Issue 1
- Efficient Dynamic Searchable Encryption with Forward Privacy
 Mohammad Etemad (University of Virginia), Alptekin Küpçü (Koç University), Charalampos Papamanthou (University of Maryland, College Park), and David Evans (University of Virginia)
- Improved Strongly Deniable Authenticated Key Exchanges for Secure Messaging
 Nik Unger (University of Waterloo) and Ian Goldberg (University of Waterloo)
- SafePub: A Truthful Data Anonymization Algorithm With Strong Privacy Guarantees
 Raffael Bild (Technical University of Munich, Germany), Klaus A. Kuhn (Technical University of Munich, Germany), and Fabian Prasser (Technical University of Munich, Germany)
- Every Move You Make: Exploring Practical Issues in Smartphone Motion Sensor Fingerprinting and Countermeasures
 Anupam Das (Carnegie Mellon University), Nikita Borisov (University of Illinois at Urbana-Champaign), and Edward Chou (University of Illinois at Urbana-Champaign)
- I never signed up for this! Privacy implications of email tracking
 Steven Englehardt (Princeton), Jeffrey Han (Princeton), and Arvind Narayanan (Princeton)
- Recognizing and Imitating Programmer Style: Adversaries in Program Authorship Attribution
 Lucy Simko (University of Washington), Luke Zettlemoyer (University of Washington), and Tadayoshi Kohno (University of Washington)
- Guard Sets in Tor using AS Relationships
 Mohsen Imani (The University of Texas at Arlington), Armon Barton (The University of Texas at Arlington), and Matthew Wright (Rochester Institute of Technology)
Issue 2
- Privacy-preserving Wi-Fi Analytics
 Mohammad Alaggan (Univ Lyon, Inria, INSA Lyon, CITI, F-69621 Villeurbanne, France), Mathieu Cunche (Univ Lyon, INSA Lyon, Inria, CITI, France), and Sébastien Gambs (Université du Québec à Montréal, Canada)
- Dropping on the Edge: Flexibility and Traffic Confirmation in Onion Routing Protocols
 Florentin Rochet (Uclouvain Crypto Group) and Olivier Pereira (Uclouvain Crypto Group)
- Cracking ShadowCrypt: Exploring the Limitations of Secure I/O Systems in Internet Browsers
 Michael Freyberger (Princeton University), Warren He (UC Berkeley), Devdatta Akhawe (Dropbox), Michelle Mazurek (Princeton University), and Prateek Mittal (Princeton University)
- Functional Credentials
 Dominic Deuber (Friedrich-Alexander-Universität Erlangen-Nürnberg), Matteo Maffei (TU Vienna), Giulio Malavolta (Friedrich-Alexander-Universität Erlangen-Nürnberg), Max Rabkin (), Dominique Schöder (Friedrich-Alexander-Universität Erlangen-Nürnberg), and Mark Simkin (Aarhus University)
- Onion-AE: Foundations of Nested Encryption
 Yusi Zhang (University of California, Davis) and Phillip Rogaway (University of California, Davis)
- Möbius: Trustless Tumbling for Transaction Privacy
 Sarah Meiklejohn (University College London) and Rebekah Mercer (Aarhus University)
- Touch and You're Trapp(ck)ed: Quantifying the Uniqueness of Touch Gestures for Tracking
 Rahat Masood (UNSW, CSIRO Data61), Benjamin Zi Hao Zhao (CSIRO Data61, UNSW), Hassan Jameel Asghar (CSIRO Data61), and Mohamed Ali Kaafar (CSIRO Data61)
Issue 3
- Quantifying Privacy Loss of Human Mobility Graph Topology
 Dionysis Manousakas (University of Cambridge), Cecilia Mascolo (University of Cambridge), Alastair Beresford (University of Cambridge), Dennis Chan (University of Cambridge), and Nikhil Sharma (University College London)
- Tempest: Temporal Dynamics in Anonymity Systems
 Ryan Wails (U.S. Naval Research Laboratory), Yixin Sun (Princeton University), Aaron Johnson (U.S. Naval Research Laboratory), Mung Chiang (Princeton University), and Prateek Mittal (Princeton University)
- Secure asymmetry and deployability for decoy routing systems
 Cecylia Bocovich (University of Waterloo) and Ian Goldberg (University of Waterloo)
- "Won't Somebody Think of the Children" Privacy Analysis at Scale: A Case Study With COPPA
 Irwin Reyes (International Computer Science Institute), Primal Wijesekera (University of British Columbia), Joel Reardon (University of Calgary), Amit Elazari (University of California - Berkeley), Abbas Razaghpanah (Stony Brook University), Narseo Vallina Rodriguez (International Computer Science Institute, IMDEA Networks), and Serge Egelman (International Computer Science Institute, University of California - Berkeley)
- Toward Distribution Estimation under Local Differential Privacy with Small Samples
