Program

Monday June 29

The SAT Symposium, the welcome reception, and the PETS sessions are in Behrakis Grand Hall in the Creese Student Center (3210 Chestnut St, Philadelphia, PA 19104) at Drexel University.

08:30 – 17:50 SAT Symposium

18:00 – 20:00 Registration and Welcome Reception

Tuesday June 30

The sessions are in Behrakis Grand Hall.

8:30 – 9:30 Registration and Light Breakfast

9:30 Opening Remarks (Apu Kapadia and Steven Murdoch)

9:40 Censorship Resistance (Chair: Rob Jansen)

10:40 Break

11:15 Anonymous Communications (Chair: Nick Mathewson)

12:15 Lunch

13:45 Identity Protection (Chair: Sadia Afroz)

14:25 Mini-Break

14:45 PETS Keynote Address (Chair: Ian Goldberg)

16:00 Break

16:30 Secure Computation (Chair: Nikita Borisov)

17:30 PET Award Reception (Chair: Rachel Greenstadt and Nick Hopper) LeBow 220

18:30 Closing (Apu Kapadia and Steven Murdoch)

Wednesday July 1

8:00 – 8:30 Registration and Light Breakfast

8:30 Networks and Anonymity (Chair: Paul Syverson)

9:30 Break

10:00 Cloud Computation (Chair: Amir Houmansadr)

11:00 Mini-Break

11:15 Town hall meeting: The Future Evolution of PETS and PoPETs (Chairs: Apu Kapadia and Steven Murdoch)

12:00 Lunch

13:30 User Profiling (Chair: Matthew Wright)

14:30 Mini-Break

14:45 Applied Cryptography (Chair: Nick Hopper)

15:45 Break

16:15 Rump Session (Chair: Roger Dingledine)

18:00 Closing (Apu Kapadia and Steven Murdoch)

19:00 Banquet at Academy of Natural Sciences

The Gala Dinner will be held at the Academy of Natural Sciences. Founded in 1812, the Academy of Natural Sciences of Drexel University is a leading natural history museum dedicated to advancing research, education, and public engagement in biodiversity and environmental science. We will be eating in the Hall of the Dinosaurs.

A shuttle will be provided between 6:30pm to 10:30pm that will loop between the Academy and the university campus.

Thursday July 2 (HotPETS)

8:15 – 9:15 Breakfast

9:15 Opening Remarks [Video]

9:30 Censorship and Anonymity (Chair: Meredith Whittaker)

10:45 Coffee Break

11:15 HotPETs Keynote Address (Chair: Susan Landau)

  • How dark are we going? [Video] (Bio)
    Matt Blaze, University of Pennsylvania

12:30 Lunch

2:00 Data Privacy Tools (Chair: Tariq Elahi)

2:50 Coffee Break

3:10 Privacy and Secure Communication (Chair: Claudia Diaz)

4:00 Ice Cream Break

4:20 Privacy and Human Behavior (Chair: Kat Hanna)

5:10 Closing Remarks [Video]

Friday July 3

Social Excursion: Wissahickon Woods

Keynote Speakers

Jonathan Katz (University of Maryland): Secure computation: Where do we go from here?

Abstract: Secure computation was introduced by Yao in the early '80s, and received a lot of attention from theoretical cryptographers over the next two decades. More recently, secure computation has "entered the mainstream," with multiple groups claiming practical implementations, funding from several government agencies, and widespread interest from researchers in other fields.

This talk will survey some of the recent developments in this area, with a particular focus on where things are going covering both active directions of research as well as prospects for future deployment.

Bio: Jonathan Katz is a professor of computer science at the University of Maryland, and director of the Maryland Cybersecurity Center. His research interests lie broadly in the fields of cryptography, privacy, and science of cybersecurity, and he is a co-author of the widely used textbook "Introduction to Modern Cryptography." Katz was a member of the DARPA Computer Science Study Group from 2009-2010, and received a Humboldt Research Award in 2015. He currently serves as a founding member of the steering committee for the IEEE cybersecurity initiative.

Matt Blaze (University of Pennsylvania): How dark are we going?

Bio: Matt Blaze directs the Distributed Systems Lab at the University of Pennsylvania, where he is an Associate Professor of Computer and Information Science. His research focuses on the design and analysis of secure systems, with a particular interest in security technology with bearing on public policy issues, including cryptography policy (key escrow), wiretapping and surveillance, and the security of electronic voting systems.