📚 Distributed Systems and Security Reading Group

The reading group meets weekly on Wednesday, 10am during term time and is open to the public. We read both new papers and classics in the field of distributed systems and security. Occasionally, we also discuss pre-prints and critique work-in-progress papers. Papers are shared via the mailing list on Monday morning, giving everyone ample time to read them before the meeting.

Easter Term 2025

Date Paper Full Citation
1st Jul 2025 Breaking and fixing content-defined chunking iacr Truong, K.T., Merz, S.P., Scarlata, M., GĂŒnther, F. and Paterson, K.G., 2025. Breaking and fixing content-defined chunking. Cryptology ePrint Archive.
25th Jun 2025 CoverDrop Implementation Paper Hugenroth, D., Cutler, S., Kendrick, D., Savarese, M., Hunter-Green, Z., McMahon, P., Kalanaki, M., Vasile, D.A., Bejasa-Dimmock, S., Hoyland, L. and Beresford, A.R., 2025. CoverDrop White Paper (No. UCAM-CL-TR-999). University of Cambridge, Computer Laboratory.
18th Jun 2025 Sabot: Efficient and Strongly Anonymous Bootstrapping of Communication Channels iacr Coijanovic, C., Hetz, L., Paterson, K.G. and Strufe, T., 2025. Sabot: Efficient and Strongly Anonymous Bootstrapping of Communication Channels. Cryptology ePrint Archive.
11th Jun 2025 Anix: Anonymous Blackout-Resistant Microblogging with Message Endorsing Kamali, S. and Barradas, D., 2025. Anix: Anonymous Blackout-Resistant Microblogging with Message Endorsing.
4th Jun 2025 SoK: "Interoperability vs Security" Arguments: A Technical Framework arxiv Landis, D., Bietti, E. and Park, S., 2025. SoK: "Interoperability vs Security" Arguments: A Technical Framework. arXiv preprint arXiv:2502.04538.
28th May 2025 You Have to Ignore the Dangers: User Perceptions of the Security and Privacy Benefits of WhatsApp Mods IEEE S&P Munyendo, C.W., Owens, K., Strong, F., Wang, S., Aviv, A.J., Kohno, T. and Roesner, F., 2025, May. “You Have to Ignore the Dangers”: User Perceptions of the Security and Privacy Benefits of WhatsApp Mods. In 2025 IEEE Symposium on Security and Privacy (S&P) (pp. 4515-4533). IEEE.
21st May 2025 Nitriding: A tool kit for building scalable, networked, secure enclaves arxiv Winter, P., Giles, R., Schafhuber, M. and Haddadi, H., 2022. Nitriding: A tool kit for building scalable, networked, secure enclaves. arXiv preprint arXiv:2206.04123.
14th May 2025 Flock: A Framework for Deploying On-Demand Distributed Trust Kaviani, D., Tan, S., Kannan, P.G. and Popa, R.A., 2024. Flock: A Framework for Deploying On-Demand Distributed Trust. In 18th USENIX Symposium on Operating Systems Design and Implementation (OSDI 24) (pp. 721-743).
7th May 2025 T0RTT: Non-Interactive Immediate Forward-Secret Single-Pass Circuit Construction iacr Lauer, S., Gellert, K., Merget, R., Handirk, T. and Schwenk, J., 2019. T0RTT: non-interactive immediate forward-secret single-pass circuit construction. Cryptology ePrint Archive.
30th Apr 2025 Janus: Fast Privacy-Preserving Data Provenance For TLS PETS Lauinger, J., Ernstberger, J., Finkenzeller, A. and Steinhorst, S., 2025. Janus: Fast Privacy-Preserving Data Provenance For TLS. Proceedings on Privacy Enhancing Technologies.

Lent Term 2025

Date Paper Full Citation
12th Mar 2025 Attestable Builds: Assembling Verifiable Artifacts on Untrusted Machines using Trusted Execution Environments arxiv Hugenroth, D., Lins, M., Mayrhofer, R. and Beresford, A., 2025. Attestable builds: compiling verifiable binaries on untrusted systems using trusted execution environments. arXiv preprint arXiv:2505.02521.
5th Mar 2025 Turning a Bluetooth Device into an Apple AirTag Without Root Privileges Chen, J., Ma, X., Luo, L. and Zeng, Q., Tracking You from a Thousand Miles Away! Turning a Bluetooth Device into an Apple AirTag Without Root Privileges.
26th Feb 2025 Architectural Neural Backdoors from First Principles IEEE S&P Langford, H., Shumailov, I., Zhao, Y., Mullins, R. and Papernot, N., 2025, May. Architectural neural backdoors from first principles. In 2025 IEEE Symposium on Security and Privacy (S&P) (pp. 1657-1675). IEEE.
19th Feb 2025 It's TEEtime: A New Architecture Bringing Sovereignty to Smartphones arxiv Groschupp, F., Kuhne, M., Schneider, M., Puddu, I., Shinde, S. and Capkun, S., 2022. It's TEEtime: A New Architecture Bringing Sovereignty to Smartphones. arXiv preprint arXiv:2211.05206.
12th Feb 2025 Granola: Low-Overhead Distributed Transaction Coordination Cowling, J. and Liskov, B., 2012. Granola: low-overhead distributed transaction coordination. In 2012 USENIX Annual Technical Conference (USENIX ATC 12) (pp. 223-235).
5th Feb 2025 How To Think About End-To-End Encryption and AI: Training, Processing, Disclosure, and Consent arxiv Knodel, M., FĂĄbrega, A., Ferrari, D., Leiken, J., Hou, B.L., Yen, D., de Alfaro, S., Cho, K. and Park, S., 2024. How To Think About End-To-End Encryption and AI: Training, Processing, Disclosure, and Consent. arXiv preprint arXiv:2412.20231.
29th Jan 2025 BadRAM: Practical Memory Aliasing Attacks on Trusted Execution Environments IEEE S&P De Meulemeester, J., Wilke, L., Oswald, D., Eisenbarth, T., Verbauwhede, I. and Van Bulck, J., 2025, May. BadRAM: Practical memory aliasing attacks on trusted execution environments. In 2025 IEEE Symposium on Security and Privacy (S&P) (pp. 4117-4135). IEEE.

