petsymposium.org
Open in
urlscan Pro
198.96.155.13
Public Scan
URL:
https://petsymposium.org/popets/2022/
Submission: On October 04 via api from US — Scanned from CA
Submission: On October 04 via api from US — Scanned from CA
Form analysis
0 forms found in the DOMText Content
Menu * Home * Proceedings VOLUME 2022 ISSUE 1 * Editors’ Introduction Florian Kerschbaum (University of Waterloo), Michelle Mazurek (University of Maryland) * Personal information inference from voice recordings: User awareness and privacy concerns [PDF] Jacob Leon Kröger (Weizenbaum Institute for the Networked Society, Technische Universität Berlin, Germany), Leon Gellrich (Universität Potsdam, Germany), Sebastian Pape (Goethe Universität, Frankfurt, Germany), Saba Rebecca Brause (Weizenbaum Institute for the Networked Society, TU Berlin, Germany), Stefan Ullrich (Weizenbaum Institute for the Networked Society, TU Berlin, Germany) * Forward and Backward-Secure Range-Searchable Symmetric Encryption [PDF] Jiafan Wang (Dept. of Information Engineering, The Chinese University of Hong Kong), Sherman S. M. Chow (Department of Information Engineering, The Chinese University of Hong Kong, Hong Kong) * (, δ)-Indistinguishable Mixing for Cryptocurrencies [PDF] Mingyu Liang (George Mason University), Ioanna Karantaidou (George Mason University), Foteini Baldimtsi (George Mason University), S. Dov Gordon (George Mason University), Mayank Varia (Boston University) * MLEFlow: Learning from History to Improve Load Balancing in Tor [PDF] [Artifact] Hussein Darir (All authors with the University of Illinois at Urbana-Champaign), Hussein Sibai (All authors with the University of Illinois at Urbana-Champaign), Chin-Yu Cheng (All authors with the University of Illinois at Urbana-Champaign), Nikita Borisov (All authors with the University of Illinois at Urbana-Champaign), Geir Dullerud (All authors with the University of Illinois at Urbana-Champaign), Sayan Mitra (All authors with the University of Illinois at Urbana-Champaign) * How Can and Would People Protect From Online Tracking? [PDF] Maryam Mehrnezhad (Newcastle University, UK), Kovila Coopamootoo (Newcastle University, UK), Ehsan Toreini (Durham University, UK) * Towards Improving Code Stylometry Analysis in Underground Forums [PDF] Michal Tereszkowski-Kaminski (King’s College London), Sergio Pastrana (Universidad Carlos III de Madrid), Jorge Blasco (Royal Holloway, University of London), Guillermo Suarez-Tangil (IMDEA Networks Institute and King’s College London) * Ulixes: Facial Recognition Privacy with Adversarial Machine Learning [PDF] Thomas Cilloni (University of Mississippi), Wei Wang (Xi’an Jiaotong-Liverpool University), Charles Walter (University of Mississippi), Charles Fleming (University of Mississippi) * If This Context Then That Concern: Exploring users’ concerns with IFTTT applets [PDF] Mahsa Saeidi (Affil), McKenzie Calvert (Affil), Audrey W. Au (Affil), Anita Sarma (Affil), Rakesh B. Bobba (Affil) * User Perceptions of Gmail’s Confidential Mode [PDF] Elham Al Qahtani (University of North Carolina at Charlotte), Yousra Javed (Illinois State University), Mohamed Shehab (University of North Carolina at Charlotte) * Toward Uncensorable, Anonymous and Private Access Over Satoshi Blockchains [PDF] Ruben Recabarren (Florida International University, Miami, FL 33199), Bogdan Carbunar (Florida International University, Miami, FL 33199) * OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers [PDF] [Artifact] Darion Cassel (Carnegie Mellon University), Su-Chin Lin (National Taiwan University), Alessio Buraggina (University of Miami), William Wang (University of Chicago), Andrew Zhang (University of Illinos Urbana-Champaign), Lujo Bauer (Carnegie Mellon University), Hsu-Chun Hsiao (National Taiwan University), Limin Jia (Carnegie Mellon University), Timothy Libert (Google) * Making the Most of Parallel Composition in Differential Privacy [PDF] Josh Smith (Work was done when Josh Smith was at Data61 (CSIRO), Australia), Hassan Jameel Asghar (Macquarie University and Data61 (CSIRO), Australia), Gianpaolo Gioiosa (Data61 (CSIRO), Australia), Sirine Mrabet (Data61 (CSIRO), Australia), Serge Gaspers (University of New South Wales, Australia), Paul Tyler (Data61 (CSIRO), Australia) * Zen and the art of model adaptation: Low-utility-cost attack mitigations in collaborative machine learning [PDF] Dmitrii Usynin (Department of Computing, Imperial College London; Department of Diagnostic and Interventional Radiology, Technical University of Munich), Daniel Rueckert (Institute for Artificial Intelligence in Medicine, Technical University of Munich; Department of Computing, Imperial College London), Jonathan Passerat-Palmbach (Department of Computing, Imperial College London; ConsenSys Health, New York, NY, USA), Georgios Kaissis (Institute for Artificial Intelligence in Medicine, Technical University of Munich; Department of Computing, Imperial College London, Germany) * AriaNN: Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing [PDF] Théo Ryffel (INRIA, Département d’informatique de l’ENS, ENS, CNRS, PSL University, Paris, France), Pierre Tholoniat (Columbia University, New York, USA), David Pointcheval (Département d’informatique de l’ENS, ENS, CNRS, PSL University, INRIA, Paris, France), Francis Bach (INRIA, Département d’informatique de l’ENS, ENS, CNRS, PSL University, Paris, France) * Proof-of-Vax: Studying User Preferences and Perception of Covid Vaccination Certificates [PDF] Marvin Kowalewski (Ruhr University Bochum), Franziska Herbert (Ruhr University Bochum), Theodor Schnitzler (Ruhr University Bochum), Markus Dürmuth (Ruhr University Bochum) * Differentially private partition selection [PDF] [Artifact] Damien Desfontaines (Tumult Labs), James Voss (Google), Bryant Gipson (Google), Chinmoy Mandayam (Google) * Circuit-PSI With Linear Complexity via Relaxed Batch OPPRF [PDF] [Artifact] Nishanth Chandran (Microsoft Research.), Divya Gupta (Microsoft Research.), Akash Shah (UCLA. Work done at Microsoft Research.) * Multiparty Reach and Frequency Histogram: Private, Secure, and Practical [PDF] Badih Ghazi (Google Research), Ben Kreuter (Google), Ravi Kumar (Google Research), Pasin Manurangsi (Google Research), Jiayu Peng (Google), Evgeny Skvortsov (Google), Yao Wang (Google), Craig Wright (Google) * Polymath: Low-Latency MPC via Secure Polynomial Evaluations and Its Applications [PDF] [Artifact] Donghang Lu (Purdue University), Albert Yu (Purdue University), Aniket Kate (Purdue University), Hemanta Maji (Purdue University) * Privacy-preserving FairSwap: Fairness and privacy interplay [PDF] [Artifact] Sepideh Avizheh (University of Calgary, AB, Canada), Preston Haffey (University of Calgary, AB, Canada), Reihaneh Safavi-Naini (University of Calgary, AB, Canada) * If You Like Me, Please Don’t “Like” Me: Inferring Vendor Bitcoin Addresses From Positive Reviews [PDF] [Artifact] Jochen Schäfer (University of Mannheim), Christian Müller (University of Mannheim), Frederik Armknecht (University of Mannheim) * Disparate Vulnerability to Membership Inference Attacks [PDF] [Artifact] Bogdan Kulynych (EPFL), Mohammad Yaghini (University of Toronto, Vector Institute), Giovanni Cherubin (Alan Turing Institute), Michael Veale (University College London), Carmela Troncoso (EPFL) * Privacy-Preserving High-dimensional Data Collection with Federated Generative Autoencoder [PDF] Xue Jiang (Technische Universität München, Huawei Technologies Düsseldorf GmbH), Xuebing Zhou (Huawei Technologies Düsseldorf GmbH), Jens Grossklags (Technische Universität München) * Masking Feedforward Neural Networks Against Power Analysis Attacks [PDF] [Artifact] Konstantinos Athanasiou (Northeastern University, Boston, MA), Thomas Wahl (Northeastern University, Boston, MA), A. Adam Ding (Northeastern University, Boston, MA), Yunsi Fei (Northeastern University, Boston, MA) * From “Onion Not Found” to Guard Discovery [PDF] [Artifact] Lennart Oldenburg (imec-COSIC KU Leuven), Gunes Acar (Radboud University), Claudia Diaz (imec-COSIC KU Leuven) * Polaris: Transparent Succinct Zero-Knowledge Arguments for R1CS with Efficient Verifier [PDF] Shihui Fu (University of Waterloo), Guang Gong (University of Waterloo) * DataProVe: Fully Automated Conformance Verification Between Data Protection Policies and System Architectures [PDF] [Artifact] Vinh Thong Ta (Edge Hill University, Ormskirk, UK), Max Hashem Eiza (Liverpool John Moores University, Liverpool, UK) * SoK: Cryptographic Confidentiality of Data on Mobile Devices [PDF] Maximilian Zinkus (Johns Hopkins University), Tushar M. Jois (Johns Hopkins University, {jois), Matthew Green (Johns Hopkins University, {jois) * Setting the Bar Low: Are Websites Complying With the Minimum Requirements of the CCPA? [PDF] [Artifact] Maggie Van Nortwick (Northeastern University), Christo Wilson (Northeastern University) * The Effectiveness of Adaptation Methods in Improving User Engagement and Privacy Protection on Social Network Sites [PDF] Moses Namara (Clemson University), Henry Sloan (Binghamton University), Bart P. Knijnenburg (Clemson University) ISSUE 2 * Editors’ Introduction Florian Kerschbaum (University of Waterloo), Michelle Mazurek (University of Maryland) * Are iPhones Really Better for Privacy? A Comparative Study of iOS and Android Apps [PDF] [Artifact] Konrad Kollnig (Department of Computer Science, University of Oxford), Anastasia Shuba (Independent Researcher), Reuben Binns (Department of Computer Science, University of Oxford), Max Van Kleek (Department of Computer Science, University of Oxford), Nigel Shadbolt (Department of Computer Science, University of Oxford) * Building a Privacy-Preserving Smart Camera System [PDF] [Artifact] Yohan Beugin (The Pennsylvania State University), Quinn Burke (The Pennsylvania State University), Blaine Hoak (The Pennsylvania State University), Ryan Sheatsley (The Pennsylvania State University), Eric Pauley (The Pennsylvania State University), Gang Tan (The Pennsylvania State University), Syed Rafiul Hussain (The Pennsylvania State University), Patrick McDaniel (The Pennsylvania State University) * CoverDrop: Blowing the Whistle Through A News App [PDF] Mansoor Ahmed-Rengers (OpenOrigins Limited and University of Cambridge), Diana A. Vasile (Department of Computer Science and Technology, University of Cambridge), Daniel Hugenroth (Department of Computer Science and Technology, University of Cambridge), Alastair R. Beresford (Department of Computer Science and Technology, University of Cambridge), Ross Anderson (Department of Computer Science and Technology, University of Cambridge) * Employees’ privacy perceptions: exploring the dimensionality and antecedents of personal data sensitivity and willingness to disclose [PDF] Jan Tolsdorf (Bonn-Rhein-Sieg University of Applied Sciences), Delphine Reinhardt (University of Göttingen), Luigi Lo Iacono (Bonn-Rhein-Sieg University of Applied Sciences) * Revisiting Identification Issues in GDPR ‘Right Of Access’ Policies: A Technical and Longitudinal Analysis [PDF] Mariano Di Martino (Hasselt University - tUL, Expertise Center of Digital Media (EDM)), Isaac Meers (Hasselt University - tUL, Expertise Center of Digital Media), Peter Quax (Hasselt University - tUL, Expertise Center of Digital Media, Flanders Make), Ken Andries (Hasselt University - Law Faculty, Attorney at the Brussels Bar), Wim Lamotte (Hasselt University - tUL, Expertise Center of Digital Media) * Understanding Privacy-Related Advice on Stack Overflow [PDF] Mohammad Tahaei (University of Bristol), Tianshi Li (Carnegie Mellon University), Kami Vaniea (University of Edinburgh) * SoK: Plausibly Deniable Storage [PDF] Chen Chen (Stony Brook University), Xiao Liang (Stony Brook University), Bogdan Carbunar (FIU), Radu Sion (Stony Brook University) * Increasing Adoption of Tor Browser Using Informational and Planning Nudges [PDF] [Artifact] Peter Story (Department of Computer Science, Clark University), Daniel Smullen (School of Computer Science, Carnegie Mellon University), Rex Chen (School of Computer Science, Carnegie Mellon University), Yaxing Yao (Department of Information Systems, University of Maryland, Baltimore County), Alessandro Acquisti (Heinz College of Information Systems and Public Policy, Carnegie Mellon University), Lorrie Faith Cranor (School of Computer Science, Carnegie Mellon University), Norman Sadeh (School of Computer Science, Carnegie Mellon University), Florian Schaub (School of Information, University of Michigan) * Differentially Private Simple Linear Regression [PDF] Daniel Alabi (Harvard John A. Paulson School of Engineering and Applied Sciences), Audra McMillan (Khoury College of Computer Sciences, Northeastern University and Department of Computer Science, Boston University), Jayshree Sarathy (Harvard John A. Paulson School of Engineering and Applied Sciences), Adam Smith (Department of Computer Science, Boston University), Salil Vadhan (Harvard John A. Paulson School of Engineering and Applied Sciences) * Privacy-preserving training of tree ensembles over continuous data [PDF] Samuel Adams (University of Washington Tacoma), Chaitali Choudhary (University of Washington Tacoma), Martine De Cock (University of Washington Tacoma), Rafael Dowsley (Monash University), David Melanson (University of Washington Tacoma), Anderson Nascimento (University of Washington Tacoma), Davis Railsback (University of Washington Tacoma), Jianwei Shen (University of Arizona) * User-Level Label Leakage from Gradients in Federated Learning [PDF] Aidmar Wainakh (Telecooperation Lab, Technical University of Darmstadt), Fabrizio Ventola (Artificial Intelligence and Machine Learning Lab, Technical University of Darmstadt), Till Müßig (Technical University of Darmstadt), Jens Keim (Technical University of Darmstadt), Carlos Garcia Cordero (Telecooperation Lab, Technical University of Darmstadt), Ephraim Zimmer (Telecooperation Lab, Technical University of Darmstadt), Tim Grube (Telecooperation Lab, Technical University of Darmstadt), Kristian Kersting (Artificial Intelligence and Machine Learning Lab, Technical University of Darmstadt), Max Mühlhäuser (Telecooperation Lab, Technical University of Darmstadt) * Understanding Utility and Privacy of Demographic Data in Education Technology by Causal Analysis and Adversarial-Censoring [PDF] Rakibul Hasan (Arizona State University), Mario Fritz (CISPA Helmholtz Center for Information Security) * Comprehensive Analysis of Privacy Leakage in Vertical Federated Learning During Prediction [PDF] Xue Jiang (Technical University of Munich; Huawei Technologies Düsseldorf GmbH), Xuebing Zhou (Huawei Technologies Düsseldorf GmbH), Jens Grossklags (Technical University of Munich) * Checking Websites’ GDPR Consent Compliance for Marketing Emails [PDF] Karel Kubíček (ETH Zurich), Jakob Merane (ETH Zurich), Carlos Cotrini (ETH Zurich), Alexander Stremitzer (ETH Zurich), Stefan Bechtold (ETH Zurich), David Basin (ETH Zurich) * Efficient Set Membership Proofs using MPC-in-the-Head [PDF] Aarushi Goel (Johns Hopkins University), Matthew Green (Johns Hopkins University), Mathias Hall-Andersen (Aarhus University), Gabriel Kaptchuk (Boston Univeristy) * Privacy-Preserving Positioning in Wi-Fi Fine Timing Measurement [PDF] Domien Schepers (Northeastern University), Aanjhan Ranganathan (Northeastern University) * RegulaTor: A Straightforward Website Fingerprinting Defense [PDF] James K Holland (University of Minnesota), Nicholas Hopper (University of Minnesota) * Knowledge Cross-Distillation for Membership Privacy [PDF] Rishav Chourasia (National University of Singapore), Batnyam Enkhtaivan (NEC Corporation), Kunihiro Ito (NEC Corporation), Junki Mori (NEC Corporation), Isamu Teranishi (NEC Corporation), Hikaru Tsuchida (NEC Corporation) * Updatable Private Set Intersection [PDF] Saikrishna Badrinarayanan (Visa Research), Peihan Miao (University of Illinois Chicago), Tiancheng Xie (University of California, Berkeley) * d3p - A Python Package for Differentially-Private Probabilistic Programming [PDF] [Artifact] Lukas Prediger (Aalto University, Finland.), Niki Loppi (NVIDIA AI Technology Center, Finland), Samuel Kaski (Aalto University, Finland & University of Manchester, UK), Antti Honkela (University of Helsinki, Finland 1 Available at: https://github.com/DPBayes/d3p) * Who Knows I Like Jelly Beans? An Investigation Into Search Privacy [PDF] Daniel Kats (NortonLifeLock Research Group), David Luz Silva (NortonLifeLock Research Group), Johann Roturier (NortonLifeLock Research Group) * PUBA: Privacy-Preserving User-Data Bookkeeping and Analytics [PDF] Valerie Fetzer (Karlsruhe Institute of Technology, KASTEL), Marcel Keller (CSIRO’s Data61), Sven Maier (Karlsruhe Institute of Technology, KASTEL), Markus Raiber (Karlsruhe Institute of Technology, KASTEL), Andy Rupp (University of Luxembourg and KASTEL SRL), Rebecca Schwerdt (Karlsruhe Institute of Technology, KASTEL) * How to prove any NP statement jointly? Efficient Distributed-prover Zero-Knowledge Protocols [PDF] Pankaj Dayama (IBM Research), Arpita Patra (Indian Institute of Science Bangalore), Protik Paul (Indian Institute of Science Bangalore), Nitin Singh (IBM Research), Dhinakaran Vinayagamurthy (IBM Research) * FP-Radar: Longitudinal Measurement and Early Detection of Browser Fingerprinting [PDF] Pouneh Nikkhah Bahrami (University of California, Davis), Umar Iqbal (University of Washington), Zubair Shafiq (University of California, Davis) * Analyzing the Feasibility and Generalizability of Fingerprinting Internet of Things Devices [PDF] [Artifact] Dilawer Ahmed (North Carolina State University), Anupam Das (North Carolina State University), Fareed Zaffar (Lahore University of Management Sciences (LUMS)) * Visualizing Privacy-Utility Trade-Offs in Differentially Private Data Releases [PDF] [Artifact] Priyanka Nanayakkara (Northwestern University), Johes Bater (Duke University), Xi He (University of Waterloo), Jessica Hullman (Northwestern University), Jennie Rogers (Northwestern University) ISSUE 3 * Editors’ Introduction Florian Kerschbaum (University of Waterloo), Michelle Mazurek (University of Maryland) * A Multi-Region Investigation of the Perceptions and Use of Smart Home Devices [PDF] [Artifact] Patrick Bombik (Technical University of Munich), Tom Wenzel (Technical University of Munich), Jens Grossklags (Technical University of Munich), Sameer Patil (School of Computing, University of Utah) * Charting App Developers’ Journey Through Privacy Regulation Features in Ad Networks [PDF] Mohammad Tahaei (University of Bristol), Kopo M. Ramokapane (University of Bristol), Tianshi Li (Carnegie Mellon University), Jason I. Hong (Carnegie Mellon University), Awais Rashid (University of Bristol) * “All apps do this”: Comparing Privacy Concerns Towards Privacy Tools and Non-Privacy Tools for Social Media Content [PDF] Vanessa Bracamonte (KDDI Research, Inc.), Sebastian Pape (Goethe University Frankfurt), Sascha Loebner (Goethe University Frankfurt) * My Cookie is a phoenix: detection, measurement, and lawfulness of cookie respawning with browser fingerprinting [PDF] Imane Fouad (Univ. Lille, CNRS, Inria), Cristiana Santos (Utrecht University), Arnaud Legout (Inria), Nataliia Bielova (LINC team, CNIL, France) * Exploring the Privacy Concerns of Bystanders in Smart Homes from the Perspectives of Both Owners and Bystanders [PDF] Ahmed Alshehri (Colorado School of Mines), Joseph Spielman (Colorado School of Mines), Amiya Prasad (Colorado School of Mines), Chuan Yue (Colorado School of Mines) * Adversarial Images Against Super-Resolution Convolutional Neural Networks for Free [PDF] Arezoo Rajabi (University of Washington), Mahdieh Abbasi (Universite Laval), Rakesh B. Bobba (Oregon State University), Kimia Tajik (Case Western Reserve University) * Integrating Privacy into the Electric Vehicle Charging Architecture [PDF] [Artifact] Dustin Kern (Darmstadt University of Applied Sciences), Timm Lauser (Darmstadt University of Applied Sciences), Christoph Krauß (Darmstadt University of Applied Sciences) * “It Feels Like Whack-a-mole”: User Experiences of Data Removal from People Search Websites [PDF] Kejsi Take (New York University), Kevin Gallagher (DCentral/INESC-ID, Instituto Superior Técnico, Universidade de Lisboa), Andrea Forte (Drexel University), Damon McCoy (New York University), Rachel Greenstadt (New York University) * Learning to Behave: Improving Covert Channel Security with Behavior-Based Designs [PDF] Ryan Wails (Georgetown, U.S. Naval Research Laboratory), Andrew Stange (Carnegie Mellon), Eliana Troper (Georgetown Univ.), Aylin Caliskan (University of Washington), Roger Dingledine (The Tor Project), Rob Jansen (U.S. Naval Research Laboratory), Micah Sherr (Georgetown Univ.) * I know what you did on Venmo: Discovering privacy leaks in mobile social payments [PDF] [Artifact] Rajat Tandon (University of Southern California Information Sciences Institute), Pithayuth Charnsethikul (University of Southern California Information Sciences Institute), Ishank Arora (University of Texas, Austin), Dhiraj Murthy (University of Texas, Austin), Jelena Mirkovic (University of Southern California Information Sciences Institute) * Privacy accounting εconomics: Improving differential privacy composition via a posteriori bounds [PDF] [Artifact] Valentin Hartmann (EPFL), Vincent Bindschaedler (University of Florida), Alexander Bentkamp (State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences & Vrije Universiteit Amsterdam), Robert West (EPFL) * Moby: A Blackout-Resistant Anonymity Network for Mobile Devices [PDF] Amogh Pradeep (Northeastern University & EPFL), Hira Javaid (Northeastern University), Ryan Williams (Northeastern University), Antoine Rault (EPFL), David Choffnes (Northeastern University), Stevens Le Blond (EPFL), Bryan Ford (EPFL) * Athena: Probabilistic Verification of Machine Unlearning [PDF] [Artifact] David M. Sommer (Zühlke), Liwei Song (Princeton University), Sameer Wagh (Princeton University), Prateek Mittal (Princeton University) * Fully Secure PSI via MPC-in-the-Head [PDF] S. Dov Gordon (George Mason University), Carmit Hazay (Bar-Ilan University), Phi Hung Le (George Mason University) * Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor [PDF] [Artifact] Vera Rimmer (imec-DistriNet, KU Leuven), Theodor Schnitzler (Ruhr-Universität Bochum), Tom Van Goethem (imec-DistriNet, KU Leuven), Abel Rodríguez Romero (imec-DistriNet, KU Leuven), Wouter Joosen (imec-DistriNet, KU Leuven), Katharina Kohls (Radboud University) * SoK: SCT Auditing in Certificate Transparency [PDF] Sarah Meiklejohn (Google LLC), Joe DeBlasio (Google LLC), Devon O’Brien (Google LLC), Chris Thompson (Google LLC), Kevin Yeo (Google LLC), Emily Stark (Google LLC) * In Search of Lost Utility: Private Location Data [PDF] Szilvia Lestyán (Department of Networked Systems and Services,CrySyS Lab, Budapest University of Technology and Economics), Gergely Ács, Gergely Biczók * Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps [PDF] [Artifact] Yucheng Yang (University of Wisconsin-Madison), Jack West (Loyola University Chicago), George K. Thiruvathukal (Loyola University Chicago), Neil Klingensmith (Loyola University Chicago), Kassem Fawaz (University of Wisconsin-Madison) * “We may share the number of diaper changes”: A Privacy and Security Analysis of Mobile Child Care Applications [PDF] Moritz Gruber (AWARE7 GmbH), Christian Höfig (AWARE7 GmbH), Maximilian Golla (Max Planck Institute for Security and Privacy), Tobias Urban (Institute for Internet Security – if(is); secunet Security Networks AG), Matteo Große-Kampmann (Ruhr University Bochum; AWARE7 GmbH; Institute for Internet Security – if(is)) * Deletion inference, reconstruction, and compliance in machine (un)learning [PDF] [Artifact] Ji Gao (University of Virginia), Sanjam Garg (University of California, Berkeley and NTT Research), Mohammad Mahmoody (University of Virginia), Prashant Nalini Vasudevan (National University of Singapore) * Leave No Data Behind – Empirical Insights into Data Erasure from Online Services [PDF] Eduard Rupp (Technical University of Munich), Emmanuel Syrmoudis (Technical University of Munich), Jens Grossklags (Technical University of Munich) * Mixnet optimization methods [PDF] [Artifact] Iness Ben Guirat (imec-COSIC KU Leuven), Claudia Diaz (imec-COSIC KU Leuven and Nym Technologies SA) * On dark patterns and manipulation of website publishers by CMPs [PDF] Michael Toth (Centre Inria de l’Université Grenoble-Alpes), Nataliia Bielova (Nataliia Bielova, LINC team, CNIL, France), Vincent Roca (Centre Inria de l’Université Grenoble-Alpes) * Leveraging strategic connection migration-powered traffic splitting for privacy [PDF] [Artifact] Mona Wang (Princeton University), Anunay Kulshrestha (Princeton University), Liang Wang (Princeton University), Prateek Mittal (Princeton University) * DALock: Password Distribution-Aware Throttling [PDF] Jeremiah Blocki (Purdue University), Wuwei Zhang (Purdue University) * On Defeating Graph Analysis of Anonymous Transactions [PDF] [Artifact] Christoph Egger (Friedrich-Alexander-Universität Erlangen-Nürnberg), Russell W. F. Lai (Friedrich-Alexander-Universität Erlangen-Nürnberg), Viktoria Ronge (Friedrich-Alexander-Universität Erlangen-Nürnberg), Ivy K. Y. Woo (Independent), Hoover H. F. Yin (The Chinese University of Hong Kong) * User-friendly yet rarely read: A case study on the redesign of an online HIPAA authorization [PDF] [Artifact] Sarah Pearman (Carnegie Mellon University), Ellie Young (New College of Florida), Lorrie Faith Cranor (Carnegie Mellon University) * OrgAn: Organizational Anonymity with Low Latency [PDF] [Artifact] Debajyoti Das (imecCOSIC, KU Leuven, Leuven, Belgium), Easwar Vivek Mangipudi (Department of Computer Science, Purdue University, West Lafayette, USA), Aniket Kate (Department of Computer Science, Purdue University, West Lafayette, USA) * FingerprinTV: Fingerprinting Smart TV Apps [PDF] [Artifact] Janus Varmarken (University of California, Irvine), Jad Al Aaraj (University of California, Irvine), Rahmadi Trimananda (University of California, Irvine), Athina Markopoulou (University of California, Irvine) * ZoomP3: Privacy-Preserving Publishing of Online Video Conference Recordings [PDF] Yuanyi Sun (Penn State University), Sencun Zhu (Penn State University), Yu Chen (Binghamton University, SUNY) * PrivacyScout: Assessing Vulnerability to Shoulder Surfing on Mobile Devices [PDF] Mihai Bâce (University of Stuttgart, Germany), Alia Saad (University of Duisburg-Essen, Germany), Mohamed Khamis (University of Glasgow, United Kingdom), Stefan Schneegass (University of Duisburg-Essen, Germany), Andreas Bulling (University of Stuttgart, Germany) * SoK: Assumptions Underlying Cryptocurrency Deanonymizations [PDF] Dominic Deuber (Friedrich-AlexanderUniversität Erlangen-Nürnberg), Viktoria Ronge (Friedrich-AlexanderUniversität Erlangen-Nürnberg), Christian Rückert (Universität Mannheim) * Watch Over Your TV: A Security and Privacy Analysis of the Android TV Ecosystem [PDF] [Artifact] Marcos Tileria (Royal Holloway, University of London), Jorge Blasco (Royal Holloway, University of London) * SoK: TEE-Assisted Confidential Smart Contract [PDF] Rujia Li (Southern University of Science and Technology & University of Birmingham), Qin Wang (CSIRO Data61), Qi Wang (Southern University of Science and Technology), David Galindo (University of Birmingham), Mark Ryan (University of Birmingham) * Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies [PDF] [Artifact] Anisa Halimi (IBM Research Europe - Dublin), Leonard Dervishi (Case Western Reserve University), Erman Ayday (Case Western Reserve University), Apostolos Pyrgelis (EPFL), Juan Ramón Troncoso-Pastoriza (Tune Insight), Jean-Pierre Hubaux (EPFL), Xiaoqian Jiang (University of Texas, Health Science Center), Jaideep Vaidya (Rutgers University) ISSUE 4 * Editors’ Introduction Florian Kerschbaum (University of Waterloo), Michelle Mazurek (University of Maryland) * Blocked or Broken? Automatically Detecting When Privacy Interventions Break Websites [PDF] Michael Smith (University of California, San Diego), Peter Snyder (Brave Software), Moritz Haller (Brave Software), Benjamin Livshits (Imperial College London), Deian Stefan (University of California, San Diego), Hamed Haddadi (Brave Software) * SoK: Privacy-enhancing Smart Home Hubs [PDF] Igor Zavalyshyn (UCLouvain), Axel Legay (UCLouvain), Annanda Rath (Sirris), Etienne Rivière (UCLouvain) * On the Cost of Suppressing Volume for Encrypted Multi-maps [PDF] Megumi Ando (MITRE), Marilyn George (Brown University) * XORBoost: Tree Boosting in the Multiparty Computation Setting [PDF] Kevin Deforth (Inpher, Switzerland), Marc Desgroseilliers (Inpher, Switzerland), Nicolas Gama (Inpher, Switzerland), Mariya Georgieva (Inpher, Switzerland), Dimitar Jetchev (Inpher, Switzerland), Marius Vuille (Inpher, Switzerland) * Neural Fuzzy Extractors: A Secure Way to Use Artificial Neural Networks for Biometric User Authentication [PDF] Abhishek Jana (Kansas State University), Bipin Paudel (Kansas State University), Md Kamruzzaman Sarker (Kansas State University), Monireh Ebrahimi (Kansas State University), Pascal Hitzler (Kansas State University), George T Amariucai (Kansas State University) * Analyzing the Monetization Ecosystem of Stalkerware [PDF] Cassidy Gibson (University of Florida), Vanessa Frost (University of Florida), Katie Platt (University of Florida), Washington Garcia (University of Florida), Luis Vargas (University of Florida), Sara Rampazzi (University of Florida), Vincent Bindschaedler (University of Florida), Patrick Traynor (University of Florida), Kevin Butler (University of Florida) * A Global Survey of Android Dual-Use Applications Used in Intimate Partner Surveillance [PDF] [Artifact] Majed Almansoori (University of Wisconsin-Madison), Andrea Gallardo (Carnegie Mellon University), Julio Poveda (University of Maryland), Adil Ahmed (University of Wisconsin-Madison), Rahul Chatterjee (University of Wisconsin-Madison) * On the Feasibility of Linking Attack to Google/Apple Exposure Notification Framework [PDF] [Artifact] Kazuki Nomoto (Waseda University), Mitsuaki Akiyama (NTT), Masashi Eto (Ministry of Internal Affairs and Communications (MIC)), Atsuo Inomata (Osaka University), Tatsuya Mori (Waseda University/NICT/RIKEN AIP) * Towards Sparse Federated Analytics: Location Heatmaps under Distributed Differential Privacy with Secure Aggregation [PDF] Eugene Bagdasaryan (Cornell Tech), Peter Kairouz (Google), Stefan Mellem (Google), Adrià Gascón (Google), Kallista Bonawitz (Google), Deborah Estrin (Cornell Tech), Marco Gruteser (Google) * 3LegRace: Privacy-Preserving DNN Training over TEEs and GPUs [PDF] Yue Niu (Electrical and Computer Engineering Department, University of Southern California), Ramy E. Ali (Electrical and Computer Engineering Department, University of Southern California, reali), Salman Avestimehr (Electrical and Computer Engineering Department, University of Southern California, reali) * How Usable Are iOS App Privacy Labels? [PDF] Shikun Zhang (Carnegie Mellon University), Yuanyuan Feng (University of Vermont), Yaxing Yao (University of Maryland, Baltimore County), Lorrie Faith Cranor (Carnegie Mellon University), Norman Sadeh (Carnegie Mellon University) * gOTzilla: Efficient Disjunctive Zero-Knowledge Proofs from MPC in the Head, with Application to Proofs of Assets in Cryptocurrencies [PDF] [Artifact] Foteini Baldimtsi (George Mason University), Panagiotis Chatzigiannis (George Mason University - Visa Research), S. Dov Gordon (George Mason University), Phi Hung Le (George Mason University), Daniel McVicker (George Mason University) * Developers Say the Darnedest Things: Privacy Compliance Processes Followed by Developers of Child-Directed Apps [PDF] Noura Alomar (University of California, Berkeley), Serge Egelman (University of California, Berkeley and International Computer Science Institute) * LLAMA: A Low Latency Math Library for Secure Inference [PDF] [Artifact] Kanav Gupta (Microsoft Research), Deepak Kumaraswamy (Microsoft Research), Nishanth Chandran (Microsoft Research), Divya Gupta (Microsoft Research) * ATOM: Ad-network Tomography [PDF] [Artifact] Maaz Bin Musa (University of Iowa), Rishab Nithyanand (University of Iowa) * Investigating GDPR Fines in the Light of Data Flows [PDF] Marlene Saemann (Bosch), Daniel Theis (Institute for Internet Security), Tobias Urban (Institute for Internet Security & secunet Security Networks AG), Martin Degeling (Ruhr University Bochum) * Machine Learning with Differentially Private Labels: Mechanisms and Frameworks [PDF] [Artifact] Xinyu Tang (Princeton University), Milad Nasr (University of Massachusetts Amherst), Saeed Mahloujifar (Princeton University), Virat Shejwalkar (University of Massachusetts Amherst), Liwei Song (Princeton University), Amir Houmansadr (University of Massachusetts Amherst), Prateek Mittal (Princeton University) * Pika: Secure Computation using Function Secret Sharing over Rings [PDF] Sameer Wagh (Devron Corporation and UC Berkeley) * Flexible and scalable privacy assessment for very large datasets, with an application to official governmental microdata [PDF] [Artifact] Mário S. Alvim (UFMG, Brazil), Natasha Fernandes (Macquarie University, Australia), Annabelle McIver (Macquarie University, Australia), Carroll Morgan (UNSW and Trustworthy Systems, Australia), Gabriel H. Nunes (UFMG, Brazil) * “You offer privacy like you offer tea”: Investigating Mechanisms for Improving Guest Privacy in IoT-Equipped Households [PDF] Karola Marky (Leibniz University Hannover and University of Glasgow), Nina Gerber (Technical University of Darmstadt), Michelle Gabriela Pelzer (Technical University of Darmstadt), Mohamed Khamis (University of Glasgow), Max Mühlhäuser (Technical University of Darmstadt) * Effects of Privacy Permissions on User Choices in Voice Assistant App Stores [PDF] Gary Liu (University of California, Berkeley), Nathan Malkin (University of California, Berkeley) * Collection, usage and privacy of mobility data in the enterprise and public administrations [PDF] Alexandra Kapp (Hochschule für Technik und Wirtschaft Berlin (HTW), University of Applied Sciences) * Ctrl-Shift: How Privacy Sentiment Changed from 2019 to 2021 [PDF] Angelica Goetzen (Max Planck Institute for Software Systems), Samuel Dooley (University of Maryland & Max Planck Institute for Software Systems), Elissa M. Redmiles (Max Planck Institute for Software Systems) * Keeping Privacy Labels Honest [PDF] [Artifact] Simon Koch (Technische Universität Braunschweig, Institute for Application Security), Malte Wessels (Technische Universität Braunschweig, Institute for Application Security), Benjamin Altpeter (Datenanfragen.de e. V.), Madita Olvermann (Technische Universität Braunschweig, Industrial/Organizational and Social Psychology), Martin Johns (Technische Universität Braunschweig, Institute for Application Security) * Zswap: zk-SNARK Based Non-Interactive Multi-Asset Swaps [PDF] [Artifact] Felix Engelmann (IT University of Copenhagen), Thomas Kerber (University of Edinburgh, IOHK, thomas.), Markulf Kohlweiss (University of Edinburgh, IOHK), Mikhail Volkhov (University of Edinburgh) * Formalizing and Estimating Distribution Inference Risks [PDF] [Artifact] Anshuman Suri (University of Virginia), David Evans (University of Virginia) * Connect the Dots: Tighter Discrete Approximations of Privacy Loss Distributions [PDF] Vadym Doroshenko (Google), Badih Ghazi (Google Research), Pritish Kamath (Google Research), Ravi Kumar (Google Research), Pasin Manurangsi (Google Research) * Hidden Issuer Anonymous Credential [PDF] [Artifact] Daniel Bosk (KTH), Davide Frey (Univ Rennes, CNRS, Inria, IRISA), Mathieu Gestin (Univ Rennes, CNRS, Inria, IRISA), Guillaume Piolle (CentraleSupélec, Inria, Univ Rennes, CNRS, IRISA) * A novel reconstruction attack on foreign-trade official statistics, with a Brazilian case study [PDF] Danilo Fabrino Favato (Universidade Federal de Minas Gerais, Brazil), Gabriel Coutinho (Universidade Federal de Minas Gerais, Brazil), Mário S. Alvim (Universidade Federal de Minas Gerais, Brazil), Natasha Fernandes (Macquarie University, Australia) * Private Aggregation of Trajectories [PDF] Badih Ghazi (Google Research), Neel Kamal (Google), Ravi Kumar (Google Research), Pasin Manurangsi (Google Research), Annika Zhang (Google) * On the Challenges of Developing a Concise Questionnaire to Identify Privacy Personas [PDF] [Artifact] Tom Biselli (Science and Technology for Peace and Security (PEASEC) Technical University of Darmstadt), Enno Steinbrink (Science and Technology for Peace and Security (PEASEC) Technical University of Darmstadt), Franziska Herbert (Science and Technology for Peace and Security (PEASEC) Technical University of Darmstadt), Gina M. Schmidbauer-Wolf (Science and Technology for Peace and Security (PEASEC) Technical University of Darmstadt), Christian Reuter (Science and Technology for Peace and Security (PEASEC) Technical University of Darmstadt) * Homomorphically counting elements with the same property [PDF] Ilia Iliashenko (Ciphermode Labs), Malika Izabachène (Cosmian), Axel Mertens (imec-COSIC - KU Leuven), Hilder V. L. Pereira (imec-COSIC - KU Leuven) * Time- and Space-Efficient Aggregate Range Queries over Encrypted Databases [PDF] Zachary Espiritu (Brown University), Evangelia Anna Markatou (Brown University), Roberto Tamassia (Brown University) * How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy [PDF] Michal Kepkowski (Macquarie University), Lucjan Hanzlik (CISPA Helmholtz Center for Information Security), Ian Wood (Macquarie University), Mohamed Ali Kaafar (Macquarie University) * Replay (Far) Away: Exploiting and Fixing Google/Apple Exposure Notification Contact Tracing [PDF] [Artifact] Christopher Ellis (The Ohio State University), Haohuang Wen (The Ohio State University), Zhiqiang Lin (The Ohio State University), Anish Arora (The Ohio State University) * Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation [PDF] Nuttapong Attrapadung (AIST), Koki Hamada (NTT), Dai Ikarashi (NTT), Ryo Kikuchi (NTT), Takahiro Matsuda (AIST), Ibuki Mishina (NTT), Hiraku Morita (University of St. Gallen), Jacob C. N. Schuldt (AIST) * Privately Connecting Mobility to Infectious Diseases via Applied Cryptography [PDF] [Artifact] Alexandros Bampoulidis (Research Studio Data Science, RSA FG, Vienna, Austria), Alessandro Bruni (Katholieke Universiteit Leuven, Belgium), Lukas Helminger (Graz University of Technology / KnowCenter GmbH, Austria), Daniel Kales (Graz University of Technology, Austria), Christian Rechberger (Graz University of Technology, Austria), Roman Walch (Graz University of Technology / Know-Center GmbH, Austria) Contact Us