Censorship & Privacy Tech |
Professor: | Roya Ensafi |
Office hours: Tue/Thu 6:30–7:00 PM, 4745 Beyster, or by appointment | |
Credits: | 4. This course counts towards meeting system quals requirements. |
Prerequisites: | This course is open to advanced undergraduate students with EECS 388, EECS 489 Networking (recommended), or grad standing. |
Lectures: | Tue/Thu 4:30–6:30, 3150 DOW |
Communication: | ensafi@umich.edu or use our class Piazza for the class-related discussion |
Network technologies have revolutionized the way people interact with each other, with corporations, and with government. Yet a range of network interference techniques, including censorship, surveillance, online tracking, content manipulation, throttling, and net neutrality violations, pose increasing threats to users’ security and privacy.
In this course, we’ll study the latest research in detecting and resisting these threats, including systems for censorship detection and circumvention, web tracking and traffic analysis countermeasures, anonymous communication systems such as Tor, and other privacy enhancing technologies (PETs). Student groups will be expected to complete original research projects on topics in this area.
This course will include reading 3-4 papers per week, with written reviews and in-class discussion on the topics. You must complete a final group project related to Internet censorship and Privacy enhancing technologies. We’ll aim for submitting our final projects to technical conferences and workshops. There will be no exams. Instead, your grade will be based on the following:
Class Participation (15%) — In each class, we read and discuss 1-2 research papers. You should read the assigned papers before coming to each class and be fully prepared to talk about them.
Paper Reviews (20%) — You are required to write a 400 word review for each assigned paper. A good review often consists of four parts: a concise description of the problem the paper tries to solve, summary of key contributions, evaluation of the paper’s strengths and weaknesses, and discussion on open questions. Your review should project that you carefully read the paper and have thought about the research problem and the solution space. Please send these to ensafi@umich.edu with the subject "598 reading", and include your review as inline text in the email.
Paper reviews are due by 1 pm on the day of each class through HotCRP.
In-class Presentation (15%) — Working with a partner, pick a new or controversial topic related to censorship and privacy enhancing technologies (PETs). Read blogs, news, and research papers, and prepare a 20 minute presentation to present to the class. Send an email to ensafi@umich.edu with your top 2 choices and who your partner will be before the class on Tuesday, Oct. 1st.
Research Project (50%) — You need to complete an original research project in a small groups of 3 or 4 on topics related to the course. This project should address important, interesting open problems related to censorship and privacy enhancing technologies (PETs). While I am happy to discuss and recommend projects, it is ultimately your task to choose the topic. Final project consists of four parts:
Please review ITS’s policies on responsible use of technology resources and CAEN’s policy documents for guidelines concerning proper use of information technology at U-M, as well as the Engineering Honor Code. As members of the university, you are required to abide by these policies.