Issue 1
- Computation on Encrypted Data using Dataflow Authentication
Andreas Fischer (SAP Security Research), Benny Fuhry (SAP Security Research), Florian Kerschbaum (School of Computer Science, University of Waterloo, Canada), and Eric Bodden (Heinz Nixdorf Institute, University of Paderborn, Germany) - Discontinued Privacy: Personal Data Leaks in Apple Bluetooth-Low-Energy Continuity Protocols
Guillaume Celosia (Univ Lyon, INSA Lyon, Inria, CITI) and Mathieu Cunche (Univ Lyon, INSA Lyon, Inria, CITI) - The Privacy Policy Landscape After the GDPR
Thomas Linden (University of Wisconsin-Madison), Rishabh Khandelwal (University of Wisconsin-Madison), Hamza Harkous (EPFL), and Kassem Fawaz (University of Wisconsin-Madison) - Inferring Tracker-Advertiser Relationships in the Online Advertising Ecosystem using Header Bidding
John Cook (The University of Iowa), Rishab Nithyanand (The University of Iowa), and Zubair Shafiq (The University of Iowa) - Emotional and Practical Considerations towards the Adoption and Abandonment of VPNs as a Privacy-Enhancing Technology.
Moses Namara (Clemson University), Daricia Wilkinson (Clemson University), Bart Knijnenburg (Clemson University), and Kelly Caine (Clemson University) - Not All Attributes are Created Equal: 𝘥𝓧-Private Mechanisms for Linear Queries
Parameswaran Kamalaruban (EPFL), Victor Perrier (ISAE-SUPAERO & Data61, CSIRO), Hassan Jameel Asghar (Macquarie University & Data61, CSIRO), and Mohamed Ali Kaafar (Macquarie University & Data61, CSIRO) - Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks
Ankush Singla (Purdue University), Syed Rafiul Hussain (Purdue University), Omar Chowdhury (University of Iowa), Elisa Bertino (Purdue University), and Ninghui Li (Purdue University) - Pets without PETs: on the under-estimation of privacy concerns in pet wearables
Dirk van der Linden (University of Bristol), Matthew Edwards (University of Bristol), Irit Hadar (University of Haifa), and Anna Zamansky (University of Haifa) - Black-Box Wallets: Fast Anonymous Two-Way Payments for Constrained Devices
Max Hoffmann (Ruhr-University Bochum), Michael Kloo?? (Karlsruhe Institute of Technology), Markus Raiber (Karlsruhe Institute of Technology), and Andy Rupp (Karlsruhe Institute of Technology) - The Best of Both Worlds: Mitigating Trade-offs Between Accuracy and User Burden in Capturing Mobile App Privacy Preferences
Daniel Smullen (Carnegie Mellon University), Yuanyuan Feng (Carnegie Mellon University), Shikun (Aerin) Zhang (Carnegie Mellon University), and Norman Sadeh (Carnegie Mellon University) - SqORAM: Read-Optimized Sequential Write-Only Oblivious RAM
Anrin Chakraborti (Stony Brook University) and Radu Sion (Stony Brook University) - Website Fingerprinting with Website Oracles
Tobias Pulls (Karlstad University) and Rasmus Dahlberg (Karlstad University)
Issue 2
These papers are pre-prints that are not suitable for citation. The page numbers will be updated in the final versions.
- Illuminating the Dark or how to recover what should not be seen in FE-based classifiers
Sergiu Carpov (CEA LIST), Caroline Fontaine (LSV, CNRS), Damien Ligier (Wallix), Renaud Sirdey (CEA LIST), and Sergiu Carpov (CEA LIST) - Enhanced Performance and Privacy for TLS over TCP Fast Open
Erik Sy (University of Hamburg), Tobias Mueller (University of Hamburg), Christian Burkert (University of Hamburg), Hannes Federrath (University of Hamburg), and Mathias Fischer (University of Hamburg) - A Comparative Measurement Study of Web Tracking on Mobile and Desktop Environments
Zhiju Yang (Colorado School of Mines) and Chuan Yue (Colorado School of Mines) - NoMoATS: Towards Automatic Detection of Mobile Tracking
Anastasia Shuba (UC Irvine) and Athina Markopoulou (UC Irvine) - Privacy-Preserving Payment Splitting
Saba Eskandarian (Stanford University), Mihai Christodorescu (Visa Research), and Payman Mohassel (Facebook) - Protecting against Website Fingerprinting with Multihoming
Sébastien Henri (Cisco Meraki), Gines Garcia-Aviles (University Carlos III of Madrid, Spain), Pablo Serrano (University Carlos III of Madrid, Spain), Albert Banchs (IMDEA Networks Institute and University Carlos III of Madrid, Spain), and Patrick Thiran (EPFL, Switzerland) - Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym
David Harborth (Chair of Mobile Business and Multilateral Security, Goethe University Frankfurt), Dr. Sebastian Pape (Chair of Mobile Business and Multilateral Security, Goethe University Frankfurt), and Prof. Dr. Kai Rannenberg (Chair of Mobile Business and Multilateral Security, Goethe University Frankfurt) - The TV is Smart and Full of Trackers: Measuring Smart TV Advertising and Tracking
Janus Varmarken (University of California, Irvine), Hieu Le (University of California, Irvine), Anastasia Shuba (University of California, Irvine), Zubair Shafiq (University of Iowa), and Athina Markopoulou (University of California, Irvine) - SPy: Car Steering Reveals Your Trip Route!
