Re-purposing Perceptual Hashing based Client Side Scanning for Physical Surveillance

12/08/2022
by   Ashish Hooda, et al.
0

Content scanning systems employ perceptual hashing algorithms to scan user content for illegal material, such as child pornography or terrorist recruitment flyers. Perceptual hashing algorithms help determine whether two images are visually similar while preserving the privacy of the input images. Several efforts from industry and academia propose to conduct content scanning on client devices such as smartphones due to the impending roll out of end-to-end encryption that will make server-side content scanning difficult. However, these proposals have met with strong criticism because of the potential for the technology to be misused and re-purposed. Our work informs this conversation by experimentally characterizing the potential for one type of misuse – attackers manipulating the content scanning system to perform physical surveillance on target locations. Our contributions are threefold: (1) we offer a definition of physical surveillance in the context of client-side image scanning systems; (2) we experimentally characterize this risk and create a surveillance algorithm that achieves physical surveillance rates of >40 poisoning 5 trade-off between the robustness of client-side image scanning systems and surveillance, showing that more robust detection of illegal material leads to increased potential for physical surveillance.

READ FULL TEXT

page 10

page 11

research
06/17/2021

Adversarial Detection Avoidance Attacks: Evaluating the robustness of perceptual hashing-based client-side scanning

End-to-end encryption (E2EE) by messaging platforms enable people to sec...
research
06/20/2023

Deep perceptual hashing algorithms with hidden dual purpose: when client-side scanning does facial recognition

End-to-end encryption (E2EE) provides strong technical protections to in...
research
05/29/2022

YASM (Yet Another Surveillance Mechanism)

Client-Side Scanning (CSS) see in the Child Sexual Abuse Material Detect...
research
10/14/2021

Bugs in our Pockets: The Risks of Client-Side Scanning

Our increasing reliance on digital technology for personal, economic, an...
research
12/19/2020

Network Reconnaissance in IPv6-based Residential Broadband Networks

Network scanning has been a widely used technique to gather information ...
research
05/28/2020

The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums

Abusers increasingly use spyware apps, account compromise, and social en...
research
09/27/2020

Addressless: A New Internet Server Model to Prevent Network Scanning

Eliminating unnecessary exposure is a principle of server security. The ...

Please sign up or login with your details

Forgot password? Click here to reset