|27 Feb||Introduction (slides)
* David Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24(2), 1981.
|6 March||Tor – hidden services – finding bridges (slides)|
|13 March||Crowds – predecessor attack, optimality of Crowds (slides)|
|20 March||DC Nets – collisions, anonymity computation, predecessor attack (slides)|
|27 March||Traffic analysis – mixing strategies, dummy traffic design, attacks in current systems (slides)|
|10 April||Salsa – finding nodes without a centralized service (slides)|
|17 April||Telex – decoy routing (slides)|
|24 April||Parrot – Mimicking approaches to fool censorship (slides)|
|1 May||Obfuscation – importance of false positives, ScrambleSuit – randomizing flows (slides)|
Papers to read (* complementary reads)
|6 March||Roger Dingledine, Nick Mathewson, and Paul Syverson. Tor: The Second-Generation Onion Router. In the Proceedings of the 13th USENIX Security Symposium, 2004.
IEEE Symposium on Security and Privacy (S&P 2013).
European Symposium on Research in Computer Security (ESORICS 2009).
|20 March||The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. In Journal of Cryptology 1, 1988,
* Henry Corrigan-Gibbs and Bryan Ford Dissent: Accountable Anonymous Group Messaging. ACM Conference on Computer and Communications Security (CCS 2010).
|27 March||Jean-François Raymond, Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, 2000.
Information Hiding Workshop (IH 1998).
|10 April||Arjun Nambiar and Matthew Wright. Salsa: A Structured Approach to Large-Scale Anonymity. ACM Conference on Computer and Communications Security (CCS 2006).
* Qiyan Wang, Prateek Mittal, and Nikita Borisov. In Search of an Anonymous and Secure Lookup: Attacks on Structured Peer-to-peer Anonymous Communication Systems. ACM Conference on Computer and Communications Security (CCS 2010).
|17 April||Eric Wustrow, Scott Wolchok, Ian Goldberg, and J. Alex Halderman. Telex: Anticensorship in the Network Infrastructure. Usenix Security Symposium 2011.
* Sheharbano Khattak, Tariq Elahi, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch, and Ian Goldberg. SoK: Making Sense of Censorship Resistance Systems. Proceedings on Privacy Enhancing Technologies (PoPETS 2016).
|24 April||Amir Houmansadr, Chad Brubaker, and Vitaly Shmatikov. The Parrot is Dead: Observing Unobservable Network Communications. 2013 IEEE Symposium on Security and Privacy.
* Hooman Mohajeri Moghaddam, Baiyu Li, Mohammad Derakhshani, and Ian Goldberg. SkypeMorph: Protocol Obfuscation for Tor Bridges. ACM conference on Computer and Communications Security (CCS 2012).
|1 May||Liang Wang, Kevin P. Dyer, Aditya Akella, Thomas Ristenpart, and Thomas Shrimpton. Seeing Through Network-Protocol Obfuscation. ACM Conference on Computer and Communications Security (CCS ’15).
* Philipp Winter, Tobias Pulls, and Juergen Fuss. ScrambleSuit: A Polymorphic Network Protocol to Circumvent Censorship. Workshop on Privacy in the Electronic Society (WPES 2013).
|8 May||Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, and Thomas Shrimpton. Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail. IEEE Symposium on Security and Privacy (S&P 2012).
* Andrew Hintz. Fingerprinting Websites Using Traffic Analysis. rivacy Enhancing Technologies workshop (PET 2002).
|15 May||Rebekah Overdorf, Marc Juarez, Gunes Acar, Rachel Greenstadt, and Claudia Diaz. How Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion Services. ACM Conference on Computer and Communications Security (CCS ’17)
* Marc Juarez, Sadia Afroz, Gunes Acar, Claudia Diaz, and Rachel Greenstadt. A Critical Evaluation of Website Fingerprinting Attacks. ACM conference on Computer and Communications Security (CCS 2014).
|22 May (W. Lueks)||Ania Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, and George Danezis. The Loopix Anonymity System. 26th Usenix Security Symposium 2017.
Mini CCS PC Committee