A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | AA | |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | Note: This is merely a way to crowdsource a to-read list. A work's inclusion in this list is not an endorsement of the work or its authors, nor a guarantee of accuracy (or even that I've actually read it!), nor is it meant to snub you personally if your paper isn't listed (or if it does list a paper by someone you dislike). Take what you like and leave the rest. Suggest additions: riana at stanford dot edu or @riana@someone.elses.computer. | ||||||||||||||||||||||||||
2 | Title | Author(s) | Date | Link | Notes | ||||||||||||||||||||||
3 | How To Think About End-To-End Encryption and AI: Training, Processing, Disclosure, and Consent | Knodel, M., Fabrega, A., Ferrari, D., Leiken, J., Li Hou, B., Yen, D., de Alfaro, S., Cho, K., Park, S. | 2024 | https://eprint.iacr.org/2024/2086 | |||||||||||||||||||||||
4 | Beyond App Markets: Demystifying Underground Mobile App Distribution Via Telegram | Guo, Y., Wang, D., Wang, L., Fang, Y., Wang, C., Yang, M., Liu, T., Wang, H. | 2024 | https://arxiv.org/abs/2408.03482 | |||||||||||||||||||||||
5 | Group Moderation Under End-to-End Encryption | Scheffler, S., Mayer, J. | 2024 | https://dl.acm.org/doi/10.1145/3614407.3643704 | |||||||||||||||||||||||
6 | Enhanced Online Grooming Detection Employing Context Determination and Message-Level Analysis | Street, J., Ihianle, I., Olajide, F., & Lotfi, A. | 2024 | https://arxiv.org/abs/2409.07958 | |||||||||||||||||||||||
7 | ARSecure: A Novel End-to-End Encryption Messaging System Using Augmented Reality | Alsop, H., Alsop, D., Solomon, J., Aumento, L., Butters, M., Millar, C., Yigit, Y., Maglaras, L., & Moradpoor, N. | 2024 | https://arxiv.org/abs/2409.04457 | |||||||||||||||||||||||
8 | Deciphering Viral Trends in WhatsApp: A Case Study From a Village in Rural India | Garimella, K., Nayak, B., Chauchard, S., & Vashistha, A. | 2024 | https://arxiv.org/abs/2407.08172 | |||||||||||||||||||||||
9 | Conversational Agents to Facilitate Deliberation on Harmful Content in WhatsApp Groups | Agarwal, D., Shahid, F., & Vashistha, A. | 2024 | https://arxiv.org/abs/2405.20254 | |||||||||||||||||||||||
10 | Private Hierarchical Governance for Encrypted Messaging | Namavari, A., Wang, B., Menda, S., Nassi, B., Tyagi, N., Grimmelmann, J., Zhang, A., & Ristenpart, T. | 2024 | https://www.computer.org/csdl/proceedings-article/sp/2024/313000a255/1WPcZc6gTLy | |||||||||||||||||||||||
11 | Mental Models, Expectations and Implications of Client-Side Scanning: An Interview Study with Experts | Bhardwaj, D., Guthoff, C., Dabrowski, A., Fahl, S., & Krombholz, K. | 2024 | https://dl.acm.org/doi/10.1145/3613904.3642310 | |||||||||||||||||||||||
12 | One Style Does Not Regulate All': Moderation Practices in Public and Private WhatsApp Groups | Shahid, F., Agarwal, D. & Vashistha, A. | 2024 | https://arxiv.org/abs/2401.08091 | |||||||||||||||||||||||
13 | Content Moderation on End-to-End Encrypted Systems: A Legal Analysis | Duan, C., & Grimmelmann, J. | 2024 | https://georgetownlawtechreview.org/content-moderation-on-end-to-end-encrypted-systems-a-legal-analysis/GLTR-01-2024/ | |||||||||||||||||||||||
14 | Committee Moderation on Encrypted Messaging Platforms | Pattison, A., & Hopper, N. | 2023 | https://arxiv.org/abs/2306.01241 | |||||||||||||||||||||||
15 | "Is Reporting Worth the Sacrifice of Revealing What I Have Sent?": Privacy Considerations When Reporting on End-to-End Encrypted Platforms | Wang, L., Wang, R., Williams-Ceci, S., Menda, S., & Zhang, A.X. | 2023 | https://arxiv.org/abs/2306.10478 | |||||||||||||||||||||||
