CS 858: Hot Topics in Privacy Enhancing Technologies — Fall 2015

Suggested Reading List

This is a list of papers we will discuss in class. Feel free to suggest any others you may find appropriate. A good starting point for finding papers in this area is Free Haven's Selected Papers in Anonymity site.

Privacy
'I've Got Nothing to Hide' and Other Misunderstandings of Privacy (local cached copy)
Daniel J. Solove, San Diego Law Review, Vol. 44, 2007
A Classification for Privacy Techniques (local cached copy)
Carlisle Adams, University of Ottawa Law & Technology Journal 3, 2006
PETs for the Internet
Privacy-enhancing Technologies for the Internet (local cached copy)
Ian Goldberg, David Wagner, Eric Brewer, IEEE COMPCON 1997
Privacy-enhancing technologies for the Internet, II: Five years later (local cached copy)
Ian Goldberg, PET 2002
Privacy-enhancing technologies for the Internet III: Ten years later (local cached copy)
Ian Goldberg, "Digital Privacy: Theory, Technologies and Practices", Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, and Sabrina De Capitani di Vimercati, editors, 2007
Privacy and the Real World
Why Doesn't Jane Protect Her Privacy (local cached copy)
Karen Renaud, Melanie Volkamer, Arne Renkema-Padmos, 14th Privacy Enhancing Technologies Symposium (PETS 2014)
Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in China (local cached copy)
Jeffrey Knockel, Masashi Crete-Nishihata, Jason Q. Ng, Adam Senft, Jedidiah R. Crandall, 5th USENIX Workshop on Free and Open Communications on the Internet (FOCI 2015)
Internet Censorship in Iran: A First Look (local cached copy)
Simurgh Aryan, Homa Aryan, J. Alex Halderman, 3rd USENIX Workshop on Free and Open Communications on the Internet (FOCI 2013)
The Anatomy of Web Censorship in Pakistan (local cached copy)
Zubair Nabi, 3rd USENIX Workshop on Free and Open Communications on the Internet (FOCI 2013)
Privacy in Peer-to-Peer and Social Networks
The Sybil Attack (local cached copy)
John R. Douceur, 1st International Workshop on Peer-to-Peer Systems (IPTPS 2002)
DSybil: Optimal Sybil-Resistance for Recommendation Systems (local cached copy)
Haifeng Yu, Chenwei Shi, Michael Kaminsky, Phillip B. Gibbons, Feng Xiao, 30th IEEE Symposium on Security & Privacy (Oakland 2009)
Vanish: Increasing Data Privacy with Self-Destructing Data (local cached copy)
Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy, 18th USENIX Security Symposium (USENIX Security 2009)
Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs (local cached copy)
Scott Wolchok, Owen S. Hofmann, Nadia Heninger, Edward W. Felten, J. Alex Halderman, Christopher J. Rossbach, Brent Waters, Emmett Witchel, 17th Network and Distributed System Security Symposium (NDSS 2010)
Social Turing Tests: Crowdsourcing Sybil Detection (local cached copy)
Gang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang, Miriam Metzger, Haitao Zheng, Ben Y. Zhao, 20th Network and Distributed System Security Symposium (NDSS 2013)
Portrait of a Privacy Invasion: Detecting Relationships Through Large-scale Photo Analysis (local cached copy)
Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna, Proceedings on Privacy Enhancing Technologies 2015.1
Anonymous and Pseudonymous Communication
Untraceable electronic mail, return addresses, and digital pseudonyms (local cached copy)
David Chaum, Communications of the ACM, 1981
Tor: The Second-Generation Onion Router (local cached copy)
Roger Dingledine, Nick Mathewson, Paul Syverson, 12th USENIX Security Symposium (USENIX Security 2004)
Riposte: An Anonymous Messaging System Handling Millions of Users (local cached copy)
Henry Corrigan-Gibbs, Dan Boneh, David Mazières, 36th IEEE Symposium on Security and Privacy (Oakland 2015)