Michaelmas Term 2024

Date Paper Full Citation
18th Dec 2024 Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks USENIX Sec Dahiya, P., Shumailov, I. and Anderson, R., 2024. Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks. In 33rd USENIX Security Symposium (USENIX Security 24) (pp. 3657-3674).
11th Dec 2024 Kintsugi: Decentralized E2EE Key Recovery Ma, E., Kleppmann, M. 2025. Kintsugi: Decentralized E2EE Key Recovery. To be published in Security Protocols XXIX.
4th Dec 2024 Amigo: Secure Group Mesh Messaging in Realistic Protest Settings iacr Inyangson, D., Radway, S., Jois, T.M., Fazio, N. and Mickens, J., 2024. Amigo: Secure Group Mesh Messaging in Realistic Protest Settings. Cryptology ePrint Archive.
28th Nov 2024 Machine learning with confidential computing: a systematization of knowledge Mo, F., Tarkhani, Z. and Haddadi, H., 2024. Machine learning with confidential computing: A systematization of knowledge. ACM computing surveys, 56(11), pp.1-40.
20th Nov 2024 Unmasking the Security and Usability of Password Masking ACM CCS Hu, Y., Alroomi, S., Sahin, S. and Li, F., 2024, December. Unmasking the Security and Usability of Password Masking. In Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security (pp. 4241-4255).
13th Nov 2024 Rust for Embedded Systems: Current State, Challenges and Open Problems arxiv Sharma, A., Sharma, S., Torres-Arias, S., & Machiry, A. (2023). Rust for embedded systems: current state, challenges and open problems (extended report). arXiv preprint arXiv:2311.05063.
6th Nov 2024 Sui Lutris: A blockchain combining broadcast and consensus ACM CCS Blackshear, S., Chursin, A., Danezis, G., Kichidis, A., Kokoris-Kogias, L., Li, X., Logan, M., Menon, A., Nowacki, T., Sonnino, A. and Williams, B., 2024, December. Sui lutris: A blockchain combining broadcast and consensus. In Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security (pp. 2606-2620).
30th Oct 2024 End-to-End Encrypted Cloud Storage in the Wild: A Broken Ecosystem ACM CCS Hofmann, J. and Truong, K.T., 2024, December. End-to-End Encrypted Cloud Storage in the Wild: A Broken Ecosystem. In Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security (pp. 3988-4001).
23rd Oct 2024 Skipped or non-public
16th Oct 2024 Minimizing a Smartphone's TCB for Security-Critical Programs with Exclusively-Used, Physically-Isolated, Statically-Partitioned Hardware Yao, Z., Seyed Talebi, S.M., Chen, M., Amiri Sani, A. and Anderson, T., 2023, June. Minimizing a Smartphone's TCB for Security-Critical Programs with Exclusively-Used, Physically-Isolated, Statically-Partitioned Hardware. In Proceedings of the 21st Annual International Conference on Mobile Systems, Applications and Services (pp. 233-246).
9th Oct 2024 Non-Transferable Anonymous Tokens by Secret Binding ACM CCS Durak, F.B., Marco, L., Talayhan, A. and Vaudenay, S., 2024, December. Non-Transferable Anonymous Tokens by Secret Binding. In Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security (pp. 2460-2474).
2nd Oct 2024 Tor: From the dark web to the future of privacy. Collier, B., 2024. Tor: From the dark web to the future of privacy. MIT Press.

