Add links.
This commit is contained in:
parent
970105389b
commit
2c46ca0384
|
@ -1,74 +1,105 @@
|
||||||
# Paper Suggestions
|
# Paper Suggestions
|
||||||
|
|
||||||
### Differential Privacy
|
### Differential Privacy
|
||||||
- Frank McSherry and Kunal Talwar. *Mechanism Design via Differential Privacy*. FOCS 2007.
|
- Frank McSherry and Kunal Talwar.
|
||||||
- Cynthia Dwork, Moni Naor, Toniann Pitassi, and Guy Rothblum. *Differential
|
[*Mechanism Design via Differential Privacy*](http://kunaltalwar.org/papers/expmech.pdf).
|
||||||
Privacy under Continual Observation*. STOC 2010.
|
FOCS 2007.
|
||||||
- T.-H. Hubert Chan, Elaine Shi, and Dawn Song. *Private and Continual Release
|
- Cynthia Dwork, Moni Naor, Toniann Pitassi, and Guy Rothblum.
|
||||||
of Statistics*. ICALP 2010.
|
[*Differential Privacy under Continual Observation*](http://www.wisdom.weizmann.ac.il/~naor/PAPERS/continual_observation.pdf).
|
||||||
- Moritz Hardt, Katrina Ligett, and Frank McSherry. *A Simple and Practical
|
STOC 2010.
|
||||||
Algorithm for Differentially Private Data Release*. NIPS 2012.
|
- T.-H. Hubert Chan, Elaine Shi, and Dawn Song.
|
||||||
- Daniel Kifer and Ashwin Machanavajjhala. *A Rigorous and Customizable
|
[*Private and Continual Release of Statistics*](https://eprint.iacr.org/2010/076.pdf).
|
||||||
Framework for Privacy*. PODS 2012.
|
ICALP 2010.
|
||||||
|
- Moritz Hardt, Katrina Ligett, and Frank McSherry.
|
||||||
|
[*A Simple and Practical Algorithm for Differentially Private Data Release*](https://papers.nips.cc/paper/4548-a-simple-and-practical-algorithm-for-differentially-private-data-release.pdf).
|
||||||
|
NIPS 2012.
|
||||||
|
- Daniel Kifer and Ashwin Machanavajjhala.
|
||||||
|
[*A Rigorous and Customizable Framework for Privacy*](http://www.cse.psu.edu/~duk17/papers/pufferfish_preprint.pdf).
|
||||||
|
PODS 2012.
|
||||||
|
|
||||||
### Applied Cryptography
|
### Applied Cryptography
|
||||||
- Benjamin Braun, Ariel J. Feldman Zuocheng Ren, Srinath Setty, Andrew J.
|
- Benjamin Braun, Ariel J. Feldman Zuocheng Ren, Srinath Setty, Andrew J. Blumberg, and Michael Walfish.
|
||||||
Blumberg, and Michael Walfish. *Verifying Computations with State*. SOSP 2013.
|
[*Verifying Computations with State*](https://eprint.iacr.org/2013/356.pdf).
|
||||||
- Aseem Rastogi, Matthew A. Hammer and Michael Hicks. *Wysteria: A Programming
|
SOSP 2013.
|
||||||
Language for Generic, Mixed-Mode Multiparty Computations*. S&P 2014.
|
- Aseem Rastogi, Matthew A. Hammer and Michael Hicks.
|
||||||
- Shai Halevi and Victor Shoup. *Algorithms in HElib*. CRYPTO 2014.
|
[*Wysteria: A Programming Language for Generic, Mixed-Mode Multiparty Computations*](http://www.cs.umd.edu/~aseem/wysteria-tr.pdf).
|
||||||
- Shai Halevi and Victor Shoup. *Bootstrapping for HElib*. EUROCRYPT 2015.
|
S&P 2014.
|
||||||
- Léo Ducas and Daniele Micciancio. *FHEW: Bootstrapping Homomorphic Encryption
|
- Shai Halevi and Victor Shoup.
|
||||||
in Less than a Second*. EUROCRYPT 2015.
