Skip to main content

Showing 1–24 of 24 results for author: Nithyanand, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.06958  [pdf, other

    cs.CR cs.CY cs.MA cs.NI cs.SI

    Turning the Tide on Dark Pools? Towards Multi-Stakeholder Vulnerability Notifications in the Ad-Tech Supply Chain

    Authors: Yash Vekaria, Rishab Nithyanand, Zubair Shafiq

    Abstract: Online advertising relies on a complex and opaque supply chain that involves multiple stakeholders, including advertisers, publishers, and ad-networks, each with distinct and sometimes conflicting incentives. Recent research has demonstrated the existence of ad-tech supply chain vulnerabilities such as dark pooling, where low-quality publishers bundle their ad inventory with higher-quality ones to… ▽ More

    Submitted 11 June, 2024; originally announced June 2024.

    ACM Class: K.4.1; K.4.3; K.4.4; D.2.0; D.2.4; G.3; H.3.7; K.1; K.6.1; K.6.5

  2. arXiv:2401.09044  [pdf, other

    cs.CY cs.HC cs.IR

    Algorithmic amplification of biases on Google Search

    Authors: Hussam Habib, Ryan Stoldt, Andrew High, Brian Ekdale, Ashley Peterson, Katy Biddle, Javie Ssozi, Rishab Nithyanand

    Abstract: The evolution of information-seeking processes, driven by search engines like Google, has transformed the access to information people have. This paper investigates how individuals' preexisting attitudes influence the modern information-seeking process, specifically the results presented by Google Search. Through a comprehensive study involving surveys and information-seeking tasks focusing on the… ▽ More

    Submitted 17 January, 2024; originally announced January 2024.

  3. arXiv:2307.00402  [pdf, other

    cs.NI

    Making Sense of Constellations: Methodologies for Understanding Starlink's Scheduling Algorithms

    Authors: Hammas Bin Tanveer, Mike Puchol, Rachee Singh, Antonio Bianchi, Rishab Nithyanand

    Abstract: Starlink constellations are currently the largest LEO WAN and have seen considerable interest from the research community. In this paper, we use high-frequency and high-fidelity measurements to uncover evidence of hierarchical traffic controllers in Starlink -- a global controller which allocates satellites to terminals and an on-satellite controller that schedules transmission of user flows. We t… ▽ More

    Submitted 1 July, 2023; originally announced July 2023.

  4. arXiv:2303.03445  [pdf, other

    cs.IR

    How Auditing Methodologies Can Impact Our Understanding of YouTube's Recommendation Systems

    Authors: Sarmad Chandio, Daniyal Pirwani Dar, Rishab Nithyanand

    Abstract: Data generated by audits of social media websites have formed the basis of our understanding of the biases presented in algorithmic content recommendation systems. As legislators around the world are beginning to consider regulating the algorithmic systems that drive online platforms, it is critical to ensure the correctness of these inferred biases. However, as we will show in this paper, doing s… ▽ More

    Submitted 6 March, 2023; originally announced March 2023.

  5. arXiv:2210.06654  [pdf, other

    cs.CR cs.CY cs.NI cs.SI

    The Inventory is Dark and Full of Misinformation: Understanding the Abuse of Ad Inventory Pooling in the Ad-Tech Supply Chain

    Authors: Yash Vekaria, Rishab Nithyanand, Zubair Shafiq

    Abstract: Ad-tech enables publishers to programmatically sell their ad inventory to millions of demand partners through a complex supply chain. Bogus or low quality publishers can exploit the opaque nature of the ad-tech to deceptively monetize their ad inventory. In this paper, we investigate for the first time how misinformation sites subvert the ad-tech transparency standards and pool their ad inventory… ▽ More

    Submitted 14 October, 2023; v1 submitted 12 October, 2022; originally announced October 2022.

    Comments: To appear at IEEE Symposium on Security & Privacy (Oakland) 2024

  6. arXiv:2210.02522  [pdf, other

    cs.NI

    Glowing in the Dark Uncovering IPv6 Address Discovery and Scanning Strategies in the Wild

    Authors: Hammas Bin Tanveer, Rachee Singh, Paul Pearce, Rishab Nithyanand

    Abstract: In this work we identify scanning strategies of IPv6 scanners on the Internet. We offer a unique perspective on the behavior of IPv6 scanners by conducting controlled experiments leveraging a large and unused /56 IPv6 subnet. We selectively make parts of the subnet visible to scanners by hosting applications that make direct or indirect contact with IPv6- capable servers on the Internet. By carefu… ▽ More

    Submitted 5 October, 2022; originally announced October 2022.

