Readings in Surveillance and Countermeasures

These readings are from a graduate class at Princeton University by Edward Feltan (2013)

Report to the President by the Commission on CIA Activities Within the United States (1975)

Search and Seizure: Past, Present, and Future

Secrecy, Flagging, and Paranoia: Adoption Criteria in Encrypted Email

The Design, Implementation and Operation of an Email Pseudonym Server

Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries

Chimera: A Declarative Language for Streaming Network Traffic Analysis

The Parrot Is Dead: Observing Unobservable Network Communications

A Survey of Covert Channels and Countermeasures in Computer Network Protocols

Off-the-Record Communication, or, Why Not to Use PGP

The Most Dangerous Code in the World: Validating SSL Certificates in Non-Browser Software

SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements

Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL

APT1: Exposing One of China’s Cyber Espionage Units

TEMPEST: A Signal Problem

Remote Physical Device Fingerprinting

Remote Timing Attacks are Practical

Lest We Remember: Cold Boot Attacks on Encryption Keys

Mining Your Ps and Qs: Widespread Weak Keys in Network Devices—%20On%20the%20importance%20of%20eliminating%20errors%20in%20cryptographic%20protocols.pdf

On the Importance of Eliminating Errors in Cryptographic Computations

Third-Party Web Tracking: Policy and Technology

Tor: The Second-Generation Onion Router

Cookieless Monster: Exploring the Ecosystem of Web-based Device Fingerprinting

Why Johnny Can’t Encrypt: A Usability Evaluation of PGP

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s