Difference between revisions of "Privacy Final Project Ideas"

From Simson Garfinkel
Jump to navigationJump to search
(Created page with "* Measure the prevalence of browser fingerprinting on the web. * Develop a browser plug-in that defeats browser fingerprinting. * Map out the purpose and impact of differen...")
 
m
 
(2 intermediate revisions by the same user not shown)
Line 6: Line 6:


* Analyze the top 1000 websites and determine which are the most popular JavaScript downloads? Which are the most popular?
* Analyze the top 1000 websites and determine which are the most popular JavaScript downloads? Which are the most popular?
* Perform a re-analysis of data published by another privacy researcher.
* Examine data available from a website for private information.
* Systematically Search online documents for metadata and invisible information.
* Develop a workable implementation of a multi-party computation system
* Develop a workable implementation of a system that performs search on encrypted data.
* Perform an analysis of articles discussing privacy that have appeared in CACM, or Crypto, or some other venue.
* Perform a novel analysis of leaked passwords
* Examine the use of real names and real IP addresses in Wikipedia
== Other sources ==
* http://isites.harvard.edu/fs/docs/icb.topic1475289.files/ProjectIdeas.pdf

Latest revision as of 18:29, 30 October 2016

  • Measure the prevalence of browser fingerprinting on the web.
  • Develop a browser plug-in that defeats browser fingerprinting.
  • Map out the purpose and impact of different JavaScript libraries that are downloaded by major websites.
  • Analyze the top 1000 websites and determine which are the most popular JavaScript downloads? Which are the most popular?
  • Perform a re-analysis of data published by another privacy researcher.
  • Examine data available from a website for private information.
  • Systematically Search online documents for metadata and invisible information.
  • Develop a workable implementation of a multi-party computation system
  • Develop a workable implementation of a system that performs search on encrypted data.
  • Perform an analysis of articles discussing privacy that have appeared in CACM, or Crypto, or some other venue.
  • Perform a novel analysis of leaked passwords
  • Examine the use of real names and real IP addresses in Wikipedia

Other sources