Award Abstract # 1255546
EAGER: Attacking (and Defending) Information

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: UNIVERSITY OF CALIFORNIA, SANTA BARBARA
Initial Amendment Date: August 28, 2012
Latest Amendment Date: August 28, 2012
Award Number: 1255546
Award Instrument: Standard Grant
Program Manager: Nina Amla
namla@nsf.gov
 (703)292-7991
CNS
 Division Of Computer and Network Systems
CSE
 Direct For Computer & Info Scie & Enginr
Start Date: September 1, 2012
End Date: February 28, 2014 (Estimated)
Total Intended Award Amount: $200,000.00
Total Awarded Amount to Date: $200,000.00
Funds Obligated to Date: FY 2012 = $200,000.00
History of Investigator:
  • Christopher Kruegel (Principal Investigator)
    chris@cs.ucsb.edu
  • Giovanni Vigna (Co-Principal Investigator)
Recipient Sponsored Research Office: University of California-Santa Barbara
3227 CHEADLE HALL
SANTA BARBARA
CA  US  93106-0001
(805)893-4188
Sponsor Congressional District: 24
Primary Place of Performance: University of California-Santa Barbara
CA  US  93106-5110
Primary Place of Performance
Congressional District:
24
Unique Entity Identifier (UEI): G9QBQDH39DF4
Parent UEI:
NSF Program(s): Secure &Trustworthy Cyberspace
Primary Program Source: 01001213DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 7434, 7916, 8087
Program Element Code(s): 806000
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

The Internet has evolved into an essential medium that permeates most aspects of our lives. We consume information and entertainment online, cultivate relationships, exchange ideas, and handle business transactions. Not surprisingly, this new medium has also attracted malicious elements who seek to use the Internet to take advantage of others. Information manipulation is a new, emerging frontier in cyber security. Information manipulation denotes all attempts by adversaries to distort information with the goal to influence opinion, thought, or action. It can take many shapes and forms, from blatant attacks, such as search-poisoning, to misinformation, such as bogus on-line reviews, and more subtle distortion, such as personalized search and biased news. Unlike more traditional attacks, which typically aim to take control of computational resources or sensitive data, information manipulation targets human minds and their ideas. Left unchecked, information manipulation can harm our economy, culture, and democracy.

In this research project, the PIs aim to systematically study the ways in which attackers can manipulate information along its flow from the source where it is created to the recipient. Of particular interest are systems that help to discover, organize, and present information to users. These systems, such as search engines and news portals, reach large audiences and act as filters that often determine what content users will see or not. Thus, attackers can achieve significant leverage when successfully manipulating the filter mechanisms to their benefit. As one example, attackers can carry out search engine poisoning attacks to trick search engines into ranking their content higher than it should be based on its organic value. However, attackers do not need to target search engines directly; it is also possible to manipulate ranking by targeting users of search engines and their search history. Based on the study and analysis of attacks, the PIs will develop general detection approaches to identify when systems are under attack. This information can then be leveraged to design appropriate countermeasures.

PROJECT OUTCOMES REPORT

Disclaimer

This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.

Information manipulation is a new, emerging frontier in cyber security. Information manipulation denotes all attempts by adversaries to distort information with the goal to influence opinion, thought, or action. It can take many shapes and forms, from blatant attacks, such as search-poisoning, to misinformation, such as bogus on-line reviews, and more subtle distortion, such as personalized search and biased news. Unlike more traditional attacks, which typically aim to take control of computational resources or sensitive data, information manipulation targets human minds and their ideas.


In this research, we explored the problem of information manipulation attacks along two main vectors. First, we looked into the problem of fake reviews in popular websites. Sites such as Yelp and TripAdvisor allow anonymous users on the Internet to create accounts and rate their experience with products and services. Clearly, there is an incentive for businesses to make their products appear better than they are (or to slender competition). In our project, we analyzed review entries and uses anomaly detection to determine whether certain entries are likely fraudulent. To this end, we use a number of techniques that leverage spatial and temporal correlation. More specifically, we are interested in differences between multiple reviewing sites for a specific business (spatial correlation). When reviews on one site deviate substantially from those on other sites, reviews are possibly fraudulent. We also check whether the reviews for a specific business over time change suddenly (temporal correlation). Again, a sudden shift combined with a substantial increase in the number of reviews for a business is suspicious. Finally, we also consider the accounts created by reviewers. For example, reviewers who do not live in the area or have only reviewed a small number of businesses will be considered less trustworthy.

We also worked on a study that identified ways in which websites can implement web fingerprinting. Web fingerprinting is a term that describes techniques that web servers can use to track clients (web browsers). Tracking is used for many different reasons, including targeted advertising and preventing fraud. The most prominent fingerprinting mechanism are browser cookies. However, given their negative publicity and initiatives such as do-not-track, cookies become increasingly less reliable. Hence, companies (and attackers) search for alternatives. Our study led to the discovery of various novel approaches to carry out fingerprinting, but it also revealed the extent to which entities on the web make use of these (aggressive) techniques. As part of our research, we discovered novel browser-fingerprinting techniques that can, in milliseconds, uncover a browser's family and version. Finally, we demonstrate that over 800,000 users who are currently utilizing user-agent-spoofing extensions are more fingerprintable than users who do not attempt to hide their browser's identity, and hence, challenge the advice given by prior research on the use of such extensions as a way of increasing one's privacy.


Our research uncovered important information manipulation attacks and potential privacy invasions in two different domains. This project was a one-year, initial exploration of the domain. We believe that we set out to investigate a number of interesting problems that will yield additional fruitful research problems (and results) in the years to come.


Last Modified: 04/04/2014
Modified by: Christopher I Kruegel

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page