Easter Term 2024

Date Paper Full Citation
10th Jul 2024 All about Eve: Execute-Verify Replication for Multi-Core Servers Kapritsos, M., Wang, Y., Quema, V., Clement, A., Alvisi, L. and Dahlin, M., 2012. All about Eve: execute-verify replication for multi-core servers. In 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12) (pp. 237-250).
3rd Jul 2024 Private Web Search with Tiptoe Henzinger, A., Dauterman, E., Corrigan-Gibbs, H. and Zeldovich, N., 2023, October. Private web search with Tiptoe. In Proceedings of the 29th symposium on operating systems principles (pp. 396-416).
26th Jun 2024 TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution IEEE S&P Kim, J., Park, J., Roh, S., Chung, J., Lee, Y., Kim, T. and Lee, B., 2025, May. TIKTAG: Breaking arm's memory tagging extension with speculative execution. In 2025 IEEE Symposium on Security and Privacy (S&P) (pp. 4063-4081). IEEE.
19th Jun 2024 MixMatch: Flow Matching for Mixnet Traffic PETS Oldenburg, L., Juarez, M., RĂșa, E.A. and Diaz, C., 2024. Mixmatch: Flow matching for mixnet traffic. Proceedings on Privacy Enhancing Technologies, 2024(2), pp.276-294.
12th Jun 2024 Holepunch: Fast, Secure File Deletion with Crash Consistency IEEE S&P Ratliff, Z., Goh, W., Wieland, A., Mickens, J. and Williams, R., 2024, May. Holepunch: Fast, Secure File Deletion with Crash Consistency. In 2024 IEEE Symposium on Security and Privacy (S&P) (pp. 2705-2721). IEEE.
5th Jun 2024 A Tale of Two Industroyers: It was the season of Darkness IEEE S&P Salazar, L., Castro, S.R., Lozano, J., Koneru, K., Zambon, E., Huang, B., Baldick, R., Krotofil, M., Rojas, A. and Cardenas, A.A., 2024, May. A tale of two Industroyers: It was the season of darkness. In 2024 IEEE Symposium on Security and Privacy (S&P) (pp. 312-330). IEEE.
29th May 2024 Surveilling the Masses with Wi-Fi-Based Positioning Systems IEEE S&P Rye, E. and Levin, D., 2024, May. Surveilling the Masses with Wi-Fi-Based Positioning Systems. In 2024 IEEE Symposium on Security and Privacy (S&P) (pp. 2831-2846). IEEE.
22nd May 2024 Skipped or non-public
15th May 2024 On SMS Phishing Tactics and Infrastructure IEEE S&P Nahapetyan, A., Prasad, S., Childs, K., Oest, A., Ladwig, Y., Kapravelos, A. and Reaves, B., 2024, May. On sms phishing tactics and infrastructure. In 2024 IEEE Symposium on Security and Privacy (S&P) (pp. 1-16). IEEE.
8th May 2024 Evaluations of Machine Learning Privacy Defenses are Misleading ACM CCS Aerni, M., Zhang, J. and TramĂšr, F., 2024, December. Evaluations of machine learning privacy defenses are misleading. In Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security (pp. 1271-1284).
1st May 2024 DY Fuzzing: Formal Dolev-Yao Models Meet Cryptographic Protocol Fuzz Testing IEEE S&P Ammann, M., Hirschi, L. and Kremer, S., 2024, May. DY fuzzing: formal Dolev-Yao models meet cryptographic protocol fuzz testing. In 2024 IEEE Symposium on Security and Privacy (S&P) (pp. 1481-1499). IEEE.
24th Apr 2024 PolySphinx: Extending the Sphinx Mix Format With Better Multicast Support IEEE S&P Schadt, D., Coijanovic, C., Weis, C. and Strufe, T., 2024, May. PolySphinx: Extending the Sphinx Mix Format With Better Multicast Support. In 2024 IEEE Symposium on Security and Privacy (S&P) (pp. 4386-4404). IEEE.
17th Apr 2024 Routing Attacks on Cryptocurrency Mining Pools IEEE S&P Tran, M., von Arx, T. and Vanbever, L., 2024, May. Routing Attacks on Cryptocurrency Mining Pools. In 2024 IEEE Symposium on Security and Privacy (S&P) (pp. 3805-3821). IEEE.

Lent Term 2024

Date Paper Full Citation
20th Mar 2024 Nebula: A Privacy-First Platform for Data Backhaul IEEE S&P Watson, J.L., Despres, T., Tan, A., Patil, S.G., Dutta, P. and Popa, R.A., 2024, May. Nebula: A Privacy-First Platform for Data Backhaul. In 2024 IEEE Symposium on Security and Privacy (S&P) (pp. 3184-3202). IEEE.
13th Mar 2024 INVISILINE: Invisible Plausibly-Deniable Storage IEEE S&P Pinjala, S.K., Carbunar, B., Chakraborti, A. and Sion, R., 2024, May. INVISILINE: Invisible plausibly-deniable storage. In 2024 IEEE Symposium on Security and Privacy (S&P) (pp. 2722-2739). IEEE.
6th Mar 2024 Share with Care: Breaking E2EE in Nextcloud IEEE S&P Albrecht, M.R., Backendal, M., Coppola, D. and Paterson, K.G., 2024, July. Share with care: Breaking E2EE in Nextcloud. In 2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P) (pp. 828-840). IEEE.
28th Feb 2024 Bluesky and the AT Protocol: Usable Decentralized Social Media Kleppmann, M., Frazee, P., Gold, J., Graber, J., Holmgren, D., Ivy, D., Johnson, J., Newbold, B. and Volpert, J., 2024, December. Bluesky and the at protocol: Usable decentralized social media. In Proceedings of the ACM Conext-2024 Workshop on the Decentralization of the Internet (pp. 1-7).
21st Feb 2024 Don't Shoot the Messenger: Localization Prevention of Satellite Internet Users IEEE S&P Koisser, D., Mitev, R., Chilese, M. and Sadeghi, A.R., 2024, May. Don’t shoot the messenger: Localization prevention of satellite internet users. In 2024 IEEE Symposium on Security and Privacy (S&P) (pp. 426-444). IEEE.
14th Feb 2024 Content Censorship in the InterPlanetary File System arxiv Sridhar, S., Ascigil, O., Keizer, N., Genon, F., Pierre, S., Psaras, Y., RiviĂšre, E. and KrĂłl, M., 2023. Content censorship in the interplanetary file system. arXiv preprint arXiv:2307.12212.
7th Feb 2024 Skipped or non-public
31st Jan 2024 On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used by Cryptocurrencies arxiv Sharma, P.K., Gosain, D. and Diaz, C., 2022. On the anonymity of peer-to-peer network anonymity schemes used by cryptocurrencies. arXiv preprint arXiv:2201.11860.
24th Jan 2024 Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains Hutchins, E.M., Cloppert, M.J. and Amin, R.M., 2011. Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Leading Issues in Information Warfare & Security Research, 1(1), p.80.
17th Jan 2024 ADEM: An Authentic Digital EMblem ACM CCS Linker, F. and Basin, D., 2023, November. ADEM: An authentic digital emblem. In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (pp. 2815-2829).
10th Jan 2024 The Experts' Insights on the Peer Review Process of Evaluating Security Papers IEEE S&P Soneji, A., Kokulu, F.B., Rubio-Medrano, C., Bao, T., Wang, R., Shoshitaishvili, Y. and DoupĂ©, A., 2022, May. “Flawed, but like democracy we don’t have a better system”: The Experts’ Insights on the Peer Review Process of Evaluating Security Papers. In 2022 IEEE Symposium on Security and Privacy (S&P) (pp. 1845-1862). IEEE.

