Reading list

Papers numbering with R* are reserved for presentation by the instructor. Do not select those papers. 

Secret Sharing

Reference: How to share a secret, A. Shamir - Communications of the ACM, 1979 

[1] Prio: Private, Robust, and Scalable Computation of Aggregate Statistics, Henry Corrigan-Gibbs and Dan Boneh, in NSDI 2017. 

Digital Signatures

[R1] Digital Signatures for Flows and Multicasts, Chung Kei Wong and Simon S. Lam,  IEEE/ACM Transactions on Networking, Vol. 7, No. 4, August 1999

Attribute-based encryption

[2] Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption, Ming Li, Shucheng Yu, Yao Zheng, Kui Ren, and Wenjing Lou, in IEEE TPDS 2012. 

[3] Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud, Wenhai Sun ;  Shucheng Yu ;  Wenjing Lou ;  Y. Thomas Hou ;  Hui Li, in INFOCOM 2014.

Cloud 

[4] Side-Channel Attacks on Shared Search Indexes, L. Wang, in IEEE S&P 2017.

[5] Obladi: Oblivious Serializable Transactions in the Cloud, Natacha Crooks, Matthew Burke, Ethan Cecchetti, Sitar Harel, Rachit Agarwal, Lorenzo Alvisi, in USENIX OSDI 2018. 

Content sharing

[R2] Scalable and private media consumption with Popcorn, Trinabh Gupta, Natacha Crooks, Whitney Mulhern, Srinath Setty, Lorenzo Alvisi, Michael Walfish, in NSDI 2016. 

[6] OblivP2P: An Oblivious Peer-to-Peer Content Sharing System, Yaoqi Jia et al. in USENIX Security 2016. 

Wireless security

[R3] Intercepting Mobile Communications: The Insecurity of 802.11, Nikita Borisov, Ian Goldberg, and David A. Wagner, MOBICOM, July 2001

[7] Ghostbuster: Detecting the Presence of Hidden Eavesdroppers, Anadi Chaman, Jiaming Wang, Jiachen Sun, Haitham Hassanieh, Romit Roy Choudhury MOBICOM'18, ACM International Conference on Mobile Computing and Networking, October 2018

IoT security

[8] HoMonit: Monitoring Smart Home Apps from Encrypted Traffic, Wei Zhang et al., in ACM CCS 2018. 

[9] Information Exposure for Consumer IoT Devices: A Multidimensional, Network-Informed Measurement Approach, J. Ren, et al., in ACM IMC, 2019.

[10] Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms, W. Zhou et al., in USENIX Security, 2019.

[11] Karaoke: Distributed Private Messaging Immune to Passive Traffic Analysis, D. Lazar, et al. in USENIX OSDI 2018.

Web and DNS security

[12] Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path Baojun Liu et al, in USENIX Security, 2018. 

SDN

[13] NetHide: Secure and Practical Network Topology Obfuscation, Roland Meier et al, in USENIX Security, 2018

 

Certificates

[R4] CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers, James Larisch et al., in IEEE S&P 2017.

 

Blockchain and Smart Contract

[R5] Bitcoin: A Peer-to-Peer Electronic Cash System, Satoshi Nakamoto, 

[14] Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions, Stefanie Roos et al., in NDSS 2018. 

[15] Blind Certificate Authorities, L. Wang, et al. in IEEE S&P, 2019. 

[16] Teechain: A Secure Payment Network with Asynchronous Blockchain Access, J, Lind et al., in ACM SOSP, 2019. 

[17] BITE: Bitcoin Lightweight Client Privacy using Trusted Execution, S. Matetic et al., in Usenix Security 2019.

 

Machine Learning Security

[18] Towards Evaluating the Robustness of Neural Networks, Nicholas Carlini and David Wagner, in IEEE S&P 17

[19] Neural Network Inversion in Adversarial Setting via Background Knowledge Alignment, Z. Yang et al., in ACM CCS 19

 

Verifiable Delay Functions

[20] Verifiable Delay Functions, Boneh, Bonneau, Bünz, Fisch, in CRYPTO 2018.

[21] A Survey of Two Verifiable Delay Functions, Boneh, Bünz, Fisch

AttachmentSize
PDF icon ABE-MingLi.pdf1.65 MB