Issue 1
- Generic Adaptively Secure Searchable Phrase Encryption
Zachary A. Kissel (Merrimack College) and Jie Wang (UMass Lowell) - The Onion Name System: Tor-powered Decentralized DNS for Tor Onion Services
Jesse Victors (Cigital), Ming Li (University of Arizona, Tucson), and Xinwen Fu (UMass Lowell) - Topics of Controversy: An Empirical Analysis of Web Censorship Lists
Zachary Weinberg (CMU), Mahmood Sharif (CMU), Janos Szurdi (CMU), and Nicolas Christin (CMU) - Toward Practical Secure Stable Matching
M. Sadegh Riazi (UC San Diego), Ebrahim M. Songhori (Rice University), Ahmad-Reza Sadeghi (TU Darmstadt), Thomas Schneider (TU Darmstadt), and Farinaz Koushanfar (UC San Diego) - Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning
Muhammad Ikram (Data61, CSIRO and UNSW), Hassan Jameel Asghar (Data61, CSIRO), Mohamed Ali Kaafar (Data61, CSIRO), Anirban Mahanti (Data61, CSIRO), and Balachandar Krishanmurthy (ATT Research) - PHI: Path-Hidden Lightweight Anonymity Protocol at Network Layer
Chen Chen (CMU/ETH Zurich) and Adrian Perrig (ETH Zurich) - Analyzing Remote Server Locations for Personal Data Transfers in Mobile Apps
Mojtaba Eskandari (University of Trento, Fondazione Bruno Kessler), Maqsood Ahmad (University of Trento), Anderson Santana de Oliveira (SAP), and Bruno Crispo (University of Trento, KU Leuven) - ErasuCrypto: A Light-weight Secure Data Deletion Scheme for Solid State Drives
Chen Liu (University of Delaware), Hoda Aghaei Khouzani (University of Delaware), and Chengmo Yang (University of Delaware) - Are you The One to Share? Secret Transfer with Access Structure
Yongjun Zhao (Chinese University of Hong Kong) and Sherman S. M. Chow (Chinese University of Hong Kong) - Phonion: Practical Protection of Metadata in Telephony Networks
Stephan Heuser (Intel CRI-SC, TU Darmstadt), Bradley Reaves (University of Florida), Praveen Kumar Pendyala (TU Darmstadt), Henry Carter (Villanova University), Alexandra Dmitrienko (ETH Zurich), William Enck (NC State), Negar Kiyavash (University of Illinois), Ahmad-Reza Sadeghi (Intel CRI-SC, TU Darmstadt), and Patrick Traynor (University of Florida)
Issue 2
- Waterfilling: Balancing the Tor network with maximum diversity
Florentin Rochet (Uclouvain Crypto Group) and Olivier Pereira (Uclouvain Crypto Group) - Look Before You Authorize: Using Eye-Tracking To Enforce User Attention Towards Application Permissions
Yousra Javed (University of North Carolina Charlotte) and Mohamed Shehab (University of North Carolina Charlotte) - PrivateRide: A Privacy-Enhanced Ride-Hailing Service
Anh Pham (EPFL), Italo Dacosta (EPFL), Bastien Jacot-Guillarmod (EPFL), Kévin Huguenin (LAAS-CNRS), Taha Hajar (EPFL), Florian Tramer (EPFL), Virgil Gligor (CMU), and Jean-Pierre Hubaux (EPFL) - Vulnerable GPU Memory Management: Towards Recovering Raw Data from GPU
Zhe Zhou (CUHK), Wenrui Diao (CUHK), Xiangyu Liu (CUHK), Zhou Li (ACM Menmber), Kehuan Zhang (CUHK), and Rui Liu (CUHK) - PeerFlow: Secure Load Balancing in Tor
Aaron Johnson (U.S. Naval Research Laboratory), Rob Jansen (U.S. Naval Research Laboratory), Nicholas Hopper (University of Minnesota), Aaron Segal (Yale University), and Paul Syverson (U.S. Naval Research Laboratory) - On the Privacy and Security of the Ultrasound Ecosystem
Vasilios Mavroudis (University College London), Shuang Hao (UC Santa Barbara), Yanick Fratantonio (UC Santa Barbara), Federico Maggi (Politecnico di Milano), Giovanni Vigna (UC Santa Barbara), and Christopher Kruegel (UC Santa Barbara) - Cross-cultural Privacy Prediction
