Security and Privacy
ECE 574
Instructor: Prateek Mittal
Lecture Times: Tuesday and Thursday (10:40am - 12pm)
Office hours: By appointment only
Contact: pmittal AT princeton DOT edu
Reading List
Here is an example reading list of papers. We will be updating this list for fall 2025 shorly (focusing more on machine learning).
Secure Public Key Infrastructures
Secure Internet Routing
Anonymous Communication
Traffic Analysis
Traffic Analysis Resilience
Censorship Techniques
Censorship Resilience
Machine Learning and Privacy: Attacks
Machine Learning and Privacy: Defenses
Machine Learning and Privacy: Differential Privacy
Machine Learning and Privacy: Differentially-private Learning
Machine Learning for Security
Machine Learning and Security: Adversarial Examples
Machine Learning and Security: Poisoning Attacks
Machine Learning and Security: Defenses
Computer Architecture and Security (time permitting, optional): Information Flow Control
Computer Architecture and Security (time permitting, optional): Leveraging hardware trust
Formal Methods and Security (time permitting, optional): Network Verification
|