A Framework for the Game-theoretic Analysis of Censorship Resistance

We present a game-theoretic analysis of optimal solutions for interactions between censors and censorship resistance systems (CRSs) by focusing on the data channel used by the CRS to smuggle clients’ data past the censors. This analysis leverages the inherent errors (false positives and negatives) m...

Full description

Bibliographic Details
Main Authors: Elahi Tariq, Doucette John A., Hosseini Hadi, Murdoch Steven J., Goldberg Ian
Format: Article
Language:English
Published: Sciendo 2016-10-01
Series:Proceedings on Privacy Enhancing Technologies
Online Access:https://doi.org/10.1515/popets-2016-0030
id doaj-50adf15463694988b82efab1918de71a
record_format Article
spelling doaj-50adf15463694988b82efab1918de71a2021-09-05T13:59:51ZengSciendoProceedings on Privacy Enhancing Technologies2299-09842016-10-01201648310110.1515/popets-2016-0030popets-2016-0030A Framework for the Game-theoretic Analysis of Censorship ResistanceElahi Tariq0Doucette John A.1Hosseini Hadi2Murdoch Steven J.3Goldberg Ian4KU LeuvenUniversity of WaterlooUniversity of WaterlooUniversity College LondonUniversity of WaterlooWe present a game-theoretic analysis of optimal solutions for interactions between censors and censorship resistance systems (CRSs) by focusing on the data channel used by the CRS to smuggle clients’ data past the censors. This analysis leverages the inherent errors (false positives and negatives) made by the censor when trying to classify traffic as either non-circumvention traffic or as CRS traffic, as well as the underlying rate of CRS traffic. We identify Nash equilibrium solutions for several simple censorship scenarios and then extend those findings to more complex scenarios where we find that the deployment of a censorship apparatus does not qualitatively change the equilibrium solutions, but rather only affects the amount of traffic a CRS can support before being blocked. By leveraging these findings, we describe a general framework for exploring and identifying optimal strategies for the censorship circumventor, in order to maximize the amount of CRS traffic not blocked by the censor. We use this framework to analyze several scenarios with multiple data-channel protocols used as cover for the CRS. We show that it is possible to gain insights through this framework even without perfect knowledge of the censor’s (secret) values for the parameters in their utility function.https://doi.org/10.1515/popets-2016-0030
collection DOAJ
language English
format Article
sources DOAJ
author Elahi Tariq
Doucette John A.
Hosseini Hadi
Murdoch Steven J.
Goldberg Ian
spellingShingle Elahi Tariq
Doucette John A.
Hosseini Hadi
Murdoch Steven J.
Goldberg Ian
A Framework for the Game-theoretic Analysis of Censorship Resistance
Proceedings on Privacy Enhancing Technologies
author_facet Elahi Tariq
Doucette John A.
Hosseini Hadi
Murdoch Steven J.
Goldberg Ian
author_sort Elahi Tariq
title A Framework for the Game-theoretic Analysis of Censorship Resistance
title_short A Framework for the Game-theoretic Analysis of Censorship Resistance
title_full A Framework for the Game-theoretic Analysis of Censorship Resistance
title_fullStr A Framework for the Game-theoretic Analysis of Censorship Resistance
title_full_unstemmed A Framework for the Game-theoretic Analysis of Censorship Resistance
title_sort framework for the game-theoretic analysis of censorship resistance
publisher Sciendo
series Proceedings on Privacy Enhancing Technologies
issn 2299-0984
publishDate 2016-10-01
description We present a game-theoretic analysis of optimal solutions for interactions between censors and censorship resistance systems (CRSs) by focusing on the data channel used by the CRS to smuggle clients’ data past the censors. This analysis leverages the inherent errors (false positives and negatives) made by the censor when trying to classify traffic as either non-circumvention traffic or as CRS traffic, as well as the underlying rate of CRS traffic. We identify Nash equilibrium solutions for several simple censorship scenarios and then extend those findings to more complex scenarios where we find that the deployment of a censorship apparatus does not qualitatively change the equilibrium solutions, but rather only affects the amount of traffic a CRS can support before being blocked. By leveraging these findings, we describe a general framework for exploring and identifying optimal strategies for the censorship circumventor, in order to maximize the amount of CRS traffic not blocked by the censor. We use this framework to analyze several scenarios with multiple data-channel protocols used as cover for the CRS. We show that it is possible to gain insights through this framework even without perfect knowledge of the censor’s (secret) values for the parameters in their utility function.
url https://doi.org/10.1515/popets-2016-0030
work_keys_str_mv AT elahitariq aframeworkforthegametheoreticanalysisofcensorshipresistance
AT doucettejohna aframeworkforthegametheoreticanalysisofcensorshipresistance
AT hosseinihadi aframeworkforthegametheoreticanalysisofcensorshipresistance
AT murdochstevenj aframeworkforthegametheoreticanalysisofcensorshipresistance
AT goldbergian aframeworkforthegametheoreticanalysisofcensorshipresistance
AT elahitariq frameworkforthegametheoreticanalysisofcensorshipresistance
AT doucettejohna frameworkforthegametheoreticanalysisofcensorshipresistance
AT hosseinihadi frameworkforthegametheoreticanalysisofcensorshipresistance
AT murdochstevenj frameworkforthegametheoreticanalysisofcensorshipresistance
AT goldbergian frameworkforthegametheoreticanalysisofcensorshipresistance
_version_ 1717812886377594880