Michaelmas Term 2023

Date Paper Full Citation
13th Dec 2023 Fin: Practical signature-free asynchronous common subset in constant time ACM CCS Duan, S., Wang, X. and Zhang, H., 2023, November. Fin: Practical signature-free asynchronous common subset in constant time. In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (pp. 815-829).
6th Dec 2023 SoK: Design, vulnerabilities, and security measures of cryptocurrency wallets arxiv Erinle, Y., Kethepalli, Y., Feng, Y. and Xu, J., 2023. Sok: Design, vulnerabilities, and security measures of cryptocurrency wallets. arXiv preprint arXiv:2307.12874.
30th Nov 2023 How the Great Firewall of China detects and blocks fully encrypted traffic USENIX Sec Wu, M., Sippe, J., Sivakumar, D., Burg, J., Anderson, P., Wang, X., Bock, K., Houmansadr, A., Levin, D. and Wustrow, E., 2023. How the Great Firewall of China detects and blocks fully encrypted traffic. In 32nd USENIX Security Symposium (USENIX Security 23) (pp. 2653-2670).
23rd Nov 2023 Passive SSH Key Compromise via Lattices ACM CCS Ryan, K., He, K., Sullivan, G.A. and Heninger, N., 2023, November. Passive SSH key compromise via lattices. In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (pp. 2886-2900).
15th Nov 2023 An analysis of pre-installed Android software Gamba, J., Rashed, M., Razaghpanah, A., Tapiador, J. and Vallina-Rodriguez, N., 2020, May. An analysis of pre-installed android software. In 2020 IEEE symposium on security and privacy (S&P) (pp. 1039-1055). IEEE.
8th Nov 2023 CHERIoT: Complete Memory Safety for Embedded Devices Amar, S., Chisnall, D., Chen, T., Filardo, N.W., Laurie, B., Liu, K., Norton, R., Moore, S.W., Tao, Y., Watson, R.N. and Xia, H., 2023, October. CHERIoT: Complete memory safety for embedded devices. In Proceedings of the 56th Annual IEEE/ACM International Symposium on Microarchitecture (pp. 641-653).
1st Nov 2023 Flamingo: Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning IEEE S&P Ma, Y., Woods, J., Angel, S., Polychroniadou, A. and Rabin, T., 2023, May. Flamingo: Multi-round single-server secure aggregation with applications to private federated learning. In 2023 IEEE Symposium on Security and Privacy (S&P) (pp. 477-496). IEEE.
25th Oct 2023 Cryptographic Capability Computing LeMay, M., Rakshit, J., Deutsch, S., Durham, D.M., Ghosh, S., Nori, A., Gaur, J., Weiler, A., Sultana, S., Grewal, K. and Subramoney, S., 2021, October. Cryptographic capability computing. In MICRO-54: 54th Annual IEEE/ACM International Symposium on Microarchitecture (pp. 253-267).
18th Oct 2023 Hertzbleed 2 IEEE S&P Wang, Y., Paccagnella, R., Wandke, A., Gang, Z., Garrett-Grossman, G., Fletcher, C.W., Kohlbrenner, D. and Shacham, H., 2023, May. DVFS frequently leaks secrets: Hertzbleed attacks beyond SIKE, cryptography, and CPU-only data. In 2023 IEEE Symposium on Security and Privacy (S&P) (pp. 2306-2320). IEEE.
11th Oct 2023 I Still Know What You Watched Last Sunday: Privacy of the HbbTV Protocol in the European Smart TV Landscape NDSS Tagliaro, C., Hahn, F., Sepe, R., Aceti, A. and Lindorfer, M., 2023. I still know what you watched last Sunday: Privacy of the HbbTV protocol in the European smart TV landscape. In 30th Annual Network and Distributed System Security, NDSS 2023.
4th Oct 2023 Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings USENIX Sec Bitsikas, E., Schnitzler, T., Pöpper, C. and Ranganathan, A., 2023. Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings. In 32nd USENIX Security Symposium (USENIX Security 23) (pp. 2151-2168).
27th Sep 2023 Abuse-Resistant Location Tracking: Balancing Privacy and Safety in the Offline Finding Ecosystem USENIX Sec Eldridge, H., Beck, G., Green, M., Heninger, N. and Jain, A., 2024. Abuse-Resistant Location Tracking: Balancing Privacy and Safety in the Offline Finding Ecosystem. In 33rd USENIX Security Symposium (USENIX Security 24) (pp. 5431-5448).
20th Sep 2023 Skipped or non-public
13th Sep 2023 BRUTEPRINT: Expose Smartphone Fingerprint Authentication to Brute-force Attack arxiv Chen, Y. and He, Y., 2023. BrutePrint: Expose Smartphone Fingerprint Authentication to Brute-force Attack. arXiv preprint arXiv:2305.10791.
6th Sep 2023 Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit Domain Knowledge USENIX Sec Bars, N., Schloegel, M., Scharnowski, T., Schiller, N. and Holz, T., 2023. Fuzztruction: using fault injection-based fuzzing to leverage implicit domain knowledge. In 32nd USENIX Security Symposium (USENIX Security 23) (pp. 1847-1864).

