Issue 1
- OLYMPUS: Sensor Privacy through Utility Aware Obfuscation
Nisarg Raval (Duke University), Ashwin Machanavajjhala (Duke University), and Jerry Pan (Duke University) - RON-Gauss: Enhancing Utility in Non-Interactive Private Data Release
Thee Chanyaswad (Princeton University), Changchang Liu (Princeton University), and Prateek Mittal (Princeton University) - Privacy-preserving Similar Patient Queries for Combined Biomedical Data
Ahmed Salem (CISPA, Saarland University), Pascal Berrang (CISPA, Saarland University), Mathias Humbert (Swiss Data Science Center, ETH Zurich and EPFL), and Michael Backes (CISPA Helmholtz Center i.G.) - Tithonus: A Bitcoin Based Censorship Resilient System
Ruben Recabarren (Florida International University) and Bogdan Carbunar (Florida International University) - Systematizing Genome Privacy Research: A Privacy-Enhancing Technologies Perspective
Alexandros Mittos (University College London), Bradley Malin (Vanderbilt University), and Emiliano De Cristofaro (University College London) - My Genome Belongs to Me: Controlling Third Party Computation on Genomic Data
Dominic Deuber (Friedrich-Alexander-Universität Erlangen-Nürnberg), Christoph Egger (Friedrich-Alexander-Universität Erlangen-Nürnberg), Katharina Fech (Friedrich-Alexander-Universität Erlangen-Nürnberg), Giulio Malavolta (Friedrich-Alexander-Universität Erlangen-Nürnberg), Dominique Schröder (Friedrich-Alexander-Universität Erlangen-Nürnberg), Sri Aravinda Krishnan Thyagarajan (Friedrich-Alexander-Universität Erlangen-Nürnberg), Florian Battke (CeGaT GmbH), Claudia Durand (CeGaT GmbH), and Christoph Egger (Friedrich-Alexander-Universität Erlangen-Nürnberg) - LOGAN: Membership Inference Attacks Against Generative Models
Jamie Hayes (University College London), Luca Melis (University College London), George Danezis (University College London), and Emiliano De Cristofaro (University College London) - PD-DM: An efficient locality-preserving block device mapper with plausible deniability
Chen Chen (Stony Brook University), Anrin Chakraborti (Stony Brook University), and Radu Sion (Stony Brook University) - Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset
Thang Hoang (Oregon State University), Muslum Ozgur Ozmen (Oregon State University), Yeongjin Jang (Oregon State University), and Attila A. Yavuz (Oregon State University) - Choosing Epsilon for Privacy as a Service
Sara Krehbiel (University of Richmond) - Lethe: Conceal Content Deletion from Persistent Observers
Mohsen Minaei (Purdue University), Mainack Mondal (University of Chicago), Patrick Loiseau (Univ. Grenoble Alpes, CNRS, Inria, Grenoble INP, LIG & MPI-SWS), Krishna Gummadi (MPI-SWS), and Aniket Kate (Purdue University) - Investigating sources of PII used in Facebook’s targeted advertising
Giridhari Venkatadri (Northeastern University), Elena Lucherini (Northeastern University), Piotr Sapiezynski (Northeastern University), and Alan Mislove (Northeastern University) - Breach-Resistant Structured Encryption
Ghous Amjad (Brown University), Seny Kamara (Brown University), and Tarik Moataz (Brown University) - Private Evaluation of Decision Trees using Sublinear Cost
Anselme Tueno (SAP SE), Florian Kerschbaum (University of Waterloo), and Stefan Katzenbeisser (TU Darmstatdt)
Issue 2
- The (Co-)Location Sharing Game
Alexandra-Mihaela Olteanu (EPFL, UNIL - HEC Lausanne), Mathias Humbert (Swiss Data Science Center), Kévin Huguenin (UNIL - HEC Lausanne), and Jean-Pierre Hubaux (EPFL) - Cardinality Estimators do not Preserve Privacy
Damien Desfontaines (ETH Zürich / Google), Andreas Lochbihler (Digital Asset), and David Basin (ETH Zürich) - Together or Alone: The Price of Privacy in Collaborative Learning
