CS 858: Hot Topics in Privacy Enhancing Technologies — Fall 2011

Suggested Reading List

This is a list of papers we will discuss in class. Feel free to suggest any others you may find appropriate. A good starting point for finding papers in this area is Free Haven's Selected Papers in Anonymity site.

'I've Got Nothing to Hide' and Other Misunderstandings of Privacy (local cached copy)
Daniel J. Solove, San Diego Law Review, Vol. 44, 2007
A Classification for Privacy Techniques (local cached copy)
Carlisle Adams, University of Ottawa Law & Technology Journal 3, 2006
PETs for the Internet
Privacy-enhancing Technologies for the Internet (local cached copy)
Ian Goldberg, David Wagner, Eric Brewer, IEEE COMPCON 1997
Privacy-enhancing technologies for the Internet, II: Five years later (local cached copy)
Ian Goldberg, PET 2002
Privacy-enhancing technologies for the Internet III: Ten years later (local cached copy)
Ian Goldberg, "Digital Privacy: Theory, Technologies and Practices", Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, and Sabrina De Capitani di Vimercati, editors, 2007
Anonymous and Pseudonymous Communication
Untraceable electronic mail, return addresses, and digital pseudonyms (local cached copy)
David Chaum, Communications of the ACM, 1981
Tor: The Second-Generation Onion Router (local cached copy)
Roger Dingledine, Nick Mathewson, Paul Syverson, USENIX Security 2004
Scalable Onion Routing with Torsk (local cached copy)
Jon McLachlan, Andrew Tran, Nicholas Hopper, Yongdae Kim, CCS 2009
ShadowWalker: Peer-to-peer Anonymous Communication using Redundant Structured Topologies (local cached copy)
Prateek Mittal, Nikita Borisov, CCS 2009
Balancing the Shadows (local cached copy)
Max Schuchard, Alex Dean, Victor Heorhiadi, Yongdae Kim, Nicholas Hopper, WPES 2010
In Search of an Anonymous and Secure Lookup: Attacks on Structured Peer-to-peer Anonymous Communication Systems (local cached copy)
Qiyan Wang, Prateek Mittal, Nikita Borisov, CCS 2010
PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval (local cached copy)
Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg, CACR Tech Report 2011-05
Publius: A robust, tamper-evident, censorship-resistant and source-anonymous web publishing system (local cached copy)
Marc Waldman, Aviel Rubin, Lorrie Cranor, USENIX Security 2000
Telex: Anticensorship in the Network Infrastructure (local cached copy)
Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman, USENIX Security 2011
Decoy Routing: Toward Unblockable Internet Communication (local cached copy)
Josh Karlin, Daniel Ellard, Alden W. Jackson, Christine E. Jones, Greg Lauer, David P. Mankins, W. Timothy Strayer, FOCI 2011
Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability (local cached copy)
Amir Houmansadr, Giang Nguyen, Matthew Caesar, Nikita Borisov, CCS 2011
Traffic Analysis
Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems (local cached copy)
Jean-François Raymond, PET 2000
On the risks of serving whenever you surf: Vulnerabilities in Tor's blocking resistance design (local cached copy)
Jon McLachlan, Nicholas J. Hopper, WPES 2009
BridgeSPA: Improving Tor Bridges with Single Packet Authorization (local cached copy)
Rob Smits, Divam Jain, Sarah Pidcock, Ian Goldberg, Urs Hengartner, WPES 2011
A Practical Congestion Attack on Tor Using Long Paths (local cached copy)
Nathan S. Evans, Roger Dingledine, Christian Grothoff, USENIX Security 2009
Privacy in P2P and Social Networks
The Sybil Attack (local cached copy)
John R. Douceur, IPTPS 2002
De-anonymizing Social Networks (local cached copy)
Arvind Narayanan, Vitaly Shmatikov, Oakland 2009
DSybil: Optimal Sybil-Resistance for Recommendation Systems (local cached copy)
Haifeng Yu, Chenwei Shi, Michael Kaminsky, Phillip B. Gibbons, Feng Xiao, Oakland 2009
Vanish: Increasing Data Privacy with Self-Destructing Data (local cached copy)
Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy, USENIX Security 2009
Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs (local cached copy)
Scott Wolchok, Owen S. Hofmann, Nadia Heninger, Edward W. Felten, J. Alex Halderman, Christopher J. Rossbach, Brent Waters, Emmett Witchel, NDSS 2010
Anonymous Blacklisting
Formalizing Anonymous Blacklisting Systems (local cached copy)
Ryan Henry, Ian Goldberg, Oakland 2011
PEREA: towards practical TTP-free revocation in anonymous authentication (local cached copy)
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith, CCS 2008
FAUST: Efficient, TTP-Free Abuse Prevention by Anonymous Whitelisting (local cached copy)
Peter Lofgren, Nicholas Hopper, WPES 2011
Web Privacy
An Analysis of Private Browsing Modes in Modern Browsers (local cached copy)
Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh, USENIX Security 2010
How Unique Is Your Web Browser? (local cached copy)
Peter Eckersley, PETS 2010
Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL (local cached copy)
Christopher Soghoian, Sid Stamm, FC 2011
Privacy-Preserving Computation
Protocols for Secure Computations (local cached copy)
Andrew Yao, FOCS 1982
Secure Multiparty Computation Goes Live (local cached copy)
Peter Bogetoft, Dan Lund Christensen, Ivan Damgård, Martin Geisler, Thomas Jakobsen, Mikkel Krøigaard, Janus Dam Nielsen, Jesper Buus Nielsen, Kurt Nielsen, Jakob Pagter, Michael Schwartzbach, Tomas Toft, FC 2009
SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics (local cached copy)
Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos, USENIX Security 2010
TASTY: Tool for Automating Secure Two-partY computations (local cached copy)
Wilko Henecka, Stefan Koegl, Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg , CCS 2010
Faster Secure Two-Party Computation Using Garbled Circuits (local cached copy)
Yan Huang, David Evans, Jonathan Katz, Lior Malka, USENIX Security 2011