Readings in Surveillance and Countermeasures

These readings are from a graduate class at Princeton University by Edward Feltan (2013)

http://www.aarclibrary.org/publib/church/rockcomm/pdf/RockComm_Chap9_MailInt.pdf

Report to the President by the Commission on CIA Activities Within the United States (1975)


http://papers.ssrn.com/sol3/papers.cfm?abstract_id=757846

Search and Seizure: Past, Present, and Future


http://www.cs.princeton.edu/~sgaw/publications/01Feb-Activists-sgaw-CHI2006.pdf

Secrecy, Flagging, and Paranoia: Adoption Criteria in Encrypted Email


http://pdos.csail.mit.edu/papers/nymserver:ccs5.pdf

The Design, Implementation and Operation of an Email Pseudonym Server


http://www.ohmygodel.com/publications/usersrouted-ccs13.pdf

Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries


https://www.usenix.org/system/files/conference/usenixsecurity12/sec12-final116.pdf

Chimera: A Declarative Language for Streaming Network Traffic Analysis


http://www.cs.utexas.edu/~shmat/shmat_oak13parrot.pdf

The Parrot Is Dead: Observing Unobservable Network Communications


http://researchbank.swinburne.edu.au/vital/access/services/Download/swin:9173/SOURCE2

A Survey of Covert Channels and Countermeasures in Computer Network Protocols


http://www.cypherpunks.ca/otr/otr-wpes.pdf

Off-the-Record Communication, or, Why Not to Use PGP


http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf

The Most Dangerous Code in the World: Validating SSL Certificates in Non-Browser Software


http://www.ieee-security.org/TC/SP2013/papers/4977a511.pdf

SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements


http://files.cloudprivacy.net/ssl-mitm.pdf

Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL


http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf

APT1: Exposing One of China’s Cyber Espionage Units


http://www.nsa.gov/public_info/_files/cryptologic_spectrum/tempest.pdf

TEMPEST: A Signal Problem


http://homes.cs.washington.edu/~yoshi/papers/PDF/KoBrCl2005PDF-Extended-lowres.pdf

Remote Physical Device Fingerprinting


https://crypto.stanford.edu/~dabo/papers/ssl-timing.pdf

Remote Timing Attacks are Practical


http://citp.princeton.edu/pub/coldboot.pdf

Lest We Remember: Cold Boot Attacks on Encryption Keys


https://factorable.net/weakkeys12.extended.pdf

Mining Your Ps and Qs: Widespread Weak Keys in Network Devices


http://cs.tau.ac.il/~tromer/courses/infosec11/Boneh%20DeMillo%20Lipton%201997%20—%20On%20the%20importance%20of%20eliminating%20errors%20in%20cryptographic%20protocols.pdf

On the Importance of Eliminating Errors in Cryptographic Computations


https://cyberlaw.stanford.edu/files/publication/files/trackingsurvey12.pdf

Third-Party Web Tracking: Policy and Technology


http://www.onion-router.net/Publications/tor-design.pdf

Tor: The Second-Generation Onion Router


http://seclab.cs.ucsb.edu/media/uploads/papers/sp2013_cookieless.pdf

Cookieless Monster: Exploring the Ecosystem of Web-based Device Fingerprinting


Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s