CSCI-B 649/INFO-I 590: Advanced Topics in Privacy
Fall 2011


[ Home | Policies | Schedule | Project | Resources ]

Discussion Schedule

We will discuss 3-4 papers/week for the first few weeks, and then 2-3 papers/week thereafter as your project work increases.

Date Paper Moderator
Aug 30 Introduction and Administrivia Apu Kapadia
Background: Security, Privacy, Cryptography
Sep 6 Anonymizing networks

Untraceable electronic mail, return addresses, and digital pseudonyms
D. Chaum
Communications of the ACM, 1981
Robert T.
Crowds: Anonymity for web transactions
M. K. Reiter and A. D. Rubin
ACM Transactions on Information and System Security 1(1):66–92, November 1998
Roberto H.
Tor: The Second-Generation Onion Router
Roger Dingledine, Nick Mathewson, and Paul Syverson
In the Proceedings of the 13th USENIX Security Symposium, August 2004
Greg
Low-Cost Traffic Analysis of Tor
S.J. Murdoch, G.Danezis, IEEE Security and Privacy (Oakland) 2005
Mejbaol
Sep 13 Distributed Hash Tables (DHTs)

Chord: a scalable peer-to-peer lookup protocol for internet applications
Stoica, I., Morris, R., Liben-Nowell, D., Karger, D. R., Kaashoek, M. F., Dabek, F., and Balakrishnan, H.
IEEE/ACM Transactions on Networking 11, 1 (Feb. 2003), 17-32.
Zahidur
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric.
Maymounkov, P. and Mazières, D.
In Revised Papers From the First international Workshop on Peer-To-Peer Systems (March 07 - 08, 2002).
Hani
ShadowWalker: Peer-to-Peer Anonymous Communication Using Redundant Structured Topologies
Prateek Mittal and Nikita Borisov
CCS 2009
Niranjana
Sep 20 Anonymity Terminology

Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management — A Consolidated Proposal for Terminology (alternate link)
Pfitzmann, Hansen
TU Dresden
Kavin
Sep 27 P2P systems for self-destructing data

The Ephemerizer: Making Data Disappear
Perlman, R.
Sun Microsystems, Inc. Technical Reports; Vol. SERIES13103
Swapnil
Vanish: Increasing Data Privacy with Self-Destructing Data
Roxana Geambasu, Tadayoshi Kohno, Amit Levy, Henry M. Levy
In Proceedings of the USENIX Security Symposium, Montreal, Canada, August 2009.
Suresh
Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs
Scott Wolchok, Owen S. Hofmann, Nadia Heninger, Edward W. Felten, J. Alex Halderman, Christopher J. Rossbach, Brent Waters, and Emmett Witchel
Proc. 17th ISOC Network and Distributed System Security Symposium NDSS ’10,
Swati
Oct 4 Project proposal paper due
Sybil Defenses

SybilGuard: defending against sybil attacks via social networks
Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman
In Proceedings of the ACM SIGCOMM Conference on Computer Communications (SIGCOMM 2006), Pisa, Italy, September 2006.
Gowtham
SybilInfer: Detecting Sybil Nodes using Social Networks
George Danezis and Prateek Mittal
NDSS, February 2009
Srikanth
Oct 11 Project Proposal Presentations
Oct 18 ACM CCS Conference, no class
Attend CCS or work on project

Oct 25 A law and policy perspective

I've Got Nothing to Hide, and Other Misunderstandings of Privacy
Daniel J. Solove
George Washington University Law School, San Diego Law Review, Vol. 44, 2007
Abhyodaya
Saving Facebook
James Grimmelmann
Iowa Law Review 94 (2009): 1137-1206.
Greg
Nov 1 PETS 2011 Conference Review

Nov 8 Papers on k-anonymity and cloud privacy

l-diversity: Privacy beyond k-anonymity
Ashwin Machanavajjhala, Johannes Gehrke, Daniel Kifer, Muthuramakrishnan Venkitasubramaniam
ICDE 2006
Monisha
Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing
Robert Gellman
World Privacy Forum, 2009
Santhosh
Nov 15 Project status report due
No class, work on projects
Nov 22
Covert and side channels

Keyboard acoustic emanations revisited
Li Zhuang, Feng Zhou, and J. D. Tygar
CCS 2005

Shravya
Predictable Design of Network-Based Covert Communication Systems
Smith, R.W., Knight, G.S.,
IEEE Symposium on Security and Privacy, Oakland, California, May 2008.
Aparna
Nov 29 CCS 2011 Conference Review

Dec 6 Final project reports due
No class, work on project presentation
Dec 15 Final Project Presentations, 12:30–3:30pm, Info West 107