This is a list of papers we will discuss in class. Feel free to
suggest any others you may find appropriate. A good starting point
for finding papers in this area is Free Haven's Selected Papers in
Anonymity site.
Privacy |
'I've Got Nothing to Hide' and Other Misunderstandings of Privacy (local cached copy) Daniel J. Solove, San Diego Law Review, Vol. 44, 2007 |
A Classification for Privacy Techniques (local cached copy) Carlisle Adams, University of Ottawa Law & Technology Journal 3, 2006 |
PETs for the Internet |
Privacy-enhancing Technologies for the Internet (local cached copy) Ian Goldberg, David Wagner, Eric Brewer, IEEE COMPCON 1997 |
Privacy-enhancing technologies for the Internet, II: Five years later (local cached copy) Ian Goldberg, PET 2002 |
Privacy-enhancing technologies for the Internet III: Ten years later (local cached copy) Ian Goldberg, "Digital Privacy: Theory, Technologies and Practices", Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, and Sabrina De Capitani di Vimercati, editors, 2007 |
Anonymous and Pseudonymous Communication |
Untraceable electronic mail, return addresses, and digital pseudonyms (local cached copy) David Chaum, Communications of the ACM, 1981 |
Tor: The Second-Generation Onion Router (local cached copy) Roger Dingledine, Nick Mathewson, Paul Syverson, USENIX Security 2004 |
Scalable Onion Routing with Torsk (local cached copy) Jon McLachlan, Andrew Tran, Nicholas Hopper, Yongdae Kim, CCS 2009 |
ShadowWalker: Peer-to-peer Anonymous Communication using Redundant Structured Topologies (local cached copy) Prateek Mittal, Nikita Borisov, CCS 2009 |
Balancing the Shadows (local cached copy) Max Schuchard, Alex Dean, Victor Heorhiadi, Yongdae Kim, Nicholas Hopper, WPES 2010 |
In Search of an Anonymous and Secure Lookup: Attacks on Structured Peer-to-peer Anonymous Communication Systems (local cached copy) Qiyan Wang, Prateek Mittal, Nikita Borisov, CCS 2010 |
Censorship Resistance |
Publius: A robust, tamper-evident, censorship-resistant and
source-anonymous web publishing system (local cached copy) Marc Waldman, Aviel Rubin, Lorrie Cranor, USENIX Security 2000 |
Telex: Anticensorship in the Network Infrastructure (local cached copy) Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman, USENIX Security 2011 |
Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability (local cached copy) Amir Houmansadr, Giang Nguyen, Matthew Caesar, Nikita Borisov, CCS 2011 |
Routing Around Decoys (local cached copy) Max Schuchard, John Geddes, Christopher Thompson, Nicholas Hopper, CCS 2012 |
SkypeMorph: Protocol Obfuscation for Tor Bridges (local cached copy) Hooman Mohajeri Moghaddam, Baiyu Li, Mohammad Derakhshani, Ian Goldberg, CCS 2012 |
StegoTorus: A Camouflage Proxy for the Tor Anonymity System (local cached copy) Zachary Weinberg, Jeffrey Wang, Vinod Yegneswaran, Linda Briesemeister, Steven Cheung, Frank Wang, Dan Boneh, CCS 2012 |
CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing (local cached copy) Qiyan Wang, Xun Gong, Giang T. K. Nguyen, Amir Houmansadr, Nikita Borisov, CCS 2012 |
The Parrot is Dead: Observing Unobservable Network Communications (local cached copy) Amir Houmansadr, Chad Brubaker, Vitaly Shmatikov, Oakland 2013 |
Privacy in P2P and Social Networks |
The Sybil Attack (local cached copy) John R. Douceur, IPTPS 2002 |
DSybil: Optimal Sybil-Resistance for Recommendation Systems (local cached copy) Haifeng Yu, Chenwei Shi, Michael Kaminsky, Phillip B. Gibbons, Feng Xiao, Oakland 2009 |
De-anonymizing Social Networks (local cached copy) Arvind Narayanan, Vitaly Shmatikov, Oakland 2009 |
Preserving Link Privacy in Social Network based Systems (local cached copy) Prateek Mittal, Charalampos Papamanthou, Dawn Song, NDSS 2013 |
Vanish: Increasing Data Privacy with Self-Destructing Data (local cached copy) Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy, USENIX Security 2009 |
Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs (local cached copy) Scott Wolchok, Owen S. Hofmann, Nadia Heninger, Edward W. Felten, J. Alex Halderman, Christopher J. Rossbach, Brent Waters, Emmett Witchel, NDSS 2010 |
Private Computation and Storage |
Protocols for Secure Computations (local cached copy) Andrew Yao, FOCS 1982 |
Private Information Retrieval: An Overview And Current Trends (local cached copy) Dmitri Asonov, ECDPvA Workshop, Informatik 2001 |
Billion-Gate Secure Computation with Malicious Adversaries (local cached copy) Benjamin Kreuter, abhi shelat, Chih-hao Shen, USENIX Security 2012 |
On the Computational Practicality of Private Information Retrieval (local cached copy) Radu Sion, Bogdan Carbunar, NDSS 2007 |
Revisiting the Computational Practicality of Private Information Retrieval (local cached copy) Femi Olumofin, Ian Goldberg, FC 2011 |
PrivateFS: A Parallel Oblivious File System (local cached copy) Peter Williams, Radu Sion, Alin Tomescu, CCS 2012 |
Web Privacy |
Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL (local cached copy) Christopher Soghoian, Sid Stamm, FC 2011 |
ObliviAd: Provably Secure and Practical Online Behavioral Advertising (local cached copy) Michael Backes, Aniket Kate, Matteo Maffei, Kim Pecina, Oakland 2012 |
Privacy-Aware Personalization for Mobile Advertising (local cached copy) Michaela Hardt, Suman Nath, CCS 2012 |