Monday June 29
The SAT Symposium, the welcome reception, and the PETS sessions are in Behrakis Grand Hall in the Creese Student Center (3210 Chestnut St, Philadelphia, PA 19104) at Drexel University.08:30 – 17:50 SAT Symposium
18:00 – 20:00 Registration and Welcome Reception
Tuesday June 30
The sessions are in Behrakis Grand Hall.8:30 – 9:30 Registration and Light Breakfast
9:30 Opening Remarks (Apu Kapadia and Steven Murdoch)
9:40 Censorship Resistance (Chair: Rob Jansen)
- Analyzing the Great Firewall of China Over Space and Time
R. Ensafi, P. Winter, A. Mueen, J. Crandall - A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients
V. Perta, M. Barbera, G. Tyson, H. Haddadi, A. Mei - Blocking-Resistant Communication through Domain Fronting
D. Fifield, C. Lan, R. Hynes, P. Wegmann, V. Paxson
10:40 Break
11:15 Anonymous Communications (Chair: Nick Mathewson)
- 20,000 In League Under the Sea: Anonymous Communication, Trust, MLATs, and Undersea Cables
A. D. Jaggard, A. Johnson, S. Cortes, P. Syverson, J. Feigenbaum - Guard Sets for Onion Routing
J. Hayes, G. Danezis - Defending Tor from Network Adversaries: A Case Study of Network Path Prediction
J. Juen, A. Johnson, A. Das, N. Borisov, M. Caesar
12:15 Lunch
13:45 Identity Protection (Chair: Sadia Afroz)
- De-anonymizing Genomic Databases using Phenotypic Traits
M. Humbert, K. Huguenin, J. Hugonot, E. Ayday, J. Hubaux - Toward Mending Two Nation-Scale Brokered Identification Systems
L. Brandão, N. Christin, G. Danezis, Anonymous
14:25 Mini-Break
14:45 PETS Keynote Address (Chair: Ian Goldberg)
|
16:00 Break
16:30 Secure Computation (Chair: Nikita Borisov)
- Practical Forward-Secure Range and Sort Queries with Update-Oblivious Linked Lists
E. Blass, T. Mayberry, G. Noubir - Parallel Oblivious Array Access for Secure Multiparty Computation and Privacy-Preserving Minimum Spanning Trees
P. Laud - Recursive Trees for Practical ORAM
T. Moataz, E. Blass, G. Noubir
17:30 PET Award Reception (Chair: Rachel Greenstadt and Nick Hopper) LeBow 220
18:30 Closing (Apu Kapadia and Steven Murdoch)
Wednesday July 1
8:00 – 8:30 Registration and Light Breakfast
8:30 Networks and Anonymity (Chair: Paul Syverson)
- Portrait of a Privacy Invasion: Detecting Relationships Through Large-scale Photo Analysis
Y. Shoshitaishvili, C. Kruegel, G. Vigna - Constructing Elastic Distinguishability Metrics for Location Privacy
K. Chatzikokolakis, C. Palamidessi, M. Stronati - DP5: A Private Presence Service
N. Borisov, G. Danezis, I. Goldberg
9:30 Break
10:00 Cloud Computation (Chair: Amir Houmansadr)
- Know Thy Neighbor: Crypto Library Detection in Cloud
G. Irazoqui, M. Inci, B. Sunar, T. Eisenbarth - Secure and Scalable Match: Overcoming the Universal Circuit Bottleneck using Group Programs
R. Krishnan, R. Sundaram - Substring-Searchable Symmetric Encryption
M. Chase, E. Shen
11:00 Mini-Break
11:15 Town hall meeting: The Future Evolution of PETS and PoPETs (Chairs: Apu Kapadia and Steven Murdoch)
12:00 Lunch
13:30 User Profiling (Chair: Matthew Wright)
- Automated Experiments on Ad Privacy Settings
A. Datta, M. Tschantz, A. Datta - An Automated Approach for Complementing Ad Blockers' Blacklists
D. Gugelmann, M. Happe, B. Ager, V. Lenders - Privacy Games: Optimal User-Centric Data Obfuscation
R. Shokri
14:30 Mini-Break
14:45 Applied Cryptography (Chair: Nick Hopper)
- A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing
G. Arfaoui, J. Lalande, J. Traoré, N. Desmoulins, P. Berthomé, S. Gharout - Accountable Metadata-Hiding Escrow: A Group Signature Case Study
M. Kohlweiss, I. Miers - Optimal Rate Private Information Retrieval from Homomorphic Encryption
A. Kiayias, N. Leonardos, H. Lipmaa, K. Pavlyk, Q. Tang
15:45 Break
16:15 Rump Session (Chair: Roger Dingledine)
18:00 Closing (Apu Kapadia and Steven Murdoch)
19:00 Banquet at Academy of Natural Sciences
The Gala Dinner will be held at the Academy of Natural Sciences. Founded in 1812, the Academy of Natural Sciences of Drexel University is a leading natural history museum dedicated to advancing research, education, and public engagement in biodiversity and environmental science. We will be eating in the Hall of the Dinosaurs. A shuttle will be provided between 6:30pm to 10:30pm that will loop between the Academy and the university campus. |