Yao Li (University of California, Irvine), Alfred Kobsa (University of California, Irvine), Bart P. Knijnenburg (Clemson University), and M-H. Carolyn Nguyen (Microsoft Corporation) - Cross-Device Tracking: Measurement and Disclosures
Justin Brookman (Federal Trade Commission), Phoebe Rouge (Federal Trade Commission), Aaron Alva (Federal Trade Commission), and Tina Yeung (Federal Trade Commission) - Externally Verifiable Oblivious RAM
Joshua Gancher (Cornell University), Adam Groce (Reed College), and Alex Ledger (Reed College) - Social Engineering Attacks on Government Opponents: Target Perspectives and Defenses
William Marczak (UC Berkeley) and Vern Paxson (UC Berkeley) - Website Fingerprinting Defenses at the Application Layer
Giovanni Cherubin (Royal Holloway, University of London), Jamie Hayes (University College London), and Marc Juarez (KU Leuven)
Issue 3
- Privacy-preserving computation with trusted computing via Scramble-then-Compute
H. Dang, A. Dinh, E. Chang, B. Ooi (National University of Singapore) - Why Can't Users Choose Their Identity Providers On The Web?
K. Corre (Orange Labs/IRISA), O. Barais (IRISA/INRIA), G. Sunyé (INRIA), J. Crom (Orange Labs), V. Frey (Orange Labs) - Privacy-Preserving Interdomain Routing at Internet Scale
G. Asharov (Cornell Tech), D. Demmler (TU Darmstadt), M. Schapira (Hebrew University of Jerusalem), T. Schneider (TU Darmstadt), G. Segev (Hebrew University of Jerusalem), S. Shenker (University of California, Berkley), M. Zohner (TU Darmstadt) - Wiretapping End-to-End
Encrypted VoIP Calls: Real-World Attacks on ZRTP
D. Schürmann, F. Kabus, G. Hildermeier, L. Wolf (TU Braunschweig) - A Usability Evaluation of Tor
Launcher
L. Lee (University of California, Berkeley), D. Fifield (University of California, Berkeley), N. Malkin (University of California, Berkeley), G. Iver (University of California, Berkeley), S. Egelman (University of California, Berkeley and International Computer Science Institute), D. Wagner (University of California, Berkeley) - Sea-Glass: Enabling City-wide IMSI-Catcher Detection
P. Ney, I. Smith, G. Cadamuro, T. Kohno (University of Washington) - Hardening Stratum, the Bitcoin Pool
Mining Protocol
R. Recabarren, B. Carbunar (Florida International University) - PathShuffle: Credit Mixing and
Anonymous Payments for Ripple
P. Moreno-Sanchez (Purdue University), T. Ruffing (Saarland University), A. Kate (Purdue University) - Detecting Anti Ad-blockers in the
Wild
M. Mughees (UIUC), Z. Qian (UC Riverside), Z. Shafiq (The University of Iowa) - A Leakage-Abuse Attack Against
Multi-User Searchable Encryption
C. Van Rompay, R. Molva, M. Önen (EURECOM) - DataLair: Efficient Block Storage with
Plausible Deniability against Multi-Snapshot Adversaries
A. Chakraborti, C. Chen, R. Sion (Stony Brook University)
Issue 4
Accepted papers
- Why Privacy Is All But Forgotten - An Empirical Study of
Privacy & Sharing Attitude
Kovila P.L. Coopamootoo (University of Derby) and Thomas Gross (Newcastle University) - Personalized Pseudonyms for Servers in the Cloud
Qiuyu Xiao and Michael Reiter (University of North Carolina at Chapel Hill) and Yinqian Zhang (The Ohio State University)
Conditionally accepted papers
- DeltaShaper: Enabling Unobservable Censorship-resistant TCP
Tunneling over Videoconferencing Streams
