CS 294-65: Privacy Technologies: From Theory to Practice
Spring, 2011

Jan 24 Privacy Landscape, Attacks against Privacy
Optional Reading:

What is privacy worth?
Alessandro Acquisti, Leslie John, and George Loewenstein

De-anonymizing Social Networks
Arvind Narayanan and Vitaly Shmatikov

How to Break Anonymity of the Netflix Prize Dataset.
Arvind Narayanan and Vitaly Shmatikov

Learning Your Identity and Disease from Research Papers: Information Leaks in Genome Wide Association Study
R. Wang, Y. Li, X. Wang, H. Tang and X. Zhou

Side-Channel Leaks in Web Applications: a Reality Today, a Challenge Tomorrow
S. Chen, R. Wang, X. Wang and K. Zhang

Jan 31 Goals: Platform for Private Data and Privacy Assistant

REPRIV: Re-Envisioning In-Browser Privacy
Matthew Fredrikson and Ben Livshits

Optional Reading:

Separating Web Applications from User Data Storage with BStore
Ramesh Chandra, Priya Gupta, and Nickolai Zeldovich

Adnostic: Privacy Preserving Targeted Advertising
Vincent Toubiana, Arvind Narayanan, Dan Boneh, Helen Nissenbaum, Solon Barocas

Project groups formed
Feb 07
New location: Soda 405
Trusted Computing/Trusted Hardware

BIND: A Fine-grained Attestation Service for Secure Distributed Systems.
Elaine Shi, Adrian Perrig, Leendert Van Doorn.

TrustVisor: Efficient TCB Reduction and Attestation.
Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil Gligor, and Adrian Perrig

Optional Reading:

vTPM: Virtualizing the Trusted Platform Module.
Stefan Berger, Ramon Caceres, Kenneth A. Goldman, Ronald Perez, Reiner Sailer, and Leendert van Doorn

Feb 16 1:00pm-4:00pm
(merged with cs261)
Information Flow Tracking

Improving Application Security with Data Flow Assertions

Pointless Tainting? Evaluating the Practicality of Pointer Tainting

Information Flow Control for Standard OS Abstractions

Optional reading:

Quantitative information flow as network flow capacity

Measuring Channel Capacity to Distinguish Undue Influence

Making information flow explicit in HiStar

Project proposal due
Feb 21 Academic and Administrative Holiday: No Lecture
Feb 28 Virtualization

NoHype: Virtualized cloud infrastructure without the virtualization
Eric Keller, Jakub Szefer, Jennifer Rexford, and Ruby B. Lee

Overshadow: A Virtualization-Based Approach to Retrofitting Protection in Commodity Operating Systems
Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis, Pratap Subrahmanyam, Carl A. Waldspurger, Dan Boneh, Jeffrey Dwoskin, and Dan R.K. Ports

Mar 07 Provenance

Towards a Secure and Efficient System for End-to-End Provenance
Patrick McDaniel, Kevin Butler, Steve McLaughlin, Radu Sion, Erez Zadok, and Marianne Winslett

Trusted Computing and Provenance: Better Together
John Lyle and Andrew Martin

Mar 14 Cryptography
Optional Reading:

Multiparty Computation from Threshold Homomorphic Encryption
Ronald Cramer, Ivan Damgar, and Jesper Buus Nielsen

Fully Homomorphic Encryption over the Integers
Marten van Dijk, Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan

Practical Techniques for Searching on Encrypted Data
Dawn Song, David Wagner, and Adrian Perrig

Conjunctive, Subset, and Range Queries on Encrypted Data
Dan Boneh and Brent Waters

Multi-Dimensional Range Query over Encrypted Data.
Elaine Shi, John Bethencourt, T-H. Hubert Chan, Dawn Song, and Adrian Perrig

Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
Jonathan Kats, Amit Sahai, and Brent Waters

Mar 21 Spring Break: No Lecture
Mar 28 Differential Privacy
Optional Reading:

Differential Privacy (Invited talk at ICALP 2006)
Cynthia Dwork

The Differential Privacy Frontier
Cynthia Dwork

Project milestone
Apr 04 Application Framework

Airavat: Security and Privacy for MapReduce
Indrajit Roy, Srinath T.V. Setty, Ann Kilzer, Vitaly Shmatikov, and Emmett Witchel

Privacy Integrated Queries
Frank McSherry

SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics
Martin Burkhart, Mario Strasser, Dilip Many, and Xenofontas
Dimitropoulos, ETH Zurich, Switzerland

Apr 11 Applications

CryptDB: A Practical Encrypted Relational DBMS

Raluca Ada Popa, Nickolai Zeldovich, and Hari Balakrishnan

Differentially-Private Network Trace Analysis
Frank McSherry and Ratul Mahajan

Adnostic: Privacy Preserving Targeted Advertising
Vincent Toubiana, Arvind Narayanan, Dan Boneh, Helen Nissenbaum, Solon Barocas

Optional Reading:

BotGrep: Finding P2P Bots with Structured Graph Analysis
Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, and Nikita Borisov

Apr 18 Misc
Optional Reading:

k-anonymity: a model for protecting privacy.
Latanya Sweeney

t-closeness: Privacy Beyond k-Anonymity and l-Diversity
Ninghui Li, Tiancheng Li, Suresh Venkatasubramanian.

Enabling Accurate Analysis of Private Network Data
Michael Hay, Gerome Miklau, David Jensen

Apr 25 Project Presentations