Accepted papers for PETS 2022
Issue 1
- Personal Information Inference from Voice Recordings: User Awareness and Privacy Concerns
Jacob Leon Kröger (Technische Universität Berlin, Germany), Leon Konstantin Gellrich (Universität Potsdam, Germany), Sebastian Pape (Goethe Universität, Frankfurt, Germany), Saba Rebecca Brause (Technische Universität Berlin, Germany), Stefan Ullrich (Technische Universität Berlin, Germany)
- MLEFlow: Learning from History to Improve Load Balancing in Tor
Hussein Darir (University of Illinois at Urbana-Champaign), Hussein Sibai (University of Illinois at Urbana-Champaign), Chin-Yu Cheng (University of Illinois at Urbana-Champaign), Nikita Borisov (University of Illinois at Urbana-Champaign), Geir Dullerud (University of Illinois at Urbana-Champaign), and Sayan Mitra (University of Illinois at Urbana-Champaign)
- How Can and Would People Protect from Online Tracking?
Maryam Mehrnezhad (Newcastle University), Kovila Coopamootoo (Newcastle University), and Ehsan Toreini (Durham University)
- Towards Improving Code Stylometry Analysis in Underground Forums
Michal Tereszkowski-Kaminski (King's College London), Sergio Pastrana (Universidad Carlos III de Madrid), Jorge Blasco (Royal Holloway, University of London), and Guillermo Suarez-Tangil (IMDEA Networks Institute and King's College London)
- Ulixes: Facial Recognition Privacy with Adversarial Machine Learning
Thomas Cilloni (University of Mississippi), Wei Wang (Xi'an Jiaotong-Liverpool University), Charles Walter (University of Mississippi), and Charles Fleming (University of Mississippi)
- If This Context Then That Concern: Exploring users' concerns with IFTTT applets
Mahsa Saeidi (Oregon State University), McKenzie Calvert (Oregon State University), Audrey W. Au (Oregon State University), Anita Sarma (Oregon State University), and Rakesh B. Bobba (Oregon State University)
- User Perceptions of Gmail’s Confidential Mode
Elham Al Qahtani (University of North Carolina at Charlotte), Yousra Javed (National University of Sciences and Technology), and Mohamed Shehab (University of North Carolina at Charlotte)
- Toward Uncensorable, Anonymous and Private Access Over Satoshi Blockchains
Ruben Recabarren (Florida International University) and Bogdan Carbunar (Florida International University)
- OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers
Darion Cassel (Carnegie Mellon University), Su-Chin Lin (National Taiwan University), Alessio Buraggina (University of Miami), William Wang (University of Chicago), Andrew Zhang (University of Illinos Urbana-Champaign), Lujo Bauer (Carnegie Mellon University), Hsu-Chun Hsiao (National Taiwan University), Limin Jia (Carnegie Mellon University), and Timothy Libert (Google)
- Making the Most of Parallel Composition in Differential Privacy
Josh Smith (Data61, CSIRO), Hassan Jameel Asghar (Macquarie University and Data61, CSIRO), Gianpaolo Gioiosa (Data61, CSIRO), Sirine Mrabet (Data61, CSIRO), Serge Gaspers (University of New South Wales), and Paul Tyler (Data61, CSIRO)
- Zen and the art of model adaptation: Low-utility-cost attack mitigations in collaborative machine learning
Dmitrii Usynin (Imperial College, TU Munich), Jonathan Passerat-Palmbach (Imperial College, ConsenSys Health), Georgios Kaissis (TU Munich, Imperial College), and Daniel Rueckert (TU Munich, Imperial College)
- AriaNN: Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing
Théo Ryffel (INRIA, DI ENS, ENS, CNRS, PSL University, Paris, France), Pierre Tholoniat (Columbia University, New York, USA), David Pointcheval (DI ENS, ENS, CNRS, PSL University, INRIA, Paris, France), and Francis Bach (INRIA, DI ENS, ENS, CNRS, PSL University, Paris, France)
- Proof-of-Vax: Studying User Preferences and Perception of Covid Vaccination Certificates
Marvin Kowalewski (Ruhr University Bochum), Franziska Herbert (Ruhr University Bochum), Theodor Schnitzler (Ruhr University Bochum), and Markus Dürmuth (Ruhr University Bochum)
- Differentially private partition selection
Damien Desfontaines (Google / ETH Zürich), James Voss (Google), Bryant Gipson (Google), and Chinmoy Mandayam (Google)
- Circuit-PSI with Linear Complexity via Relaxed Batch OPPRF
Nishanth Chandran (Microsoft Research, India), Divya Gupta (Microsoft Research, India), and Akash Shah (Microsoft Research, India)
- Multiparty Reach and Frequency Histogram: Private, Secure and Practical
Badih Ghazi (Google), Ravi Kumar (Google), Ben Kreuter (Google), Pasin Manurangsi (Google), Jiayu Peng (Google), Evgeny Skvortsov (Google), Yao Wang (Google), and Craig Wright (Google)
- Polymath: Low-Latency MPC via Secure Polynomial Evaluations and its Applications
Donghang Lu (Purdue University), Albert Yu (Purdue University), Aniket Kate (Purdue University), and Hemanta Maji (Purdue University)
- Privacy-preserving FairSwap: Fairness and Privacy Interplay
Sepideh Avizheh (University of Calgary), Preston Haffey (University of Calgary), and Reihaneh Safavi-Naini (University of Calgary)
- If You Like Me, Please Don’t "Like" Me: Inferring Vendor Bitcoin Addresses From Positive Reviews
Jochen Schäfer (University of Mannheim), Christian Müller (University of Mannheim), and Frederik Armknecht (University of Mannheim)
- Disparate Vulnerability to Membership Inference Attacks
Bogdan Kulynych (EPFL), Mohammad Yaghini (University of Toronto), Giovanni Cherubin (Alan Turing Institute), Michael Veale (University College London), and Carmela Troncoso (EPFL)
- Privacy-preserving High-dimensional Data Collection with Federated Generative Autoencoder
Xue Jiang (Technical University of Munich), Xuebing Zhou (Huawei Technologies Duesseldorf GmbH), and Jens Grossklags (Technical University of Munich)
- Masking Feedforward Neural Networks against Power Analysis Attacks
Konstantinos Athanasiou (Northeastern University), Thomas Wahl (Northeastern University), A. Adam Ding (Northeastern University), and Yunsi Fei (Northeastern University)
- From "Onion Not Found" to Guard Discovery
Lennart Oldenburg (imec-COSIC KU Leuven), Gunes Acar (imec-COSIC KU Leuven), and Claudia Diaz (imec-COSIC KU Leuven)
- Polaris: Transparent Succinct Zero-Knowledge Arguments for R1CS with Efficient Verifier
Shihui Fu (University of Waterloo) and Guang Gong (University of Waterloo)
- DataProVe: Fully Automated Conformance Verification Between Data Protection Policies and System Architectures
Vinh Thong Ta (Edge Hill University) and Max Hashem Eiza (University of Central Lancashire)
- SoK: Cryptographic Confidentiality of Data on Mobile Devices
Maximilian Zinkus (Johns Hopkins University), Tushar M. Jois (Johns Hopkins University), and Matthew Green (Johns Hopkins University)
- Setting the Bar Low: Are Websites Complying With the Minimum Requirements of the CCPA?
Maggie Van Nortwick (Northeastern University) and Christo Wilson (Northeastern University)
- The Effectiveness of Adaptation Methods in Improving User Engagement and Privacy Protection on Social Network Sites
Moses Namara (Clemson University), Henry Sloan (Binghamton University), and Bart P. Knijnenburg (Clemson University)
- Forward and Backward-Secure Range-Searchable Symmetric Encryption
Jiafan Wang (Chinese University of Hong Kong) and Sherman S. M. Chow (Chinese University of Hong Kong)
- (ε, δ)-Indistinguishable Mixing for Cryptocurrencies
Foteini Baldimtzi (GMU), S. Dov Gordon (GMU), Ioanna Karantaidou (GMU), Mingyu Liang (GMU), and Mayank Varia (BU)
Issue 2
- Are iPhones Really Better for Privacy? A Comparative Study of iOS and Android Apps
Konrad Kollnig (University of Oxford), Anastasia Shuba (Broadcom Inc.), Reuben Binns (University of Oxford), Max Van Kleek (University of Oxford), and Nigel Shadbolt (University of Oxford)
- Employees’ privacy perceptions: exploring the dimensionality and antecedents of personal data sensitivity and willingness to disclose
Jan Tolsdorf (Bonn-Rhein-Sieg University of Applied Sciences), Delphine Reinhardt (University of Göttingen), and Luigi Lo Iacono (Bonn-Rhein-Sieg University of Applied Sciences)
- Revisiting Identification Issues in GDPR `Right Of Access' Policies: A Technical and Longitudinal Analysis
Mariano Di Martino (tUL - Hasselt University, Expertise Center of Digital Media), Isaac Meers (tUL - Hasselt University, Expertise Center of Digital Media), Peter Quax (tUL - Hasselt University, Expertise Center of Digital Media, Flanders Make), Ken Andries (Hasselt University, Law Faculty), and Wim Lamotte (tUL - Hasselt University, Expertise Center of Digital Media)
- Understanding Privacy-Related Advice on Stack Overflow
Mohammad Tahaei (University of Bristol), Tianshi Li (Carnegie Mellon University), and Kami Vaniea (University of Edinburgh)
- SoK: Plausibly Deniable Storage
Chen Chen (Stony Brook University), Xiao Liang (Stony Brook University), Bogdan Carbunar (FIU), and Radu Sion (Stony Brook University)
- Increasing Adoption of Tor Browser Using Informational and Planning Nudges
Peter Story (Clark University), Daniel Smullen (Carnegie Mellon University), Rex Chen (Carnegie Mellon University), Yaxing Yao (University of Maryland, Baltimore County), Alessandro Acquisti (Carnegie Mellon University), Lorrie Faith Cranor (Carnegie Mellon University), Norman Sadeh (Carnegie Mellon University), and Florian Schaub (University of Michigan)
- Differentially Private Simple Linear Regression
Daniel Alabi (Harvard University), Audra McMillan (Apple), Jayshree Sarathy (Harvard University), Adam Smith (Boston University), and Salil Vadhan (Harvard University)
- Privacy-Preserving training of tree ensembles over continuous data
Samuel Adams (University of Washington Tacoma), Chaitali Choudhary (University of Washington Tacoma), Martine De Cock (University of Washington Tacoma), Rafael Dowsley (Monash University), David Melanson (University of Washington Tacoma), Anderson Nascimento (University of Washington Tacoma), Davis Railsback (University of Washington Tacoma), and Jianwei Shen (University of Arizona)
- User-Level Label Leakage from Gradients in Federated Learning
Aidmar Wainakh (Technical University of Darmstadt), Fabrizio Ventola (Technical University of Darmstadt), Till Müßig (Technical University of Darmstadt), Jens Keim (Technical University of Darmstadt), Carlos Garcia Cordero (Technical University of Darmstadt), Ephraim Zimmer (Technical University of Darmstadt), Tim Grube (Technical University of Darmstadt), Kristian Kersting (Technical University of Darmstadt), and Max Mühlhäuser (Technical University of Darmstadt)
- Understanding Utility and Privacy of Demographic Data in Education Technology by Causal Analysis and Adversarial-Censoring
Rakibul Hasan (CISPA Helmholtz Center for Information Security) and Mario Fritz (CISPA Helmholtz Center for Information Security)
- Comprehensive Analysis of Privacy Leakage in Vertical Federated Learning During Prediction
Xue Jiang (Technical University of Munich), Xuebing Zhou (Huawei Technologies Duesseldorf GmbH), and Jens Grossklags (Technical University of Munich)
- Checking Websites' GDPR Consent Compliance for Marketing Emails
Karel Kubicek (ETH Zurich), Jakob Merane (ETH Zurich), Carlos Cotrini (ETH Zurich), Alexander Stremitzer (ETH Zurich), Stefan Bechtold (ETH Zurich), and David Basin (ETH Zurich)
- Efficient Set Membership using MPC-in-the-Head
Aarushi Goel (Johns Hopkins University), Matthew Green (Johns Hopkins University), Mathias Hall-Anderson (Aarhus University), and Gabriel Kaptchuk (Boston University)
- Privacy-Preserving Positioning in Wi-Fi Fine Timing Measurement
Domien Schepers (Northeastern University) and Aanjhan Ranganathan (Northeastern University)
- RegulaTor: A Straightforward Website Fingerprinting Defense
James K Holland (University of Minnesota) and Nicholas Hopper (University of Minnesota)
- Knowledge Cross-Distillation for Membership Privacy
Rishav Chourasia (NUS School of Computing), Batnyam Enkhtaivan (NEC Corporation), Kunihiro Ito (NEC Corporation), Junki Mori (NEC Corporation), Isamu Teranishi (NEC Corporation), and Hikaru Tsuchida (NEC Corporation)
- Updatable Private Set Intersection
Saikrishna Badrinarayanan (Visa Research), Peihan Miao (University of Illinois at Chicago), and Tiancheng Xie (University of California, Berkeley)
- d3p - A Python Package for Differentially-Private Probabilistic Programming
Lukas Prediger (Aalto University, Finland), Niki Loppi (NVIDIA AI Technology Center, Finland), Samuel Kaski (Aalto University, Finland & University of Manchester, UK), and Antti Honkela (University of Helsinki, Finland)
- Who Knows I Like Jelly Beans? An Investigation Into Search Privacy
Daniel Kats (NortonLifeLock Research Group), Johann Roturier (NortonLifeLock Research Group), and David Silva (NortonLifeLock Research Group)
- PUBA: Privacy-Preserving User-Data Bookkeeping and Analytics