Balázs Pejó (University of Luxembourg), Gergely Biczók (CrySyS Lab, Budapest Univ. of Technology and Economics), and Qiang Tang (Luxembourg Institute of Science and Technology) - Mitigating Location Privacy Attacks on Mobile Devices using Dynamic App Sandboxing
Sashank Narain (Northeastern University) and Guevara Noubir (Northeastern University) - On Privacy Notions in Anonymous Communication
Christiane Kuhn (TU Dresden), Martin Beck (TU Dresden), Stefan Schiffner (Université du Luxembourg), Eduard Jorswieck (TU Dresden), and Thorsten Strufe (TU Dresden) - Privacy Protection for Audio Sensing Against Multi-Microphone Adversaries
Chuhan Gao (University of Wisconsin-Madison), Kassem Fawaz (University of Wisconsin-Madison), Sanjib Sur (University of South Carolina), and Suman Banerjee (University of Wisconsin-Madison) - SoK: Modular and Efficient Private Decision Tree Evaluation
Ágnes Kiss (TU Darmstadt), Masoud Naderpour (University of Helsinki), Jian Liu (UC Berkeley), N. Asokan (Aalto University), and Thomas Schneider (TU Darmstadt) - Skip, Skip, Skip Accept!!! A study on the Usability of Smartphone Manufacturer Provided Default Features and User Privacy
Kopo M. Ramokapane (University of Bristol), Anthony Mazeli (Lancaster University), and Awais Rashid (University of Bristol) - Oblivious DNS: Practical Privacy for DNS Queries
Paul Schmitt (Princeton University), Anne Edmundson (Princeton University), Allison Mankin (Salesforce), and Nick Feamster (Princeton University) - Privacy Loss Classes: The Central Limit Theorem in Differential Privacy
David Sommer (ETH Zurich), Sebastian Meiser (UCL), and Esfandiar Mohammadi (ETH Zurich) - MorphIT: Morphing Packet Reports for Internet Transparency
Georgia Fragkouli (EPFL), Katerina Argyraki (EPFL), and Bryan Ford (EPFL) - 4 Years of EU Cookie Law: Results and Lessons Learned
Martino Trevisan (Politecnico di Torino), Stefano Traverso (Politecnico di Torino), Eleonora Bassi (Politecnico di Torino), and Marco Mellia (Politecnico di Torino) - DPSelect: A Differential Privacy Based Guard Relay Selection Algorithm for Tor
Hans Hanley (Princeton University), Yixin Sun (Princeton University), Sameer Wagh (Princeton University), and Prateek Mittal (Princeton University) - Finding a Needle in a Haystack: The Traffic Analysis Version
Abdullah Qasem (Concordia University), Sami Zhioua (KFUPM), and Karima Makhlouf (Imam Abdulrahman Bin Faisal University) - AccessiLeaks: Investigating Privacy Leaks Exposed by the Android Accessibility Service
Mohammad Naseri (Saarland University), Nataniel P. Borges Jr. (CISPA Helmholtz Center i.G.), Andreas Zeller (CISPA Helmholtz Center i.G.), and Romain Rouvoy (University of Lille / Inria / IUF)
Issue 3
- Reducing Metadata Leakage from Encrypted Files and Communication with PURBs
Kirill Nikitin(EPFL), Ludovic Barman (EPFL), Wouter Lueks (EPFL), Matthew Underwood, Jean-Pierre Hubaux (EPFL), and Bryan Ford (EPFL) - SecureNN: 3-Party Secure Computation for Neural Network Training
Sameer Wagh (Princeton University), Divya Gupta (Microsoft Research), and Nishanth Chandran (Microsoft Research) - MAPS: Scaling Privacy Compliance Analysis to a Million Apps
Sebastian Zimmeck (Wesleyan University), Peter Story (Carnegie Mellon University), Daniel Smullen (Carnegie Mellon University), Abhilasha Ravichander (Carnegie Mellon University), Ziqi Wang (Carnegie Mellon University), Joel Reidenberg (Fordham University), N. Cameron Russell (Fordham University), and Norman Sadeh (Carnegie Mellon University) - Setup-Free Secure Search on Encrypted Data: Faster and Post-Processing Free
Adi Akavia (University of Haifa), Craig Gentry (IBM Research), Shai Halevi (IBM Research), and Max Leibovich (University of Haifa) - Keeping the Smart Home Private with Smart(er) Traffic Shaping
