Security and Privacy
ECE 574

Instructor: Prateek Mittal
Lecture Times: Tuesday and Thursday (10:40am - 12pm)
Office hours: By appointment only
Contact: pmittal AT princeton DOT edu


Reading List

Here is an example reading list of papers. We will be updating this list for fall 2025 shorly (focusing more on machine learning).

Secure Public Key Infrastructures Secure Internet Routing Anonymous Communication Traffic Analysis Traffic Analysis Resilience Censorship Techniques Censorship Resilience Machine Learning and Privacy: Attacks Machine Learning and Privacy: Defenses Machine Learning and Privacy: Differential Privacy Machine Learning and Privacy: Differentially-private Learning Machine Learning for Security Machine Learning and Security: Adversarial Examples Machine Learning and Security: Poisoning Attacks Machine Learning and Security: Defenses Computer Architecture and Security (time permitting, optional): Information Flow Control Computer Architecture and Security (time permitting, optional): Leveraging hardware trust Formal Methods and Security (time permitting, optional): Network Verification