Information Privacy with Applications (Fall 2018): Difference between revisions

From Sidiprojects Wiki
Jump to navigation Jump to search
(→‎Readings not linked in the syllabus: added diverse double-compiling paper)
m (Undo revision 1208 by David (talk))
 
(39 intermediate revisions by the same user not shown)
Line 30: Line 30:
''There is a write-up due before class on any day in which we have a visiting speaker.''
''There is a write-up due before class on any day in which we have a visiting speaker.''


[[:File:Esoc_488_Privacy_Technology_write_ups.pdf|Writing assignments]]
* [[:File:Esoc_488_Privacy_Technology_write_ups.pdf|Writing assignments]]
* [[:File:Esoc488privacy_new_directions_written_assignment.pdf|Diffie-Hellman Writing Assignment]]
* [[:File:Esoc_488_Privacy_Technology_end_of_trust_writeup.pdf|End of Trust Writing Assignment]]
* [[:File:Esoc488 fa18_Presentation_guidelines.pdf|Final write up and presentation guidelines]]


===Assignment 0: Quick exercises in the shell===
===Assignment 0: Quick exercises in the shell===
Line 45: Line 48:
''Due Tuesday, 18 September 2018, by 11:59 PM (MST).''
''Due Tuesday, 18 September 2018, by 11:59 PM (MST).''


[[:File:Esoc_488_Privacy_Technology_Assignment_2.pdf|Assignment 2: Watchfulness]]
[[:File:Esoc_488_Privacy_Technology_Assignment_2.pdf|Assignment 2: Scripting and cracking challenge]]


===Assignment 3: Threat Modeling===
===Assignment 3: Threat Modeling===
Line 51: Line 54:


[[:File:Esoc_488_Privacy_Technology_Assignment_3.pdf|Assignment 3: Threat Modeling]]
[[:File:Esoc_488_Privacy_Technology_Assignment_3.pdf|Assignment 3: Threat Modeling]]
===Assignment 4: "Trust me"===
''Due Tuesday, 18 October 2018, by 11:59 PM (MST).''
[[:File:Esoc_488_Privacy_Technology__Assignment_4.pdf|Assignment 4: Delegated trust challenge]] (updated)
===Assignment 5: Anonymity===
''Due Tuesday, 18 October 2018, by 11:59 PM (MST).''
[[:File:Esoc_488_Privacy_Technology__Assignment_5.pdf|Assignment 5: Working with Tor]]
===Assignment 6: Layer 8+ Privacy===
''Due Tuesday, 27 November 2018, by 11:59 PM (MST).''
[[:File:Esoc_488_Privacy_Technology__Assignment_6.pdf|Assignment 6: Face Detection]]
Tutorial for working with OpenCV in the VM is [[Esoc488_fa18_tutorial|here]]


