Events

CITP Luncheon Speaker Series: Trammell Hudson – Thunderstrike 2: More Mac EFI Firmware Vulnerabilties

Sherrerd Hall, 3rd floor open space Princeton, NJ, United States

This talk describes Thunderstrike, an attack that installs persistent firmware modifications into the boot ROM of Apple's popular MacBooks. The bootkit can be installed by an evil-maid via the externally accessible Thunderbolt ports. Alternatively, a remote SW attack can amplify root privileges yielding the same result. Once installed, 1) it can prevent software attempts to remove it, 2) it can survive reinstallation of the operating system as well as hard drive replacement, and 3) it can spread virally across air-gaps by infecting additional Thunderbolt devices.

CITP Luncheon Speaker Series: Yong Jin Park – “Future of Wearable Communication Devices: Privacy Pitfalls and Research Agenda”

Sherrerd Hall, 3rd floor open space Princeton, NJ, United States

Communication occurs overwhelmingly in mobile platforms. As a consequence, a typical person is far more routinely exposed to personal privacy-related decisions than at any other time. This talk will discuss the increasing presence of wearable communication devices and potential pitfalls in the cornucopia of personalized digital data. It will highlight the characteristics of synergetic personal data practices and policy concerns through the development of (failed) Google Glass. Three key areas of related political-policy concern (privacy; anti-trust; and user competence) will be summarized and possible solutions suggested, with the discussion on the future research agenda in this area. A main theme of this talk is that the data practices typical of Google Glass pose policy challenges and signal a dramatic shift to personalized data marketing, with subsequent wearable devices projected in light of 360-degree data collection.

Law and Technology Lunch Time Series: Privacy and Security for the Internet of Things

Robertson Hall, Bowl 002

As connected devices become increasingly widespread, new privacy and security concerns grow. Internet of Things devices often are not designed with security in mind -- they may serve as stepping stones to broader networks containing sensitive data, their flaws may physically endanger people, and their use by everyday consumers means that they exist in many households without the supervision of a skilled network administrator.

This panel is the first in a series of lunch-timers on law and technology. Each program explores the current state of an emerging technology and the legal, policy, and ethical considerations that stem from it.

CITP Lecture Series: Jonathan Mayer – The Privacy Properties of Telephone Metadata

Sherrerd Hall, 3rd Floor Open Space

Since 2013, a stream of disclosures have prompted reconsideration of surveillance law and policy. One of the most controversial principles, both in the United States and abroad, is that communications metadata receives substantially less protection than communications content. Several nations currently collect telephone metadata in bulk, including on their own citizens. In this paper, we attempt to shed light on the privacy properties of telephone metadata. Using a novel crowdsourcing methodology, we demonstrate that telephone metadata is densely interconnected, can trivially be re-identified, and can be used to draw sensitive inferences.

CITP Luncheon Speaker Series: Hadi Asghari – Where are the Privacy Enhanced Services for the Masses?

Sherrerd Hall, 3rd floor open space Princeton, NJ, United States

Many online markets are dominated by firms offering services for “free”, in exchange for the tracking of personal data. There are niche services that offer more privacy in exchange for less performance or convenience. But they are not as popular. What is puzzling is that a considerable portion of users say they are concerned about their online privacy in surveys, pointing to a market gap. In this talk findings are presented from on-going interviews with entrepreneurs and developers building privacy-enhanced services. The interviews uncover some unique economic and engineering challenges. This will be followed with an open discussion on solutions.

CITP Luncheon Speaker Series: Seda Gürses – PET Sematary: Privacy’s Return from the Dead and the Rise of Privacy Engineering

Sherrerd Hall, 3rd floor open space Princeton, NJ, United States

This talk will first give an overview of the nascent field of privacy engineering. Preliminary results will then be presented from an ongoing empirical study on the impact of the shift from shrink wrap software to services and apps on software engineering practice. Instead of organizing around stable versions of client specific binaries released at longer time intervals, and installed on user owned devices, software provided as a service or in the form of apps tends toward continuous, networked and centrally controlled functionality. What kind of challenges does this shift to services and apps pose to computer science research on privacy? And, have computer scientists understood and responded to these challenges in the privacy solutions they develop?