Published using Google Docs
6.885: Critical Perspectives on Security and Privacy Architecture - home
Updated automatically every 5 minutes

6.885 – Critical Perspectives on Security and Privacy Architectures

Faculty: Daniel Weitzner (CSAIL), Jerry Sussman (EECS), and Michael A. Specter (Google)

Spring 2022 - Room 24-112 – Th2:00-4:00pm

Prerequisites: 6.805 or 6.033 or permission of instructors

Enrollment limited to 15 students

2-0-10: one 2 hour meeting per week

Description: Explore technical approaches to addressing privacy and security requirements with the goal of critically assessing how these systems meet or fall short of social and public policy goals. Study foundational privacy and cybersecurity legal frameworks as well as relevant concepts in information economics to understand incentives driving technical design. Technical readings include leading papers in anonymity, public ledgers, privacy enhancing technologies, policy aware systems, cryptographic computing and differential privacy. Several invited speakers from industry, government and civil society organizations will offer guest lectures.

Learning Objectives

Grading

Week

Topic, Key Questions, Readings

1

Feb 3

Initial conditions of digital privacy and security policy - the technical view

Q: What are the foundational assumptions driving the design of security and privacy systems?

Readings:

Select paper topics (due COB Saturday Feb 5)

2

Feb 10

Initial conditions of digital privacy and security policy - the legal view

Q: What are the starting points for law and policymaking in the early (1990s) digital world?

  • BIll Clinton & Al Gore, Framework for Electronic Commerce (paper, NYT)

Papers: 1) Rodrigo Lopez Uricoechea (topic: what does it mean that ‘the private sector should lead’?)

3

Feb 17

Information Economics

Q. What are the economic drivers affecting privacy and security system design, and user behavior therein?

  • Classics in Economics & Asymmetric Information:
  • As it relates to security & privacy:


Papers: 1)
Kelsey Merrill (privacy and security)

4

Feb 24

Challenges for Cryptography in Practical Settings

Q. What do cryptosystems promise, and how do they fail in practice? Why do they succeed?

1) Messaging Security Guarantees (Kyle Hogan)

2) Usability (Maja Svanberg)

Papers: 1) Kyle Hogan, 2) Maja Svanberg

5

Mar 3

Encryption and Exceptional Access

Papers: Kevin Paeth (technical aspects), Kyle Hogan (policy aspects)

Special Guest Lecturer: James Baker, Deputy General Counsel Twitter, former General Counsel, Federal Bureau of Investigation

6

Mar 10

Decentralized Systems

Q. How do new decentralized system architectures propose to address privacy risks? How do these protocols compare to centralized systems?

Decentralized architectures for personal data:

Centralized architectures for personal data:

Optional:

Papers: 1) Sukhi Gulati (Q1), 2) Lily Tsai (Q2)

Question 1: what are the privacy properties of different decentralized social networking protocols?

Question 2: What are the privacy risks associated with centralized systems (Passport) and how do they compare to decentralized systems?

Special Guest Lecturer:  Prof. Ruben Verborgh, Ghent University

7

Mar 17

1) Public Ledgers: Cryptocurrencies and New Decentralized Systems (1st hour)

What are the social and legal relationships motivating the design of cryptocurrencies? Do the incentive structures set up in the original Nakamoto paper hold up to real-world use of the system?

     Optional:

2) Security & Privacy for Marginalized Groups (2nd hour)

How does gender and race show up in security systems? And how might we approach building security tools that take into account the realities of power and oppression?

Optional, but highly entertaining:

Charles Isbell, You Can’t Escape Hyperparameters and Latent Variables: Machine Learning as a Software Engineering Enterprise, Keynote at Neurips

Papers: 1) Stella Lau, 2) Rodrigo Lopez Uricoechea, 3) Monica Valcourt (crypto currency-web3)

Special Guest Lecturer:  Kendra Albert (Harvard)

Spring Break

8

Mar 31

(Challenges to) Security Research as a Public Good

Q1: What function, positive and/or negative, does regulation on security researchers have in vulnerability discovery? Is there a public good for security research? Here we will focus on E-Voting as a worked example:

  • Electronic Voting
  • Bernhard, Matthew, Josh Benaloh, J. Alex Halderman, Ronald L. Rivest, Peter Y. A. Ryan, Philip B. Stark, Vanessa Teague, Poorvi L. Vora, and Dan S. Wallach. “Public Evidence from Secret Ballots.”, August 4, 2017.
  • SKIM
  • SKIM
  • The Voatz Saga:
  • Read the Introduction, Part 5, and Appendix 9
  • Be sure to read the acknowledgements.

