ChaosPad V1.1
Full screen

Server Notice:

hide

Public Pad Latest text of pad QQS6CCpTDl Saved May 14, 2025

 
You can find your name below the list of papers we'll read. Volunteer for the paper you like on the date it is to be discussed (on the day that you're assigned to).
Do not change the day of your participation unless you've discussed with the person that you're switching with.
Thanks!
Please don't change the dates, that could cause confusion :-)
 
 
The reading groups will be:
 
RG 1
Tue Jun 3rd
1)   Herley, Cormac, and Paul  C.  Van  Oorschot. "Sok: Science, security  and  the elusive goal of   security as a  scientific pursuit." 2017  IEEE  Symposium on Security  and  Privacy (SP).  IEEE, 2017.
 
2)   C. Diaz, S. Seys, J. Claessens, B. Preneel, "Towards measuring   anonymity", In Proc. 2nd International Conference on Privacy-Enhancing   Technologies (PETs), LNCS,   vol. 2482., pp. 54–68, 2002. 
 
RG 2
Thu Jun 5th
1)    Herley, Cormac, and Paul  C.  Van  Oorschot. "Sok: Science, security   and  the elusive goal of   security as a  scientific pursuit." 2017   IEEE  Symposium on Security  and  Privacy (SP).  IEEE, 2017.
 
2)    C. Diaz, S. Seys, J. Claessens, B. Preneel, "Towards measuring    anonymity", In Proc. 2nd International Conference on Privacy-Enhancing    Technologies (PETs), LNCS,   vol. 2482., pp. 54–68, 2002. 
 
 
RG 1
Tue Jun 24th
3) Latanya Sweeney. Simple demographics often identify people uniquely. Health, 2000   
               
4)  YA  de Montjoye, CA Hidalgo, M  Verleysen, VD Blondel. Unique in the  Crowd:  The privacy bounds of human  mobility. Nature srep. 3    
 
 
RG 2
Thu Jun 26th
3) Latanya Sweeney. Simple demographics often identify people uniquely. Health, 2000   
               
4)  YA  de Montjoye, CA Hidalgo, M  Verleysen, VD Blondel. Unique in the  Crowd:  The privacy bounds of human  mobility. Nature srep. 3    
 
 
 
RG 1
Tue Jul 15th
5)   A. Narayanan and V.  Shmatikov, "Robust de-anonymization of large  sparse datasets", in  Proc. IEEE Symp. Secur., Priv. (SP). IEEE  Comput.  Soc.,    May 2008,   pp.  111-125.
               
6)  Dantcheva, Antitza, Petros Elia,  and Arun Ross. "What else does your   biometric data reveal? A survey on  soft biometrics." IEEE Transactions   on Information Forensics   and  Security 11.3 (2015): 441-467.
 
 
RG 2
Thu Jul 17th
5)   A. Narayanan and V.  Shmatikov, "Robust de-anonymization of large  sparse datasets", in  Proc. IEEE Symp. Secur., Priv. (SP). IEEE  Comput.  Soc.,    May 2008,   pp.  111-125.
               
6)  Dantcheva, Antitza, Petros Elia,  and Arun Ross. "What else does your   biometric data reveal? A survey on  soft biometrics." IEEE Transactions   on Information Forensics   and  Security 11.3 (2015): 441-467.
 
 
 
RG 1
Tue Jul 22nd
7) Georgi Ganev, Emiliano De Cristofaro
 The Inadequacy of Similarity-based Privacy Metrics: Privacy Attacks against “Truly Anonymous” Synthetic Datasets
46th IEEE Symposium on Security & Privacy (IEEE S&P 2025)
 
8) Yili Ren and others, "Person Re-identification in 3D Space: A WiFi Vision-based Approach", USENIX Security, 2023: Southall
 
RG 2
Thu Jul 24th
7) Georgi Ganev, Emiliano De Cristofaro
 The Inadequacy of Similarity-based Privacy Metrics: Privacy Attacks against “Truly Anonymous” Synthetic Datasets
46th IEEE Symposium on Security & Privacy (IEEE S&P 2025)
 
8) Yili Ren and others, "Person Re-identification in 3D Space: A WiFi Vision-based Approach", USENIX Security, 2023
 
 
 
 
 
 
Papers 2025:
1)  Herley, Cormac, and Paul  C.  Van  Oorschot. "Sok: Science, security and  the elusive goal of   security as a  scientific pursuit." 2017 IEEE  Symposium on Security  and  Privacy (SP).  IEEE, 2017.
 
