Raising further questions about privacy on the internet, researchers from Princeton and Stanford universities have released a study showing that a specific person's online behavior can be identified by linking anonymous web browsing histories with social media profiles.
In a paper presented at the 2016 ACM Conference on Computer and Communications Security on Oct. 27, researchers describe a system called PREDATOR that distinguishes between legitimate and malicious purchasers of new websites. The system yields important insights into how those two groups behave differently online even before the malicious users have done anything obviously bad or harmful. These early signs can help security professionals take preemptive measures.
Researchers have found that the “Great Firewall” technology that controls internet traffic entering and leaving China is not merely an apparatus that statically blocks traffic. It also actively sends probes across the internet, preemptively searching for internet infrastructure and services that seek to circumvent its defenses. “The Great Firewall is actively trying to find these sites so it can block them,” said Nick Feamster, a professor of computer science at Prince
Researchers have found that the "Great Firewall" technology that controls internet traffic entering and leaving China is not merely an apparatus that statically blocks traffic. It also actively sends probes to other machines that are connected to the internet, preemptively searching for internet infrastructure and services that seek to circumvent its defenses.
A smartphone application that alerts drivers to local road hazards could help avoid accidents and be a step towards improving transportation policy, Princeton University professor Garnet Chan told an audience during the hackathon sponsored by the Center for Information Technology Policy (CITP) and Code for Princeton on February 27 and 28.
Edward Felten, a Princeton University computer scientist who is a leading expert on computer security, has been named U.S. Deputy Chief Technology Officer in the White House's Office of Science and Technology Policy (OSTP).
Big Data continues to transform the way we live and work, altering the relationships between government, citizens, businesses and consumers. But does it come at a cost?
A group of eight undergraduates spent fall break in Washington, D.C., meeting with leaders in the field of technology policy – at the Federal Trade Commission, the State Department, advocacy groups, consulting and law firms, and the Washington Post. The trip was organized by Edward Felten, director of Princeton’s Center for Information Technology Policy, and Janet Vertesi, assistant professor of sociology. “Before going on this trip Washington was a black box in many wa
Seemingly minor bits of information collected by the National Security Agency, such as the phone numbers that citizens dial, can reveal far more personal information than is commonly believed, Professor Edward Felten told a Senate committee Wednesday.
Fundamentals of fluids Researchers in the lab of Howard Stone, the Donald R. Dixon ’69 and Elizabeth W. Dixon Professor of Mechanical and Aerospace Engineering, are applying a deep understanding of fluid flows to reveal the mechanics behind critical biological functions. In one project, Stone’s group found the unexpected formation of bacterial ribbons in the middle of flowing fluids, which has implications for understanding serious infections and has led to a collaboration with Bon
New Princeton engineering students kick off the 2010 school year at orientation. Photographs from the engineering school freshman orientation.