Easter Term 2023

Date Paper Full Citation
28th Jun 2023 Pool-Party: Exploiting Browser Resource Pools as Side-Channels for Web Tracking USENIX Sec Snyder, P., Karami, S., Edelstein, A., Livshits, B. and Haddadi, H., 2023. Pool-Party: Exploiting browser resource pools for web tracking. In 32nd USENIX Security Symposium (USENIX Security 23) (pp. 7091-7105).
21st Jun 2023 CalvinFS: Consistent WAN Replication and Scalable Metadata Management for Distributed File Systems Thomson, A. and Abadi, D.J., 2015. CalvinFS: Consistent WAN Replication and Scalable Metadata Management for Distributed File Systems. In 13th USENIX Conference on File and Storage Technologies (FAST 15) (pp. 1-14).
14th Jun 2023 Not Yet Another Digital ID: Privacy-Preserving Humanitarian Aid Distribution IEEE S&P Wang, B., Lueks, W., Sukaitis, J., Narbel, V.G. and Troncoso, C., 2023, May. Not yet another digital ID: privacy-preserving humanitarian aid distribution. In 2023 IEEE Symposium on Security and Privacy (S&P) (pp. 645-663). IEEE.
7th Jun 2023 Deep perceptual hashing algorithms with hidden dual purpose: when client-side scanning does facial recognition IEEE S&P Jain, S., CreĆŁu, A.M., Cully, A. and de Montjoye, Y.A., 2023, May. Deep perceptual hashing algorithms with hidden dual purpose: when client-side scanning does facial recognition. In 2023 IEEE Symposium on Security and Privacy (S&P) (pp. 234-252). IEEE.
31st May 2023 Eavesdropping risks of the DisplayPort video interface Erdeljan, D., 2023. Eavesdropping risks of the displayport video interface. Doctoral dissertation, University of Cambridge (United Kingdom).
24th May 2023 Dissecting BFT Consensus: In Trusted Components we Trust! Gupta, S., Rahnama, S., Pandey, S., Crooks, N. and Sadoghi, M., 2023, May. Dissecting bft consensus: In trusted components we trust!. In Proceedings of the Eighteenth European Conference on Computer Systems (pp. 521-539).
17th May 2023 Robust, privacy-preserving, transparent, and auditable on-device blocklisting arxiv Thomas, K., Meiklejohn, S., Specter, M.A., Wang, X., LlorĂ , X., Somogyi, S. and Kleidermacher, D., 2023. Robust, privacy-preserving, transparent, and auditable on-device blocklisting. arXiv preprint arXiv:2304.02810.
10th May 2023 ModZoo: A Large-Scale Study of Modded Android Apps and their Markets arxiv Saavedra, L.A., Dutta, H.S., Beresford, A.R. and Hutchings, A., 2024. ModZoo: A Large-Scale Study of Modded Android Apps and their Markets. arXiv preprint arXiv:2402.19180.
3rd May 2023 Space Odyssey: An Experimental Software Security Analysis of Satellites IEEE S&P Willbold, J., Schloegel, M., Vögele, M., Gerhardt, M., Holz, T. and Abbasi, A., 2023, May. Space odyssey: An experimental software security analysis of satellites. In 2023 IEEE Symposium on Security and Privacy (S&P) (pp. 1-19). IEEE.