|
[*Algorithms in HElib*](https://www.shoup.net/papers/helib.pdf).
|
||||||
- Peter Kairouz, Sewoong Oh, and Pramod Viswanath. *Secure Multi-party
|
CRYPTO 2014.
|
||||||
Differential Privacy*. NIPS 2015.
|
- Shai Halevi and Victor Shoup.
|
||||||
|
[*Bootstrapping for HElib*](https://www.shoup.net/papers/boot.pdf).
|
||||||
|
EUROCRYPT 2015.
|
||||||
|
- Léo Ducas and Daniele Micciancio.
|
||||||
|
[*FHEW: Bootstrapping Homomorphic Encryption in Less than a Second*](https://eprint.iacr.org/2014/816.pdf).
|
||||||
|
EUROCRYPT 2015.
|
||||||
|
- Peter Kairouz, Sewoong Oh, and Pramod Viswanath.
|
||||||
|
[*Secure Multi-party Differential Privacy*](https://papers.nips.cc/paper/6004-secure-multi-party-differential-privacy.pdf).
|
||||||
|
NIPS 2015.
|
||||||
- Arjun Narayan, Ariel Feldman, Antonis Papadimitriou, and Andreas Haeberlen,
|
- Arjun Narayan, Ariel Feldman, Antonis Papadimitriou, and Andreas Haeberlen,
|
||||||
*Verifiable Differential Privacy*. EUROSYS 2015.
|
[*Verifiable Differential Privacy*](https://www.cis.upenn.edu/~ahae/papers/verdp-eurosys2015.pdf).
|
||||||
|
EUROSYS 2015.
|
||||||
|
|
||||||
### Language-Based Security
|
### Language-Based Security
|
||||||
- Frank McSherry. *Privacy Integrated Queries*. SIGMOD 2009.
|
- Martín Abadi and Andrew D. Gordon.
|
||||||
- Jason Reed and Benjamin C. Pierce: *Distance Makes the Types Grow Stronger: A
|
[*A Calculus for Cryptographic Protocols: The Spi Calculus*](https://www.microsoft.com/en-us/research/wp-content/uploads/2016/11/ic99spi.pdf).
|
||||||
Calculus for Differential Privacy*. ICFP 2010.
|
Information and Computation, 1999.
|
||||||
- Daniel B. Griffin, Amit Levy, Deian Stefan, David Terei, David Mazières, John
|
- Frank McSherry.
|
||||||
C.Mitchell, and Alejandro Russo. *Hails: Protecting Data Privacy in Untrusted
|
[*Privacy Integrated Queries*](http://citeseerx.ist.psu.edu/viewdoc/download?rep=rep1&type=pdf&doi=10.1.1.211.4503).
|
||||||
Web Applications*. OSDI 2012.
|
SIGMOD 2009.
|
||||||
|
- Jason Reed and Benjamin C. Pierce.
|
||||||
|
[*Distance Makes the Types Grow Stronger: A Calculus for Differential Privacy*](https://www.cis.upenn.edu/~bcpierce/papers/dp.pdf).
|
||||||
|
ICFP 2010.
|
||||||
|
- Daniel B. Griffin, Amit Levy, Deian Stefan, David Terei, David Mazières, John C. Mitchell, and Alejandro Russo.
|
||||||
|
[*Hails: Protecting Data Privacy in Untrusted Web Applications*](https://www.usenix.org/system/files/conference/osdi12/osdi12-final-35.pdf).
|
||||||
|
OSDI 2012.
|
||||||
|
- Danfeng Zhang, Aslan Askarov, and Andrew C. Myers.
|
||||||
|
[*Language-Based Control and Mitigation of Timing Channels*](https://www.cs.cornell.edu/andru/papers/pltiming-pldi12.pdf).
|
||||||
|
PLDI 2012.
|
||||||
|
- Andrew Miller, Michael Hicks, Jonathan Katz, and Elaine Shi.
|
||||||
|
[*Authenticated Data Structures, Generically*](https://www.cs.umd.edu/~mwh/papers/gpads.pdf).
