MLSEC 8 Flashcards

1
Q

Privacy

A

Control and protection of personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Privacy Protection

A

Data minimization

Data protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Anonymity

A

Anonymity ensures that a user may use a resource or service without disclosing the user’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Pseudonymity

A

Pseudonymity ensures that a user may use a resource or service without disclosing its user identity, but can still be accountable for that use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Privacy-Enhancing Technologies (PETs)

A

Anonymity services

Digital currencies

Data reduction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attacking Privacy with Machine Learning

A

De-pseudonymization
= Linking of pseudonyms with identities or pseudonyms

De-anonymization
= Identification of parties in anonymous communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Onion Routing

A

Routing of message through chain of relays

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Tor Network

A

Onion routing with random routes through network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Weak point Tor Network

A

entry and exit of network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Website Fingerprinting

A

Identification of visited websites at entry nodes

timing, direction, and size of packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

One-vs-all Multi-class classification

A

discrimination of one class from all other

n classes → n classifiers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

all-vs-all Multi-class classification

A

discrimination of each pair of classes

n classes → n2 classifiers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Defense strategies for anonymization

A

Padding of packet payloads to fixed sizes

Randomized retrieval of web objects by browser

Injection of incoming and outgoing packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Threats to Pseudonymization

A

Linking by behavioral patterns (two-class SVM)

Linking by anomalies
(center of mass)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Code Stylometry

A

Study of stylistic patterns in program code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Different representations of source code

A

Lexical features: source code as stream of tokens

Syntactic features: source code as abstract syntax tree