Chris Kanich
YOU?
Author Swipe
View article: Fair Decisions through Plurality: Results from a Crowdfunding Platform
Fair Decisions through Plurality: Results from a Crowdfunding Platform Open
We discuss an algorithmic intervention aimed at increasing equity and economic efficiency at a crowdfunding platform that gives cash subsidies to grantees. Through a blend of technical and qualitative methods, we show that the previous alg…
View article: Sanctions and infrastructural ideologies: Assessing the material shaping of EU digital sovereignty in response to the war in Ukraine
Sanctions and infrastructural ideologies: Assessing the material shaping of EU digital sovereignty in response to the war in Ukraine Open
In this paper, we interrogate the sanctions instated against Russian media by the European Union (EU) in response to Russia's aggression in Ukraine. We do this in three ways. First, we present the outcome of extensive network measurements …
View article: Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels Compared to Apps' Privacy Policies
Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels Compared to Apps' Privacy Policies Open
Apple introduced privacy labels in Dec. 2020 as a way for developers to report the privacy behaviors of their apps. While Apple does not validate labels, they also require developers to provide a privacy policy, which offers an important c…
View article: Unbundle-Rewrite-Rebundle: Runtime Detection and Rewriting of Privacy-Harming Code in JavaScript Bundles
Unbundle-Rewrite-Rebundle: Runtime Detection and Rewriting of Privacy-Harming Code in JavaScript Bundles Open
This work presents Unbundle-Rewrite-Rebundle (URR), a system for detecting privacy-harming portions of bundled JavaScript code and rewriting that code at runtime to remove the privacy-harming behavior without breaking the surrounding code …
View article: Internet Sanctions on Russian Media: Actions and Effects
Internet Sanctions on Russian Media: Actions and Effects Open
As a response to the Russian aggression against Ukraine, the European Union (EU), through the notion of "digital sovereignty", imposed sanctions on organizations and individuals affiliated with the Russian Federation that prohibit broadcas…
View article: Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels Compared to Apps' Privacy Policies
Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels Compared to Apps' Privacy Policies Open
Apple introduced privacy labels in Dec. 2020 as a way for developers to report the privacy behaviors of their apps. While Apple does not validate labels, they also require developers to provide a privacy policy, which offers an important c…
View article: SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots
SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots Open
In this paper, we revisit the use of honeypots for detecting reflective amplification attacks. These measurement tools require careful design of both data collection and data analysis including cautious threshold inference. We survey commo…
View article: Cart-ology: Intercepting Targeted Advertising via Ad Network Identity Entanglement
Cart-ology: Intercepting Targeted Advertising via Ad Network Identity Entanglement Open
Targeted advertising is a pervasive practice in the advertising ecosystem, with complex representations of user identity central to targeting. Ad networks are incentivized to tie ephemeral cookies across devices to lasting durable identifi…
View article: Longitudinal Analysis of Privacy Labels in the Apple App Store
Longitudinal Analysis of Privacy Labels in the Apple App Store Open
In December of 2020, Apple started to require app developers to self-report privacy label annotations on their apps indicating what data is collected and how it is used.To understand the adoption and shifts in privacy labels in the App Sto…
View article: Fair Decision-Making for Food Inspections
Fair Decision-Making for Food Inspections Open
Data and algorithms are essential and complementary parts of a large-scale decision-making process. However, their injudicious use can lead to unforeseen consequences, as has been observed by researchers and activists alike in the recent p…
View article: Tales of Favicons and Caches: Persistent Tracking in Modern Browsers
Tales of Favicons and Caches: Persistent Tracking in Modern Browsers Open
Statement from the NDSS 2021 Program Committee: NDSS is devoted to ethical principles and encourages the research community to ensure its work protects the privacy, security, and safety of users and others involved.While the NDSS 2021 PC a…
View article: Moving Beyond Set-It-And-Forget-It Privacy Settings on Social Media
Moving Beyond Set-It-And-Forget-It Privacy Settings on Social Media Open
When users post on social media, they protect their privacy by choosing an access control setting that is rarely revisited. Changes in users' lives and relationships, as well as social media platforms themselves, can cause mismatches betwe…
View article: An Empirical Analysis of the Commercial VPN Ecosystem
An Empirical Analysis of the Commercial VPN Ecosystem Open
Global Internet users increasingly rely on virtual private network (VPN) services to preserve their privacy, circumvent censorship, and access geo-filtered content. Due to their own lack of technical sophistication and the opaque nature of…
View article: DeepAuth
DeepAuth Open
With the increasing volume of transactions taking place online, mobile fraud has also increased. Mobile applications often authenticate the user only at install time. The user may then remain logged in for hours or weeks. Any unauthorized …
View article: Forgotten But Not Gone
Forgotten But Not Gone Open
Users have accumulated years of personal data in cloud storage, creating potential privacy and security risks. This agglomeration includes files retained or shared with others simply out of momentum, rather than intention. We presented 100…
View article: Network Model Selection for Task-Focused Attributed Network Inference
Network Model Selection for Task-Focused Attributed Network Inference Open
Networks are models representing relationships between entities. Often these relationships are explicitly given, or we must learn a representation which generalizes and predicts observed behavior in underlying individual data (e.g. attribu…
View article: Most Websites Don't Need to Vibrate: A Cost-Benefit Approach to Improving Browser Security
Most Websites Don't Need to Vibrate: A Cost-Benefit Approach to Improving Browser Security Open
Modern web browsers have accrued an incredibly broad set of features since being invented for hypermedia dissemination in 1990. Many of these features benefit users by enabling new types of web applications. However, some features also bri…
View article: Evaluating Social Networks Using Task-Focused Network Inference
Evaluating Social Networks Using Task-Focused Network Inference Open
Networks are representations of complex underlying social processes. However, the same given network may be more suitable to model one behavior of individuals than another. In many cases, aggregate population models may be more effective t…
View article: A General Framework For Task-Oriented Network Inference
A General Framework For Task-Oriented Network Inference Open
We present a brief introduction to a flexible, general network inference framework which models data as a network space, sampled to optimize network structure to a particular task. We introduce a formal problem statement related to influen…
View article: Characterizing fraud and its ramifications in affiliate marketing networks
Characterizing fraud and its ramifications in affiliate marketing networks Open
Cookie stuffing is an activity which allows unscrupulous actors online to defraud affiliate marketing programs by causing themselves to receive credit for purchases made by web users, even if the affiliate marketer did not actively perform…
View article: Browser Feature Usage on the Modern Web
Browser Feature Usage on the Modern Web Open
Modern web browsers are incredibly complex, with millions of lines of code and over one thousand JavaScript functions and properties available to website authors. This work investigates how these browser features are used on the modern, op…
View article: Browser Feature Usage on the Modern Web
Browser Feature Usage on the Modern Web Open
Modern web browsers are incredibly complex, with millions of lines of code and over one thousand JavaScript functions and properties available to website authors. This work investigates how these browser features are used on the modern, op…
View article: High Fidelity, High Risk, High Reward
High Fidelity, High Risk, High Reward Open
Network tap data can provide researchers with access to every packet flowing into or out of an organization. However, building a sound ethical framework around using this data is a necessary task before the community can embrace this data …