Thursday July 2 (HotPETS)
8:15 – 9:15 Breakfast
9:15 Opening Remarks [Video]
9:30 Censorship and Anonymity (Chair: Meredith Whittaker)
- Censorship Arms Race: Research vs. Practice [Video]
Sadia Afroz, David Fifield, Michael C. Tschantz, Vern Paxson, J. D. Tygar - Tor's Usability for Censorship Circumvention [Video]
David Fifield and Linda N. Lee, Serge Egelman, David Wagner - Protecting the Tor Network from Sybil Attacks [Video]
Philipp Winter, Roya Ensafi, Karsten Loesing, Nick Feamster
10:45 Coffee Break
11:15 HotPETs Keynote Address (Chair: Susan Landau)
12:30 Lunch
2:00 Data Privacy Tools (Chair: Tariq Elahi)
- Access My Info: An Application That Helps People Create Legal Requests for Their Personal Information [Video]
Andrew Hilts, Christopher Parsons - Location Guard: Location Privacy for the Rest of Us [Video]
Konstantinos Chatzikokolakis, Catuscia Palamidessi, Marco Stronati
2:50 Coffee Break
3:10 Privacy and Secure Communication (Chair: Claudia Diaz)
- Vuvuzela: Scalable Private Messaging Resistant to Traffic Analysis
Jelle van den Hooff, David Lazar, Matei Zaharia, Nickolai Zeldovich - Certificate Cothority: Towards Trustworthy Collective CAs [Video]
Ewa Syta, Iulia Tamas, Dylan Visher, David Isaac Wolinsky, Bryan Ford
4:00 Ice Cream Break
4:20 Privacy and Human Behavior (Chair: Kat Hanna)
- Human-Centered Design for Secure Communication: Opportunities to Close the Participation Gap [Video]
Ame Elliott, Sara Sinclair Brody - Tensions and Frictions in Researching Activists' Digital Security and Privacy Practices
Maya Indira Ganesh
5:10 Closing Remarks [Video]
Friday July 3
Social Excursion: Wissahickon Woods
The woods around the Wissahickon Creek form an oasis within the city of Philadelphia. There are lot of options from the more strenuous White Trail to the more secluded Orange Trail to a more relaxed stroll on Forbidden Drive (which parallels the creek) and/or a snack at the quite tasty Valley Green Inn. More information can be found at http://www.fow.org.
Catch the bus for the hike at 11:45 a.m. at 33rd and Arch St. The bus will depart at noon. A boxed lunch will be provided.
Keynote Speakers
Jonathan Katz (University of Maryland): Secure computation: Where do we go from here?
Abstract: Secure computation was introduced by Yao in the early '80s, and received a lot of attention from theoretical cryptographers over the next two decades. More recently, secure computation has "entered the mainstream," with multiple groups claiming practical implementations, funding from several government agencies, and widespread interest from researchers in other fields.
This talk will survey some of the recent developments in this area, with a particular focus on where things are going covering both active directions of research as well as prospects for future deployment.
Bio: Jonathan Katz is a professor of computer science at the University of Maryland, and director of the Maryland Cybersecurity Center. His research interests lie broadly in the fields of cryptography, privacy, and science of cybersecurity, and he is a co-author of the widely used textbook "Introduction to Modern Cryptography." Katz was a member of the DARPA Computer Science Study Group from 2009-2010, and received a Humboldt Research Award in 2015. He currently serves as a founding member of the steering committee for the IEEE cybersecurity initiative.
Matt Blaze (University of Pennsylvania): How dark are we going?
Bio: Matt Blaze directs the Distributed Systems Lab at the University of Pennsylvania, where he is an Associate Professor of Computer and Information Science. His research focuses on the design and analysis of secure systems, with a particular interest in security technology with bearing on public policy issues, including cryptography policy (key escrow), wiretapping and surveillance, and the security of electronic voting systems.
endPage(); ?>