Noah Apthorpe (Princeton University), Danny Yuxing Huang (Princeton University), Dillon Reisman (Princeton University), Arvind Narayanan (Princeton University), and Nick Feamster (Princeton University) - Investigating People's Privacy Risk Perception
Nina Gerber (Karlsruhe Institute of Technology), Benjamin Reinheimer (Karlsruhe Institute of Technology), and Melanie Volkamer (Karlsruhe Institute of Technology) - ConsenSGX: Scaling Anonymous Communications Networks with Trusted Execution Environments
Sajin Sasy (University of Waterloo) and Ian Goldberg (University of Waterloo) - Circumventing Cryptographic Deniability with Remote Attestation
Lachlan J. Gunn (Aalto University), Ricardo Vieitez Parra (Aalto University), and N. Asokan (Aalto University) - StealthDB: a Scalable Encrypted Database with Full SQL Query Support
Dhinakaran Vinayagamurthy (University of Waterloo), Alexey Gribov (Symbiont.io), and Sergey Gorbunov (University of Waterloo and Algorand) - Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments
Edwin Dauber (Drexel University), Aylin Caliskan (George Washington University), Richard Harang (Sophos, Data Science Team), Gregory Shearer (ICF International), Michael Weisman (United States Army Research Laboratory), Frederica Nelson (United States Army Research Laboratory), and Rachel Greenstadt (Drexel University) - Cryptography for #MeToo
Benjamin Kuykendall (Princeton University), Hugo Krawczyk (IBM Research), and Tal Rabin (IBM Research) - Cheaper Private Set Intersection via Differentially Private Leakage
Adam Groce (Reed College), Peter Rindal (Visa Research), and Mike Rosulek (Oregon State University) - Tracking Anonymized Bluetooth Devices
Johannes K Becker (Boston University), David Li (Boston University), and David Starobinski (Boston University) - New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols
Ravi Borgaonkar (SINTEF Digital, Norway), Lucca Hirschi (Inria & LORIA, France), Shinjo Park (Technische Universität Berlin, Germany), and Altaf Shaik (Technische Universität Berlin, Germany) - Mesh: A Supply Chain Solution with Locally Private Blockchain Transactions
Riham AlTawy (University of Waterloo) and Guang Gong (University of Waterloo) - Encrypted Databases for Differential Privacy
Archita Agarwal (Brown University), Maurice Herlihy (Brown University), Seny Kamara (Brown University), and Tarik Moataz (Brown University) - p-FP: Extraction, Classification, and Prediction of Website Fingerprints with Deep Learning
Se Eun Oh (University of Minnesota), Saikrishna Sunkam (University of Minnesota), and Nicholas Hopper (University of Minnesota) - Snapdoc: Authenticated snapshots with history privacy in peer-to-peer collaborative editing
Stephan A. Kollmann (University of Cambridge), Martin Kleppmann (University of Cambridge), and Alastair R. Beresford (University of Cambridge) - Investigating Statistical Privacy Frameworks from the Perspective of Hypothesis Testing
Changchang Liu (Princeton University), Xi He (Duke University), Thee Chanyaswad (Princeton University), Shiqiang Wang (IBM Research), and Prateek Mittal (Princeton University) - A QUIC Look at Web Tracking
Erik Sy (University of Hamburg), Christian Burkert (University of Hamburg), Hannes Federrath (University of Hamburg), and Mathias Fischer (University of Hamburg) - ScrambleDB: Oblivious (Chameleon) Pseudonymization-as-a-Service
Anja Lehmann (IBM Research - Zurich) - Improved Differentially Private Analysis of Variance
Marika Swanberg (Reed College), Ira Globus-Harris (Reed College), Iris Griffith (Reed College), Adam Groce (Reed College), and Andrew Bray (Reed College)
Note: Acceptance of some of these papers is conditional upon approval from a shepherd.