Optional:

How does the law help or hinder security research? What does this mean in light of the economics work we studied in week 3?

Q2: Are there better models for vulnerability discovery and disclosure?

  • Responsible disclosure debate:

Papers: 1) Savannah Tynan (Q2), 2) Parama Pal

9

April 7

(Mike Specter in the house)

Web privacy battleground – Advertising, profiling, tracking

Q1. What do we learn about how vulnerability disclosure works in the real world? What is the right model for vulnerability discovery and disclosure?

  • Responsible disclosure debate:

Special Guest Lecturers:

Pieter Zatko (‘Mudge’) & Sarah Zatko 2-3pm

Q2. What are the basic social and legal principles of privacy and how are they implemented in digital network environments?

Reading:

Papers: 1) Kevin Paeth, 2) Kelsey Merrill

Special Guest Lecturer:  Jules Polonetsky, CEO, Future of Privacy Forum 3-4pm

10

Apr 14

Policy aware systems - data governance approaches to privacy: Beyond PETs

Q1. How can we bridge the functional gap between legal requirements and technical system function?

[2-3pm] Special Guest Lecturer: Cillian Kieran, Founder and CEO of Ethyca Inc.

Q2. What are the policy requirements and technical approaches to data deletion, right to be forgotten and other data management mechanisms?

  • Kraska, Tim, Michael Stonebraker, Michael Brodie, Sacha Servan-Schreiber, and Daniel Weitzner. “SchengenDB: A Data Protection Database Proposal.” In Heterogeneous Data Management, Polystores, and Analytics for Healthcare, 24–38. Springer, 2019.
  • DELF: Safeguarding deletion correctness in online social networks (FB's way of implementing deletion)
  • Fides Open Source Privacy Language [introduction, repo]
  • Schwarzkopf, Malte, Eddie Kohler, M. Frans Kaashoek, and Robert Morris. “Position: GDPR Compliance by Construction.” In Heterogeneous Data Management, Polystores, and Analytics for Healthcare, 39–53. Springer, 2019.

Optional:

[3-4pm] Special Guest Lecturer: Mihir Patil, Engineering Lead, Privacy and Civil Liberties, Palantir

Papers: 1) Lily Tsai [Q2], 2) Sukhi Gulati [Q1]

11

Apr 21

HCI Perspectives on privacy and security

Q1. What can we learn from HCI studies of user interactions with privacy and security features of systems generally?

Q2. What do we learn from HCI research about how to regulate ‘dark patterns? Is the proposed EDPB guidance on dark patterns consistent with research findings? What should the EDPB consider changing?

Optional:

2-4pm: Special Guest Lecturer: Dr. Ilaria Liccardi, MIT IPRI

Papers: 1) Parama Pal [Q1], 2) Maja Svanberg [Q2]

12

April 28

GDPR Dark Patterns continued; differential privacy

Q1. What comments do we have for the European Data Project Board’s

 Guidelines 3/2022 on Dark patterns in social media platform interfaces: How to recognise and avoid them ? In particular, to what extent does the guidance effectively address the GDPR policy goals identified in section 2, are the specific dark patterns identified in the Annex (section 4) usefully described?

Q2. What is differential privacy and what is the nature of privacy guarantees it offers? How do the mathematical guarantees of differential privacy map to privacy law and policy?

More background on differential privacy [optional]

Q3. How did the US Census Bureau decide to implement differential privacy and what can we learn from that ongoing project?

Papers: Q1) Stella Lau, Q2) Savannah Tynan, Q3) Monica Valcourt

13

May 5

Final class - Presentations and Reflections

Order of presentations

*        *        *        *        *