Vanderbilt Hall, Room 220, NYU Law School

2:00 - 3:30pm 
Threat Models and Adversaries: Why Obfuscation?

  • “Evaluating Strategies for Padding DNS Traffic”
    Daniel Kahn Gillmor, American Civil Liberties Union and Internet Engineering Task Force
  • “PrivacyVisor: Privacy Protection for Preventing Face Detection from Camera”
    Isao Echizen, National Institute of Informatics, Tokyo
  • “Circumvention Through Obfuscation”
    Amir Houmansadr, University of Massachusetts Amherst
  • Moderator: Seda Gürses, University of Leuven

4:00 - 5:30pm

Does it Work?: Tests, Evaluation, and Benchmarks

  • “Obfuscation and Free-Riding in the Long-Run: Using Game Theory to Assess the Impact of User-Initiated Perturbation Techniques”
    Jeffrey Pawlick and Quanyan Zhu, New York University
  • “Obfuscating Data to Prevent Discrimination”
    Sorelle Friedler, Haverford College
  • “Inference Attacks against Obfuscation Mechanisms”
    Reza Shokri, Cornell Tech
  • Moderator: Helen Nissenbaum, Cornell Tech and New York University

Greenberg Lounge, NYU Law School

9:00 - 10:30am
Obfuscating Identities and Locations

  • “Identity Obfuscation Through Fully Functional Avatars”
    Paul Ashley, Anonyome Labs
  • “Profile Obfuscation as a Privacy Design Pattern”
    Ero Balsa, University of Leuven
  • “Go Rando First and Ask Questions Later: Resisting Emotional Surveillance with Noisy Feelings”
    Benjamin Grosser, University of Illinois at Urbana-Champaign
  • Moderator: Scott Skinner-Thompson, New York University

10:40am - 12:10pm

Obfuscating Software

  • “Software diversification as an obfuscation technique”
    Benoit Baudry and Nicolas Harrand, Inria
  • “How Good is Obfuscation?”
    Alexander Pretschner, Technical University of Munich
  • “Hiding Data Flows with Covert Channels”
    Saumya Debray and Jon Stephens, University of Arizona
  • Moderator: TBA

12:45 - 2:10pm (lunch panel)

The Art of Obfuscation

  • “HyperFace: Emerging Strategies for Obfuscating Computer Vision Algorithms”
    Adam Harvey
  • “Obfuscating 15M US Criminal Records and Mugshots for the Right to Remove Them”
    Paolo Cirio
  • “Between Erasure and Obfuscation: The Case of Missing Data”
    Mimi Onuoha
  • “Political Rhetoric as Obfuscation and Finding Solutions with Neural Networks”
    Nicole Cote and Rob Hammond, New York University
  • Moderators: Taylor Black and Harris Kornstein, New York University

2:20 - 3:50pm

Obfuscating Things: Hardware, Devices, and Infrastructure

  • “Obfuscation in Adaptive Systems”
    Seda Gürses, University of Leuven
  • “Obfuscating Integrated Circuits (ICs): What, Why and How?”
    Siddharth Garg, New York University
  • “Two Stories on (De)Obfuscation: From Handbags to Search”
    Lakshmi Subramanian, New York University
  • Moderator: Natasha Dow Schüll, New York University

4:00 - 5:30pm

Obfuscation: New Applications and Communities

  • “Obfuscation in Bitcoin: Techniques and Politics”
    Arvind Narayanan and Malte Möser, Princeton University
  • “Cryptographic Techniques for Obfuscating Personal Data: From Anonymous Credentials, to Steganography, to Code Obfuscation”
    Anna Lysyanskaya, Brown University
  • “Obfuscation Going Forward”
    Finn Brunton, New York University; Helen Nissenbaum, Cornell Tech and New York University; and Daniel Howe, City University of Hong Kong
  • Moderator: Finn Brunton, New York University

5:30 - 6:00pm


Draft: updated March 15, 2017


Stay in Touch

We'll send occasional announcements about conference details and follow-up initiatives.

Sponsored by:

NYU Steinhardt logo

International Program and Organizing Committee:

Paul Ashley, Anonyome Labs
Benoît Baudry, INRIA, France
Finn Brunton, New York University
Saumya Debray, University of Arizona
Cynthia Dwork, Harvard University
Rachel Greenstadt, Drexel University
Seda Gürses, Princeton University
Anna Lysyanskaya, Brown University
Helen Nissenbaum, Cornell Tech & New York University
Alexander Pretschner, Technische Universität München
Reza Shokri, Cornell Tech