<node id="546241">
  <nid>546241</nid>
  <type>event</type>
  <uid>
    <user id="27707"><![CDATA[27707]]></user>
  </uid>
  <created>1466498825</created>
  <changed>1475893087</changed>
  <title><![CDATA[PhD Proposal by Abhinav Narain]]></title>
  <body><![CDATA[<p><strong>Title: Near-Field Deniable Communication</strong></p><p>-----</p><p>&nbsp;</p><p>Abhinav Narain</p><p>School of Computer Science</p><p>College of Computing</p><p>Georgia Institute of Technology</p><p>&nbsp;</p><p>Committee</p><p>---------</p><p>Prof. Nick Feamster (Adviser, Princeton University) Prof. Wenke Lee (School of Computer Science, Georgia Institute of Technology)</p><p>Prof. Mostafa Ammar,&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;(School of Computer Science, Georgia Institute of Technology)</p><p>Prof. Taesoo Kim, (School of Computer Science, Georgia Institute of Technology) Prof. Alex Snoeren, (Dept. of Computer Science, University of California, San Diego)</p><p>&nbsp;</p><p>Date:&nbsp; Wednesday, June 22, 2016</p><p>Time:&nbsp; 1 pm to 3 pm EST</p><p>Location: CITP conference room, Sherard Hall, Princeton University Webcast : <a href="http://bit.ly/28JKsKd">http://bit.ly/28JKsKd</a></p><p>&nbsp;</p><p>Abstract:</p><p>--------</p><p>There is constant surveillance by employers, corporations, and governments.</p><p>People need to communicate with one another while concealing the communication itself. The existing system provides few tools in Wide-area Internet, but parties in close physical proximity may want to use a lightweight tool. Although tools for encrypted communication exist, they serve only to single out privacy-minded individuals as compared to eavesdroppers.</p><p>&nbsp;</p><p>First, the thesis proposes a deniable communication system, Denali. The system leverages an observation of leveraging ubiquitous phenomenon of packet corruption in Wireless networks. The system uses off-the-shelf hardware to provide ease of use for the users.</p><p>&nbsp;</p><p>Second, I present deniable communication system for power-line networks called Power-line Whisperer. The system leverages the presence of physical layer noise in power-line network. The system uses software defined radios to evaluate and demonstrate a novel technique to hide transmissions in noise.</p><p>&nbsp;</p><p>Finally, instead of using computations on a processor to generate signals on the channel, I propose to sense electromagnetic interference on power-line to detect the presence of anomalous activity on processors in IoT devices.</p><p> </p>]]></body>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Near-Field Deniable Communication]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary>
  <field_time>
    <item>
      <value><![CDATA[2016-06-22T14:00:00-04:00]]></value>
      <value2><![CDATA[2016-06-22T16:00:00-04:00]]></value2>
      <rrule><![CDATA[]]></rrule>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_time>
  <field_fee>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_fee>
  <field_extras>
      </field_extras>
  <field_audience>
          <item>
        <value><![CDATA[Public]]></value>
      </item>
      </field_audience>
  <field_media>
      </field_media>
  <field_contact>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_contact>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_phone>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_phone>
  <field_url>
    <item>
      <url><![CDATA[http://bit.ly/28JKsKd]]></url>
      <title><![CDATA[]]></title>
            <attributes><![CDATA[]]></attributes>
    </item>
  </field_url>
  <field_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_email>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>221981</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[Graduate Studies]]></item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>1788</tid>
        <value><![CDATA[Other/Miscellaneous]]></value>
      </item>
      </field_categories>
  <field_keywords>
          <item>
        <tid>102851</tid>
        <value><![CDATA[Phd proposal]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
