CSCI-B 649/INFO-I 590: Advanced Topics in Privacy
Fall 2010

[ Home | Policies | Schedule | Project | Resources ]

Discussion Schedule

We will discuss 4 papers/week for the first three weeks, and then 3 papers/week thereafter.

Date Paper Moderator Slides
Aug 31 Introduction and Administrivia Apu Kapadia
Background: Security, Privacy, Cryptography
Sep 7 Anonymizing networks

Untraceable electronic mail, return addresses, and digital pseudonyms
D. Chaum
Communications of the ACM, 1981
Crowds: Anonymity for web transactions
M. K. Reiter and A. D. Rubin
ACM Transactions on Information and System Security 1(1):66–92, November 1998
Tor: The Second-Generation Onion Router
Roger Dingledine, Nick Mathewson, and Paul Syverson
In the Proceedings of the 13th USENIX Security Symposium, August 2004
Low-Cost Traffic Analysis of Tor
S.J. Murdoch, G.Danezis, IEEE Security and Privacy (Oakland) 2005
Sep 14 Distributed Hash Tables (DHTs)

Chord: a scalable peer-to-peer lookup protocol for internet applications
Stoica, I., Morris, R., Liben-Nowell, D., Karger, D. R., Kaashoek, M. F., Dabek, F., and Balakrishnan, H.
IEEE/ACM Transactions on Networking 11, 1 (Feb. 2003), 17-32.
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric.
Maymounkov, P. and Mazières, D.
In Revised Papers From the First international Workshop on Peer-To-Peer Systems (March 07 - 08, 2002).
Why Kad Lookup Fails
Hun-Jeong Kang, Eric Chan-Tin, Yongdae Kim and Nicholas Hopper
ShadowWalker: Peer-to-Peer Anonymous Communication Using Redundant Structured Topologies
Prateek Mittal and Nikita Borisov
CCS 2009
Sep 21 Sybil attacks and defenses

Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management — A Consolidated Proposal for Terminology (alternate link)
Pfitzmann, Hansen
TU Dresden
SybilGuard: defending against sybil attacks via social networks
Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman
In Proceedings of the ACM SIGCOMM Conference on Computer Communications (SIGCOMM 2006), Pisa, Italy, September 2006.
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
Yu, H., Gibbons, P. B., Kaminsky, M., and Xiao, F.
In Proceedings of the 2008 IEEE Symposium on Security and Privacy
SybilInfer: Detecting Sybil Nodes using Social Networks
George Danezis and Prateek Mittal
NDSS, February 2009
Sep 28 P2P systems for self-destructing data

The Ephemerizer: Making Data Disappear
Perlman, R.
Sun Microsystems, Inc. Technical Reports; Vol. SERIES13103
Vanish: Increasing Data Privacy with Self-Destructing Data
Roxana Geambasu, Tadayoshi Kohno, Amit Levy, Henry M. Levy
In Proceedings of the USENIX Security Symposium, Montreal, Canada, August 2009.
Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs
Scott Wolchok, Owen S. Hofmann, Nadia Heninger, Edward W. Felten, J. Alex Halderman, Christopher J. Rossbach, Brent Waters, and Emmett Witchel
Proc. 17th ISOC Network and Distributed System Security Symposium NDSS ’10,
Oct 5 Project proposal paper due
ACM CCS Conference, no class
Attend CCS or work on project

Oct 12 Project Proposal Presentations
Oct 19 Routing along social networks

Privacy-preserving P2P data sharing with OneSwarm
Tomas Isdal, Michael Piatek, Arvind Krishnamurthy, Thomas Anderson
Drac: An Architecture for Anonymous Low-Volume Communications
George Danezis, Claudia Diaz, Carmela Troncoso, Ben Laurie
Privacy Preserving Social Networking Over Untrusted Networks
Jonathan Anderson, Claudia Diaz, Joseph Bonneau, Frank Stajano
Proceedings of the 2nd ACM workshop on Online social networks - WOSN '09, 2009.
Oct 26 Social Search

The anatomy of a large-scale social search engine
Damon Horowitz, Sepandar D. Kamvar
WWW 2010
What Do People Ask Their Social Networks, and Why? A Survey Study of Status Message Q&A Behavior
Morris, M. R., Teevan, J., and Panovich, K.
CHI 2010
Anonymous Opinion Exchange over Untrusted Social Networks
Mouna Kacimi, Stefano Ortolani, Bruno Crispo
ACM EuroSys Workshop on Social Network Systems, 2009.
Nov 2 PETS 2010 and WPES 2010 Conference Review

Nov 9 A law and policy perspective

I've Got Nothing to Hide, and Other Misunderstandings of Privacy
Daniel J. Solove
George Washington University Law School, San Diego Law Review, Vol. 44, 2007
Saving Facebook
James Grimmelmann
Iowa Law Review 94 (2009): 1137-1206.
Adrian and Anindya
Nov 16 Project status report due
No class, work on projects
Nov 23
Papers on k-anonymity and cloud privacy

l-diversity: Privacy beyond k-anonymity
Ashwin Machanavajjhala, Johannes Gehrke, Daniel Kifer, Muthuramakrishnan Venkitasubramaniam
ICDE 2006
Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing
Robert Gellman
World Privacy Forum, 2009
Nov 30 CCS 2010 Conference Review

Dec 7 Final project reports due
No class, work on project presentation
Dec 14 Final Project Presentations, 4–7pm, Info East 122