    Comments: 13 pages, 18 pages with appendix + bib, To appear in USENIX Security '23

  7. The Morbid Realities of Social Media: An Investigation into the Misinformation Shared by the Deceased Victims of COVID-19

    Authors: Hussam Habib, Rishab Nithyanand

    Abstract: Social media platforms have had considerable impact on the real world especially during the Covid-19 pandemic. Misinformation related to Covid-19 might have caused significant impact on the population specifically due to its association with dangerous beliefs such as anti-vaccination and Covid denial. In this work, we study a unique dataset of Facebook posts by users who shared and believed in Cov… ▽ More

    Submitted 20 September, 2022; originally announced September 2022.

  8. arXiv:2207.10791  [pdf, other

    cs.SI

    ATOM: A Generalizable Technique for Inferring Tracker-Advertiser Data Sharing in the Online Behavioral Advertising Ecosystem

    Authors: Maaz Bin Musa, Rishab Nithyanand

    Abstract: Data sharing between online trackers and advertisers is a key component in online behavioral advertising. This sharing can be facilitated through a variety of processes, including those not observable to the user's browser. The unobservability of these processes limits the ability of researchers and auditors seeking to verify compliance with regulations which require complete disclosure of data sh… ▽ More

    Submitted 8 July, 2022; originally announced July 2022.

    Comments: Accepted at PETS'22 16 Pages 3 Tables 2 Figures

  9. Making a Radical Misogynist: How online social engagement with the Manosphere influences traits of radicalization

    Authors: Hussam Habib, Padmini Srinivasan, Rishab Nithyanand

    Abstract: The algorithms and the interactions facilitated by online platforms have been used by radical groups to recruit vulnerable individuals to their cause. This has resulted in the sharp growth of violent events and deteriorating online discourse. The Manosphere, a collection of radical anti-feminist communities, is one such group which has attracted attention due to their rapid growth and increasingly… ▽ More

    Submitted 17 February, 2022; originally announced February 2022.

  10. Are Proactive Interventions for Reddit Communities Feasible?

    Authors: Hussam Habib, Maaz Bin Musa, Fareed Zaffar, Rishab Nithyanand

    Abstract: Reddit has found its communities playing a prominent role in originating and propagating problematic socio-political discourse. Reddit administrators have generally struggled to prevent or contain such discourse for several reasons including: (1) the inability for a handful of human administrators to track and react to millions of posts and comments per day and (2) fear of backlash as a consequenc… ▽ More

    Submitted 22 November, 2021; originally announced November 2021.

    Comments: arXiv admin note: text overlap with arXiv:1906.11932

  11. Reddit and the Fourth Estate: Exploring the magnitude and effects of media influence on community level moderation on Reddit

    Authors: Hussam Habib, Rishab Nithyanand

    Abstract: Most platforms, including Reddit, face a dilemma when applying interventions such as subreddit bans to toxic communities -- do they risk angering their user base by proactively enforcing stricter controls on discourse or do they defer interventions at the risk of eventually triggering negative media reactions which might impact their advertising revenue? In this paper, we analyze Reddit's previous… ▽ More

    Submitted 29 October, 2021; originally announced November 2021.

  12. Inferring Tracker-Advertiser Relationships in the Online Advertising Ecosystem using Header Bidding

    Authors: John Cook, Rishab Nithyanand, Zubair Shafiq

    Abstract: Online advertising relies on trackers and data brokers to show targeted ads to users. To improve targeting, different entities in the intricately interwoven online advertising and tracking ecosystems are incentivized to share information with each other through client-side or server-side mechanisms. Inferring data sharing between entities, especially when it happens at the server-side, is an impor… ▽ More

    Submitted 20 September, 2019; v1 submitted 16 July, 2019; originally announced July 2019.