Lent Term 2023

Date Paper Full Citation
15th Mar 2023 Many Roads Lead to Rome: How Packet Headers Influence DNS Censorship Measurement USENIX Sec Bhaskar, A. and Pearce, P., 2022. Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement. In 31st USENIX Security Symposium (USENIX Security 22) (pp. 449-464).
8th Mar 2023 Is Cryptographic Deniability Sufficient? Non-Expert Perceptions of Deniability in Secure Messaging IEEE S&P Reitinger, N., Malkin, N., Akgul, O., Mazurek, M.L. and Miers, I., 2023, May. Is Cryptographic Deniability Sufficientƒ Non-Expert Perceptions of Deniability in Secure Messaging. In 2023 IEEE Symposium on Security and Privacy (S&P) (pp. 274-292). IEEE.
1st Mar 2023 Lessons learned from Threema USENIX Sec Paterson, K.G., Scarlata, M. and Truong, K.T., 2023. Three lessons from threema: Analysis of a secure messenger. In 32nd USENIX Security Symposium (USENIX Security 23) (pp. 1289-1306).
24th Feb 2023 Laser-Induced Fault Injection on Smartphone Bypassing the Secure Boot Vasselle, A., Thiebeauld, H., Maouhoub, Q., Morisset, A. and Ermeneux, S., 2018. Laser-induced fault injection on smartphone bypassing the secure boot-extended version. IEEE Transactions on Computers, 69(10), pp.1449-1459.
17th Feb 2023 Heads in the clouds: measuring the implications of universities migrating to public clouds Fiebig, T., GĂŒrses, S., Gañån, C.H., Kotkamp, E., Kuipers, F., Lindorfer, M., Prisse, M. and Sari, T., 2023. Heads in the Clouds? Measuring Universities' Migration to Public Clouds: Implications for Privacy & Academic Freedom. In Proceedings on privacy enhancing technologies symposium (Vol. 2023, No. 2, pp. 117-150).
8th Feb 2023 Lessons Learned: Surveying the Practicality of Differential Privacy in the Industry arxiv Garrido, G.M., Liu, X., Matthes, F. and Song, D., 2022. Lessons learned: Surveying the practicality of differential privacy in the industry. arXiv preprint arXiv:2211.03898.
1st Feb 2023 Skipped or non-public
25th Jan 2023 Blind My - An Improved Cryptographic Protocol to Prevent Stalking in Apple's Find My Network PETS Mayberry, T., Blass, E.O. and Fenske, E., 2023. Blind My-An Improved Cryptographic Protocol to Prevent Stalking in Apple's Find My Network. Proceedings on Privacy Enhancing Technologies.
18th Jan 2023 AirGuard - Protecting Android Users from Stalking Attacks by Apple Find My Devices Heinrich, A., Bittner, N. and Hollick, M., 2022, May. AirGuard-protecting android users from stalking attacks by apple find my devices. In Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (pp. 26-38).

Michaelmas Term 2022

Date Paper Full Citation
7th Dec 2022 No Privacy in the Electronics Repair Industry IEEE S&P Ceci, J., Stegman, J. and Khan, H., 2023, May. No privacy in the electronics repair industry. In 2023 IEEE Symposium on Security and Privacy (S&P) (pp. 3347-3364). IEEE.
30th Nov 2022 Skipped or non-public
23rd Nov 2022 I know what you did on Venmo: Discovering privacy leaks in mobile social payments PETS Tandon, R., Charnsethikul, P., Arora, I., Murthy, D. and Mirkovic, J., 2022. I know what you did on Venmo: Discovering privacy leaks in mobile social payments. Proceedings on Privacy Enhancing Technologies.
16th Nov 2022 Forward-secure 0-RTT goes live: implementation and performance analysis in QUIC Dallmeier, F., Drees, J.P., Gellert, K., Handirk, T., Jager, T., Klauke, J., Nachtigall, S., Renzelmann, T. and Wolf, R., 2020. Forward-secure 0-RTT goes live: implementation and performance analysis in QUIC. In Cryptology and Network Security: 19th International Conference, CANS 2020, Vienna, Austria, December 14–16, 2020, Proceedings 19 (pp. 211-231). Springer International Publishing.
9th Nov 2022 SoK: Managing risks of linkage attacks on data privacy PETS Powar, J. and Beresford, A.R., 2023. SoK: Managing risks of linkage attacks on data privacy. Proceedings on Privacy Enhancing Technologies.
2nd Nov 2022 SoK: Cryptographic Confidentiality of Data on Mobile Devices PETS Zinkus, M., Jois, T.M. and Green, M., 2022. SoK: Cryptographic Confidentiality of Data on Mobile Devices. Proceedings on Privacy Enhancing Technologies, 1, pp.586-607.
26th Oct 2022 Uninvited Guests: Analyzing the Identity and Behavior of Certificate Transparency Bots USENIX Sec Kondracki, B., So, J. and Nikiforakis, N., 2022. Uninvited guests: Analyzing the identity and behavior of certificate transparency bots. In 31st USENIX Security Symposium (USENIX Security 22) (pp. 53-70).
19th Oct 2022 EL PASSO: Efficient and Lightweight Privacy-preserving Single Sign On PETS Zhang, Z., KrĂłl, M., Sonnino, A., Zhang, L. and RiviĂšre, E., 2021. EL PASSO: Efficient and lightweight privacy-preserving single sign on. Proceedings on Privacy Enhancing Technologies.
12th Oct 2022 Practically-exploitable Cryptographic Vulnerabilities in Matrix IEEE S&P Albrecht, M.R., Celi, S., Dowling, B. and Jones, D., 2023, May. Practically-exploitable cryptographic vulnerabilities in matrix. In 2023 IEEE Symposium on Security and Privacy (S&P) (pp. 164-181). IEEE.
5th Oct 2022 ATOM: Ad-network Tomography PETS Musa, M.B. and Nithyanand, R., 2022. Atom: ad-network tomography. Proceedings on Privacy Enhancing Technologies.