16 | Protecting Point-to-Point Messaging Apps: Understanding Telegram, WeChat, and WhatsApp in the United States | Puyosa, I. | 2023 | https://www.atlanticcouncil.org/in-depth-research-reports/report/point-to-point-messaging-apps/ | |||||||||||||||||||||||
17 | What is Secure? An Analysis of Popular Messaging Apps | Hendrix, J., Quintin, C., Sinders, C., Wagner, L.W., Bernard, T., & Mehta, A. | 2023 | https://www.techpolicy.press/what-is-secure-an-analysis-of-popular-messaging-apps/ | |||||||||||||||||||||||
18 | One Protocol to Rule Them All? On Securing Interoperable Messaging | Blessing, J., & Anderson, R. | 2023 | https://arxiv.org/abs/2303.14178 | |||||||||||||||||||||||
19 | Interoperability in End-to-End Encrypted Messaging | Len, J., Ghosh, E., Grubbs, P., & Rösler, P. | 2023 | https://eprint.iacr.org/2023/386.pdf | |||||||||||||||||||||||
20 | Asymmetric Group Message Franking: Definitions & Constructions | Lai, J., Zeng, G., Huang, Z., Yiu, S.M., Mu, X., & Weng, J. | 2023 | https://eprint.iacr.org/2023/332 | |||||||||||||||||||||||
21 | Robust, privacy-preserving, transparent, and auditable on-device blocklisting | Thomas, J., Meiklejohn, S., Specter, M., Wang, X., Llorà, X., Somogyi, S., & Kleidermacher, D. | 2023 | https://arxiv.org/abs/2304.02810 | |||||||||||||||||||||||
22 | Parakeet: Practical Key Transparency for End-to-End Encrypted Messaging | Malvai, H., Kokoris-Kogias, L., Sonnino, A., Ghoshk, E., Oztürk, E., Lewi, K., & Lawlor, S. | 2023 | https://eprint.iacr.org/2023/081.pdf | |||||||||||||||||||||||
23 | SoK: Content Moderation for End-to-End Encryption | Scheffler, S., & Mayer, J. | 2023 | https://petsymposium.org/popets/2023/popets-2023-0060.pdf | This is a starting point for research, because it surveys ~400 sources (through Aug 2022)! | ||||||||||||||||||||||
24 | Public Verification for Private Hash Matching | Scheffler, S., Kulshrestha, A., & Mayer, J. | 2023 | https://eprint.iacr.org/2023/029 | Cited in the Scheffler & Mayer SoK | ||||||||||||||||||||||
25 | Outside Looking In: Approaches to Content Moderation in End-to-End Encrypted Systems | Kamara, S., Knodel, M., Llansó, E., Nojeim, G., Qin, J., Thakur, D., & Vogus, C. | 2022 | https://arxiv.org/abs/2202.04617 | Cited in the Scheffler & Mayer SoK | ||||||||||||||||||||||
26 | End-to-End Secure Messaging with Traceability Only for Illegal Content | Bartusek, J., Garg, S., Jain, A., & Policharla, G.-V. | 2022 | https://eprint.iacr.org/2022/1643 | Cited in the Scheffler & Mayer SoK | ||||||||||||||||||||||
27 | Anonymous Traceback for End-to-End Encryption | Kenney, E., Tang, Q., & Wu, C. | 2022 | https://researchwith.njit.edu/en/publications/anonymous-traceback-for-end-to-end-encryption | Not cited in the Scheffler & Mayer SoK | ||||||||||||||||||||||
28 | Orca: Blocklisting in Sender-Anonymous Messaging | Tyagi, N., Len, J., Miers, I., & Ristenpart, T. | 2022 | https://www.usenix.org/conference/usenixsecurity22/presentation/tyagi | Not cited in the Scheffler & Mayer SoK | ||||||||||||||||||||||
29 | Cryptography, Trust and Privacy: It's Complicated | Balsa, E., Nissenbaum, H., & Park, S. | 2022 | https://dl.acm.org/doi/abs/10.1145/3511265.3550443 | Not cited in the Scheffler & Mayer SoK | ||||||||||||||||||||||
30 | Child sexual abuse material and end-to-end encryption on social media platforms: An overview | Teunissen, C., & Napier, S. | 2022 | https://www.aic.gov.au/publications/tandi/tandi653 | Not cited in the Scheffler & Mayer SoK | ||||||||||||||||||||||
