Report of the 2nd Workshop on Obfuscation

2017

Since we began planning the “International Workshop on Obfuscation: Science, Technology, and Theory” a year ago, there have been numerous shifts in the world’s technological, political, and economic landscape, from a US election influenced by email leaks and algorithmically-promoted fake news stories, to the merger of some of the world’s largest telecom and media companies into data-driven advertising behemoths, to data breaches of major entertainment companies, healthcare providers, and voting systems (to name but a few). We define obfuscation as the production of noise modeled on an existing signal in order to make data or information more ambiguous, uncertain, and difficult to exploit—an idea that is particularly salient in the era of big data technologies. In concert with other practices and tools, obfuscation offers a novel and unique means of evading data surveillance, building privacy-respecting platforms without sacrificing utility, and improving security (including through obfuscating code or hardware itself). However, while obfuscation has long been a methodology engaged by researchers and developers in certain subfields of computer science, engineering, and applied technologies, it has only recently been taken up and studied as a broader strategy or set of tactics by humanists, social scientists, policymakers, and artists. 

CONTENTS

Obfuscation Going Forward: A Research Agenda Finn Brunton, New York University and Helen Nissenbaum, Cornell Tech and New York University

PrivacyVisor: Privacy Protection for Preventing Face Detection from Camera Images Isao Echizen, National Institute of Informatics, Tokyo

Circumvention Through Obfuscation Amir Houmansadr, University of Massachusetts Amherst

Political Rhetoric as Obfuscation and Finding Solutions with Neural Networks Nicole Cote and Rob Hammond, New York University

Obfuscating Data to Prevent Discrimination Sorelle Friedler, Haverford College

Using Ethically-Constrained Game Theory to Protect Our Privacy Jeffrey Pawlick and Quanyan Zhu, New York University Tandon School of Engineering

Identity Obfuscation Through Fully Functional Avatars Paul Ashley, Anonyome Labs

Go Rando: Resisting Emotional Surveillance with Noisy Feelings Ben Grosser, University of Illinois at Urbana-Champaign

Hiding Data Flows with Covert Channels Saumya Debray and Jon Stephens, University of Arizona

Software Diversification as an Obfuscation Technique Nicolas Harrand and Benoit Baudry, Inria, France

Software (De-)Obfuscation: How Good Is It? Alexander Pretschner, Technische Universität München, Germany

On Missing Datasets Mimi Onuoha

Obfuscating 15M US Criminal Records and Mugshots for the Right to Remove Them Paolo Cirio

HyperFace: Emerging Strategies for Obfuscating Computer Vision Algorithms Adam Harvey

Place vs. Space: On the Future of Location Obfuscation Seda Gürses

Obfuscation in Bitcoin: Techniques and Politics Arvind Narayanan & Malte Möser, Princeton University

Obfuscation and the Threat of Centralized Distribution Daniel C. Howe, School of Creative Media, City University of Hong Kong

Resource Type: