Issue 1
- Efficient Dynamic Searchable Encryption with Forward Privacy
Mohammad Etemad (University of Virginia), Alptekin Küpçü (Koç University), Charalampos Papamanthou (University of Maryland, College Park), and David Evans (University of Virginia) - Improved Strongly Deniable Authenticated Key Exchanges for Secure Messaging
Nik Unger (University of Waterloo) and Ian Goldberg (University of Waterloo) - SafePub: A Truthful Data Anonymization Algorithm With Strong Privacy Guarantees
Raffael Bild (Technical University of Munich, Germany), Klaus A. Kuhn (Technical University of Munich, Germany), and Fabian Prasser (Technical University of Munich, Germany) - Every Move You Make: Exploring Practical Issues in Smartphone Motion Sensor Fingerprinting and Countermeasures
Anupam Das (Carnegie Mellon University), Nikita Borisov (University of Illinois at Urbana-Champaign), and Edward Chou (University of Illinois at Urbana-Champaign) - I never signed up for this! Privacy implications of email tracking
Steven Englehardt (Princeton), Jeffrey Han (Princeton), and Arvind Narayanan (Princeton) - Recognizing and Imitating Programmer Style: Adversaries in Program Authorship Attribution
Lucy Simko (University of Washington), Luke Zettlemoyer (University of Washington), and Tadayoshi Kohno (University of Washington) - Guard Sets in Tor using AS Relationships
Mohsen Imani (The University of Texas at Arlington), Armon Barton (The University of Texas at Arlington), and Matthew Wright (Rochester Institute of Technology)
Issue 2
- Privacy-preserving Wi-Fi Analytics
Mohammad Alaggan (Univ Lyon, Inria, INSA Lyon, CITI, F-69621 Villeurbanne, France), Mathieu Cunche (Univ Lyon, INSA Lyon, Inria, CITI, France), and Sébastien Gambs (Université du Québec à Montréal, Canada) - Dropping on the Edge: Flexibility and Traffic Confirmation in Onion Routing Protocols
Florentin Rochet (Uclouvain Crypto Group) and Olivier Pereira (Uclouvain Crypto Group) - Cracking ShadowCrypt: Exploring the Limitations of Secure I/O Systems in Internet Browsers
Michael Freyberger (Princeton University), Warren He (UC Berkeley), Devdatta Akhawe (Dropbox), Michelle Mazurek (Princeton University), and Prateek Mittal (Princeton University) - Functional Credentials
Dominic Deuber (Friedrich-Alexander-Universität Erlangen-Nürnberg), Matteo Maffei (TU Vienna), Giulio Malavolta (Friedrich-Alexander-Universität Erlangen-Nürnberg), Max Rabkin (), Dominique Schöder (Friedrich-Alexander-Universität Erlangen-Nürnberg), and Mark Simkin (Aarhus University) - Onion-AE: Foundations of Nested Encryption
Yusi Zhang (University of California, Davis) and Phillip Rogaway (University of California, Davis) - Möbius: Trustless Tumbling for Transaction Privacy
Sarah Meiklejohn (University College London) and Rebekah Mercer (Aarhus University) - Touch and You're Trapp(ck)ed: Quantifying the Uniqueness of Touch Gestures for Tracking
Rahat Masood (UNSW, CSIRO Data61), Benjamin Zi Hao Zhao (CSIRO Data61, UNSW), Hassan Jameel Asghar (CSIRO Data61), and Mohamed Ali Kaafar (CSIRO Data61)
Issue 3
- Quantifying Privacy Loss of Human Mobility Graph Topology
Dionysis Manousakas (University of Cambridge), Cecilia Mascolo (University of Cambridge), Alastair Beresford (University of Cambridge), Dennis Chan (University of Cambridge), and Nikhil Sharma (University College London) - Tempest: Temporal Dynamics in Anonymity Systems
Ryan Wails (U.S. Naval Research Laboratory), Yixin Sun (Princeton University), Aaron Johnson (U.S. Naval Research Laboratory), Mung Chiang (Princeton University), and Prateek Mittal (Princeton University) - Secure asymmetry and deployability for decoy routing systems
Cecylia Bocovich (University of Waterloo) and Ian Goldberg (University of Waterloo) - "Won't Somebody Think of the Children" Privacy Analysis at Scale: A Case Study With COPPA
Irwin Reyes (International Computer Science Institute), Primal Wijesekera (University of British Columbia), Joel Reardon (University of Calgary), Amit Elazari (University of California - Berkeley), Abbas Razaghpanah (Stony Brook University), Narseo Vallina Rodriguez (International Computer Science Institute, IMDEA Networks), and Serge Egelman (International Computer Science Institute, University of California - Berkeley) - Toward Distribution Estimation under Local Differential Privacy with Small Samples
