A Framework for the Game-theoretic Analysis of Censorship Resistance
We present a game-theoretic analysis of optimal solutions for interactions between censors and censorship resistance systems (CRSs) by focusing on the data channel used by the CRS to smuggle clients’ data past the censors. This analysis leverages the inherent errors (false positives and negatives) m...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Sciendo
2016-10-01
|
Series: | Proceedings on Privacy Enhancing Technologies |
Online Access: | https://doi.org/10.1515/popets-2016-0030 |
id |
doaj-50adf15463694988b82efab1918de71a |
---|---|
record_format |
Article |
spelling |
doaj-50adf15463694988b82efab1918de71a2021-09-05T13:59:51ZengSciendoProceedings on Privacy Enhancing Technologies2299-09842016-10-01201648310110.1515/popets-2016-0030popets-2016-0030A Framework for the Game-theoretic Analysis of Censorship ResistanceElahi Tariq0Doucette John A.1Hosseini Hadi2Murdoch Steven J.3Goldberg Ian4KU LeuvenUniversity of WaterlooUniversity of WaterlooUniversity College LondonUniversity of WaterlooWe present a game-theoretic analysis of optimal solutions for interactions between censors and censorship resistance systems (CRSs) by focusing on the data channel used by the CRS to smuggle clients’ data past the censors. This analysis leverages the inherent errors (false positives and negatives) made by the censor when trying to classify traffic as either non-circumvention traffic or as CRS traffic, as well as the underlying rate of CRS traffic. We identify Nash equilibrium solutions for several simple censorship scenarios and then extend those findings to more complex scenarios where we find that the deployment of a censorship apparatus does not qualitatively change the equilibrium solutions, but rather only affects the amount of traffic a CRS can support before being blocked. By leveraging these findings, we describe a general framework for exploring and identifying optimal strategies for the censorship circumventor, in order to maximize the amount of CRS traffic not blocked by the censor. We use this framework to analyze several scenarios with multiple data-channel protocols used as cover for the CRS. We show that it is possible to gain insights through this framework even without perfect knowledge of the censor’s (secret) values for the parameters in their utility function.https://doi.org/10.1515/popets-2016-0030 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Elahi Tariq Doucette John A. Hosseini Hadi Murdoch Steven J. Goldberg Ian |
spellingShingle |
Elahi Tariq Doucette John A. Hosseini Hadi Murdoch Steven J. Goldberg Ian A Framework for the Game-theoretic Analysis of Censorship Resistance Proceedings on Privacy Enhancing Technologies |
author_facet |
Elahi Tariq Doucette John A. Hosseini Hadi Murdoch Steven J. Goldberg Ian |
author_sort |
Elahi Tariq |
title |
A Framework for the Game-theoretic Analysis of Censorship Resistance |
title_short |
A Framework for the Game-theoretic Analysis of Censorship Resistance |
title_full |
A Framework for the Game-theoretic Analysis of Censorship Resistance |
title_fullStr |
A Framework for the Game-theoretic Analysis of Censorship Resistance |
title_full_unstemmed |
A Framework for the Game-theoretic Analysis of Censorship Resistance |
title_sort |
framework for the game-theoretic analysis of censorship resistance |
publisher |
Sciendo |
series |
Proceedings on Privacy Enhancing Technologies |
issn |
2299-0984 |
publishDate |
2016-10-01 |
description |
We present a game-theoretic analysis of optimal solutions for interactions between censors and censorship resistance systems (CRSs) by focusing on the data channel used by the CRS to smuggle clients’ data past the censors. This analysis leverages the inherent errors (false positives and negatives) made by the censor when trying to classify traffic as either non-circumvention traffic or as CRS traffic, as well as the underlying rate of CRS traffic. We identify Nash equilibrium solutions for several simple censorship scenarios and then extend those findings to more complex scenarios where we find that the deployment of a censorship apparatus does not qualitatively change the equilibrium solutions, but rather only affects the amount of traffic a CRS can support before being blocked. By leveraging these findings, we describe a general framework for exploring and identifying optimal strategies for the censorship circumventor, in order to maximize the amount of CRS traffic not blocked by the censor. We use this framework to analyze several scenarios with multiple data-channel protocols used as cover for the CRS. We show that it is possible to gain insights through this framework even without perfect knowledge of the censor’s (secret) values for the parameters in their utility function. |
url |
https://doi.org/10.1515/popets-2016-0030 |
work_keys_str_mv |
AT elahitariq aframeworkforthegametheoreticanalysisofcensorshipresistance AT doucettejohna aframeworkforthegametheoreticanalysisofcensorshipresistance AT hosseinihadi aframeworkforthegametheoreticanalysisofcensorshipresistance AT murdochstevenj aframeworkforthegametheoreticanalysisofcensorshipresistance AT goldbergian aframeworkforthegametheoreticanalysisofcensorshipresistance AT elahitariq frameworkforthegametheoreticanalysisofcensorshipresistance AT doucettejohna frameworkforthegametheoreticanalysisofcensorshipresistance AT hosseinihadi frameworkforthegametheoreticanalysisofcensorshipresistance AT murdochstevenj frameworkforthegametheoreticanalysisofcensorshipresistance AT goldbergian frameworkforthegametheoreticanalysisofcensorshipresistance |
_version_ |
1717812886377594880 |