== Class Sessions ==
== Class Sessions ==
Line 61: Line 81:
* [[:File:Citizen_privacy_II.pdf|Lecture 5: Citizen Privacy II]]
* [[:File:Citizen_privacy_II.pdf|Lecture 5: Citizen Privacy II]]
* [[:File:Citizen_privacy_III.pdf|Lecture 6: Citizen Privacy III]]
* [[:File:Citizen_privacy_III.pdf|Lecture 6: Citizen Privacy III]]
* Lecture 7: Ethics I  
* [[:File:Ethics_of_privacy_II.pdf|Lecture 7: Ethics I]]
* Lecture 8: Ethics II (guest)
* Lecture 8: Ethics II (guest)
====Readings not linked in the syllabus====
====Readings not linked in the syllabus====
* [https://ebookcentral.proquest.com/lib/uaz/reader.action?docID=416053&ppg=166 Hursthouse, 'Environmental Ethics']
* [https://ebookcentral.proquest.com/lib/uaz/reader.action?docID=416053&ppg=166 Hursthouse, 'Environmental Ethics']
Line 75: Line 96:
* [[:File:Slides_threat_modeling_I.pdf|Lecture 9: Privacy and Trust, Threat modeling I]]
* [[:File:Slides_threat_modeling_I.pdf|Lecture 9: Privacy and Trust, Threat modeling I]]
* [[:File:Slides_threat_modeling_II.pdf|Lecture 10: Privacy and Trust, Threat modeling II]]
* [[:File:Slides_threat_modeling_II.pdf|Lecture 10: Privacy and Trust, Threat modeling II]]
* [[:File:Trust_and_privacy_3_pgp_wot.pdf|Lecture 11: Privacy and Trust III: PGP and the Web of Trust]]
* [[:File:Interpersonal_trust_II.pdf|Lecture 12: Privacy and Trust IV]]
====Readings not linked in the syllabus====
====Readings not linked in the syllabus====
* [[:File:Thompson_reflections_on_trusting_trust.pdf|Thompson, 'Reflections on Trusting Trust']]
* [[:File:Thompson_reflections_on_trusting_trust.pdf|Thompson, 'Reflections on Trusting Trust']]
* [[:File:Wheeler_diverse_double_compiling.pdf|Wheeler, 'Countering Trusting Trust through Diverse Double-Compiling']]
* [[:File:Wheeler_diverse_double_compiling.pdf|Wheeler, 'Countering Trusting Trust through Diverse Double-Compiling']]
* [[:File:DeadDropStrongBox_Security_Assessment.pdf|Czeskis et al., 'DeadDrop/StrongBox Security Assessment']]
* [[:File:DeadDropStrongBox_Security_Assessment.pdf|Czeskis et al., 'DeadDrop/StrongBox Security Assessment']]
===The Landscape of Privacy Technologies===
====Lectures====
* [[:File:Slides_foundations_of_privacy_technology.pdf|Lecture 13: Trust and the Landscape of Privacy Technologies]] -- Note: For those who learn better with some text to reflect on while listening,I am publishing "notes" slides from now on before class.
* [[:File:Slides_foundations_of_privacy_technology_III.pdf|Lecture 14: Trust and the Landscape of Privacy Technologies II]]
* [[:File:Slides_foundations_of_privacy_technology_III__obfuscation.pdf|Lecture 15: Obfuscation]]
====Readings not linked in the syllabus====
* [https://ebookcentral.proquest.com/lib/uaz/reader.action?docID=4093096&ppg=58 'Why is obfuscation necessary?'] and [[:File:Obfuscation_section_core_cases.pdf|'Core cases']] in ''Obfuscation: a user's guide for privacy and protest''
* [[:File:Diaz_gurses_understanding_the_landscape_of_privacy_technologies.pdf |Diaz and Gürses, 'Understanding the landscape of privacy technologies']]
* [[:File:LeMetayer_whom_to_trust_excerpt.pdf|Le Métayer, 'Whom to Trust? Using Technology to Enforce Privacy']]
* [[:File:Rawat_saxena_data_protection.pdf|Rawat et al., 'Practical Data Protection']] - From the esteemed Journal of Craptology
===Anonymity===
====Lectures====
* [[:File:Anonymity_background_I.pdf|Lecture 16: Anonymity networking background]]
* [[:File:Anonymous_communication_II.pdf|Lecture 17: Anonymous communication I (Mixnets)]]
* [[:File:Fa18_Anonymous_communication_III.pdf|Lecture 18: Anonymous communication II (Mixnets and Tor)]]
* [[:File:Fa18_anonymous_communication_IV.pdf|Lecture 19: Anonymous communication III (Tor continued)]]
====Readings not linked in the syllabus====
* [[:File:Guard_Sets_for_Onion_Routing_(2015)_-_Danezis,_Hayes.pdf|Guard sets for onion routing]]
* [[:File:A_Survey_of_Anonymous_Communication_Channels_(2008)_-_Danezis,_Diaz.pdf|George Danezis and Claudia Diaz, 'A survey of anonymous communication channels']]
* [https://proquest-safaribooksonline-com.ezproxy3.library.arizona.edu/book/networking/tcp-ip/0596002971/1dot-overview-of-tcp-ip/tcp3_chp_1_sect_2_html TCP/IP overview]
===Communications Privacy===
====Lectures====
* [[:File:Fa18_communications_privacy_I.pdf|Lecture 20: RSA]]
* [[:File:Esoc488 fa18 communications privacy II.pdf|Lecture 21: RSA review + Hands on]]
* [[:File:Esoc488 fa18 communications privacy III.pdf|Lecture 22: TLS and Certificate Transparency]]
====Readings not linked in the syllabus====
* [[:File:links_for_8_nov_2018.txt|Useful links for some of the in-class work]]
* [[:File:Diffie_Hellman_New_directions_in_cryptography.pdf|Whitfield Diffie and Martin E. Hellman, 'New Directions in Cryptography']]
===Layer 8+ Privacy===
====Lectures====
* [[:File:Esoc488 fa18 layer8+ problems I introduction.pdf|Lecture 23: Layer 8+ introduction]]
* [[:File:Esoc488 fa18 layer8+ problems II biometrics.pdf|Lecture 24: Biometrics and Face recognition]]
* [[:File:Esoc488_fa18_layer8+_problems_III_analog_keyhole.pdf|Lecture 25: Analog Keyhole Problems]]
====Readings not linked in the syllabus====
*[http://ieeexplore.ieee.org/document/6427817/#full-text-section Dan Geer, 'Identity as Privacy']
===Last Day===
====Lectures====
* [[:File:Esoc488 fa18_Lecture_last_day.pdf|Lecture 26: Wrap up]]