 Takao Murakami (National Institute of Advanced Industrial Science and Technology (AIST)), Hideitsu Hino (University of Tsukuba), and Jun Sakuma (University of Tsukuba)
- Undermining Privacy in the Aircraft Communications Addressing and Reporting System (ACARS)
 Matthew Smith (University of Oxford), Daniel Moser (ETH Zurich), Martin Strohmeier (University of Oxford), Vincent Lenders (armasuisse), and Ivan Martinovic (University of Oxford)
- Privacy-preserving Machine Learning as a Service
 Hassan Takabi (University of North Texas), Ehsan Hesamifard (University of North Texas), Mehdi Ghasemi (University of Saskatchewan), and Rebecca N. Wright (University of Rutgers)
- An Empirical Analysis of Traceability in the Monero Blockchain
 Malte Möser (Princeton University), Kyle Soska (CMU), Ethan Heilman (Boston University), Kevin Lee (UIUC), Henry Heffan (Brookline High School), Shashvat Srivastava (Shrewsbury High School), Kyle Hogan (Boston University), Jason Hennessey (Boston University), Andrew Miller (UIUC), Arvind Narayanan (Princeton University), and Nicolas Christin (CMU)
- Privacy Pass: Bypassing Internet Challenges Anonymously
 Alex Davidson (Royal Holloway, University of London), Ian Goldberg (University of Waterloo), Nick Sullivan (Cloudflare), George Tankersley (Independent), and Filippo Valsorda (Independent)
- Consistent Synchronous Group Off-The-Record Messaging with SYM-GOTR
 Michael Schliep (University of Minnesota), Eugene Vasserman (Kansas State University), and Nicholas Hopper (University of Minnesota)
Issue 4
Note that some of these papers are accepted on the condition that a shepherd approves final edits.
- Turtles, Locks, and Bathrooms: Understanding Mental Models of Privacy Through Illustration
 Maggie Oates (Carnegie Mellon University), Yama Ahmadullah (Carnegie Mellon University), Abigail Marsh (Carnegie Mellon University), Chelse Swoopes (Carnegie Mellon University), Shikun Zhang (Carnegie Mellon University), Rebecca Balebako (Carnegie Mellon University), and Lorrie Cranor (Carnegie Mellon University)
- Panoptispy: Characterizing Audio and Video Exfiltration from Android Applications
 Elleen Pan (Northeastern University), Jingjing Ren (Northeastern University), Martina Lindorfer (UC Santa Barbara), Christo Wilson (Northeastern University), and David Choffnes (Northeastern University)
- Exploiting TLS Client Authentication for Widespread User Tracking
 Lucas Foppe (USNA), Jeremy Martin (USNA, MITRE), Travis Mayberry (USNA), Erik C. Rye (USNA), and Lamont Brown (USNA)
- Differentially Private Oblivious RAM
 Sameer Wagh (Princeton University), Paul Cuff (Renaissance Technologies), and Prateek Mittal (Princeton University)
- Making NSEC5 Practical for DNSSEC
 Dimitrios Papadopoulos (Hong Kong University of Science & Technology), Duane Wessels (Verisign Labs), Shumon Huque (Salesforce), Jan Včelák (NS1), Moni Naor (Weizmann Institute), Leonid Reyzin (Boston University), and Sharon Goldberg (Boston University)
- Modeling the Online Advertising Ecosystem Using Inclusion Graphs
 Muhammad Ahmad Bashir (Northeastern University) and Christo Wilson (Northeastern University)
- Privacy-Preserving Search of Similar Patients in Genomic Data
 Gilad Asharov (Cornell Tech), Shai Halevi (IBM Research), Yehuda Lindell (Bar Ilan University), and Tal Rabin (IBM Research)
- NoMoAds: Effective and Efficient Cross-App Mobile Ad-Blocking
 Anastasia Shuba (UC Irvine), Athina Markopoulou (UC Irvine), and Zubair Shafiq (University of Iowa)
- Power to peep-all: Inference Attacks by Malicious Batteries on Mobile Devices
 Pavel Lifshits (Technion), Roni Forte (Technion), Yedid Hoshen (Hebrew University, Jerusalem), Matt Halpern (University of Texas at Austin), Manuel Philipose (University of Texas at Austin), Mohit Tiwari (University of Texas at Austin), and Mark Silberstein (Technion)
- PIR-PSI: Scaling Private Contact Discovery
 Daniel Demmler (TU Darmstadt), Peter Rindal (Oregon State University), Mike Rosulek (Oregon State University), and Ni Trieu (Oregon State University)
- When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies
 Steven Goldfeder (Princeton University), Harry Kalodner (Princeton University), Dillon Reisman (Princeton University), and Arvind Narayanan (Princeton University)
- Feature selection for website fingerprinting
 Junhua Yan (University of North Carolina at Chapel Hill) and Jasleen Kaur (University of North Carolina at Chapel Hill)
