CS 858: Hot Topics in Privacy Enhancing Technologies — Fall 2018

Suggested Reading List

This is a list of papers we will discuss in class. Feel free to suggest any others you may find appropriate. Good starting points for finding papers in this area are Free Haven's Selected Papers in Anonymity site and Philipp Winter's Selected Research Papers in Internet Censorship site.

Privacy
'I've Got Nothing to Hide' and Other Misunderstandings of Privacy (local cached copy)
Daniel J. Solove, San Diego Law Review, Vol. 44, 2007
A Classification for Privacy Techniques (local cached copy)
Carlisle Adams, University of Ottawa Law & Technology Journal 3, 2006
PETs for the Internet
Privacy-enhancing Technologies for the Internet (local cached copy)
Ian Goldberg, David Wagner, Eric Brewer, IEEE COMPCON 1997
Privacy-enhancing technologies for the Internet, II: Five years later (local cached copy)
Ian Goldberg, PET 2002
Privacy-enhancing technologies for the Internet III: Ten years later (local cached copy)
Ian Goldberg, "Digital Privacy: Theory, Technologies and Practices", Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, and Sabrina De Capitani di Vimercati, editors, 2007
Privacy and the Real World
Turtles, Locks, and Bathrooms: Understanding Mental Models of Privacy Through Illustration (local cached copy)
Maggie Oates, Yama Ahmadullah, Abigail Marsh, Chelse Swoopes, Shikun Zhang, Rebecca Balebako, Lorrie Cranor, Proceedings on Privacy Enhancing Technologies 2018.4
I never signed up for this! Privacy implications of email tracking (local cached copy)
Steven Englehardt, Jeffrey Han, Arvind Narayanan, Proceedings on Privacy Enhancing Technologies 2018.1
Adblocking and Counter Blocking: A Slice of the Arms Race (local cached copy)
Rishab Nithyanand, Sheharbano Khattak, Mobin Javed, Narseo Vallina-Rodriguez, Marjan Falahrastegar, Julia E. Powles, Emiliano De Cristofaro, Hamed Haddadi, Steven J. Murdoch, FOCI 2016
Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in China (local cached copy)
Jeffrey Knockel, Masashi Crete-Nishihata, Jason Q. Ng, Adam Senft, Jedidiah R. Crandall, FOCI 2015
Internet Censorship in Thailand: User Practices and Potential Threats (local cached copy)
Genevieve Gebhart, Tadayoshi Kohno, EuroS&P 2017
Mending Wall: On the Implementation of Censorship in India (local cached copy)
Devashish Gosain, Anshika Agarwal, Sahil Shekhawat, H. B. Acharya, Sambuddho Chakravarty, SecureComm 2017
Censorship Resistance
SoK: Towards Grounding Censorship Circumvention in Empiricism (local cached copy)
Michael C. Tschantz, Sadia Afroz, Anonymous, Vern Paxson, Oakland 2016
Your State is Not Mine: A Closer Look at Evading Stateful Internet Censorship (local cached copy)
Zhongjie Wang, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, IMC 2018
Marionette: A Programmable Network Traffic Obfuscation System (local cached copy)
Kevin P. Dyer, Scott E. Coull, Thomas Shrimpton, USENIX Security 2015
Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement (local cached copy)
Cecylia Bocovich, Ian Goldberg, CCS 2016
The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks (local cached copy)
Milad Nasr, Hadi Zolfaghari, Amir Houmansadr, CCS 2017
DeltaShaper: Enabling Unobservable Censorship-resistant TCP Tunneling over Videoconferencing Streams (local cached copy)
Diogo Barradas, Nuno Santos, Luís Rodrigues, Proceedings on Privacy Enhancing Technologies 2017.4
Secure Messaging
Riposte: An Anonymous Messaging System Handling Millions of Users (local cached copy)
Henry Corrigan-Gibbs, Dan Boneh, David Mazières, Oakland 2015
Consistent Synchronous Group Off-The-Record Messaging with SYM-GOTR (local cached copy)
Michael Schliep, Eugene Vasserman, Nicholas Hopper, Proceedings on Privacy Enhancing Technologies 2018.3
Improved Strongly Deniable Authenticated Key Exchanges for Secure Messaging (local cached copy)
Nik Unger, Ian Goldberg, Proceedings on Privacy Enhancing Technologies 2018.1
PIR-PSI: Scaling Private Contact Discovery (local cached copy)
Daniel Demmler, Peter Rindal, Mike Rosulek, Ni Trieu, Proceedings on Privacy Enhancing Technologies 2018.4
Mix Networks
Untraceable electronic mail, return addresses, and digital pseudonyms (local cached copy)
David Chaum, Communications of the ACM, 1981
The Loopix Anonymity System (local cached copy)
Ania M. Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, George Danezis, USENIX Security 2017
MCMix: Anonymous Messaging via Secure Multiparty Computation (local cached copy)
Nikolaos Alexopoulos, Aggelos Kiayias, Riivo Talviste, Thomas Zacharias, USENIX Security 2017
TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer (local cached copy)
Chen Chen, Daniele E. Asoni, Adrian Perrig, David Barrera, George Danezis, Carmela Troncoso, EuroS&P 2018
Onion Routing
Tor: The Second-Generation Onion Router (local cached copy)
Roger Dingledine, Nick Mathewson, Paul Syverson, USENIX Security 2004
Data-plane Defenses against Routing Attacks on Tor (local cached copy)
Da Henry Tan, Micah Sherr, Wenchao Zhou, Proceedings on Privacy Enhancing Technologies 2016.4
How Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion Services (local cached copy)
Rebekah Overdorf, Mark Juarez, Gunes Acar, Rachel Greenstadt, Claudia Diaz, CCS 2017
Onions in the Crosshairs: When The Man really is out to get you (local cached copy)
Aaron D. Jaggard, Paul Syverson, WPES 2017
Dropping on the Edge: Flexibility and Traffic Confirmation in Onion Routing Protocols (local cached copy)
Florentin Rochet, Olivier Pereira, Proceedings on Privacy Enhancing Technologies 2018.2
HisTorε: Differentially Private and Robust Statistics Collection for Tor (local cached copy)
Akshaya Mani, Micah Sherr, NDSS 2017
Differential Privacy
On Significance of the Least Significant Bits For Differential Privacy (local cached copy)
Ilya Mironov, CCS 2012
Crowd-Blending Privacy (local cached copy)
Johannes Gehrke, Michael Hay, Edward Lui, Rafael Pass, Crypto 2012
Dependence Makes You Vulnerable: Differential Privacy Under Dependent Tuples (local cached copy)
Changchang Liu, Supriyo Chakraborty, Prateek Mittal, NDSS 2016
Differentially Private Oblivious RAM (local cached copy)
Sameer Wagh, Paul Cuff, Prateek Mittal, Proceedings on Privacy Enhancing Technologies 2018.4