Date |
Paper |
Moderator |
|
Aug 30 |
Introduction and Administrivia |
Apu Kapadia
|
|
Background: Security, Privacy, Cryptography
|
|
Sep 6 |
Anonymizing networks
Untraceable electronic mail, return addresses,
and digital pseudonyms
D. Chaum
Communications of the ACM, 1981 |
Robert T. |
|
Crowds: Anonymity for web transactions
M. K. Reiter and A. D. Rubin
ACM Transactions on Information and System Security 1(1):66–92, November 1998 |
Roberto H. |
|
Tor: The Second-Generation Onion Router
Roger Dingledine, Nick Mathewson, and Paul Syverson
In the Proceedings of the 13th USENIX Security Symposium, August 2004 |
Greg |
|
Low-Cost Traffic Analysis of
Tor
S.J. Murdoch, G.Danezis, IEEE Security and Privacy (Oakland) 2005 |
Mejbaol |
|
Sep 13 |
Distributed Hash Tables (DHTs)
Chord: a scalable peer-to-peer lookup protocol for internet applications
Stoica, I., Morris, R., Liben-Nowell,
D., Karger, D. R., Kaashoek, M. F., Dabek, F., and Balakrishnan,
H.
IEEE/ACM Transactions on Networking 11, 1 (Feb. 2003), 17-32.
|
Zahidur
|
|
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric.
Maymounkov, P. and Mazières, D.
In Revised Papers From the First international Workshop on Peer-To-Peer Systems (March 07 - 08, 2002).
|
Hani
|
|
ShadowWalker: Peer-to-Peer Anonymous Communication Using Redundant Structured Topologies
Prateek Mittal and Nikita Borisov
CCS 2009
|
Niranjana
|
|
Sep 20 |
Anonymity Terminology
Anonymity, Unlinkability, Undetectability, Unobservability,
Pseudonymity, and Identity Management —
A Consolidated Proposal for Terminology (alternate
link)
Pfitzmann, Hansen
TU Dresden |
Kavin
|
|
Sep 27 |
P2P systems for self-destructing data
The Ephemerizer: Making Data Disappear
Perlman, R.
Sun Microsystems, Inc. Technical Reports; Vol. SERIES13103
|
Swapnil
|
|
Vanish: Increasing Data Privacy with Self-Destructing Data
Roxana Geambasu, Tadayoshi Kohno, Amit Levy, Henry M. Levy
In Proceedings of the USENIX Security Symposium, Montreal, Canada, August 2009.
|
Suresh
|
|
Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs
Scott Wolchok, Owen S. Hofmann, Nadia Heninger, Edward W. Felten, J. Alex Halderman, Christopher J. Rossbach, Brent Waters, and Emmett Witchel
Proc. 17th ISOC Network and Distributed System Security Symposium
NDSS ’10,
|
Swati
|
|
Oct 4 |
Project proposal paper due
| |
|
Sybil Defenses
SybilGuard: defending against sybil attacks via social networks
Haifeng Yu, Michael Kaminsky, Phillip
B. Gibbons, Abraham Flaxman
In Proceedings of the ACM SIGCOMM Conference on Computer Communications (SIGCOMM 2006), Pisa, Italy, September 2006.
|
Gowtham
|
|
SybilInfer: Detecting Sybil Nodes using Social Networks
George Danezis and Prateek Mittal
NDSS, February 2009
|
Srikanth
|
|
Oct 11 |
Project Proposal Presentations
|
|
|
Oct 18 |
ACM CCS Conference, no class Attend CCS or work on project |
|
|
Oct 25 |
A law and policy perspective
I've
Got Nothing to Hide, and Other Misunderstandings of Privacy
Daniel J. Solove
George Washington University Law School, San Diego Law Review, Vol. 44, 2007 |
Abhyodaya
|
|
Saving Facebook
James Grimmelmann
Iowa Law Review 94 (2009): 1137-1206.
|
Greg
|
|
Nov 1 |
PETS 2011 Conference Review
|
|
|
Nov 8 |
Papers on k-anonymity and cloud privacy
l-diversity: Privacy beyond k-anonymity
Ashwin Machanavajjhala, Johannes Gehrke, Daniel Kifer, Muthuramakrishnan Venkitasubramaniam
ICDE 2006 |
Monisha
|
|
Privacy in the Clouds: Risks to Privacy and Confidentiality
from Cloud Computing
Robert Gellman
World Privacy Forum, 2009
|
Santhosh
|
|
Nov 15 |
Project status report due
|
|
|
No class, work on projects |
|
|
Nov 22 |
Covert and side channels
Keyboard acoustic emanations revisited
Li Zhuang, Feng Zhou, and J. D. Tygar
CCS 2005
|
Shravya
|
|
Predictable Design of Network-Based Covert Communication Systems
Smith, R.W., Knight, G.S.,
IEEE Symposium on Security and Privacy, Oakland, California, May 2008.
|
Aparna
|
|
Nov 29 |
CCS 2011 Conference Review
|
|
|
Dec 6 |
Final project reports due
|
|
|
No class, work on project presentation
|
|
|
Dec 15 |
Final Project Presentations, 12:30–3:30pm, Info
West 107 |
|
|