Diogo Barradas, Nuno Santos, and Luís Rodrigues (INESC-ID / Instituto Superior Técnico, Universidade de Lisboa) - Preprocessing Based Verification of Multiparty Protocols
with Honest Majority
Peeter Laud (Cybernetica AS), Alisa Pankova (Cybernetica AS / University of Tartu / STACC), and Roman Jagomägis (Cybernetica AS) - Location Privacy for Rank-based Geo-Query Systems
Wisam Eltarjaman, Rinku Dewri, and Ramakrishna Thurimella (University of Denver) - To Permit or Not to Permit, That is the Usability Question:
Crowdsourcing Mobile Apps’ Privacy Permission Settings
Qatrunnada Ismail and Tousif Ahmed (Indiana University Bloomington), Kelly Caine (Clemson University), Apu Kapadia (Indiana University Bloomington), and Michael Reiter (University of North Carolina at Chapel Hill) - Expectation-Maximization Tensor Factorization for Practical
Location Privacy Attacks
Takao Murakami (National Institute of Advanced Industrial Science and Technology (AIST)) - What Does The Crowd Say About You? Evaluating
Aggregation-based Location Privacy
Apostolos Pyrgelis (University College London), Carmela Troncoso (IMDEA Software Institute), and Emiliano De Cristofaro (University College London) - Private Set Intersection for Unequal Set Sizes with Mobile
Applications
Agnes Kiss (TU Darmstadt), Jian Liu (Aalto University), Thomas Schneider (TU Darmstadt), N. Asokan (Aalto University), and Benny Pinkas (Bar Ilan University) - Two Is Not Enough: Privacy Assessment of Aggregation Schemes
in Smart Metering
Niklas Buescher, Spyros Boukoros, Stefan Bauregger, and Stefan Katzenbeisser (Technische Universität Darmstadt) - Bayes, not Naïve: Security Bounds on Website Fingerprinting
Defences
Giovanni Cherubin (Royal Holloway University of London) - Unlynx: A Decentralized System for Privacy-Conscious Data
Sharing
David Froelicher, Patricia Egger, João Sá Sousa, Jean Louis Raisaro, Zhicong Huang, Christian Mouchet, Bryan Ford, and Jean-Pierre Hubaux (EPFL) - Fingerprinting Past the Front Page: Identifying Keywords in
Search Engine Queries over Tor
Se Eun Oh, Nicholas Hopper, and Shuai Li (University of Minnesota) - TagIt: Tagging Network Flows using Blind Fingerprints
Fatemeh Rezaei and Amir Houmansadr (UMass Amherst) - Efficient utility improvement for location privacy
Konstantinos Chatzikokolakis (CNRS) and Ehab ElSalamouni and Catuscia Palamidessi (unaffiliated) - Certificate Transparency with Privacy
Dan Boneh (Stanford), Joseph Bonneau (Stanford/EFF), Saba Eskandarian (Stanford), and Eran Messeri (Google) - Privacy-Preserving Distributed Linear Regression on
High-Dimensional Data
Adria Gascon (University of Edinburgh), Phillipp Schoppmann (Humboldt-Universität zu Berlin), Borja Balle (Lancaster University), Mariana Raykova (Yale University), Jack Doerner (Northeastern University), Samee Zahur (Google), and David Evans (University of Virginia) - A Study of MAC Address Randomization in Mobile Devices and
When it Fails
Jeremy Martin (USNA, MITRE) and Travis Mayberry, Collin Donahue, Lucas Foppe, Lamont Brown, Chadwick Riggins, Erik C Rye, and Dane Brown (USNA) - Provably Secure Anonymous-yet-Accountable Crowdsensing with
Scalable Sublinear Revocation
Sazzadur Rahaman, Long Cheng, He Li, Danfeng (Daphne) Yao, and Jung-Min (Jerry) Park (Virginia Tech) - Systematizing Decentralization and Privacy: Lessons from 15
years of research and deployments
Carmela Troncoso (IMDEA Software Institute), Marios Isaakidis (University College London), George Danezis (Univeristy College London), and Harry Halpin (INRIA)