CS 858 Reading List
Disclaimers:
- This reading list contains more papers than what we will be able to read and discuss in class. The actual list of presented papers will be chosen based on people's interests. Feel free to read the remaining papers on your own, like to choose a course project.
- The order in which we will discuss the papers in class will likely not correspond to the order below.
- The PDFs and their abstracts are also available in the bidding system.
- If you try to download a local copy below from a non-uWaterloo host, you will have to authenticate using your WatIAM credentials. You can also download a file with all the papers.
Examining Permissions
Detecting Privacy Leaks
Managing Privacy Leaks I
Managing Privacy Leaks II
Studying Users and Permissions
Crowdsourcing Permission Expectations
Privilege Escalation
Advertising
Control-flow Attacks
Side-channel and Covert-channel Attacks
Device Theft
New Architectures I
New Architectures II
Studying Users
Authentication
Privacy-preserving Data Processing
SSL / Cryptography
Location Sharing
Last updated: 2013-11-09 13:53:18 -0500
[validate xhtml]