Date | Syllabus | Reading | Note |
---|---|---|---|
Jan 24 | Privacy Landscape, Attacks against Privacy |
Optional Reading: What is privacy worth? Alessandro Acquisti, Leslie John, and George Loewenstein De-anonymizing Social Networks Arvind Narayanan and Vitaly Shmatikov How to Break Anonymity of the Netflix Prize Dataset. Arvind Narayanan and Vitaly Shmatikov Learning Your Identity and Disease from Research Papers: Information Leaks in Genome Wide Association Study R. Wang, Y. Li, X. Wang, H. Tang and X. Zhou Side-Channel Leaks in Web Applications: a Reality Today, a Challenge Tomorrow S. Chen, R. Wang, X. Wang and K. Zhang | |
Jan 31 | Goals: Platform for Private Data and Privacy Assistant Assignment |
REPRIV: Re-Envisioning In-Browser Privacy Matthew Fredrikson and Ben Livshits Optional Reading: Separating Web Applications from User Data Storage with BStore Ramesh Chandra, Priya Gupta, and Nickolai Zeldovich Adnostic: Privacy Preserving Targeted Advertising Vincent Toubiana, Arvind Narayanan, Dan Boneh, Helen Nissenbaum, Solon Barocas | Project groups formed |
Feb 07 New location: Soda 405 | Trusted Computing/Trusted Hardware Assignment |
BIND: A Fine-grained Attestation Service for Secure Distributed Systems. Elaine Shi, Adrian Perrig, Leendert Van Doorn. TrustVisor: Efficient TCB Reduction and Attestation. Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil Gligor, and Adrian Perrig Optional Reading: vTPM: Virtualizing the Trusted Platform Module. Stefan Berger, Ramon Caceres, Kenneth A. Goldman, Ronald Perez, Reiner Sailer, and Leendert van Doorn | |
Feb 16 1:00pm-4:00pm (merged with cs261) | Information Flow Tracking Assignment |
Improving Application Security with Data Flow Assertions Pointless Tainting? Evaluating the Practicality of Pointer Tainting Information Flow Control for Standard OS Abstractions Optional reading: Quantitative information flow as network flow capacity Measuring Channel Capacity to Distinguish Undue Influence Making information flow explicit in HiStar | Project proposal due |
Feb 21 | Academic and Administrative Holiday: No Lecture | ||
Feb 28 | Virtualization Assignment |
NoHype: Virtualized cloud infrastructure without the virtualization Eric Keller, Jakub Szefer, Jennifer Rexford, and Ruby B. Lee Overshadow: A Virtualization-Based Approach to Retrofitting Protection in Commodity Operating Systems Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis, Pratap Subrahmanyam, Carl A. Waldspurger, Dan Boneh, Jeffrey Dwoskin, and Dan R.K. Ports | |
Mar 07 | Provenance Assignment |
Towards a Secure and Efficient System for End-to-End Provenance Patrick McDaniel, Kevin Butler, Steve McLaughlin, Radu Sion, Erez Zadok, and Marianne Winslett Trusted Computing and Provenance: Better Together John Lyle and Andrew Martin | |
Mar 14 | Cryptography |
Optional Reading: Multiparty Computation from Threshold Homomorphic Encryption Ronald Cramer, Ivan Damgar, and Jesper Buus Nielsen Fully Homomorphic Encryption over the Integers Marten van Dijk, Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan Practical Techniques for Searching on Encrypted Data Dawn Song, David Wagner, and Adrian Perrig Conjunctive, Subset, and Range Queries on Encrypted Data Dan Boneh and Brent Waters Multi-Dimensional Range Query over Encrypted Data. Elaine Shi, John Bethencourt, T-H. Hubert Chan, Dawn Song, and Adrian Perrig Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products Jonathan Kats, Amit Sahai, and Brent Waters | |
Mar 21 | Spring Break: No Lecture | ||
Mar 28 | Differential Privacy |
Optional Reading: Differential Privacy (Invited talk at ICALP 2006) Cynthia Dwork The Differential Privacy Frontier Cynthia Dwork | Project milestone |
Apr 04 | Application Framework Assignment |
Airavat: Security and Privacy for MapReduce Indrajit Roy, Srinath T.V. Setty, Ann Kilzer, Vitaly Shmatikov, and Emmett Witchel Privacy Integrated Queries Frank McSherry SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics Martin Burkhart, Mario Strasser, Dilip Many, and Xenofontas Dimitropoulos, ETH Zurich, Switzerland | |
Apr 11 | Applications Assignment |
CryptDB: A Practical Encrypted Relational DBMS Raluca Ada Popa, Nickolai Zeldovich, and Hari Balakrishnan Differentially-Private Network Trace Analysis Frank McSherry and Ratul Mahajan Adnostic: Privacy Preserving Targeted Advertising Vincent Toubiana, Arvind Narayanan, Dan Boneh, Helen Nissenbaum, Solon Barocas Optional Reading: BotGrep: Finding P2P Bots with Structured Graph Analysis Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, and Nikita Borisov | |
Apr 18 | Misc |
Optional Reading: k-anonymity: a model for protecting privacy. Latanya Sweeney t-closeness: Privacy Beyond k-Anonymity and l-Diversity Ninghui Li, Tiancheng Li, Suresh Venkatasubramanian. Enabling Accurate Analysis of Private Network Data Michael Hay, Gerome Miklau, David Jensen | |
Apr 25 | Project Presentations |
TBD |