Issue 4
- Handoff All Your Privacy - A Review of Apple's Bluetooth Low Energy
Implementation
Jeremy Martin (MITRE), Douglas Alpuche (USNA), Kristina Bodeman (USNA), Lamont Brown (USNA), Ellis Fenske (USNA), Lucas Foppe (USNA), Travis Mayberry (USNA), Erik C. Rye (CMAND), Brandon Sipes (USNA), and Sam Teplov (USNA) - A Girl Has No Name: Automated Authorship Obfuscation using Mutant-X
Asad Mahmood (University of Iowa), Faizan Ahmad (Lahore University of Management Sciences and University of Virginia), Zubair Shafiq (University of Iowa), Padmini Srinivasan (University of Iowa), and Fareed Zaffar (Lahore University of Management Sciences) - TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing
Elena Pagnin (Aarhus University), Gunnar Gunnarsson (Chalmers University of Technology), Pedram Talebi (Chalmers University of Technology), Claudio Orlandi (Aarhus University), and Andrei Sabelfeld (Chalmers University of Technology) - Security-Efficiency Tradeoffs in Searchable Encryption -- Lower
Bounds and Optimal Constructions
Raphael Bost (Direction Générale de l&primeArmement) and Pierre-Alain Fouque (Université de Rennes 1) - No Place to Hide: Inadvertent Location Privacy Leaks on
Twitter
Jonathan Rusert (University of Iowa), Osama Khalid (University of Iowa), Dat Hong (University of Iowa), Zubair Shafiq (University of Iowa), and Padmini Srinivasan (University of Iowa) - Uninformed but Unconcerned: Privacy Attitudes of Smart Speaker
Users
Nathan Malkin (University of California, Berkeley), Joe Deatrick (University of California, Berkeley), Allen Tong (University of California, Berkeley), Primal Wijesekera (University of California, Berkeley & International Computer Science Institute), Serge Egelman (University of California, Berkeley & International Computer Science Institute), and David Wagner (University of California, Berkeley) - Guard Placement Attacks on Location-Based Path Selection Algorithms
in Tor
Gerry Wan (Princeton University), Aaron Johnson (U.S. Naval Research Laboratory), Ryan Wails (U.S. Naval Research Laboratory), Sameer Wagh (Princeton University), and Prateek Mittal (Princeton University) - Detecting TCP/IP Connections via IPID Hash Collisions
Geoffrey Alexander (University of New Mexico), Antonio M. Espinoza (University of New Mexico), and Jedidiah R. Crandall (University of New Mexico) - #DontTweetThis: Scoring Private Information in Social
Networks
Qiaozhi Wang (University of Kansas), Hao Xue (University of Kansas), Fengjun Li (University of Kansas), Dongwon Lee (Penn State University), and Bo Luo (University of Kansas) - A Bit More Than a Bit Is More Than a Bit Better: Faster
(essentially) optimal-rate many-server PIR
Syed Mahbub Hafiz (Indiana University) and Ryan Henry (University of Calgary) - Because... I was told... so much: Linguistic Indicators of Mental
Health Status on Twitter
Janith Weerasinghe (New York University), Kediel Morales (Drexel University), Rachel Greenstadt (New York University), and Janith Weerasinghe (New York University) - The privacy of the TLS 1.3 protocol
Ghada Arfaoui (Orange, France), Xavier Bultel (Univ Rennes 1, France), Pierre-Alain Fouque (Univ Rennes 1, France), Adina Nedelcu (Orange, France), and Cristina Onete (Université Limoges, France) - “What if?” Predicting Individual Users’ Smart Home Privacy Preferences and Their Changes
Natã M. Barbosa (Syracuse University), Joon Park (Syracuse University), Yaxing Yao (Syracuse University), and Yang Wang (Syracuse University) - Monte Carlo and Reconstruction Membership Inference Attacks against
Generative Models
Benjamin Hilprecht (TU Darmstadt), Martin Härterich (SAP SE), and Daniel Bernau (SAP SE) - Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on
Deep Learning
Sanjit Bhat (MIT PRIMES), David Lu (MIT PRIMES), Albert Kwon (MIT), and Srinivas Devadas (MIT)