== Other things mentioned in class ==
== Other things mentioned in class ==

Latest revision as of 16:34, 26 August 2021

Quick Information

Instructor: David Sidi
Office Location: HARV 456 / HARV 454
Office Hours: Fridays at 10:30 AM
Telephone: (520) 621-5703
Email: dsidi@email.arizona.edu
PGP Fingerprint: 9FB6 167B D4BD 44FE 90F7 51D0 87B6 0D65 3A14 517D
Home page: https://u.arizona.edu/~dsidi/
Live question tool: https://sidiprojects.us/live_questions
Grades: https://d2l.arizona.edu/


More information is in the syllabus

Assignments

Write-ups

There is a write-up due before class on any day in which we have a visiting speaker.

Assignment 0: Quick exercises in the shell

There is no deadline for this assignment, as it will not be turned in for a grade, but you should try to get it done in the next day or two.

Assignment 0 - A few quick exercises in the shell, to get used to things.

Assignment 1: Permissions

Due Tuesday, 28 August 2018, by 11:59 PM (MST).

Assignment 1: Permissions challenge

Assignment 2: Watchfulness

Due Tuesday, 18 September 2018, by 11:59 PM (MST).

Assignment 2: Scripting and cracking challenge

Assignment 3: Threat Modeling

Due Tuesday, 02 October 2018, by 11:59 PM (MST).

Assignment 3: Threat Modeling

Assignment 4: "Trust me"

Due Tuesday, 18 October 2018, by 11:59 PM (MST).

Assignment 4: Delegated trust challenge (updated)

Assignment 5: Anonymity

Due Tuesday, 18 October 2018, by 11:59 PM (MST).

Assignment 5: Working with Tor

Assignment 6: Layer 8+ Privacy

Due Tuesday, 27 November 2018, by 11:59 PM (MST).

Assignment 6: Face Detection

Tutorial for working with OpenCV in the VM is here

Class Sessions

Why care about privacy?

Lectures

Readings not linked in the syllabus

Trust and Privacy

Lectures

Readings not linked in the syllabus

The Landscape of Privacy Technologies

Lectures

Readings not linked in the syllabus

Anonymity

Lectures

Readings not linked in the syllabus

Communications Privacy

Lectures

Readings not linked in the syllabus

Layer 8+ Privacy

Lectures

Readings not linked in the syllabus

Last Day

Lectures

Other things mentioned in class