April 7, 2023, 1:10 a.m. | Kurt Thomas, Sarah Meiklejohn, Michael A. Specter, Xiang Wang, Xavier Llorà, Stephan Somogyi, David Kleidermacher

cs.CR updates on arXiv.org arxiv.org

With the accelerated adoption of end-to-end encryption, there is an
opportunity to re-architect security and anti-abuse primitives in a manner that
preserves new privacy expectations. In this paper, we consider two novel
protocols for on-device blocklisting that allow a client to determine whether
an object (e.g., URL, document, image, etc.) is harmful based on threat
information possessed by a so-called remote enforcer in a way that is both
privacy-preserving and trustworthy. Our protocols leverage a unique combination
of private set …

abuse adoption architect blocklisting called client device document encryption end end-to-end etc hashes information novel object opportunity privacy private set intersection protocols resilience security threat threat information url

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Information Security Specialist, Sr. (Container Hardening)

@ Rackner | San Antonio, TX

Principal Security Researcher (Advanced Threat Prevention)

@ Palo Alto Networks | Santa Clara, CA, United States

EWT Infosec | IAM Technical Security Consultant - Manager

@ KPMG India | Bengaluru, Karnataka, India

Security Engineering Operations Manager

@ Gusto | San Francisco, CA; Denver, CO; Remote

Network Threat Detection Engineer

@ Meta | Denver, CO | Reston, VA | Menlo Park, CA | Washington, DC