31 | Content-Oblivious Trust and Safety Techniques: Results from a Survey of Online Service Providers | Pfefferkorn, R. | 2022 | https://tsjournal.org/index.php/jots/article/view/14 | Not cited in the Scheffler & Mayer SoK | ||||||||||||||||||||||
32 | Protecting Children in the Age of End-to-End Encryption | Draper, L. | 2022 | https://www.wcl.american.edu/impact/initiatives-programs/techlaw/projects/Protecting-Children-in-the-Age-of-End-to-End-Encryption/ | Not cited in the Scheffler & Mayer SoK | ||||||||||||||||||||||
33 | Our Vision for a Responsible Tech Future | Omidyar Network | 2022 | https://omidyar.com/our-vision-for-a-responsible-tech-future/ | Not cited in the Scheffler & Mayer SoK | ||||||||||||||||||||||
34 | Thoughts on Child Safety on Commodity Platforms | Levy, I., & Robinson, C. | 2022 | https://arxiv.org/abs/2207.09506 | Cited in the Scheffler & Mayer SoK | ||||||||||||||||||||||
35 | Hecate: Abuse Reporting in Secure Messengers with Sealed Sender | Issa, R., Alhaddad, N., & Varia, M. | 2022 | https://www.usenix.org/system/files/sec22-issa.pdf | Cited in the Scheffler & Mayer SoK | ||||||||||||||||||||||
36 | Meta’s Approach to Safer Private Messaging on Messenger and Instagram Direct Messaging | Meta | 2022 | https://messengernews.fb.com/wp-content/uploads/2021/12/Metas-approach-to-safer-private-messaging-on-MSGR-and-IG-DMs-4.pdf | Not cited in the Scheffler & Mayer SoK | ||||||||||||||||||||||
37 | Human Rights Impact Assessment: Meta's Expansion of End-to-End Encryption | BSR | 2022 | https://www.bsr.org/reports/bsr-meta-human-rights-impact-assessment-e2ee-report.pdf | Not cited in the Scheffler & Mayer SoK | ||||||||||||||||||||||
38 | Fighting Fake News in Encrypted Messaging with the Fuzzy Anonymous Complaint Tally System (FACTS) | Liu, L., Roche, D., Theriault, A., & Yerukhimovich, A. | 2021 | https://arxiv.org/pdf/2109.04559.pdf | Cited in the Scheffler & Mayer SoK | ||||||||||||||||||||||
39 | Bugs in our Pockets: The Risks of Client-Side Scanning | Abelson, H., Anderson, R., Bellovin, S., Benaloh, J., Blaze, M., Callas, J., Diffie, W., Landau, S., Neumann, P., Rivest, R., Schiller, J., Schneier, B., Teague, V., & Troncoso, C. | 2021 | https://arxiv.org/abs/2110.07450v1 | Cited in the Scheffler & Mayer SoK | ||||||||||||||||||||||
40 | Abuse Resistant Law Enforcement Access Systems | Green, M., Kaptchuk, G., & Van Laer, G. | 2021 | https://eprint.iacr.org/2021/321 | Not cited in the Scheffler & Mayer SoK | ||||||||||||||||||||||
41 | The Apple PSI System | Bhowmick, A., Boneh, D., Myers, S., Talwar, K., & Tarbe, K. | 2021 | https://www.apple.com/child-safety/pdf/Apple_PSI_System_Security_Protocol_and_Analysis.pdf | Cited in the Scheffler & Mayer SoK | ||||||||||||||||||||||
42 | Apple’s CSAM detection technology | Forsyth, D. | 2021 | https://www.apple.com/child-safety/pdf/Technical_Assessment_of_CSAM_Detection_David_Forsyth.pdf | Not cited in the Scheffler & Mayer SoK | ||||||||||||||||||||||
43 | A Review of the Cryptography Behind the Apple PSI System | Pinkas, B. | 2021 | https://www.apple.com/child-safety/pdf/Technical_Assessment_of_CSAM_Detection_Benny_Pinkas.pdf | Not cited in the Scheffler & Mayer SoK | ||||||||||||||||||||||
44 | Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption | Tyagi, N., Grubbs, P., Len, J., Miers, I., & Ristenpart, T. | 2019 | https://www.cs.umd.edu/~imiers/pdf/frank.pdf | Cited in the Scheffler & Mayer SoK | ||||||||||||||||||||||
