Paper list

Papers numbering with R* are reserved for presentation by the instructor

 

Secret Sharing

Reference: How to share a secret, A. Shamir - Communications of the ACM, 1979 

[1] URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks, Haiyun Luo,  Jiejun Kong, Petros Zerfos, Songwu Lu, and Lixia Zhang, IEEE/ACM Transactions on Networking, 2004

[2] Prio: Private, Robust, and Scalable Computation of Aggregate Statistics, Henry Corrigan-Gibbs and Dan Boneh, in NSDI 2017. 

Digital Signatures

[R1] Digital Signatures for Flows and Multicasts, Chung Kei Wong and Simon S. Lam,  IEEE/ACM Transactions on Networking, Vol. 7, No. 4, August 1999

Attribute-based encryption

[3] Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption, Ming Li, Shucheng Yu, Yao Zheng, Kui Ren, and Wenjing Lou, in IEEE TPDS 2012. 

[4] Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud, Wenhai Sun ;  Shucheng Yu ;  Wenjing Lou ;  Y. Thomas Hou ;  Hui Li, in INFOCOM 2014.

Cloud Storage

[5] Path ORAM: An Extremely Simple Oblivious RAM Protocol, Emil Stefanov , Marten van Dijk , Elaine Shi , T-H. Hubert Chan, Christopher Fletcher , Ling Ren, Xiangyao Yu, Srinivas Devadas, in ACM CCS 2013.

[6] Obladi: Oblivious Serializable Transactions in the Cloud, Natacha Crooks, Matthew Burke, Ethan Cecchetti, Sitar Harel, Rachit Agarwal, Lorenzo Alvisi, in USENIX OSDI 2018. 

[7] MiniCrypt: Reconciling Encryption and Compression for Big Data Stores, Wenting Zheng et al. in ACM EuroSys 2017. 

Content sharing

[R2] Scalable and private media consumption with Popcorn, Trinabh Gupta, Natacha Crooks, Whitney Mulhern, Srinath Setty, Lorenzo Alvisi, Michael Walfish, in NSDI 2016. 

[8] OblivP2P: An Oblivious Peer-to-Peer Content Sharing System, Yaoqi Jia et al. in USENIX Security 2016. 

Wireless security

[R3] Intercepting Mobile Communications: The Insecurity of 802.11, Nikita Borisov, Ian Goldberg, and David A. Wagner, MOBICOM, July 2001

[9] Ghostbuster: Detecting the Presence of Hidden Eavesdroppers, Anadi Chaman, Jiaming Wang, Jiachen Sun, Haitham Hassanieh, Romit Roy Choudhury MOBICOM'18, ACM International Conference on Mobile Computing and Networking, October 2018

IoT security

[10] HoMonit: Monitoring Smart Home Apps from Encrypted Traffic, Wei Zhang et al., in ACM CCS 2018. 

[11] Rethinking Access Control and Authentication for the Home Internet of Things (IoT), Weijia He, et al., in USENIX Security 2018. 

[12] Proximity-Proof: Secure and Usable Mobile Two-Factor Authenticantion, Dianqi Han et al, in ACM Mobicom, 2018. 

reference: Towards Replay-resilient RFID Authentication, G. Wang, H. Cai, C. Qian, J. Han, X. Li, H. Ding, J. Zhao, in ACM MobiCom, 2018

[13] Pinto: Enabling Video Privacy for Commodity IoT Cameras, Hyunwoo Yu et al., in ACM CCS 2018.

Web and DNS security

[14] Clock Around the Clock: Time-Based Device Fingerprinting, Iskander Sanchez-Rola, Igor Santos, Davide Balzarotti, in ACM CCS 2018. 

[15] Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path Baojun Liu et al, in USENIX Security, 2018. 

SDN

[16] NetHide: Secure and Practical Network Topology Obfuscation, Roland Meier et al, in USENIX Security, 2018

CDN

[17] End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking in Content Delivery Networks, Shuai Hao et al., in USENIX Security, 2018. 

Certificates

[R4] CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers, James Larisch et al., in IEEE S&P 2017.

[18] The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing PKI, Doowon Kim et al., in USENIX Security 2018. 

[19] Efficient, Scalable, and Resilient Vehicle-Centric Certificate Revocation List Distribution in VANETs, Mohammad Khodaei and Panos Papadimitratos, in ACM WiSec 2018. 

Blockchain and Smart Contract

[R5] Bitcoin: A Peer-to-Peer Electronic Cash System, Satoshi Nakamoto, 

[20] CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections, Jing Chen et al., in IEEE INFOCOM, 2018. 

[21] Solidus: Confidential Distributed Ledger Transactions via PVORM, Ethan Cecchetti et al., in ACM CCS 2017. 

[22] Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions, Stefanie Roos et al., in NDSS 2018. 

LoRa

[23] I Send, Therefore I Leak: Information Leakage in Low-Power Wide Area Networks, Patrick Leu et al., in ACM WiSec 2018. 

Mobile

[24] SRide: A Privacy-Preserving Ridesharing System, Ulrich Matchi Aïvodji, in ACM WiSec 2018. 

[25] vEPC-sec: Securing LTE Network Functions Virtualization on Public Cloud. Muhammad Taqi Raza, and Songwu Lu.

Machine Learning Security

[26] Practical Evasion of a Learning-Based Classifier: A Case Study, Nedim Srndic and Pavel Laskov, in IEEE S&P 2014. 

[27] DeepXplore: Automated Whitebox Testing of Deep Learning Systems, Kexin Pei et al., in ACM SOSP 2017. 

[28] With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning, Bolun Wang et al., in USENIX Security 2018. 

AttachmentSize
PDF icon Pinto-yu.pdf12.01 MB
PDF icon vEPC-sec.pdf1.37 MB
PDF icon Proximity-Proof.pdf901.68 KB