Date |
Paper |
Moderator |
Slides |
Aug 31 |
Introduction and Administrivia |
Apu Kapadia
|
|
Background: Security, Privacy, Cryptography
|
|
Sep 7 |
Anonymizing networks
Untraceable electronic mail, return addresses,
and digital pseudonyms
D. Chaum
Communications of the ACM, 1981 |
Saikou |
|
Crowds: Anonymity for web transactions
M. K. Reiter and A. D. Rubin
ACM Transactions on Information and System Security 1(1):66–92, November 1998 |
Venkata |
|
Tor: The Second-Generation Onion Router
Roger Dingledine, Nick Mathewson, and Paul Syverson
In the Proceedings of the 13th USENIX Security Symposium, August 2004 |
Adrian |
|
Low-Cost Traffic Analysis of
Tor
S.J. Murdoch, G.Danezis, IEEE Security and Privacy (Oakland) 2005 |
Kaushik |
|
Sep 14 |
Distributed Hash Tables (DHTs)
Chord: a scalable peer-to-peer lookup protocol for internet applications
Stoica, I., Morris, R., Liben-Nowell,
D., Karger, D. R., Kaashoek, M. F., Dabek, F., and Balakrishnan,
H.
IEEE/ACM Transactions on Networking 11, 1 (Feb. 2003), 17-32.
|
Sumayah
|
|
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric.
Maymounkov, P. and Mazières, D.
In Revised Papers From the First international Workshop on Peer-To-Peer Systems (March 07 - 08, 2002).
|
Naga
|
|
Why Kad
Lookup Fails
Hun-Jeong Kang, Eric Chan-Tin, Yongdae Kim and Nicholas
Hopper
P2P09
|
Vasumathi
|
|
ShadowWalker: Peer-to-Peer Anonymous Communication Using Redundant Structured Topologies
Prateek Mittal and Nikita Borisov
CCS 2009
|
Uwe
|
|
Sep 21 |
Sybil attacks and defenses
Anonymity, Unlinkability, Undetectability, Unobservability,
Pseudonymity, and Identity Management —
A Consolidated Proposal for Terminology (alternate
link)
Pfitzmann, Hansen
TU Dresden |
Anindya
|
|
SybilGuard: defending against sybil attacks via social networks
Haifeng Yu, Michael Kaminsky, Phillip
B. Gibbons, Abraham Flaxman
In Proceedings of the ACM SIGCOMM Conference on Computer Communications (SIGCOMM 2006), Pisa, Italy, September 2006.
|
Keerthi
|
|
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
Yu, H., Gibbons, P. B., Kaminsky, M., and Xiao, F.
In Proceedings of the 2008 IEEE Symposium on Security and Privacy
|
Shivaraman
|
|
SybilInfer: Detecting Sybil Nodes using Social Networks
George Danezis and Prateek Mittal
NDSS, February 2009
|
Xin
|
|
Sep 28 |
P2P systems for self-destructing data
The Ephemerizer: Making Data Disappear
Perlman, R.
Sun Microsystems, Inc. Technical Reports; Vol. SERIES13103
|
Anup
|
|
Vanish: Increasing Data Privacy with Self-Destructing Data
Roxana Geambasu, Tadayoshi Kohno, Amit Levy, Henry M. Levy
In Proceedings of the USENIX Security Symposium, Montreal, Canada, August 2009.
|
Kaushik
|
|
Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs
Scott Wolchok, Owen S. Hofmann, Nadia Heninger, Edward W. Felten, J. Alex Halderman, Christopher J. Rossbach, Brent Waters, and Emmett Witchel
Proc. 17th ISOC Network and Distributed System Security Symposium
NDSS ’10,
|
Uwe
|
|
Oct 5 |
Project proposal paper due
| |
|
ACM CCS Conference, no class Attend CCS or work on project |
|
|
Oct 12 |
Project Proposal Presentations
|
|
|
Oct 19 |
Routing along social networks
Privacy-preserving P2P data sharing with OneSwarm
Tomas Isdal, Michael Piatek, Arvind Krishnamurthy, Thomas Anderson
SIGCOMM 2010
|
Divya
|
|
Drac: An Architecture for Anonymous Low-Volume Communications
George Danezis, Claudia Diaz, Carmela Troncoso, Ben Laurie
|
Naga
|
|
Privacy Preserving Social Networking Over Untrusted Networks
Jonathan Anderson, Claudia Diaz, Joseph Bonneau, Frank Stajano
Proceedings of the 2nd ACM workshop on Online social networks - WOSN '09, 2009.
|
Saikou
|
|
Oct 26 |
Social Search
The anatomy of a large-scale social search engine
Damon Horowitz, Sepandar D. Kamvar
WWW 2010
|
Huina
|
|
What Do People Ask Their Social Networks, and Why? A Survey Study of Status Message Q&A Behavior
Morris, M. R., Teevan, J., and Panovich, K.
CHI 2010
|
Vasumathi
|
|
Anonymous Opinion Exchange over Untrusted Social Networks
Mouna Kacimi, Stefano Ortolani, Bruno Crispo
ACM EuroSys Workshop on Social Network Systems, 2009.
|
Xin
|
|
Nov 2 |
PETS 2010 and WPES 2010 Conference Review
|
|
|
Nov 9 |
A law and policy perspective
I've
Got Nothing to Hide, and Other Misunderstandings of Privacy
Daniel J. Solove
George Washington University Law School, San Diego Law Review, Vol. 44, 2007 |
Sumayah
|
|
Saving Facebook
James Grimmelmann
Iowa Law Review 94 (2009): 1137-1206.
|
Adrian and Anindya
|
|
Nov 16 |
Project status report due
|
|
|
No class, work on projects |
|
|
Nov 23 |
Papers on k-anonymity and cloud privacy
l-diversity: Privacy beyond k-anonymity
Ashwin Machanavajjhala, Johannes Gehrke, Daniel Kifer, Muthuramakrishnan Venkitasubramaniam
ICDE 2006 |
Venkata
|
|
Privacy in the Clouds: Risks to Privacy and Confidentiality
from Cloud Computing
Robert Gellman
World Privacy Forum, 2009
|
Shivaraman
|
|
Nov 30 |
CCS 2010 Conference Review
|
|
|
Dec 7 |
Final project reports due
|
|
|
No class, work on project presentation
|
|
|
Dec 14 |
Final Project Presentations, 4–7pm, Info East 122 |
|
|