Easter Term 2022

Date Paper Full Citation
29th Jun 2022 On Enforcing the Digital Immunity of a Large Humanitarian Organization IEEE S&P Le Blond, S., Cuevas, A., Troncoso-Pastoriza, J.R., Jovanovic, P., Ford, B. and Hubaux, J.P., 2018, May. On enforcing the digital immunity of a large humanitarian organization. In 2018 IEEE Symposium on Security and Privacy (S&P) (pp. 424-440). IEEE.
22nd Jun 2022 Mixnet optimization methods PETS Guirat, I.B. and Diaz, C., 2022. Mixnet optimization methods. Proceedings on Privacy Enhancing Technologies.
15th Jun 2022 Dos and Don'ts of Machine Learning in Computer Security USENIX Sec Arp, D., Quiring, E., Pendlebury, F., Warnecke, A., Pierazzi, F., Wressnegger, C., Cavallaro, L. and Rieck, K., 2022. Dos and don'ts of machine learning in computer security. In 31st USENIX Security Symposium (USENIX Security 22) (pp. 3971-3988).
8th Jun 2022 GhostTouch: Targeted Attacks on Touchscreens without Physical Touch USENIX Sec Wang, K., Mitev, R., Yan, C., Ji, X., Sadeghi, A.R. and Xu, W., 2022. GhostTouch: Targeted attacks on touchscreens without physical touch. In 31st USENIX Security Symposium (USENIX Security 22) (pp. 1543-1559).
1st Jun 2022 Your Echos are Heard: Tracking, Profiling, and Ad Targeting in the Amazon Smart Speaker Ecosystem arxiv Iqbal, U., Bahrami, P.N., Trimananda, R., Cui, H., Gamero-Garrido, A., Dubois, D., Choffnes, D., Markopoulou, A., Roesner, F. and Shafiq, Z., 2022. Your echos are heard: Tracking, profiling, and ad targeting in the Amazon smart speaker ecosystem. arXiv preprint arXiv:2204.10920, pp.984-997.
25th May 2022 Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhones Classen, J., Heinrich, A., Reith, R. and Hollick, M., 2022, May. Evil never sleeps: When wireless malware stays on after turning off iPhones. In Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (pp. 146-156).
18th May 2022 Blocked or Broken? Automatically Detecting When Privacy Interventions Break Web Sites arxiv Smith, M., Snyder, P., Haller, M., Livshits, B., Stefan, D. and Haddadi, H., 2022. Blocked or broken? Automatically detecting when privacy interventions break websites. arXiv preprint arXiv:2203.03528.
11th May 2022 SoK: SCT Auditing in Certificate Transparency arxiv Meiklejohn, S., DeBlasio, J., O'Brien, D., Thompson, C., Yeo, K. and Stark, E., 2022. SoK: SCT auditing in certificate transparency. arXiv preprint arXiv:2203.01661.
4th May 2022 Breaking Bridgefy, again: Adopting libsignal is not enough USENIX Sec Albrecht, M.R., Eikenberg, R. and Paterson, K.G., 2022. Breaking Bridgefy, again: Adopting libsignal is not enough. In 31st USENIX Security Symposium (USENIX Security 22) (pp. 269-286).
27th Apr 2022 A Large-scale Temporal Measurement of Android Malicious Apps: Persistence, Migration, and Lessons Learned USENIX Sec Shen, Y., Vervier, P.A. and Stringhini, G., 2022. A large-scale temporal measurement of android malicious apps: Persistence, migration, and lessons learned. In 31st USENIX Security Symposium (USENIX Security 22) (pp. 1167-1184).

