<node id="591737">
  <nid>591737</nid>
  <type>event</type>
  <uid>
    <user id="27707"><![CDATA[27707]]></user>
  </uid>
  <created>1494854474</created>
  <changed>1495205552</changed>
  <title><![CDATA[PhD Defense by Abhinav Narain]]></title>
  <body><![CDATA[<p>Title: Near-Field Deniable Communication</p>

<p>-----</p>

<p>&nbsp;</p>

<p>Abhinav Narain</p>

<p>School of Computer Science</p>

<p>College of Computing</p>

<p>Georgia Institute of Technology</p>

<p>&nbsp;</p>

<p>Committee</p>

<p>---------</p>

<p>Prof. Nick Feamster (Adviser, School of Computer Science, Princeton University)</p>

<p>Prof. Mostafa Ammar, (School of Computer Science, Georgia Institute of Technology)&nbsp;</p>

<p>Prof. Taesoo Kim, (School of Computer Science, Georgia Institute of Technology)</p>

<p>Prof. Alex Snoeren, (Dept. of Computer Science, University of California, San Diego)</p>

<p>&nbsp;</p>

<p>Date: &nbsp;Wednesday, May 24, 2016</p>

<p>Time: &nbsp;9 am to 11 am EST</p>

<p>Location: CITP conference room, Sherard Hall, Princeton University</p>

<p>Webcast : <a href="http://bit.ly/2qFJXx6">http://bit.ly/2qFJXx6</a></p>

<p>&nbsp;</p>

<p>There is constant surveillance by employers, corporations, and governments.</p>

<p>Long people have wanted to keep their communication private but &nbsp;With</p>

<p>increasing interest of state and private organizations and</p>

<p>corporations in the daily lives of people, such a discussion is on the</p>

<p>rise. This dissertation develops techniques and systems that empower</p>

<p>users to evade such intentions of adversaries. Our work builds from</p>

<p>the observation to leverage randomness in physical nature of the world</p>

<p>everywhere, specifically using technologies such as wireless and</p>

<p>power-lines networks in urban settings. This thesis is divided into</p>

<p>two parts. First part, we develop Denali, which allows deniable</p>

<p>communication in wireless 802.11 networks. Denali achieves this by</p>

<p>leveraging the weakness of wireless networks which has packet</p>

<p>corruption due to its ubiquitous nature of being broadcast</p>

<p>medium. This is the first such system which uses off-the-shelf</p>

<p>commodity hardware to users.</p>

<p>&nbsp;</p>

<p>&nbsp;</p>

<p>In the second part, we explore a different network primarily used for</p>

<p>powering devices in building infrastructure -- power-line network. We</p>

<p>build Power-line Whisperer, a physical layer covert communication</p>

<p>channel. Power-line Whisperer is the first of its kind of system to</p>

<p>make it easier for people to to do deniable communication on power-line</p>

<p>networks. Both these systems allow the users to do point-to-point</p>

<p>communication and defend against powerful adversaries who might be</p>

<p>interested in snooping on the message exchange for malicious reasons.</p>

<p>&nbsp;</p>
]]></body>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Near-Field Deniable Communication]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary>
  <field_time>
    <item>
      <value><![CDATA[2017-05-24T12:00:00-04:00]]></value>
      <value2><![CDATA[2017-05-24T14:00:00-04:00]]></value2>
      <rrule><![CDATA[]]></rrule>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_time>
  <field_fee>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_fee>
  <field_extras>
      </field_extras>
  <field_audience>
          <item>
        <value><![CDATA[Faculty/Staff]]></value>
      </item>
          <item>
        <value><![CDATA[Public]]></value>
      </item>
          <item>
        <value><![CDATA[Undergraduate students]]></value>
      </item>
      </field_audience>
  <field_media>
      </field_media>
  <field_contact>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_contact>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_phone>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_phone>
  <field_url>
    <item>
      <url><![CDATA[http://bit.ly/2qFJXx6]]></url>
      <title><![CDATA[WEBCAST ]]></title>
            <attributes><![CDATA[]]></attributes>
    </item>
  </field_url>
  <field_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_email>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>221981</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[Graduate Studies]]></item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>1788</tid>
        <value><![CDATA[Other/Miscellaneous]]></value>
      </item>
      </field_categories>
  <field_keywords>
          <item>
        <tid>100811</tid>
        <value><![CDATA[Phd Defense]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
