Skip to main content

Showing 1–6 of 6 results for author: Askarov, A

.
  1. arXiv:2210.12776  [pdf, other

    cs.CR

    Metadata Privacy Beyond Tunneling for Instant Messaging

    Authors: Boel Nelson, Elena Pagnin, Aslan Askarov

    Abstract: Transport layer data leaks metadata unintentionally -- such as who communicates with whom. While tools for strong transport layer privacy exist, they have adoption obstacles, including performance overheads incompatible with mobile devices. We posit that by changing the objective of metadata privacy for $\textit{all traffic}$, we can open up a new design space for pragmatic approaches to transport… ▽ More

    Submitted 6 March, 2024; v1 submitted 23 October, 2022; originally announced October 2022.

    Comments: To appear at the 9th IEEE European Symposium on Security and Privacy

  2. arXiv:2202.02043  [pdf, other

    cs.CR

    With a Little Help from My Friends: Transport Deniability for Instant Messaging

    Authors: Boel Nelson, Aslan Askarov

    Abstract: Traffic analysis for instant messaging (IM) applications continues to pose an important privacy challenge. In particular, transport-level data can leak unintentional information about IM -- such as who communicates with whom. Existing tools for metadata privacy have adoption obstacles, including the risks of being scrutinized for having a particular app installed, and performance overheads incompa… ▽ More

    Submitted 4 February, 2022; originally announced February 2022.

  3. arXiv:2106.12934  [pdf, ps, other

    cs.PL

    Towards Language-Based Mitigation of Traffic Analysis Attacks

    Authors: Jeppe Fredsgaard Blaabjerg, Aslan Askarov

    Abstract: Traffic analysis attacks pose a major risk for online security. Distinctive patterns in communication act as fingerprints, enabling adversaries to de-anonymise communicating parties or to infer sensitive information. Despite the attacks being known for decades, practical solution are scarce. Network layer countermeasures have relied on black box padding schemes that require significant overheads i… ▽ More

    Submitted 24 June, 2021; originally announced June 2021.

    Comments: 22 pages, 5 figures, submitted to CSF 2021

  4. arXiv:2005.01977  [pdf, ps, other

    cs.PL

    Reconciling progress-insensitive noninterference and declassification

    Authors: Johan Bay, Aslan Askarov

    Abstract: Practitioners of secure information flow often face a design challenge: what is the right semantic treatment of leaks via termination? On the one hand, the potential harm of untrusted code calls for strong progress-sensitive security. On the other hand, when the code is trusted to not aggressively exploit termination channels, practical concerns, such as permissiveness of the enforcement, make a c… ▽ More

    Submitted 8 May, 2020; v1 submitted 5 May, 2020; originally announced May 2020.

  5. A Dependently Typed Library for Static Information-Flow Control in Idris

    Authors: Simon Gregersen, Søren Eller Thomsen, Aslan Askarov

    Abstract: Safely integrating third-party code in applications while protecting the confidentiality of information is a long-standing problem. Pure functional programming languages, like Haskell, make it possible to enforce lightweight information-flow control through libraries like MAC by Russo. This work presents DepSec, a MAC inspired, dependently typed library for static information-flow control in Idris… ▽ More

    Submitted 18 February, 2019; originally announced February 2019.

    Comments: This is an extended version of a paper of the same title presented at POST 2019

  6. Attacker Control and Impact for Confidentiality and Integrity

    Authors: Aslan Askarov, Andrew Myers

    Abstract: Language-based information flow methods offer a principled way to enforce strong security properties, but enforcing noninterference is too inflexible for realistic applications. Security-typed languages have therefore introduced declassification mechanisms for relaxing confidentiality policies, and endorsement mechanisms for relaxing integrity policies. However, a continuing challenge has been to… ▽ More

    Submitted 23 September, 2011; v1 submitted 27 July, 2011; originally announced July 2011.

    ACM Class: D.3.3, D.4.6

    Journal ref: Logical Methods in Computer Science, Volume 7, Issue 3 (September 26, 2011) lmcs:987