Lent Term 2022

Date Paper Full Citation
23rd Mar 2022 Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design USENIX Sec Shakevsky, A., Ronen, E. and Wool, A., 2022. Trust dies in darkness: Shedding light on Samsung's TrustZone keymaster design. In 31st USENIX Security Symposium (USENIX Security 22) (pp. 251-268).
16th Mar 2022 Orca: Blocklisting in Sender-Anonymous Messaging USENIX Sec Tyagi, N., Len, J., Miers, I. and Ristenpart, T., 2022. Orca: Blocklisting in Sender-Anonymous messaging. In 31st USENIX Security Symposium (USENIX Security 22) (pp. 2299-2316).
9th Mar 2022 Trouble Over-The-Air: An Analysis of FOTA Apps in the Android Ecosystem IEEE S&P Blåzquez, E., Pastrana, S., Feal, Á., Gamba, J., Kotzias, P., Vallina-Rodriguez, N. and Tapiador, J., 2021, May. Trouble over-the-air: An analysis of FOTA apps in the android ecosystem. In 2021 IEEE Symposium on Security and Privacy (S&P) (pp. 1606-1622). IEEE.
2nd Mar 2022 Skipped or non-public
23rd Feb 2022 Breaking LTE on Layer Two IEEE S&P Rupprecht, D., Kohls, K., Holz, T. and Pöpper, C., 2019, May. Breaking LTE on layer two. In 2019 IEEE Symposium on Security and Privacy (S&P) (pp. 1121-1136). IEEE.
16th Feb 2022 Skipped or non-public
9th Feb 2022 Tubes among us: Analog attack on automatic speaker identification USENIX Sec Ahmed, S., Wani, Y., Shamsabadi, A.S., Yaghini, M., Shumailov, I., Papernot, N. and Fawaz, K., 2023. Tubes among us: Analog attack on automatic speaker identification. In 32nd USENIX Security Symposium (USENIX Security 23) (pp. 265-282).
2nd Feb 2022 VerLoc: Verifiable Localization in Decentralized Systems USENIX Sec Kohls, K. and Diaz, C., 2022. VerLoc: verifiable localization in decentralized systems. In 31st USENIX Security Symposium (USENIX Security 22) (pp. 2637-2654).
26th Jan 2022 Backchannel: A relationship-based digital identity system Online article.
19th Jan 2022 Alpenhorn: Bootstrapping Secure Communication Without Leaking Metadata Lazar, D. and Zeldovich, N., 2016. Alpenhorn: Bootstrapping secure communication without leaking metadata. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16) (pp. 571-586).

Michaelmas Term 2021

Date Paper Full Citation
8th Dec 2021 LAPD: Hidden Spy Camera Detection using Smartphone Time-of-Flight Sensors Sami, S., Tan, S.R.X., Sun, B. and Han, J., 2021, November. LAPD: Hidden spy camera detection using smartphone time-of-flight sensors. In Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems (pp. 288-301).
1st Dec 2021 Trojan source: Invisible vulnerabilities USENIX Sec Boucher, N. and Anderson, R., 2023. Trojan source: Invisible vulnerabilities. In 32nd USENIX security symposium (USENIX Security 23) (pp. 6507-6524).
24th Nov 2021 REDQUEEN: Fuzzing with Input-to-State Correspondence NDSS Aschermann, C., Schumilo, S., Blazytko, T., Gawlik, R. and Holz, T., 2019, February. REDQUEEN: Fuzzing with Input-to-State Correspondence. In NDSS (Vol. 19, pp. 1-15).
17th Nov 2021 Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong USENIX Sec Albrecht, M.R., Blasco, J., Jensen, R.B. and MarekovĂĄ, L., 2021. Collective information security in large-scale urban protests: the case of Hong Kong. In 30th USENIX Security Symposium (USENIX Security 21) (pp. 3363-3380).
10th Nov 2021 Bugs in our Pockets: The Risks of Client-Side Scanning Abelson, H., Anderson, R., Bellovin, S.M., Benaloh, J., Blaze, M., Callas, J., Diffie, W., Landau, S., Neumann, P.G., Rivest, R.L. and Schiller, J.I., 2024. Bugs in our pockets: the risks of client-side scanning. Journal of Cybersecurity, 10(1)
3rd Nov 2021 PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop USENIX Sec Heinrich A., Hollick M., Schneider T., Stute M., Weinert C., 2021 PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop. In 30th USENIX Security Symposium (USENIX Security 21) (pp. 3577-3594).
27th Oct 2021 Towards More Robust Keyword Spotting for Voice Assistants USENIX Sec Ahmed, S., Shumailov, I., Papernot, N. and Fawaz, K., 2022. Towards more robust keyword spotting for voice assistants. In 31st USENIX Security Symposium (USENIX Security 22) (pp. 2655-2672).
20th Oct 2021 Towards Private On-Chain Algorithmic Trading arxiv Kocaoğullar, C., Gervais, A. and Livshits, B., 2021. Towards private on-chain algorithmic trading. arXiv preprint arXiv:2109.11270.
13th Oct 2021 Encrypted Cloud Photo Storage Using Google Photos Koh, J.S., Nieh, J. and Bellovin, S.M., 2021, June. Encrypted cloud photo storage using Google Photos. In Proceedings of the 19th Annual International Conference on Mobile Systems, Applications, and Services (pp. 136-149).
6th Oct 2021 Weaponizing Middleboxes for TCP Reflected Amplification USENIX Sec Bock, K., Alaraj, A., Fax, Y., Hurley, K., Wustrow, E. and Levin, D., 2021. Weaponizing middleboxes for TCP reflected amplification. In 30th USENIX Security Symposium (USENIX Security 21) (pp. 3345-3361).

Organisers & Further Information

The reading group organiser collect paper suggestions, manages the mailing list, and selects an interesting paper for each week. Until Easter 2021, the reading group was organised by Stan Jiexin Zhang. His reading group archive covers the terms Michaelmas 2017 until Easter 2020. We plan to eventually include that list here as well. Between Michaelmas 2021 and Easter 2025, the reading group was organised by Daniel Hugenroth. He also created this website. From Michaelmas 2025, the reading group will be organised by Alexandre Pauwels.

This page is maintained as a GitHub repository. If you find mistakes or links are broken, please raise a pull request with us. We try to update the link and citation to the published version of the paper whenever possible.

Last updated: 2025-07-01 15:33:51. Total papers: 118. This page respects the browser dark mode preference.