National Research Centre on Privacy, Harm Reduction and Adversarial Influence Online

Announced by UK Research and Innovation (UKRI) on 14 October 2020, REPHRAIN will explore how to keep people safe online while allowing them to fully participate in digital technologies and the contributions they make to an innovative, inclusive and healthy economy and society.

Latest News

November 2021 – Release of draft REPHRAIN map for community consultation

We are very pleased to announce the release of the draft version of the REPHRAIN Map. The REPHRAIN Map will be open for review and community consultation for a 4 week period until Tuesday 14 December 2021.

All constructive comments are welcome so please let us know what you think. We would appreciate if comments could be based around the following points.

  • Four categories used in the Map (State of the art, Challenges, Tools & Approaches, Projects)
  • Map structure
  • Content of the Map
  • How useful the Map is

Please submit your comments using this survey – we look forward to hearing your thoughts!

November 2021 – Strategic Funding Call 1 Projects!

We are very pleased to announce, following a competitive process, the following projects have successfully been awarded grants from the first REPHRAIN Strategic Funding call.

Congratulations to all and we look forward to working with you!

More details of how these projects match up with the REPHRAIN missions can be found here and the University of Bristol’s press release here.

October 2021 – Another publication on our privacy testbed!

Further to our presentation at SECPRE 2021, as detailed below, the REPHRAIN Testbed team have published another paper on their work on one of our central projects.

Building a Privacy Testbed: Use Cases and Design Considerations

Prepared by Joseph Gardiner, Partha Das Chowdhury, Jacob Halsey, Mohammad Tahaei, Tariq Elahi and Awais Rashid.

Abstract: Mobile application (app) developers are often ill-equipped to understand the privacy implications of their products and services, especially with the common practice of using third-party libraries to provide critical functionality. To add to the complexity, most mobile applications interact with the “cloud”—not only the platform provider’s ecosystem (such as Apple or Google) but also with third-party servers (as a consequence of library use). This presents a hazy view of the privacy impact for a particular app. Therefore, we take a significant step to address this challenge and propose a testbed with the ability to systematically evaluate and understand the privacy behavior of client server applications in a network environment across a large number of hosts. We reflect on our experiences of successfully deploying two mass market applications on the initial versions of our proposed testbed. Standardization across cloud implementations and exposed end points of closed source binaries are key for transparent evaluation of privacy features.

Paper available for download here.

October 2021 – Presentation to the Dutch Senate!

Congratulations to one of our Practitioners-in-Residence, Erik van de Sandt, who presented his publication Towards Data Scientific Investigations to the Dutch Senate.

Read Erik’s paper here and read details of this event here.

October 2021 – see a presentation on our testbed!

Further to the below, the REPHRAIN Testbed team will be presenting during the 5th International Workshop on SECurity and Privacy Requirements Engineering (SECPRE) workshop programme, in conjunction with ESORICS 2021 – this will be taking place at 11.30 CET, 8 October.

Interested parties can register here – SECPRE will be held as a virtual event to ensure all are able to attend.

September 2021 – A publication on our testbed!

A Privacy Testbed for IT Professionals: Use Cases and Design Considerations

Prepared by Joseph Gardiner, Mohammad Tahaei, Jacob Halsey, Tariq Elahi and Awais Rashid

Abstract: We propose a testbed to assist IT professionals in evaluating privacy properties of software systems. The goal of the testbed, currently under construction, is to help IT professionals systematically evaluate and understand the privacy behaviour of applications. We first provide three use cases to support developers and privacy engineers and then describe key design considerations for the testbed.

Paper available for download here.

September 2021 – Launch of REPHRAIN Masterclasses

Starting from 2 September, REPHRAIN will be running and hosting a series of masterclasses on specialised topics – these sessions will allow a collaborative space for researchers, industry and interested parties to discuss the challenges and best practice principles in specific areas.

These masterclasses will involve our researchers presenting case studies on their work, as well as panel-based / round-table Q&A sessions. The events will be hosted online for the time being and will be free to attend – tickets can be reserved via Eventbrite and the masterclasses will be advertised via this website, our newsletter and our Twitter account.

For more information on our masterclass series, including our current schedule, check our dedicated page here.

16 August, 2021 – A new research paper on PSIs!

Polynomial Representation Is Tricky: Maliciously Secure Private Set Intersections Revisited

As accepted at ESORICS 2021! Prepared by Aydin Abadi, Steven Murdoch, Thomas Zacharias

Abstract: Private Set Intersection protocols (PSIs) allow parties to compute the intersection of their private sets, such that nothing about the sets’ elements beyond the intersection is revealed. PSIs have a variety of applications, primarily in efficiently supporting data sharing in a privacy-preserving manner. At Eurocrypt 2019, Ghosh and Nilges proposed three efficient PSIs based on the polynomial representation of sets and proved their security against active adversaries. In this work, we show that these three PSIs are susceptible to several serious attacks. The attacks let an adversary (1) learn the correct intersection while making its victim believe that the intersection is empty, (2) learn a certain element of its victim’s set beyond the intersection, and (3) delete multiple elements of its victim’s input set. We explain why the proofs did not identify these attacks and propose a set of mitigations.

Paper available for download here.

Practitioner-in-Residence / Researcher-in-Residence Programmes

REPHRAIN is delighted to announce we are accepting expressions of interest for our practitioner-in-residence programme and applications for our researcher-in-residence programme!

These programmes aim to cultivate and provide a public space to maximise collaboration with the wider community and to offer an environment for mutual engagement and learning. The remit of the programmes is to host researchers and practitioners from the wider UK/international community in its touchdown space in Bristol and its partner organisations (current Government restrictions pending) to enable access to the Centre’s facilities, including datasets and testbed, and for the Centre to benefit in return from proposal outputs.

Both are open, rolling calls and submissions will be welcome until 31 March 2023.

More details on both can be found on their dedicated pages – Practitioner-in-residence & Researcher-in-residence.

Explore more: