ABCDEFGHIJKLMNOPQRSTUVWXYZAA
1
Note: This is merely a way to crowdsource a to-read list. A work's inclusion in this list is not an endorsement of the work or its authors, nor a guarantee of accuracy (or even that I've actually read it!), nor is it meant to snub you personally if your paper isn't listed (or if it does list a paper by someone you dislike). Take what you like and leave the rest. Suggest additions: riana at stanford dot edu or @riana@someone.elses.computer.
2
TitleAuthor(s)DateLinkNotes
3
How To Think About End-To-End Encryption and AI: Training, Processing, Disclosure, and Consent
Knodel, M., Fabrega, A., Ferrari, D., Leiken, J., Li Hou, B., Yen, D., de Alfaro, S., Cho, K., Park, S.
2024
https://eprint.iacr.org/2024/2086
4
Beyond App Markets: Demystifying Underground Mobile App Distribution Via Telegram
Guo, Y., Wang, D., Wang, L., Fang, Y., Wang, C., Yang, M., Liu, T., Wang, H.
2024
https://arxiv.org/abs/2408.03482
5
Group Moderation Under End-to-End EncryptionScheffler, S., Mayer, J.2024
https://dl.acm.org/doi/10.1145/3614407.3643704
6
Enhanced Online Grooming Detection Employing Context Determination and Message-Level Analysis
Street, J., Ihianle, I., Olajide, F., & Lotfi, A.2024
https://arxiv.org/abs/2409.07958
7
ARSecure: A Novel End-to-End Encryption Messaging System Using Augmented Reality
Alsop, H., Alsop, D., Solomon, J., Aumento, L., Butters, M., Millar, C., Yigit, Y., Maglaras, L., & Moradpoor, N.
2024
https://arxiv.org/abs/2409.04457
8
Deciphering Viral Trends in WhatsApp: A Case Study From a Village in Rural India
Garimella, K., Nayak, B., Chauchard, S., & Vashistha, A.2024
https://arxiv.org/abs/2407.08172
9
Conversational Agents to Facilitate Deliberation on Harmful Content in WhatsApp Groups
Agarwal, D., Shahid, F., & Vashistha, A.2024
https://arxiv.org/abs/2405.20254
10
Private Hierarchical Governance for Encrypted Messaging
Namavari, A., Wang, B., Menda, S., Nassi, B., Tyagi, N., Grimmelmann, J., Zhang, A., & Ristenpart, T.
2024
https://www.computer.org/csdl/proceedings-article/sp/2024/313000a255/1WPcZc6gTLy
11
Mental Models, Expectations and Implications of Client-Side Scanning: An Interview Study with Experts
Bhardwaj, D., Guthoff, C., Dabrowski, A., Fahl, S., & Krombholz, K.
2024
https://dl.acm.org/doi/10.1145/3613904.3642310
12
One Style Does Not Regulate All': Moderation Practices in Public and Private WhatsApp Groups
Shahid, F., Agarwal, D. & Vashistha, A.2024
https://arxiv.org/abs/2401.08091
13
Content Moderation on End-to-End Encrypted Systems: A Legal AnalysisDuan, C., & Grimmelmann, J.2024
https://georgetownlawtechreview.org/content-moderation-on-end-to-end-encrypted-systems-a-legal-analysis/GLTR-01-2024/
14
Committee Moderation on Encrypted Messaging PlatformsPattison, A., & Hopper, N.2023
https://arxiv.org/abs/2306.01241
15
"Is Reporting Worth the Sacrifice of Revealing What I Have Sent?": Privacy Considerations When Reporting on End-to-End Encrypted Platforms
Wang, L., Wang, R., Williams-Ceci, S., Menda, S., & Zhang, A.X.
2023
https://arxiv.org/abs/2306.10478
16
Protecting Point-to-Point Messaging Apps: Understanding Telegram, WeChat, and WhatsApp in the United States
Puyosa, I.2023
https://www.atlanticcouncil.org/in-depth-research-reports/report/point-to-point-messaging-apps/
17
What is Secure? An Analysis of Popular Messaging Apps
Hendrix, J., Quintin, C., Sinders, C., Wagner, L.W., Bernard, T., & Mehta, A.
2023
https://www.techpolicy.press/what-is-secure-an-analysis-of-popular-messaging-apps/
18
One Protocol to Rule Them All? On Securing Interoperable MessagingBlessing, J., & Anderson, R.2023
https://arxiv.org/abs/2303.14178
19
Interoperability in End-to-End Encrypted MessagingLen, J., Ghosh, E., Grubbs, P., & Rösler, P.2023
https://eprint.iacr.org/2023/386.pdf
20
Asymmetric Group Message Franking: Definitions & Constructions
Lai, J., Zeng, G., Huang, Z., Yiu, S.M., Mu, X., & Weng, J.
2023
https://eprint.iacr.org/2023/332
21
Robust, privacy-preserving, transparent, and auditable on-device blocklisting
Thomas, J., Meiklejohn, S., Specter, M., Wang, X., Llorà, X., Somogyi, S., & Kleidermacher, D.
2023
https://arxiv.org/abs/2304.02810
22
Parakeet: Practical Key Transparency for End-to-End Encrypted Messaging
Malvai, H., Kokoris-Kogias, L., Sonnino, A., Ghoshk, E., Oztürk, E., Lewi, K., & Lawlor, S.
2023
https://eprint.iacr.org/2023/081.pdf
23
SoK: Content Moderation for End-to-End EncryptionScheffler, S., & Mayer, J.2023
https://petsymposium.org/popets/2023/popets-2023-0060.pdf
This is a starting point for research, because it surveys ~400 sources (through Aug 2022)!
24
Public Verification for Private Hash MatchingScheffler, S., Kulshrestha, A., & Mayer, J.2023
https://eprint.iacr.org/2023/029
Cited in the Scheffler & Mayer SoK
25
Outside Looking In: Approaches to Content Moderation in End-to-End Encrypted Systems
Kamara, S., Knodel, M., Llansó, E., Nojeim, G., Qin, J., Thakur, D., & Vogus, C.
2022
https://arxiv.org/abs/2202.04617
Cited in the Scheffler & Mayer SoK
26
End-to-End Secure Messaging with Traceability Only for Illegal ContentBartusek, J., Garg, S., Jain, A., & Policharla, G.-V.2022
https://eprint.iacr.org/2022/1643
Cited in the Scheffler & Mayer SoK
27
Anonymous Traceback for End-to-End EncryptionKenney, E., Tang, Q., & Wu, C.2022
https://researchwith.njit.edu/en/publications/anonymous-traceback-for-end-to-end-encryption
Not cited in the Scheffler & Mayer SoK
28
Orca: Blocklisting in Sender-Anonymous MessagingTyagi, N., Len, J., Miers, I., & Ristenpart, T.2022
https://www.usenix.org/conference/usenixsecurity22/presentation/tyagi
Not cited in the Scheffler & Mayer SoK
29
Cryptography, Trust and Privacy: It's ComplicatedBalsa, E., Nissenbaum, H., & Park, S.2022
https://dl.acm.org/doi/abs/10.1145/3511265.3550443
Not cited in the Scheffler & Mayer SoK
30
Child sexual abuse material and end-to-end encryption on social media platforms: An overview
Teunissen, C., & Napier, S.2022
https://www.aic.gov.au/publications/tandi/tandi653
Not cited in the Scheffler & Mayer SoK
31
Content-Oblivious Trust and Safety Techniques: Results from a Survey of Online Service Providers
Pfefferkorn, R.2022
https://tsjournal.org/index.php/jots/article/view/14
Not cited in the Scheffler & Mayer SoK
32
Protecting Children in the Age of End-to-End EncryptionDraper, L.2022
https://www.wcl.american.edu/impact/initiatives-programs/techlaw/projects/Protecting-Children-in-the-Age-of-End-to-End-Encryption/
Not cited in the Scheffler & Mayer SoK
33
Our Vision for a Responsible Tech FutureOmidyar Network2022
https://omidyar.com/our-vision-for-a-responsible-tech-future/
Not cited in the Scheffler & Mayer SoK
34
Thoughts on Child Safety on Commodity PlatformsLevy, I., & Robinson, C.2022
https://arxiv.org/abs/2207.09506
Cited in the Scheffler & Mayer SoK
35
Hecate: Abuse Reporting in Secure Messengers with Sealed SenderIssa, R., Alhaddad, N., & Varia, M.2022
https://www.usenix.org/system/files/sec22-issa.pdf
Cited in the Scheffler & Mayer SoK
36
Meta’s Approach to Safer Private Messaging on Messenger and Instagram Direct Messaging
Meta2022
https://messengernews.fb.com/wp-content/uploads/2021/12/Metas-approach-to-safer-private-messaging-on-MSGR-and-IG-DMs-4.pdf
Not cited in the Scheffler & Mayer SoK
37
Human Rights Impact Assessment: Meta's Expansion of End-to-End EncryptionBSR2022
https://www.bsr.org/reports/bsr-meta-human-rights-impact-assessment-e2ee-report.pdf
Not cited in the Scheffler & Mayer SoK
38
Fighting Fake News in Encrypted Messaging with the Fuzzy Anonymous Complaint Tally System (FACTS)
Liu, L., Roche, D., Theriault, A., & Yerukhimovich, A.2021
https://arxiv.org/pdf/2109.04559.pdf
Cited in the Scheffler & Mayer SoK
39
Bugs in our Pockets: The Risks of Client-Side Scanning
Abelson, H., Anderson, R., Bellovin, S., Benaloh, J., Blaze, M., Callas, J., Diffie, W., Landau, S., Neumann, P., Rivest, R., Schiller, J., Schneier, B., Teague, V., & Troncoso, C.
2021
https://arxiv.org/abs/2110.07450v1
Cited in the Scheffler & Mayer SoK
40
Abuse Resistant Law Enforcement Access SystemsGreen, M., Kaptchuk, G., & Van Laer, G.2021
https://eprint.iacr.org/2021/321
Not cited in the Scheffler & Mayer SoK
41
The Apple PSI System
Bhowmick, A., Boneh, D., Myers, S., Talwar, K., & Tarbe, K.
2021
https://www.apple.com/child-safety/pdf/Apple_PSI_System_Security_Protocol_and_Analysis.pdf
Cited in the Scheffler & Mayer SoK
42
Apple’s CSAM detection technologyForsyth, D.2021
https://www.apple.com/child-safety/pdf/Technical_Assessment_of_CSAM_Detection_David_Forsyth.pdf
Not cited in the Scheffler & Mayer SoK
43
A Review of the Cryptography Behind the Apple PSI SystemPinkas, B.2021
https://www.apple.com/child-safety/pdf/Technical_Assessment_of_CSAM_Detection_Benny_Pinkas.pdf
Not cited in the Scheffler & Mayer SoK
44
Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption
Tyagi, N., Grubbs, P., Len, J., Miers, I., & Ristenpart, T.2019
https://www.cs.umd.edu/~imiers/pdf/frank.pdf
Cited in the Scheffler & Mayer SoK
45
Traceback for End-to-End Encrypted MessagingTyagi, N., Miers, I., & Ristenpart, T.2019
https://eprint.iacr.org/2019/981.pdf
Cited in the Scheffler & Mayer SoK
46
Fast Message Franking: From Invisible Salamanders to EncryptmentDodis, Y., Grubbs, P., Ristenpart, T., & Woodage, J.2019
https://eprint.iacr.org/2019/016
Cited in the Scheffler & Mayer SoK
47
Callisto: A Cryptographic Approach to Detecting Serial Perpetrators of Sexual Misconduct
Rajan, A., Qin, L., Archer, D., Boneh, D., Lepoint, T., & Varia, M.
2018
https://www.semanticscholar.org/paper/Callisto%3A-A-Cryptographic-Approach-to-Detecting-of-Rajan-Qin/71a02285f1eb302b195879993264fa96b43ee7d2
Not cited in the Scheffler & Mayer SoK
48
SEEMless: Secure End-to-End Encrypted Messaging with less trustChase, M., Deshpande, A., Ghosh, E., & Malvai, H.2018
https://eprint.iacr.org/2018/607
Not cited in the Scheffler & Mayer SoK
49
Messenger Secret Conversations: Technical Whitepaper (v.2.0)Meta2017
https://about.fb.com/wp-content/uploads/2016/07/messenger-secret-conversations-technical-whitepaper.pdf
Not cited in the Scheffler & Mayer SoK
50
Message Franking via Committing Authenticated EncryptionGrubbs, P., Lu, J., & Ristenpart, T.2017
https://eprint.iacr.org/2017/664
Not cited in the Scheffler & Mayer SoK
51
Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications
Abelson, H., Anderson, R., Bellovin, S., Benaloh, J., Blaze, M., Diffie, W., Gilmore, J., Green, M., Landau, S., Neumann, P., Rivest, R., Schiller, J., Schneier, B., Specter, M, & Weitzner, D.
2015
https://dspace.mit.edu/bitstream/handle/1721.1/97690/MIT-CSAIL-TR-2015-026.pdf
Cited in the Scheffler & Mayer SoK
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100