Mert D. Pesé (University of Michigan), Xiaoying Pu (University of Michigan), and Kang G. Shin (University of Michigan) - A Framework of Metrics for Differential Privacy from Local Sensitivity
Peeter Laud (Cybernetica AS), Alisa Pankova (Cybernetica AS), and Martin Pettai (Cybernetica AS) - Secure and Scalable Document Similarity on Distributed Databases: Differential Privacy to the Rescue
Phillipp Schoppmann (Humboldt-Universität zu Berlin), Lennart Vogelsang (Humboldt-Universität zu Berlin), Adrià Gascón (The Alan Turing Institute / University of Warwick), and Borja Balle () - Differentially Private SQL with Bounded User Contribution
Royce J Wilson (Google), Celia Yuxin Zhang (Google), William Lam (Google), Damien Desfontaines (Google / ETH Zürich), Daniel Simmons-Marengo (Google), and Bryant Gipson (Google) - Listen Only When Spoken To: Interpersonal Communication Cues as Smart Speaker Privacy Controls
Abraham H. Mhaidli (University of Michigan), Manikandan Venkatesh (University of Michigan), Yixin Zou (University of Michigan), and Florian Schaub (University of Michigan) - SoK: Differential Privacies
Damien Desfontaines (ETH Zürich / Google) and Balázs Pejó (University of Luxembourg) - Angel or Devil? A Privacy Study of Mobile Parental Control Apps
Álvaro Feal (IMDEA Networks Institute / Universidad Carlos III de Madrid), Paolo Calciati (IMDEA Software Institute / Universidad Politécnica de Madrid), Narseo Vallina-Rodriguez (IMDEA Networks Institute / ICSI), Carmela Troncoso (EPFL), and Alessandra Gorla (IMDEA Sofware Institute) - Averaging Attacks on Bounded Noise-based Disclosure Control Algorithms
Hassan Jameel Asghar (Macquarie University & Data61, CSIRO) and Dali Kaafar (Macquarie University & Data61, CSIRO) - Impact of Frequency of Location Reports on the Privacy Level of Geo-indistinguishability
Ricardo Mendes (University of Coimbra), Mariana Cunha (University of Coimbra), and João P. Vilela (University of Coimbra) - Mind the Gap: Ceremonies for Applied Secret Sharing
Bailey Kacsmar (University of Waterloo), Chelsea H. Komlo (University of Waterloo), Florian Kerschbaum (University of Waterloo), and Ian Goldberg (University of Waterloo) - Privacy at a Glance: The User-Centric Design of Glanceable Data Exposure Visualizations
Daricia Wilkinson (Clemson University), Paritosh Bahirat (Clemson University), Moses Namara (Clemson University), Jing Lyu (Clemson University), Arwa Alsubhi (Clemson University), Jessica Qiu (Clemson University), Pamela J. Wisniewski (University of Central Florida), and Bart Knijnenburg (Clemson University) - Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts
Shrirang Mare (Indiana University and University of Washington), Franziska Roesner (University of Washington), Tadayoshi Kohno (University of Washington), and Tadayoshi Kohno () - FLASH: Fast and Robust Framework for Privacy-preserving Machine Learning
Megha Byali (Indian Institute of Science, Bangalore, India), Harsh Chaudhari (Indian Institute of Science, Bangalore, India), Arpita Patra (Indian Institute of Science, Bangalore, India), and Ajith Suresh (Indian Institute of Science, Bangalore, India) - Multiple Purposes, Multiple Problems: A User Study of Consent Dialogs after GDPR
Dominique Machuletz (University of Münster) and Rainer Böhme (University of Innsbruck) - Missed by Filter Lists: Detecting Unknown Third-Party Trackers with Invisible Pixels
Imane Fouad (INRIA), Nataliia Bielova (INRIA), Arnaud Legout (INRIA), and Natasa Sarafijanovic (IRIS) - A Tale of Two Trees: One Writes, and Other Reads. Optimized Oblivious Accesses to Large-Scale Blockchains
Duc V. Le (Purdue University), Lizzy Tengana Hurtado (National University of Colombia), Adil Ahmad (Purdue University), Mohsen Minaei (Purdue University), Byoungyoung Lee (Seoul National University), and Aniket Kate (Purdue University) - Identifying Influential Spreaders in a Social Network (While Preserving Privacy)
Varsha Bhat Kukkala (Indian Institute of Technology Ropar) and S.R.S. Iyengar (Indian Institute of Technology Ropar) - Long-Term Observation on Browser Fingerprinting: Users’ Trackability and Perspective
Gaston Pugliese (Friedrich-Alexander University Erlangen-Nürnberg (FAU)), Christian Riess (Friedrich-Alexander University Erlangen-Nürnberg (FAU)), Freya Gassmann (Saarland University), and Zinaida Benenson (Friedrich-Alexander University Erlangen-Nürnberg (FAU)) - T0RTT: Non-Interactive Immediate Forward-Secure Single-Pass Circuit Construction
Sebastian Lauer (Ruhr University Bochum), Kai Gellert (Paderborn University), Robert Merget (Ruhr University Bochum), Tobias Handirk (Paderborn University), and Jörg Schwenk (Ruhr University Bochum)
