Privacy Enhancing Technologies
General
Semester | Winter 2015/16 |
Lecturer | Prof. Dr. Konrad Rieck |
Assistants | Daniel Arp, Erwin Quiring |
Course type | Seminar |
Modules | B.Inf.1207, B.Inf.1208 |
ECTS (SWS) | 5 (3) |
Date | Introduction: 19.11.2015, 10:00-12:00 First Presentation: 21.01.2016, 10:00-18:00 Final Presentation: 04.02.2016, 10:00-18:00 |
Location | Introduction: Room 1.101 Presentations: Room 1.101 |
Audience | Applied Computer Science MSc Applied Computer Science BSc |
Description
The seminar is concerned with privacy enhancing technologies. Different techniques for protecting the privacy of users are discussed as well as attacks against these techniques.
Presentations
Time | Paper |
10:00 - 10:30 | Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting |
Presenter: Fabiola Buschendorf | |
10:30 - 11:00 | Portrait of a Privacy Invasion: Detecting Relationships Through Large-scale Photo Analysis |
Presenter: Hanna Holderied | |
11:00 - 11:30 | Tor: The Second-Generation Onion Router |
Presenter: Torsten Zielke | |
11:30 - 12:00 | Website fingerprinting in onion routing based anonymization networks |
Presenter: Christian Melching | |
12:00 - 12:30 | Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem |
Presenter: Luca Hernández Acosta |
Seminar Steps
Date | Step |
19.11.2015, 10:00-12:00 | Introduction and registration |
14.01.2016 | Send slides to assistant |
21.01.2016, 10:00-18:00 | Presentation of the first version of the slides |
27.01.2016 | Register with examination office (FlexNow) |
28.01.2016 | Send improved slides (PDF) to assistant |
04.02.2016, 10:00-18:00 | Final presentation |
Topics
- Tor: The Second-Generation Onion Router
Roger Dingledine et al. USENIX 2004 [Paper 1] → Torsten Zielke - Website fingerprinting in onion routing based anonymization networks
Andriy Panchenko et al. WPES 2011 [Paper 2] → Christian Melching - A Critical Evaluation of Website Fingerprinting Attacks
Marc Juarez et al. CCS 2014 [Paper 3] - Analyzing the Great Firewall of China Over Space and Time
Roya Ensafi et al. PETS 2015 [Paper 4] - The Parrot is Dead: Observing Unobservable Network Communications
Amir Houmansadr et al. S&P 2013 [Paper 5] - Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem
Kyle Soska and Nicolas Christin USENIX 2015 [Paper 6] → Luca Hernández Acosta - Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting
Nick Nikiforakis et al. S&P 2013 [Paper 7] → Fabiola Buschendorf - Bloom Cookies: Web Search Personalization without User Tracking
Nitesh Mor et al. NDSS 2015 [Paper 8] - Bitcoin: A Peer-to-Peer Electronic Cash System
Satoshi Nakamoto --- [Paper 9] → Kirill Bulert - Portrait of a Privacy Invasion: Detecting Relationships Through Large-scale Photo Analysis
Yan Shoshitaishvili et al. PETS 2015 [Paper 10] → Hanna Holderied - De-anonymizing Programmers via Code Stylometry
Aylin Caliskan-Islam et al. USENIX 2015 [Paper 11] - Language identification of encrypted VoIP traffic: Alejandra y Roberto or Alice and Bob?
Wright et al. USENIX 2007 [Paper 12]
Results
MD5 of matriculation number | Grade |
e61f58e8cbee0657bd28af0bcaaefd4d | 1.0 |
7f6af2f125ab94f1b50d3ceb9fe58c07 | 1.7 |
ab684dc35c096bceadfd65e3b199693b | 1.3 |
2aa7747dabeba517807a03e735f0d885 | 2.0 |
2b3a18410d3e4c6011f9e179faf1c709 | 1.3 |
Mailing List
There is a mailing list for the seminar. News and updates regarding the seminar are posted to this list. You should register here.