compared to what was already known? There are additional considerations such as…

  • Facebook's Emotional Manipulation Study: When Ethical Worlds Collide

    The research community is buzzing about the ethics of Facebook’s now-famous experiment in which it manipulated the emotional content of users’ news feeds to see how that would affect users’ activity on the site. (The paper, by Adam Kramer of Facebook, Jamie Guillory of UCSF, and Jeffrey Hancock of Cornell, appeared in Proceedings of the…

  • How the DMCA Chills Research

    I have a new piece in Slate, on how the DMCA chills security research. In the piece, I tell three stories of DMCA threats against Alex Halderman and me, and talk about how Congress can fix the problem. “The Chilling Effects of the DMCA: The outdated copyright law doesn’t just hurt consumers—it cripples researchers.” “These…

  • Making Excuses for Fees on Electronic Public Records

    I wrote a letter to Judge Hogan, the recently appointed Director of the Administrative Office of the US Courts. I wanted to make the case directly to him that the courts should do the right thing — and that what they are doing right now is against the law. I was assured by his colleagues…

  • Anticensorship in the Internet's Infrastructure

    I’m pleased to announce a research result that Eric Wustrow, Scott Wolchok, Ian Goldberg, and I have been working on for the past 18 months: Telex, a new approach to circumventing state-level Internet censorship. Telex is markedly different from past anticensorship efforts, and we believe it has the potential to shift the balance of power…

  • "You Might Also Like:" Privacy Risks of Collaborative Filtering

    Ann Kilzer, Arvind Narayanan, Ed Felten, Vitaly Shmatikov, and I have released a new research paper detailing the privacy risks posed by collaborative filtering recommender systems. To examine the risk, we use public data available from Hunch, LibraryThing, Last.fm, and Amazon in addition to evaluating a synthetic system using data from the Netflix Prize dataset.…

  • Identifying Trends that Drive Technology

    I’m trying to compile a list of major technological and societal trends that influence U.S. computing research. Here’s my initial list. Please post your own suggestions! Ubiquitous connectivity, and thus true mobility Massive computational capability available to everyone, through the cloud Exponentially increasing data volumes – from ubiquitous sensors, from higher-volume sensors (digital imagers everywhere!),…

  • Acceptance rates at security conferences

    How competitive are security research conferences? Several people have been tracking this information. Mihai Christodorescu has a nice chart of acceptance and submission rates over time. The most recent data point we have is the 2009 Usenix Security Symposium, which accepted 26 of 176 submissions (a 14.8% acceptance ratio, consistent with recent years). Acceptance rates…

  • Fingerprinting Blank Paper Using Commodity Scanners

    Today Will Clarkson, Tim Weyrich, Adam Finkelstein, Nadia Heninger, Alex Halderman and I released a paper, Fingerprinting Blank Paper Using Commodity Scanners. The paper will appear in the Proceedings of the IEEE Symposium on Security and Privacy, in May 2009. Here’s the paper’s abstract: This paper presents a novel technique for authenticating physical documents based…