This is a list of papers we will discuss in class. Feel free to
suggest any others you may find appropriate. A good starting point
for finding papers in this area is Free Haven's Selected Papers in
Anonymity site.
Privacy |
'I've Got Nothing to Hide' and Other Misunderstandings of Privacy (local cached copy) Daniel J. Solove, San Diego Law Review, Vol. 44, 2007 |
A Classification for Privacy Techniques (local cached copy) Carlisle Adams, University of Ottawa Law & Technology Journal 3, 2006 |
PETs for the Internet |
Privacy-enhancing Technologies for the Internet (local cached copy) Ian Goldberg, David Wagner, Eric Brewer, IEEE COMPCON 1997 |
Privacy-enhancing technologies for the Internet, II: Five years later (local cached copy) Ian Goldberg, PET 2002 |
Privacy-enhancing technologies for the Internet III: Ten years later (local cached copy) Ian Goldberg, "Digital Privacy: Theory, Technologies and Practices", Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, and Sabrina De Capitani di Vimercati, editors, 2007 |
Anonymous and Pseudonymous Communication |
Untraceable electronic mail, return addresses, and digital pseudonyms (local cached copy) David Chaum, Communications of the ACM, 1981 |
Tor: The Second-Generation Onion Router (local cached copy) Roger Dingledine, Nick Mathewson, Paul Syverson, USENIX Security 2004 |
Scalable Onion Routing with Torsk (local cached copy) Jon McLachlan, Andrew Tran, Nicholas Hopper, Yongdae Kim, CCS 2009 |
ShadowWalker: Peer-to-peer Anonymous Communication using Redundant Structured Topologies (local cached copy) Prateek Mittal, Nikita Borisov, CCS 2009 |
Balancing the Shadows (local cached copy) Max Schuchard, Alex Dean, Victor Heorhiadi, Yongdae Kim, Nicholas Hopper, WPES 2010 |
Building Incentives into Tor (local cached copy) Tsuen-Wan Ngan, Roger Dingledine, Dan Wallach, FC 2010 |
Recruiting New Tor Relays with BRAIDS (local cached copy) Rob Jansen, Nicholas Hopper, Yongdae Kim, CCS 2010 |
Traffic Analysis |
Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems (local cached copy) Jean-François Raymond, PET 2000 |
A Practical Congestion Attack on Tor Using Long Paths (local cached copy) Nathan S. Evans, Roger Dingledine, Christian Grothoff, USENIX Security 2009 |
On the risks of serving whenever you surf: Vulnerabilities in Tor's blocking resistance design (local cached copy) Jon McLachlan, Nicholas J. Hopper, WPES 2009 |
Preventing Active Timing Attacks in Low-Latency Anonymous Communication (local cached copy) Aaron Johnson, Joan Feigenbaum, Paul Syverson, PETS 2010 |
Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks (local cached copy) Claudia Diaz, Steven J. Murdoch, Carmela Troncoso, PETS 2010 |
Privacy in P2P and Social Networks |
The Sybil Attack (local cached copy) John R. Douceur, IPTPS 2002 |
SybilInfer: Detecting Sybil Nodes using Social Networks (local cached copy) George Danezis, Prateek Mittal, NDSS 2009 |
De-anonymizing Social Networks (local cached copy) Arvind Narayanan, Vitaly Shmatikov, Oakland 2009 |
DSybil: Optimal Sybil-Resistance for Recommendation Systems (local cached copy) Haifeng Yu, Chenwei Shi, Michael Kaminsky, Phillip B. Gibbons, Feng Xiao, Oakland 2009 |
Vanish: Increasing Data Privacy with Self-Destructing Data (local cached copy) Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy, USENIX Security 2009 |
Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs (local cached copy) Scott Wolchok, Owen S. Hofmann, Nadia Heninger, Edward W. Felten, J. Alex Halderman, Christopher J. Rossbach, Brent Waters, Emmett Witchel, NDSS 2010 |
In Search of an Anonymous and Secure Lookup: Attacks on Structured Peer-to-peer Anonymous Communication Systems (local cached copy) Qiyan Wang, Prateek Mittal, Nikita Borisov, CCS 2010 |
Anonymous Blacklisting |
PEREA: towards practical TTP-free revocation in anonymous authentication (local cached copy) Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith, CCS 2008 |
Making a Nymbler Nymble using VERBS (local cached copy) Ryan Henry, Kevin Henry, Ian Goldberg, PETS 2010 |
Jack: Scalable Accumulator-based Nymble System (local cached copy) Zi Lin, Nicholas Hopper, WPES 2010 |
BNymble: More anonymous blacklisting at almost no cost (local cached copy) Peter Lofgren, Nicholas Hopper, FC 2011 |
Database and Web Privacy |
Private Information Retrieval: An Overview And Current Trends (local cached copy) Dmitri Asonov, ECDPvA Workshop, Informatik 2001 |
Revisiting the Computational Practicality of Private Information Retrieval (local cached copy) Femi Olumofin, Ian Goldberg, FC 2011 |
An Analysis of Private Browsing Modes in Modern Browsers (local cached copy) Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh, USENIX Security 2010 |
How Unique Is Your Web Browser? (local cached copy) Peter Eckersley, PETS 2010 |
Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL (local cached copy) Christopher Soghoian, Sid Stamm, FC 2011 |
Privacy-Preserving Computation |
Protocols for Secure Computations (local cached copy) Andrew Yao, FOCS 1982 |
Secure Multiparty Computation Goes Live (local cached copy) Peter Bogetoft, Dan Lund Christensen, Ivan Damgård, Martin Geisler, Thomas Jakobsen, Mikkel Krøigaard, Janus Dam Nielsen, Jesper Buus Nielsen, Kurt Nielsen, Jakob Pagter, Michael Schwartzbach, Tomas Toft, FC 2009 |
SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics (local cached copy) Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos, USENIX Security 2010 |
PrETP: Privacy-Preserving Electronic Toll Pricing (local cached copy) Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens, USENIX Security 2010 |
TASTY: Tool for Automating Secure Two-partY computations (local cached copy) Wilko Henecka, Stefan Koegl, Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg , CCS 2010 |