14
The The S S uper uper S S ecret ecret F F ile ile S S ystem ystem CS851 – CS851 – Web Web Applicatio Applicatio n Security n Security Seminar Seminar Chris Sosa Chris Sosa Blake Sutton Blake Sutton Howie Huang Howie Huang

PicFS presentation

Embed Size (px)

DESCRIPTION

My presentation on PicFS. PicFS is an implementation of CovertFS. More specifically, it is a online file system that uses steganography to gain plausible deniability

Citation preview

Page 1: PicFS presentation

The The SSuper uper SSecret ecret FFile ile SSystemystem

CS851 – CS851 – Web Web

Application Application Security Security SeminarSeminar

Chris Sosa Chris Sosa Blake Blake Sutton Sutton Howie Howie HuangHuang

Page 2: PicFS presentation

OverviewOverview

Implemented CovertFS on top of FUSE

Automatic Image Selection from Video

Used Tor to further protect users

Page 3: PicFS presentation

MotivationMotivation

We have the right We have the right and the desire for and the desire for

privacyprivacy

We only trust our We only trust our friendsfriends

Page 4: PicFS presentation

Plausible DeniabilityPlausible Deniability

What can we do to What can we do to provide privacy?provide privacy?

We want Plausible We want Plausible DeniabilityDeniability– Privacy is threatened Privacy is threatened

whenever private whenever private information is known information is known to existto exist

– We can mask private We can mask private activities with non-activities with non-private onesprivate ones

What do you do if Nina isn’t one of your friends?

Page 5: PicFS presentation

Related Work and their Related Work and their IssuesIssues

StegFS – Free Memory StegFS – Free Memory BlocksBlocks– Files were stored on the same Files were stored on the same

systemsystem– No permanent storage No permanent storage

guaranteesguarantees CovertFS – Online photo-CovertFS – Online photo-

sharingsharing– Lacked way of getting imagesLacked way of getting images– Lacked implementationLacked implementation– User is compromised at same User is compromised at same

time as datatime as data

He does not like bullets either

Page 6: PicFS presentation

Image GenerationImage Generation

Page 7: PicFS presentation

Anonymizing with TorAnonymizing with Tor

Onion Routing in Action

I AM A MEDIA

SERVER

I <3 Privac

y

Page 8: PicFS presentation

Image Access PatternsImage Access Patterns

Mask our private file access patterns with Mask our private file access patterns with non-private online image access non-private online image access – Online sites have open API’s that encourage 3Online sites have open API’s that encourage 3rdrd

party applicationsparty applications– Mask our accesses to be similar to at least one Mask our accesses to be similar to at least one

such popular applicationsuch popular application Techniques UsedTechniques Used

– See CovertFSSee CovertFS– Image-based On-disk cache helps enormously Image-based On-disk cache helps enormously

herehere

Page 9: PicFS presentation

File System ImplementationFile System Implementation

Based on Ext2 Based on Ext2 Uses Fuse-J library to take advantage of Java SerializationUses Fuse-J library to take advantage of Java Serialization Steganographic Algorithm replaceable (uses F5)Steganographic Algorithm replaceable (uses F5) Allocation Table has paths for efficiencyAllocation Table has paths for efficiency Allocation table is chained especially (does not follow normal Allocation table is chained especially (does not follow normal

direct – indirect linkage)direct – indirect linkage) Implemented Media ServerImplemented Media Server Image-based On-Disk Cache Image-based On-Disk Cache

– Looks just like a subset of images from the Media ServerLooks just like a subset of images from the Media Server– Permanently deleted on unmountPermanently deleted on unmount

Insert “Sexy” On-disk cache

here

Ext2

Page 10: PicFS presentation

Implementation IssuesImplementation Issues

Allocation Table cannot act as a traditional Allocation Table cannot act as a traditional special file (chicken-egg problem)special file (chicken-egg problem)

Flickr modifies uploaded images of Free Flickr modifies uploaded images of Free Account holdersAccount holders– Grad students are poorGrad students are poor– No restriction with $30 / year subscriptionNo restriction with $30 / year subscription– Easier to evaluate without FlickrEasier to evaluate without Flickr

Tradeoff with privacy vs. efficiency Tradeoff with privacy vs. efficiency between On-Demand downloading and between On-Demand downloading and Bulk DownloadBulk Download

Page 11: PicFS presentation

Evaluation (Future Work)Evaluation (Future Work)

Image GenerationImage Generation– How many images How many images

selectedselected– ““Uniqueness” of frames Uniqueness” of frames – Different video types Different video types

(cartoon, home, (cartoon, home, television)television)

I’m unique!

•Traffic patterns- Media Server gathers

data- Compare with existing

API tools/apps

Page 12: PicFS presentation

DemoDemo

Page 13: PicFS presentation

ConclusionsConclusions

An anonyMizing Image-based Log File An anonyMizing Image-based Log File System is feasible!System is feasible!

Completely automatic image Completely automatic image generation is practical if you have generation is practical if you have lots of videos ;) available as source lots of videos ;) available as source materialmaterial

Page 14: PicFS presentation

Questions?Questions?