Information Privacy with Applications (Fall 2018): Difference between revisions

From Sidiprojects Wiki
Jump to navigation Jump to search
(→‎Readings not linked in the syllabus: Added obfuscation reading)
m (Undo revision 1208 by David (talk))
 
(28 intermediate revisions by the same user not shown)
Line 30: Line 30:
''There is a write-up due before class on any day in which we have a visiting speaker.''
''There is a write-up due before class on any day in which we have a visiting speaker.''


[[:File:Esoc_488_Privacy_Technology_write_ups.pdf|Writing assignments]]
* [[:File:Esoc_488_Privacy_Technology_write_ups.pdf|Writing assignments]]
* [[:File:Esoc488privacy_new_directions_written_assignment.pdf|Diffie-Hellman Writing Assignment]]
* [[:File:Esoc_488_Privacy_Technology_end_of_trust_writeup.pdf|End of Trust Writing Assignment]]
* [[:File:Esoc488 fa18_Presentation_guidelines.pdf|Final write up and presentation guidelines]]


===Assignment 0: Quick exercises in the shell===
===Assignment 0: Quick exercises in the shell===
Line 55: Line 58:
''Due Tuesday, 18 October 2018, by 11:59 PM (MST).''
''Due Tuesday, 18 October 2018, by 11:59 PM (MST).''


[[:File:Esoc_488_Privacy_Technology__Assignment_4.pdf|Assignment 4: Delegated trust challenge]]
[[:File:Esoc_488_Privacy_Technology__Assignment_4.pdf|Assignment 4: Delegated trust challenge]] (updated)
 
===Assignment 5: Anonymity===
''Due Tuesday, 18 October 2018, by 11:59 PM (MST).''
 
[[:File:Esoc_488_Privacy_Technology__Assignment_5.pdf|Assignment 5: Working with Tor]]
 
===Assignment 6: Layer 8+ Privacy===
''Due Tuesday, 27 November 2018, by 11:59 PM (MST).''
 
[[:File:Esoc_488_Privacy_Technology__Assignment_6.pdf|Assignment 6: Face Detection]]
 
Tutorial for working with OpenCV in the VM is [[Esoc488_fa18_tutorial|here]]


== Class Sessions ==
== Class Sessions ==
Line 95: Line 110:


* [[:File:Slides_foundations_of_privacy_technology_III.pdf|Lecture 14: Trust and the Landscape of Privacy Technologies II]]
* [[:File:Slides_foundations_of_privacy_technology_III.pdf|Lecture 14: Trust and the Landscape of Privacy Technologies II]]
* [[:File:Slides_foundations_of_privacy_technology_III__obfuscation.pdf|Lecture 15: Obfuscation]]