    Comments: 18 pages, 2 figures, Privacy Enhancing Technologies Symposium (2020)

    ACM Class: H.3.5

  13. arXiv:1906.11932  [pdf, other

    cs.SI cs.CY

    To Act or React: Investigating Proactive Strategies For Online Community Moderation

    Authors: Hussam Habib, Maaz Bin Musa, Fareed Zaffar, Rishab Nithyanand

    Abstract: Reddit administrators have generally struggled to prevent or contain such discourse for several reasons including: (1) the inability for a handful of human administrators to track and react to millions of posts and comments per day and (2) fear of backlash as a consequence of administrative decisions to ban or quarantine hateful communities. Consequently, as shown in our background research, admin… ▽ More

    Submitted 27 June, 2019; originally announced June 2019.

  14. arXiv:1711.05303  [pdf, other

    cs.CY

    Online Political Discourse in the Trump Era

    Authors: Rishab Nithyanand, Brian Schaffner, Phillipa Gill

    Abstract: We identify general trends in the (in)civility and complexity of political discussions occurring on Reddit between January 2007 and May 2017 -- a period spanning both terms of Barack Obama's presidency and the first 100 days of Donald Trump's presidency. We then investigate four factors that are frequently hypothesized as having contributed to the declining quality of American political discourse… ▽ More

    Submitted 14 November, 2017; originally announced November 2017.

  15. arXiv:1706.07600  [pdf, other

    cs.CR

    A Churn for the Better: Localizing Censorship using Network-level Path Churn and Network Tomography

    Authors: Shinyoung Cho, Rishab Nithyanand, Abbas Razaghpanah, Phillipa Gill

    Abstract: Recent years have seen the Internet become a key vehicle for citizens around the globe to express political opinions and organize protests. This fact has not gone unnoticed, with countries around the world repurposing network management tools (e.g., URL filtering products) and protocols (e.g., BGP, DNS) for censorship. However, repurposing these products can have unintended international impact, w… ▽ More

    Submitted 23 June, 2017; originally announced June 2017.

  16. arXiv:1706.01875  [pdf, other

    cs.CL cs.CY cs.SI

    Measuring Offensive Speech in Online Political Discourse

    Authors: Rishab Nithyanand, Brian Schaffner, Phillipa Gill

    Abstract: The Internet and online forums such as Reddit have become an increasingly popular medium for citizens to engage in political conversations. However, the online disinhibition effect resulting from the ability to use pseudonymous identities may manifest in the form of offensive speech, consequently making political discussions more aggressive and polarizing than they already are. Such environments m… ▽ More

    Submitted 19 July, 2017; v1 submitted 6 June, 2017; originally announced June 2017.

  17. arXiv:1609.07190  [pdf, other

    cs.CY

    Tracking the Trackers: Towards Understanding the Mobile Advertising and Tracking Ecosystem

    Authors: Narseo Vallina-Rodriguez, Srikanth Sundaresan, Abbas Razaghpanah, Rishab Nithyanand, Mark Allman, Christian Kreibich, Phillipa Gill

    Abstract: Third-party services form an integral part of the mobile ecosystem: they allow app developers to add features such as performance analytics and social network integration, and to monetize their apps by enabling user tracking and targeted ad delivery. At present users, researchers, and regulators all have at best limited understanding of this third-party ecosystem. In this paper we seek to shrink t… ▽ More

    Submitted 26 October, 2016; v1 submitted 22 September, 2016; originally announced September 2016.

  18. arXiv:1606.01979  [pdf, other

    cs.NI cs.CY

    Exploring the Design Space of Longitudinal Censorship Measurement Platforms

    Authors: Abbas Razaghpanah, Anke Li, Arturo Filastò, Rishab Nithyanand, Vasilis Ververis, Will Scott, Phillipa Gill

    Abstract: Despite the high perceived value and increasing severity of online information controls, a data-driven understanding of the phenomenon has remained elusive. In this paper, we consider two design points in the space of Internet censorship measurement with particular emphasis on how they address the challenges of locating vantage points, choosing content to test, and analyzing results. We discuss th… ▽ More

    Submitted 29 October, 2016; v1 submitted 6 June, 2016; originally announced June 2016.

