Skip to main content

Showing 1–5 of 5 results for author: Sullivan, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2304.09299  [pdf, other

    cs.HC

    Virtual Fidgets: Opportunities and Design Principles for Bringing Fidgeting to Online Learning

    Authors: Sam Ross, Nicole Sullivan, **a Yoon

    Abstract: We present design guidelines for incorporating fidgeting into the virtual world as a tool for students in online lectures. Fidgeting is associated with increased attention and self-regulation, and has the potential to help students focus. Currently there are no fidgets, physical or virtual, designed for preserving attention specifically in online learning environments, and no heuristics for design… ▽ More

    Submitted 18 April, 2023; originally announced April 2023.

    Comments: 6 pages, 3 figures, CHI LBW 2023

  2. arXiv:2203.07806  [pdf, other

    cs.CR

    You get PADDING, everybody gets PADDING! You get privacy? Evaluating practical QUIC website fingerprinting protections for the masses

    Authors: Sandra Siby, Ludovic Barman, Christopher Wood, Marwan Fayed, Nick Sullivan, Carmela Troncoso

    Abstract: Website fingerprinting (WF) is a well-know threat to users' web privacy. New internet standards, such as QUIC, include padding to support defenses against WF. Previous work only analyzes the effectiveness of defenses when users are behind a VPN. Yet, this is not how most users browse the Internet. In this paper, we provide a comprehensive evaluation of QUIC-padding-based defenses against WF when u… ▽ More

    Submitted 15 December, 2022; v1 submitted 15 March, 2022; originally announced March 2022.

  3. arXiv:2109.14490  [pdf

    cs.CR

    Might I Get Pwned: A Second Generation Compromised Credential Checking Service

    Authors: Bijeeta Pal, Mazharul Islam, Marina Sanusi, Nick Sullivan, Luke Valenta, Tara Whalen, Christopher Wood, Thomas Ristenpart, Rahul Chattejee

    Abstract: Credential stuffing attacks use stolen passwords to log into victim accounts. To defend against these attacks, recently deployed compromised credential checking (C3) services provide APIs that help users and companies check whether a username, password pair is exposed. These services however only check if the exact password is leaked, and therefore do not mitigate credential tweaking attacks - att… ▽ More

    Submitted 18 March, 2022; v1 submitted 29 September, 2021; originally announced September 2021.

  4. arXiv:2011.10121  [pdf, other

    cs.CR cs.NI

    Oblivious DNS over HTTPS (ODoH): A Practical Privacy Enhancement to DNS

    Authors: Sudheesh Singanamalla, Suphanat Chunhapanya, Marek VavruĊĦa, Tanya Verma, Peter Wu, Marwan Fayed, Kurtis Heimerl, Nick Sullivan, Christopher Wood

    Abstract: The Domain Name System (DNS) is the foundation of a human-usable Internet, responding to client queries for host-names with corresponding IP addresses and records. Traditional DNS is also unencrypted, and leaks user information to network operators. Recent efforts to secure DNS using DNS over TLS (DoT) and DNS over HTTPS (DoH) have been gaining traction, ostensibly protecting traffic and hiding co… ▽ More

    Submitted 19 November, 2020; originally announced November 2020.

    Comments: 16 pages, 7 figures, Under submission and Presented at IETF 109 MAPRG

  5. arXiv:1905.13737  [pdf, other

    cs.CR

    Protocols for Checking Compromised Credentials

    Authors: Lucy Li, Bijeeta Pal, Junade Ali, Nick Sullivan, Rahul Chatterjee, Thomas Ristenpart

    Abstract: To prevent credential stuffing attacks, industry best practice now proactively checks if user credentials are present in known data breaches. Recently, some web services, such as HaveIBeenPwned (HIBP) and Google Password Checkup (GPC), have started providing APIs to check for breached passwords. We refer to such services as compromised credential checking (C3) services. We give the first formal de… ▽ More

    Submitted 4 September, 2019; v1 submitted 31 May, 2019; originally announced May 2019.