|
||||||
|
POPL 2014.
|
||||||
|
- Samee Zahur and David Evans.
|
||||||
|
[*Obliv-C: A Language for Extensible Data-Oblivious Computation*](https://eprint.iacr.org/2015/1153.pdf).
|
||||||
|
IACR 2015.
|
||||||
|
- Chang Liu, Xiao Shaun Wang, Kartik Nayak, Yan Huang, and Elaine Shi.
|
||||||
|
[*ObliVM: A Programming Framework for Secure Computation*](http://www.cs.umd.edu/~elaine/docs/oblivm.pdf).
|
||||||
|
S&P 2015.
|
||||||
- Andrew Ferraiuolo, Rui Xu, Danfeng Zhang, Andrew C. Myers, and G. Edward Suh.
|
- Andrew Ferraiuolo, Rui Xu, Danfeng Zhang, Andrew C. Myers, and G. Edward Suh.
|
||||||
*Verification of a Practical Hardware Security Architecture Through Static
|
[*Verification of a Practical Hardware Security Architecture Through Static Information Flow Analysis*](http://www.cse.psu.edu/~dbz5017/pub/asplos17.pdf).
|
||||||
Information Flow Analysis*. ASPLOS 2017.
|
ASPLOS 2017.
|
||||||
- Danfeng Zhang, Aslan Askarov, and Andrew C. Myers. *Language-Based Control and
|
|
||||||
Mitigation of Timing Channels*. PLDI 2012.
|
|
||||||
- Samee Zahur and David Evans. *Obliv-C: A Language for Extensible
|
|
||||||
Data-Oblivious Computation*. 2015.
|
|
||||||
- Andrew Miller, Michael Hicks, Jonathan Katz, and Elaine Shi. *Authenticated
|
|
||||||
Data Structures, Generically*. POPL 2014.
|
|
||||||
- Martín Abadi and Andrew D. Gordon. *A Calculus for Cryptographic Protocols:
|
|
||||||
The Spi Calculus*. Information and Computation, 1999.
|
|
||||||
|
|
||||||
### Adversarial Machine Learning
|
### Adversarial Machine Learning
|
||||||
- Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru
|
- Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus.
|
||||||
Erhan, Ian Goodfellow, and Rob Fergus. [*Intriguing properties of neural
|
[*Intriguing Properties of Neural Networks*](https://arxiv.org/pdf/1312.6199.pdf).
|
||||||
networks*](https://arxiv.org/pdf/1312.6199.pdf). ICLR 2014.
|
ICLR 2014.
|
||||||
- Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. [*Explaining and
|
- Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy.
|
||||||
Harnessing Adversarial Examples*](https://arxiv.org/abs/1412.6572). ICLR 2015.
|
[*Explaining and Harnessing Adversarial Examples*](https://arxiv.org/abs/1412.6572).
|
||||||
- Nicholas Carlini and David Wagner. [*Towards Evaluating the Robustness of
|
ICLR 2015.
|
||||||
Neural Networks*](https://arxiv.org/pdf/1608.04644.pdf). S&P 2017.
|
- Nicholas Carlini and David Wagner.
|
||||||
- Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Chaowei
|
[*Towards Evaluating the Robustness of Neural Networks*](https://arxiv.org/pdf/1608.04644.pdf).
|
||||||
Xiao, Atul Prakash, Tadayoshi Kohno, and Dawn Song. [*Robust Physical-World
|
S&P 2017.
|
||||||
Attacks on Deep Learning Models*](https://arxiv.org/pdf/1707.08945.pdf). CVPR 2018.
|
- Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Chaowei Xiao, Atul Prakash, Tadayoshi Kohno, and Dawn Song.
|
||||||
- Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and
|
[*Robust Physical-World Attacks on Deep Learning Models*](https://arxiv.org/pdf/1707.08945.pdf).
|
||||||
Adrian Vladu. [*Towards Deep Learning Models Resistant to Adversarial
|
CVPR 2018.
|
||||||
Attacks*](https://arxiv.org/pdf/1706.06083.pdf). ICLR 2018.