45 | Traceback for End-to-End Encrypted Messaging | Tyagi, N., Miers, I., & Ristenpart, T. | 2019 | https://eprint.iacr.org/2019/981.pdf | Cited in the Scheffler & Mayer SoK | ||||||||||||||||||||||
46 | Fast Message Franking: From Invisible Salamanders to Encryptment | Dodis, Y., Grubbs, P., Ristenpart, T., & Woodage, J. | 2019 | https://eprint.iacr.org/2019/016 | Cited in the Scheffler & Mayer SoK | ||||||||||||||||||||||
47 | Callisto: A Cryptographic Approach to Detecting Serial Perpetrators of Sexual Misconduct | Rajan, A., Qin, L., Archer, D., Boneh, D., Lepoint, T., & Varia, M. | 2018 | https://www.semanticscholar.org/paper/Callisto%3A-A-Cryptographic-Approach-to-Detecting-of-Rajan-Qin/71a02285f1eb302b195879993264fa96b43ee7d2 | Not cited in the Scheffler & Mayer SoK | ||||||||||||||||||||||
48 | SEEMless: Secure End-to-End Encrypted Messaging with less trust | Chase, M., Deshpande, A., Ghosh, E., & Malvai, H. | 2018 | https://eprint.iacr.org/2018/607 | Not cited in the Scheffler & Mayer SoK | ||||||||||||||||||||||
49 | Messenger Secret Conversations: Technical Whitepaper (v.2.0) | Meta | 2017 | https://about.fb.com/wp-content/uploads/2016/07/messenger-secret-conversations-technical-whitepaper.pdf | Not cited in the Scheffler & Mayer SoK | ||||||||||||||||||||||
50 | Message Franking via Committing Authenticated Encryption | Grubbs, P., Lu, J., & Ristenpart, T. | 2017 | https://eprint.iacr.org/2017/664 | Not cited in the Scheffler & Mayer SoK | ||||||||||||||||||||||
51 | Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications | Abelson, H., Anderson, R., Bellovin, S., Benaloh, J., Blaze, M., Diffie, W., Gilmore, J., Green, M., Landau, S., Neumann, P., Rivest, R., Schiller, J., Schneier, B., Specter, M, & Weitzner, D. | 2015 | https://dspace.mit.edu/bitstream/handle/1721.1/97690/MIT-CSAIL-TR-2015-026.pdf | Cited in the Scheffler & Mayer SoK | ||||||||||||||||||||||
52 | |||||||||||||||||||||||||||
53 | |||||||||||||||||||||||||||
54 | |||||||||||||||||||||||||||
55 | |||||||||||||||||||||||||||
56 | |||||||||||||||||||||||||||
57 | |||||||||||||||||||||||||||
58 | |||||||||||||||||||||||||||
59 | |||||||||||||||||||||||||||
60 | |||||||||||||||||||||||||||
61 | |||||||||||||||||||||||||||
62 | |||||||||||||||||||||||||||
63 | |||||||||||||||||||||||||||
64 | |||||||||||||||||||||||||||
65 | |||||||||||||||||||||||||||
66 | |||||||||||||||||||||||||||
67 | |||||||||||||||||||||||||||
68 | |||||||||||||||||||||||||||
69 | |||||||||||||||||||||||||||
70 | |||||||||||||||||||||||||||
71 | |||||||||||||||||||||||||||
72 | |||||||||||||||||||||||||||
73 | |||||||||||||||||||||||||||
74 | |||||||||||||||||||||||||||
75 | |||||||||||||||||||||||||||
76 | |||||||||||||||||||||||||||
77 | |||||||||||||||||||||||||||
78 | |||||||||||||||||||||||||||
79 | |||||||||||||||||||||||||||
80 | |||||||||||||||||||||||||||
81 | |||||||||||||||||||||||||||
82 | |||||||||||||||||||||||||||
83 | |||||||||||||||||||||||||||
84 | |||||||||||||||||||||||||||
85 | |||||||||||||||||||||||||||
86 | |||||||||||||||||||||||||||
87 | |||||||||||||||||||||||||||
88 | |||||||||||||||||||||||||||
89 | |||||||||||||||||||||||||||
90 | |||||||||||||||||||||||||||
91 | |||||||||||||||||||||||||||
92 | |||||||||||||||||||||||||||
93 | |||||||||||||||||||||||||||
94 | |||||||||||||||||||||||||||
95 | |||||||||||||||||||||||||||
96 | |||||||||||||||||||||||||||
97 | |||||||||||||||||||||||||||
98 | |||||||||||||||||||||||||||
99 | |||||||||||||||||||||||||||
100 |