Search Results for author: Noah Apthorpe

Found 7 papers, 1 papers with code

Automating Governing Knowledge Commons and Contextual Integrity (GKC-CI) Privacy Policy Annotations with Large Language Models

no code implementations3 Nov 2023 Jake Chanenson, Madison Pickering, Noah Apthorpe

We apply our best-performing model to privacy policies from 164 popular online services, demonstrating the effectiveness of scaling GKC-CI annotation for data exploration.

Prompt Engineering

SkillBot: Identifying Risky Content for Children in Alexa Skills

no code implementations5 Feb 2021 Tu Le, Danny Yuxing Huang, Noah Apthorpe, Yuan Tian

Finally, we identify a novel risk in the VPA ecosystem: confounding utterances, or voice commands shared by multiple apps that may cause a user to interact with a different app than intended.

A Developer-Friendly Library for Smart Home IoT Privacy-Preserving Traffic Obfuscation

1 code implementation22 Aug 2018 Trisha Datta, Noah Apthorpe, Nick Feamster

The number and variety of Internet-connected devices have grown enormously in the past few years, presenting new challenges to security and privacy.

Cryptography and Security

Detecting Compressed Cleartext Traffic from Consumer Internet of Things Devices

no code implementations7 May 2018 Daniel Hahn, Noah Apthorpe, Nick Feamster

Data encryption is the primary method of protecting the privacy of consumer device Internet communications from network observers.

BIG-bench Machine Learning

Machine Learning DDoS Detection for Consumer Internet of Things Devices

no code implementations11 Apr 2018 Rohan Doshi, Noah Apthorpe, Nick Feamster

An increasing number of Internet of Things (IoT) devices are connecting to the Internet, yet many of these devices are fundamentally insecure, exposing the Internet to a variety of attacks.

BIG-bench Machine Learning feature selection

Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic

no code implementations16 Aug 2017 Noah Apthorpe, Dillon Reisman, Srikanth Sundaresan, Arvind Narayanan, Nick Feamster

The growing market for smart home IoT devices promises new conveniences for consumers while presenting new challenges for preserving privacy within the home.

Cryptography and Security

Closing the Blinds: Four Strategies for Protecting Smart Home Privacy from Network Observers

no code implementations18 May 2017 Noah Apthorpe, Dillon Reisman, Nick Feamster

The growing market for smart home IoT devices promises new conveniences for consumers while presenting novel challenges for preserving privacy within the home.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.