|
- Nicholas Carlini and David Wagner.
|
||||||
- Nicholas Carlini and David Wagner. [*Adversarial Examples Are Not Easily Detected:
|
[*Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods*](https://arxiv.org/pdf/1705.07263.pdf).
|
||||||
Bypassing Ten Detection Methods*](https://arxiv.org/pdf/1705.07263.pdf). AISec 2017.
|
AISec 2017.
|
||||||
- Jacob Steinhardt, Pang Wei Koh, and Percy Liang. [*Certified Defenses for Data
|
- Jacob Steinhardt, Pang Wei Koh, and Percy Liang.
|
||||||
Poisoning Attacks*](https://arxiv.org/pdf/1706.03691.pdf). NIPS 2017.
|
[*Certified Defenses for Data Poisoning Attacks*](https://arxiv.org/pdf/1706.03691.pdf).
|
||||||
|
NIPS 2017.
|
||||||
|
- Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu.
|
||||||
|
[*Towards Deep Learning Models Resistant to Adversarial Attacks*](https://arxiv.org/pdf/1706.06083.pdf).
|
||||||
|
ICLR 2018.
|
||||||
|
|
||||||
# Supplemental Material
|
# Supplemental Material
|
||||||
- Cynthia Dwork and Aaron Roth. *Algorithmic Foundations of Data Privacy*.
|
- Cynthia Dwork and Aaron Roth.
|
||||||
- Gilles Barthe, Marco Gaboardi, Justin Hsu, and Benjamin C. Pierce. *Programming
|
[*Algorithmic Foundations of Data Privacy*](https://www.cis.upenn.edu/~aaroth/Papers/privacybook.pdf).
|
||||||
Language Techniques for Differential Privacy*.
|
- Gilles Barthe, Marco Gaboardi, Justin Hsu, and Benjamin C. Pierce.
|
||||||
- Michael Walfish and Andrew J. Blumberg. *Verifying Computations without
|
[*Programming Language Techniques for Differential Privacy*](https://dl.acm.org/citation.cfm?id=2893591&dl=ACM&coll=DL).
|
||||||
Reexecuting Them*.
|
- Michael Walfish and Andrew J. Blumberg.
|
||||||
- Véronique Cortier, Steve Kremer, and Bogdan Warinschi. *A Survey of Symbolic
|
[*Verifying Computations without Reexecuting Them*](http://delivery.acm.org/10.1145/2650000/2641562/p74-walfish.pdf?ip=24.59.48.254&id=2641562&acc=OA&key=4D4702B0C3E38B35%2E4D4702B0C3E38B35%2E4D4702B0C3E38B35%2E757E42EE4C319386&__acm__=1533144327_267b96b7bd723efc52072f0f79f6720d).
|
||||||
Methods in Computational Analysis of Cryptographic Systems*.
|
- Véronique Cortier, Steve Kremer, and Bogdan Warinschi.
|
||||||
- Dan Boneh and Victor Shoup. *A Graduate Course in Applied Cryptography*.
|
[*A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems*](https://hal.inria.fr/inria-00379776/document).
|
||||||
|
- Dan Boneh and Victor Shoup.
|
||||||
|
[*A Graduate Course in Applied Cryptography*](https://crypto.stanford.edu/~dabo/cryptobook/BonehShoup_0_4.pdf).
|
||||||
|
|
|
@ -5,6 +5,7 @@
|
||||||
## Cryptography
|
## Cryptography
|
||||||
- [HELib](https://github.com/shaih/HElib)
|
- [HELib](https://github.com/shaih/HElib)
|
||||||
- [Obliv-C](https://oblivc.org/)
|
- [Obliv-C](https://oblivc.org/)
|
||||||
|
- [ObliVM](http://oblivm.com/download.html)
|
||||||
|
|
||||||
## Language-Based Security
|
## Language-Based Security
|
||||||
- [Jif](https://www.cs.cornell.edu/jif/)
|
- [Jif](https://www.cs.cornell.edu/jif/)
|
||||||
|
|
Reference in New Issue