Reading List
Books:
Book: A Graduate Course in Cryptography (Dan Boneh and Victor Shoup)
SoK and Surveys:
Systematizing Decentralization and Privacy: Lessons from 15 years of research and deployment
SoK: Science, Security, and the Elusive Goal of Security as a Scientific Pursuit
Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies
Online Privacy:
Telephony Security:
SoK: Everyone Hates Robocalls: A Survey of Techniques against Telephone Spam
AuthentiCall: Efficient Identity and Content Authentication for Phone Calls
Toward Standardization of Authenticated Caller ID Transmission
Phonion: Practical Protection of Metadata in Telephony Networks
AuthLoop: End-to-End Cryptographic Authentication for Telephony
CCCP: Closed Caption Crypto Phones to Resist MITM Attacks, Human Errors and Click-Through
You Can Call but You Can't Hide: Detecting Caller ID Spoofing Attacks
Using chatbots against voice spam: Analyzing Lenny's effectiveness
By Hook or by Crook: Exposing the Diverse Abuse Tactics of Technical Support Scammers
PinDr0p: using single-ended audio features to determine call provenance