I am interested in censorship circumvention and censorship-resistant publishing with an emphasis on the implementation and real-world deployment of reliable and secure systems. I am also interested in formal methods and software engineering.
I have several ongoing research projects:
Slitheen is our new proposal for a decoy routing system. Decoy routing allows users to circumvent censorship by communicating with routers on the path between a user in a censored region and an unblocked website outside of the censor's area of influence. The user indicates to a router with a deployed relay station that they wish to access a censored website, and the router delivers content from that site to the user while maintaining the illusion to a censor that the user is browsing the unblocked site.
Censorship-resistant publishing systems allow users to publish content in a safe environment where it will not be attributed to them or deleted by a censor. Existing tools are designed to protect and enable journalists to export data out of a censored region, or require participants to own and maintain large servers in a P2P system. Many users lack the domain knowledge to publish content in this manner. We aim to design a system that gives users both the agency and the protections necessary to participate actively in censorship resistance, allowing them to report on events or produce content contrary to a censoring authority, and share it in a safe and anonymous manner.
Erinn Atwater, Cecylia Bocovich, Urs Hengartner, Ian Goldberg. Netsim: Network simulation and hacking for high schoolers. 2017 USENIX Workshop on Advances in Security Education, August 2017.
Cecylia Bocovich, John A. Doucette, Ian Goldberg. Lavinia: An audit-payment protocol for censorship-resistant storage. 21st International Conference on Financial Cryptography and Data Security (FC), April 2017.
Cecylia Bocovich, Joanne Atlee. Feature-Oriented Modelling in BIP: A Case Study. 2nd International Workshop on Model-Driven Engineering for Component-Based Software Systems (ModComp), October 2016.
Cecylia Bocovich, Ian Goldberg. Slitheen: Perfectly Imitated Decoy Routing Through Traffic Replacement. 23rd ACM Conference on Computer and Communications Security (CCS), October 2016.
Erinn Atwater, Cecylia Bocovich, Urs Hengartner, Ed Lank, Ian Goldberg. Leading Johnny to Water: Designing for Usability and Trust. 11th Symposium on Usable Privacy and Security (SOUPS), July 2015.
Cecylia Bocovich and Joanne M. Atlee.
Variable-Specific Resolutions for Feature Interactions.
In Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering (FSE 2014), pages 553-563, 2014.
L.R. Biggers, C. Bocovich, R. Capshaw, B.P. Eddy, L.H. Etzkorn, and N.A. Kraft.
Configuring latent Dirichlet allocation based feature location.
In Empirical Software Engineering, 2012.
Cecylia Bocovich, Joanne Atlee. Feature-Oriented Modelling in BIP: A Case Study (extended version). Tech Report CS-2016-04, July 2016.
Cecylia Bocovich, John A. Doucette, Ian Goldberg. Lavinia: An audit-payment protocol for censorship-resistant storage (extended version). CACR Tech Report 2015-06, 2017.