====Readings not linked in the syllabus====
====Readings not linked in the syllabus====
* [https://ebookcentral.proquest.com/lib/uaz/reader.action?docID=4093096&ppg=58 'Why is obfuscation necessary?' in ''Obfuscation: a user's guide for privacy and protest'']
* [https://ebookcentral.proquest.com/lib/uaz/reader.action?docID=4093096&ppg=58 'Why is obfuscation necessary?'] and [[:File:Obfuscation_section_core_cases.pdf|'Core cases']] in ''Obfuscation: a user's guide for privacy and protest''
* [[:File:Diaz_gurses_understanding_the_landscape_of_privacy_technologies.pdf |Diaz and Gürses, 'Understanding the landscape of privacy technologies']]
* [[:File:Diaz_gurses_understanding_the_landscape_of_privacy_technologies.pdf |Diaz and Gürses, 'Understanding the landscape of privacy technologies']]
* [[:File:LeMetayer_whom_to_trust_excerpt.pdf|Le Métayer, 'Whom to Trust? Using Technology to Enforce Privacy']]
* [[:File:LeMetayer_whom_to_trust_excerpt.pdf|Le Métayer, 'Whom to Trust? Using Technology to Enforce Privacy']]
* [[:File:Rawat_saxena_data_protection.pdf|Rawat et al., 'Practical Data Protection']] - From the esteemed Journal of Craptology
* [[:File:Rawat_saxena_data_protection.pdf|Rawat et al., 'Practical Data Protection']] - From the esteemed Journal of Craptology
===Anonymity===
====Lectures====
* [[:File:Anonymity_background_I.pdf|Lecture 16: Anonymity networking background]]
* [[:File:Anonymous_communication_II.pdf|Lecture 17: Anonymous communication I (Mixnets)]]
* [[:File:Fa18_Anonymous_communication_III.pdf|Lecture 18: Anonymous communication II (Mixnets and Tor)]]
* [[:File:Fa18_anonymous_communication_IV.pdf|Lecture 19: Anonymous communication III (Tor continued)]]
====Readings not linked in the syllabus====
* [[:File:Guard_Sets_for_Onion_Routing_(2015)_-_Danezis,_Hayes.pdf|Guard sets for onion routing]]
* [[:File:A_Survey_of_Anonymous_Communication_Channels_(2008)_-_Danezis,_Diaz.pdf|George Danezis and Claudia Diaz, 'A survey of anonymous communication channels']]
* [https://proquest-safaribooksonline-com.ezproxy3.library.arizona.edu/book/networking/tcp-ip/0596002971/1dot-overview-of-tcp-ip/tcp3_chp_1_sect_2_html TCP/IP overview]
===Communications Privacy===
====Lectures====
* [[:File:Fa18_communications_privacy_I.pdf|Lecture 20: RSA]]
* [[:File:Esoc488 fa18 communications privacy II.pdf|Lecture 21: RSA review + Hands on]]
* [[:File:Esoc488 fa18 communications privacy III.pdf|Lecture 22: TLS and Certificate Transparency]]
====Readings not linked in the syllabus====
* [[:File:links_for_8_nov_2018.txt|Useful links for some of the in-class work]]
* [[:File:Diffie_Hellman_New_directions_in_cryptography.pdf|Whitfield Diffie and Martin E. Hellman, 'New Directions in Cryptography']]
===Layer 8+ Privacy===
====Lectures====
* [[:File:Esoc488 fa18 layer8+ problems I introduction.pdf|Lecture 23: Layer 8+ introduction]]
* [[:File:Esoc488 fa18 layer8+ problems II biometrics.pdf|Lecture 24: Biometrics and Face recognition]]
* [[:File:Esoc488_fa18_layer8+_problems_III_analog_keyhole.pdf|Lecture 25: Analog Keyhole Problems]]
====Readings not linked in the syllabus====
*[http://ieeexplore.ieee.org/document/6427817/#full-text-section Dan Geer, 'Identity as Privacy']
===Last Day===
====Lectures====
* [[:File:Esoc488 fa18_Lecture_last_day.pdf|Lecture 26: Wrap up]]


== Other things mentioned in class ==
== Other things mentioned in class ==

Latest revision as of 16:34, 26 August 2021

Quick Information

Instructor: David Sidi
Office Location: HARV 456 / HARV 454
Office Hours: Fridays at 10:30 AM
Telephone: (520) 621-5703
Email: dsidi@email.arizona.edu
PGP Fingerprint: 9FB6 167B D4BD 44FE 90F7 51D0 87B6 0D65 3A14 517D
Home page: https://u.arizona.edu/~dsidi/
Live question tool: https://sidiprojects.us/live_questions
Grades: https://d2l.arizona.edu/


More information is in the syllabus

Assignments

Write-ups

There is a write-up due before class on any day in which we have a visiting speaker.

Assignment 0: Quick exercises in the shell

There is no deadline for this assignment, as it will not be turned in for a grade, but you should try to get it done in the next day or two.

Assignment 0 - A few quick exercises in the shell, to get used to things.

Assignment 1: Permissions

Due Tuesday, 28 August 2018, by 11:59 PM (MST).

Assignment 1: Permissions challenge

Assignment 2: Watchfulness

Due Tuesday, 18 September 2018, by 11:59 PM (MST).

Assignment 2: Scripting and cracking challenge

Assignment 3: Threat Modeling

Due Tuesday, 02 October 2018, by 11:59 PM (MST).

Assignment 3: Threat Modeling

Assignment 4: "Trust me"

Due Tuesday, 18 October 2018, by 11:59 PM (MST).

Assignment 4: Delegated trust challenge (updated)

Assignment 5: Anonymity

Due Tuesday, 18 October 2018, by 11:59 PM (MST).

Assignment 5: Working with Tor

Assignment 6: Layer 8+ Privacy

Due Tuesday, 27 November 2018, by 11:59 PM (MST).

Assignment 6: Face Detection

Tutorial for working with OpenCV in the VM is here

Class Sessions

Why care about privacy?

Lectures

Readings not linked in the syllabus

Trust and Privacy

Lectures

Readings not linked in the syllabus

The Landscape of Privacy Technologies

Lectures

Readings not linked in the syllabus

Anonymity

Lectures

Readings not linked in the syllabus

Communications Privacy

Lectures

Readings not linked in the syllabus

Layer 8+ Privacy

Lectures

Readings not linked in the syllabus

Last Day

Lectures

Other things mentioned in class