2)  C. Diaz, S. Seys, J. Claessens, B. Preneel, "Towards measuring  anonymity", In Proc. 2nd International Conference on Privacy-Enhancing  Technologies (PETs), LNCS,   vol. 2482., pp. 54–68, 2002. 
               
3) Latanya Sweeney. Simple demographics often identify people uniquely. Health, 2000   
               
4) YA  de Montjoye, CA Hidalgo, M  Verleysen, VD Blondel. Unique in the Crowd:  The privacy bounds of human  mobility. Nature srep. 3    
               
5)  A. Narayanan and V.  Shmatikov, "Robust de-anonymization of large sparse datasets", in  Proc. IEEE Symp. Secur., Priv. (SP). IEEE  Comput. Soc.,    May 2008,   pp.  111-125.
               
6) Dantcheva, Antitza, Petros Elia,  and Arun Ross. "What else does your  biometric data reveal? A survey on  soft biometrics." IEEE Transactions  on Information Forensics   and  Security 11.3 (2015): 441-467.
 
7) Georgi Ganev, Emiliano De Cristofaro
 The Inadequacy of Similarity-based Privacy Metrics: Privacy Attacks against “Truly Anonymous” Synthetic Datasets
46th IEEE Symposium on Security & Privacy (IEEE S&P 2025)
 
8) Yili Ren and others, "Person Re-identification in 3D Space: A WiFi Vision-based Approach", USENIX Security, 2023
 
     
Reading Groups:
Tue:
1 Southall: Paper 8, Tue
2 Brüning: Paper 5, Tue
3 Stehling
4 Ebert!
5 Meyer Paper 3, Tue
6 Fenker
7 Borisov: Paper 4, Tue
8 Bueker
 
Thu
1 Böttcher
2 Reith: Paper 8, Thu
3 Adler Paper 3, Thu
4 Mercier
5 Bauch: Paper 4, Thu
6 Schubert Paper 5, Thu
7 Himmelsbach Paper 6, Thu
8 Niestroj
 
 
 
 
########################################################################################
########################################################################################
Everything below is old, to be ignored
 
 
 
 
Georgi Ganev, Emiliano De Cristofaro
 The Inadequacy of Similarity-based Privacy Metrics: Privacy Attacks against “Truly Anonymous” Synthetic Datasets
 46th IEEE Symposium on Security & Privacy (IEEE S&P 2025)
 
 
1) Wagner, Isabel, and David Eckhoff. "Technical privacy metrics: a systematic survey." ACM Computing Surveys (CSUR) 51.3 (2018): 1-38.
 
 
 
It's all in your head(set): Side-channel attacks on AR/VR systems
Authors: Yicheng Zhang, Carter Slocum, Jiasi Chen, and Nael Abu-Ghazaleh, University of California, Riverside
 
Person Re-identification in 3D Space: A WiFi Vision-based Approach
Authors: 
Yili Ren and Yichao Wang, Florida State University; Sheng Tan, Trinity University; Yingying Chen, Rutgers University; Jie Yang, Florida State University
 
Kuhn, Christiane, et al. "On Privacy Notions in Anonymous   Communication." Proceedings on Privacy Enhancing Technologies 2 (2019):   105-125.   
               
6) G.  Acs, C. Castelluccia and  R.  Chen, "Differentially Private Histogram  Publishing through Lossy   Compression," 2012 IEEE 12th International  Conference on   Data Mining,   Brussels, 2012, pp. 1-10.
               
7) M.    K. Reiter, A. D.  Rubin, "Crowds: Anonymity for Web transactions",  ACM   Trans. Inform.  Syst. Secur., vol. 1, no. 1, pp. 66-92, 1998.    
                
9) Armknecht, Frederik, and  Thorsten Strufe. "An efficient distributed privacy-preserving  recommendation system." 2011 The 10th IFIP Annual Mediterranean Ad Hoc    Networking Workshop. IEEE, 2011.
               
Sangwook Bae and others, "Watching the Watchers: Practical Video
Identification Attack in LTE Networks", USENIX Security, 2022
 
Juhi  Kulshrestha, Marcos  Oliveira, Orkut Karac ̧alık, Denis Bonnay, Claudia  Wagner. Web  Routineness and Limits of Predictability:Investigating  Demographic and  Behavioral   Differences Using Web Tracking Data 
 
Kim Wuyts, Riccardo Scandariato, Wouter Joosen,
Empirical evaluation of a privacy-focused threat modeling methodology,
Journal of Systems and Software, Volume 96, 2014,
 
Fiore, Marco, et al. "Privacy in trajectory micro-data publishing: a survey." Transactions on Data Privacy 13 (2020): 91-149.