Takao Murakami (National Institute of Advanced Industrial Science and Technology (AIST)), Hideitsu Hino (University of Tsukuba), and Jun Sakuma (University of Tsukuba) - Undermining Privacy in the Aircraft Communications Addressing and Reporting System (ACARS)
Matthew Smith (University of Oxford), Daniel Moser (ETH Zurich), Martin Strohmeier (University of Oxford), Vincent Lenders (armasuisse), and Ivan Martinovic (University of Oxford) - Privacy-preserving Machine Learning as a Service
Hassan Takabi (University of North Texas), Ehsan Hesamifard (University of North Texas), Mehdi Ghasemi (University of Saskatchewan), and Rebecca N. Wright (University of Rutgers) - An Empirical Analysis of Traceability in the Monero Blockchain
Malte Möser (Princeton University), Kyle Soska (CMU), Ethan Heilman (Boston University), Kevin Lee (UIUC), Henry Heffan (Brookline High School), Shashvat Srivastava (Shrewsbury High School), Kyle Hogan (Boston University), Jason Hennessey (Boston University), Andrew Miller (UIUC), Arvind Narayanan (Princeton University), and Nicolas Christin (CMU) - Privacy Pass: Bypassing Internet Challenges Anonymously
Alex Davidson (Royal Holloway, University of London), Ian Goldberg (University of Waterloo), Nick Sullivan (Cloudflare), George Tankersley (Independent), and Filippo Valsorda (Independent) - Consistent Synchronous Group Off-The-Record Messaging with SYM-GOTR
Michael Schliep (University of Minnesota), Eugene Vasserman (Kansas State University), and Nicholas Hopper (University of Minnesota)
Issue 4
Note that some of these papers are accepted on the condition that a shepherd approves final edits.
- Turtles, Locks, and Bathrooms: Understanding Mental Models of Privacy Through Illustration
Maggie Oates (Carnegie Mellon University), Yama Ahmadullah (Carnegie Mellon University), Abigail Marsh (Carnegie Mellon University), Chelse Swoopes (Carnegie Mellon University), Shikun Zhang (Carnegie Mellon University), Rebecca Balebako (Carnegie Mellon University), and Lorrie Cranor (Carnegie Mellon University) - Panoptispy: Characterizing Audio and Video Exfiltration from Android Applications
Elleen Pan (Northeastern University), Jingjing Ren (Northeastern University), Martina Lindorfer (UC Santa Barbara), Christo Wilson (Northeastern University), and David Choffnes (Northeastern University) - Exploiting TLS Client Authentication for Widespread User Tracking
Lucas Foppe (USNA), Jeremy Martin (USNA, MITRE), Travis Mayberry (USNA), Erik C. Rye (USNA), and Lamont Brown (USNA) - Differentially Private Oblivious RAM
Sameer Wagh (Princeton University), Paul Cuff (Renaissance Technologies), and Prateek Mittal (Princeton University) - Making NSEC5 Practical for DNSSEC
Dimitrios Papadopoulos (Hong Kong University of Science & Technology), Duane Wessels (Verisign Labs), Shumon Huque (Salesforce), Jan Včelák (NS1), Moni Naor (Weizmann Institute), Leonid Reyzin (Boston University), and Sharon Goldberg (Boston University) - Modeling the Online Advertising Ecosystem Using Inclusion Graphs
Muhammad Ahmad Bashir (Northeastern University) and Christo Wilson (Northeastern University) - Privacy-Preserving Search of Similar Patients in Genomic Data
Gilad Asharov (Cornell Tech), Shai Halevi (IBM Research), Yehuda Lindell (Bar Ilan University), and Tal Rabin (IBM Research) - NoMoAds: Effective and Efficient Cross-App Mobile Ad-Blocking
Anastasia Shuba (UC Irvine), Athina Markopoulou (UC Irvine), and Zubair Shafiq (University of Iowa) - Power to peep-all: Inference Attacks by Malicious Batteries on Mobile Devices
Pavel Lifshits (Technion), Roni Forte (Technion), Yedid Hoshen (Hebrew University, Jerusalem), Matt Halpern (University of Texas at Austin), Manuel Philipose (University of Texas at Austin), Mohit Tiwari (University of Texas at Austin), and Mark Silberstein (Technion) - PIR-PSI: Scaling Private Contact Discovery
Daniel Demmler (TU Darmstadt), Peter Rindal (Oregon State University), Mike Rosulek (Oregon State University), and Ni Trieu (Oregon State University) - When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies
Steven Goldfeder (Princeton University), Harry Kalodner (Princeton University), Dillon Reisman (Princeton University), and Arvind Narayanan (Princeton University) - Feature selection for website fingerprinting
Junhua Yan (University of North Carolina at Chapel Hill) and Jasleen Kaur (University of North Carolina at Chapel Hill)