Bubble trouble: Off-line de-anonymization of bubble forms

Joseph A. Calandrino, William Clarkson, Edward W. Felten

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Abstract

Fill-in-the-bubble forms are widely used for surveys, election ballots, and standardized tests. In these and other scenarios, use of the forms comes with an implicit assumption that individuals' bubble markings themselves are not identifying. This work challenges this assumption, demonstrating that fill-in-the-bubble forms could convey a respondent's identity even in the absence of explicit identifying information. We develop methods to capture the unique features of a marked bubble and use machine learning to isolate characteristics indicative of its creator. Using surveys from more than ninety individuals, we apply these techniques and successfully reidentify individuals from markings alone with over 50% accuracy. This bubble-based analysis can have either positive or negative implications depending on the application. Potential applications range from detection of cheating on standardized tests to attacks on the secrecy of election ballots. To protect against negative consequences, we discuss mitigation techniques to remove a bubble's identifying characteristics. We suggest additional tests using longitudinal data and larger datasets to further explore the potential of our approach in realworld applications.

Original languageEnglish (US)
Title of host publicationProceedings of the 20th USENIX Security Symposium
PublisherUSENIX Association
Pages267-280
Number of pages14
ISBN (Electronic)9781931971874
StatePublished - 2011
Event20th USENIX Security Symposium - San Francisco, United States
Duration: Aug 8 2011Aug 12 2011

Publication series

NameProceedings of the 20th USENIX Security Symposium

Conference

Conference20th USENIX Security Symposium
Country/TerritoryUnited States
CitySan Francisco
Period8/8/118/12/11

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Information Systems
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Bubble trouble: Off-line de-anonymization of bubble forms'. Together they form a unique fingerprint.

Cite this