    Comments: 7 pages

  19. arXiv:1605.05077  [pdf, other

    cs.CR cs.CY cs.NI

    Ad-Blocking and Counter Blocking: A Slice of the Arms Race

    Authors: Rishab Nithyanand, Sheharbano Khattak, Mobin Javed, Narseo Vallina-Rodriguez, Marjan Falahrastegar, Julia E. Powles, Emiliano De Cristofaro, Hamed Haddadi, Steven J. Murdoch

    Abstract: Adblocking tools like Adblock Plus continue to rise in popularity, potentially threatening the dynamics of advertising revenue streams. In response, a number of publishers have ramped up efforts to develop and deploy mechanisms for detecting and/or counter-blocking adblockers (which we refer to as anti-adblockers), effectively escalating the online advertising arms race. In this paper, we develop… ▽ More

    Submitted 20 July, 2016; v1 submitted 17 May, 2016; originally announced May 2016.

    Comments: To appear in the Proceedings of the 6th USENIX Workshop on Free and Open Communications on the Internet (FOCI 2016)

  20. arXiv:1605.03596  [pdf, other

    cs.CR

    Holding all the ASes: Identifying and Circumventing the Pitfalls of AS-aware Tor Client Design

    Authors: Rishab Nithyanand, Rachee Singh, Shinyoung Cho, Phillipa Gill

    Abstract: Traffic correlation attacks to de-anonymize Tor users are possible when an adversary is in a position to observe traffic entering and exiting the Tor network. Recent work has brought attention to the threat of these attacks by network-level adversaries (e.g., Autonomous Systems). We perform a historical analysis to understand how the threat from AS-level traffic correlation attacks has evolved ove… ▽ More

    Submitted 11 May, 2016; originally announced May 2016.

  21. arXiv:1505.05173  [pdf, other

    cs.CR

    Measuring and mitigating AS-level adversaries against Tor

    Authors: Rishab Nithyanand, Oleksii Starov, Adva Zair, Phillipa Gill, Michael Schapira

    Abstract: The popularity of Tor as an anonymity system has made it a popular target for a variety of attacks. We focus on traffic correlation attacks, which are no longer solely in the realm of academic research with recent revelations about the NSA and GCHQ actively working to implement them in practice. Our first contribution is an empirical study that allows us to gain a high fidelity snapshot of the t… ▽ More

    Submitted 26 December, 2015; v1 submitted 19 May, 2015; originally announced May 2015.

    Comments: Appearing at NDSS 2016

  22. arXiv:1503.05904  [pdf, other

    cs.CR

    Games Without Frontiers: Investigating Video Games as a Covert Channel

    Authors: Bridger Hahn, Rishab Nithyanand, Phillipa Gill, Rob Johnson

    Abstract: The Internet has become a critical communication infrastructure for citizens to organize protests and express dissatisfaction with their governments. This fact has not gone unnoticed, with governments clam** down on this medium via censorship, and circumvention researchers working to stay one step ahead. In this paper, we explore a promising new avenue for covert channels: real-time strategy-v… ▽ More

    Submitted 19 May, 2015; v1 submitted 19 March, 2015; originally announced March 2015.

  23. arXiv:1401.7304  [pdf, other

    cs.DS

    How Best to Handle a Dicey Situation

    Authors: Rishab Nithyanand, Jonathan Toohill, Rob Johnson

    Abstract: We introduce the {Destructive Object Handling} (DOH) problem, which models aspects of many real-world allocation problems, such as ship** explosive munitions, scheduling processes in a cluster with fragile nodes, re-using passwords across multiple websites, and quarantining patients during a disease outbreak. In these problems, objects must be assigned to handlers, but each object has a probabil… ▽ More

    Submitted 28 January, 2014; originally announced January 2014.

  24. arXiv:1401.6022  [pdf, other

    cs.CR

    New Approaches to Website Fingerprinting Defenses

    Authors: Xiang Cai, Rishab Nithyanand, Rob Johnson

    Abstract: Website fingerprinting attacks enable an adversary to infer which website a victim is visiting, even if the victim uses an encrypting proxy, such as Tor. Previous work has shown that all proposed defenses against website fingerprinting attacks are ineffective. This paper advances the study of website fingerprinting attacks and defenses in two ways. First, we develop bounds on the trade-off betwe… ▽ More

    Submitted 23 January, 2014; originally announced January 2014.