RAPTOR: Routing Attacks on Privacy in Tor (local cached copy)
Yixin Sun, Anne Edmundson, Laurent Vanbever, Oscar Li, Jennifer Rexford, Mung Chiang, Prateek Mittal, 24th USENIX Security Symposium (USENIX Security 2015)
Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services (local cached copy)
Albert Kwon, Mashael AlSabah, David Lazar, Marc Dacier, Srinivas Devadas, 24th USENIX Security Symposium (USENIX Security 2015)
HORNET: High-speed Onion Routing at the Network Layer (local cached copy)
Chen Chen, Daniele E. Asoni, David Barrera, George Danezis, Adrian Perrig, 22nd ACM Conference on Computer and Communications Security (CCS 2015)
Censorship Resistance
Games Without Frontiers: Investigating Video Games as a Covert Channel (local cached copy)
Bridger Hahn, Rishab Nithyanand, Phillipa Gill, Rob Johnson, arXiv:1503.05904
ScrambleSuit: a polymorphic network protocol to circumvent censorship (local cached copy)
Philipp Winter, Tobias Pulls, Juergen Fuss, 12th Workshop on Privacy in the Electronic Society (WPES 2013)
Facet: Streaming over Videoconferencing for Censorship Circumvention (local cached copy)
Shuai Li, Mike Schliep, Nick Hopper, 13th Workshop on Privacy in the Electronic Society (WPES 2014)
Blocking-Resistant Communication through Domain Fronting (local cached copy)
David Fifield, Chang Lan, Rod Hynes, Percy Wegmann, Vern Paxson, Proceedings on Privacy Enhancing Technologies 2015.2
Analyzing the Great Firewall of China Over Space and Time (local cached copy)
Roya Ensafi, Philipp Winter, Abdullah Mueen, Jedidiah R. Crandall, Proceedings on Privacy Enhancing Technologies 2015.1
Marionette: A Programmable Network Traffic Obfuscation System (local cached copy)
Kevin P. Dyer, Scott E. Coull, Thomas Shrimpton, 24th USENIX Security Symposium (USENIX Security 2015)
Privacy in Bitcoin
SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies (local cached copy)
Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten, 36th IEEE Symposium on Security & Privacy (Oakland 2015)
Evaluating User Privacy in Bitcoin (local cached copy)
Elli Androulaki, Ghassan O. Karame, Marc Roeschlin, Tobias Scherer, Srdjan Capkun, 17th International Conference on Financial Cryptography and Data Security (FC 2013)
Deanonymisation of Clients in Bitcoin P2P Network (local cached copy)
Alex Biryukov, Dmitry Khovratovich, Ivan Pustogarov, 21st ACM Conference on Computer and Communications Security (CCS 2014)
Zerocash: Decentralized Anonymous Payments from Bitcoin (local cached copy)
Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza, 35th IEEE Symposium on Security & Privacy (Oakland 2014)
Secure and Private Computation
Protocols for Secure Computations (local cached copy)
Andrew Yao, 23rd Annual Symposium on Foundations of Computer Science (FOCS 1982)
ObliVM: A Programming Framework for Secure Computation (local cached copy)
Chang Liu, Xiao Shaun Wang, Kartik Nayak, Yan Huang, Elaine Shi, 36th IEEE Symposium on Security & Privacy (Oakland 2015)
The Best of Both Worlds: Combining Information-Theoretic and Computational PIR for Communication Efficiency (local cached copy)
Casey Devet, Ian Goldberg, 14th Privacy Enhancing Technologies Symposium (PETS 2014)
Constants Count: Practical Improvements to Oblivious RAM (local cached copy)
Ling Ren, Christopher Fletcher, Albert Kwon, Emil Stefanov, Elaine Shi, Marten van Dijk, Srinivas Devadas, 24th USENIX Security Symposium (USENIX Security 2015)
Efficient Genome-Wide, Privacy-Preserving Similar Patient Query based on Private Edit Distance (local cached copy)
Xiao Shaun Wang, Yan Huang, Yongan Zhao, Haixu Tang, Xiaofeng Wang, Diyue Bu, 22nd ACM Conference on Computer and Communications Security (CCS 2015)