; Hand this in to: tdumitra@umiacs.umd.edu ; Required Readings @inproceedings{Netflix, Abstract = {We present a new class of statistical de-anonymization attacks against high-dimensional micro-data, such as individual preferences, recommendations, transaction records and so on. Our techniques are robust to perturbation in the data and tolerate some mistakes in the adversary's background knowledge. We apply our de-anonymization methodology to the Netflix Prize dataset, which contains anonymous movie ratings of 500,000 subscribers of Netflix,the world's largest online movie rental service. We demonstrate that an adversary who knows only a little bit about an individual subscriber can easily identify this subscriber's record in the dataset. Using the Internet Movie Database as the source of background knowledge, we successfully identified the Netflix records of known users, uncovering their apparent political preferences and other potentially sensitive information.}, Author = {Arvind Narayanan and Vitaly Shmatikov}, Bibsource = {DBLP, http://dblp.uni-trier.de}, Booktitle = {IEEE Symposium on Security and Privacy}, Crossref = {DBLP:conf/sp/2008}, Pages = {111-125}, Title = {Robust De-anonymization of Large Sparse Datasets}, Year = {2008}, studentfirstname ="", studentlastname ="", summary = "", contribution1 ="", contribution2 ="", contribution3 ="", contribution4 ="", contribution5 ="", weakness1 = "", weakness2 = "", weakness3 = "", weakness4 = "", weakness5 = "", interesting = "high/med/low", opinions = "", } @inproceedings{Tor, Author = {Roger Dingledine and Nick Mathewson and Paul F. Syverson}, Bibsource = {DBLP, http://dblp.uni-trier.de}, Booktitle = {USENIX Security Symposium}, Crossref = {DBLP:conf/uss/2004}, Pages = {303-320}, Title = {Tor: The Second-Generation Onion Router}, Year = {2004}, studentfirstname ="", studentlastname ="", summary = "", contribution1 ="", contribution2 ="", contribution3 ="", contribution4 ="", contribution5 ="", weakness1 = "", weakness2 = "", weakness3 = "", weakness4 = "", weakness5 = "", interesting = "high/med/low", opinions = "", } ; BibTex cross-references (don't add anything here) @proceedings{DBLP:conf/sp/2008, Bibsource = {DBLP, http://dblp.uni-trier.de}, Booktitle = {IEEE Symposium on Security and Privacy}, Date-Added = {2013-10-11 20:19:27 +0000}, Date-Modified ={2013-10-11 20:19:27 +0000}, Publisher = {IEEE Computer Society}, Title = {2008 IEEE Symposium on Security and Privacy (S{\&}P 2008), 18-21 May 2008, Oakland, California, USA}, Year = {2008} } @proceedings{DBLP:conf/uss/2004, Bibsource = {DBLP, http://dblp.uni-trier.de}, Booktitle = {USENIX Security Symposium}, Date-Added = {2013-10-11 20:16:35 +0000}, Date-Modified ={2013-10-11 20:16:35 +0000}, Publisher = {USENIX}, Title = {Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA}, Year = {2004} }