Valerie Fetzer (Karlsruhe Institute of Technology, Germany), Marcel Keller (CSIRO's Data61), Sven Maier (Karlsruhe Institute of Technology, Germany), Markus Raiber (Karlsruhe Institute of Technology, Germany), Andy Rupp (University of Luxembourg), and Rebecca Schwerdt (Karlsruhe Institute of Technology, Germany)
- How to prove any NP statement jointly? Efficient Distributed-prover Zero-Knowledge Protocols
PANKAJ DAYAMA (IBM Research), ARPITA PATRA (Indian Institute of Science Bangalore), PROTIK PAUL (Indian Institute of Science Bangalore), NITIN SINGH (IBM Research), and DHINAKARAN VINAYAGAMURTHY (IBM Research)
- FP-Radar: Longitudinal Measurement and Early Detection of Browser Fingerprinting
Pouneh Nikkhah Bahrami (University of California, Davis), Umar Iqbal (University of Iowa), and Zubair Shafiq (University of California, Davis)
- Analyzing the Feasibility and Generalizability of Fingerprinting Internet of Things Devices
Dilawer Ahmed (North Carolina State University), Anupam Das (North Carolina State University), and Fareed Zaffar (Lahore University of Management Sciences)
- Visualizing Privacy-Utility Trade-Offs in Differentially Private Data Releases
Priyanka Nanayakkara (Northwestern University), Johes Bater (Duke University), Xi He (University of Waterloo), Jessica Hullman (Northwestern University), and Jennie Rogers (Northwestern University)
- Building a Privacy-Preserving Smart Camera System
Yohan Beugin (The Pennsylvania State University), Quinn Burke (The Pennsylvania State University), Blaine Hoak (The Pennsylvania State University), Ryan Sheatsley (The Pennsylvania State University), Eric Pauley (The Pennsylvania State University), Gang Tan (The Pennsylvania State University), Syed Rafiul Hussain (The Pennsylvania State University), and Patrick McDaniel (The Pennsylvania State University)
- CoverDrop: Blowing the Whistle Through A News App
Mansoor Ahmed-Rengers (University of Cambridge), Diana A. Vasile (University of Cambridge), Daniel Hugenroth (University of Cambridge), Alastair R. Beresford (University of Cambridge), and Ross Anderson (University of Cambridge)
Issue 3
- "All apps do this": Comparing Privacy Concerns Towards Privacy Tools and
Non-Privacy Tools for Social Media Content
Vanessa Bracamonte (KDDI Research, Inc), Sebastian Pape (Goethe University Frankfurt), Sascha Loebner (Goethe University Frankfurt)
- Leveraging Strategic Connection Migration-Powered Traffic Splitting for Privacy
Mona Wang (Princeton University), Anunay Kulshrestha (Princeton University), Liang Wang (Princeton University), and Prateek Mittal (Princeton University)
- A Multi-Region Investigation of Use and Perceptions of Smart Home Devices
Patrick Bombik (Technical University of Munich), Tom Wenzel (Technical University of Munich), Jens Grossklags (Technical University of Munich), and Sameer Patil (University of Utah)
- Charting App Developers' Journey Through Privacy Regulation Features in Ad Networks
Mohammad Tahaei (University of Bristol), Kopo M. Ramokapane (University of Bristol), Tianshi Li (Carnegie Mellon University), Jason I. Hong (Carnegie Mellon University), and Awais Rashid (University of Bristol)
- Athena: Probabilistic Verification of Machine Unlearning
David Sommer (ETH Zurich), Liwei Song (Princeton University), Sameer Wagh (Princeton University), and Prateek Mittal (Princeton University)
- Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps
Yucheng Yang (University of Wisconsin—Madison), Jack West (Loyola University Chicago), George K. Thiruvathukal (Loyola University Chicago), Neil Klingensmith (Loyola University Chicago), and Kassem Fawaz (University of Wisconsin—Madison)
- “We may share the number of diaper changes”: A Privacy and Security Analysis of Mobile Child Care Applications
Moritz Gruber (AWARE7), Christian Höfig (AWARE7), Maximilian Golla (Max Planck Institute for Security and Privacy), Tobias Urban (Institute for Internet Security), and Matteo Große-Kampmann (AWARE7, Institute for Internet Security, Ruhr University Bochum)
- Deletion Inference, Reconstruction, and Compliance in Machine (Un)Learning
Ji Gao (University of Virginia), Sanjam Garg (University of California, Berkeley), Mohammad Mahmoody (University of Virginia), and Prashant Nalini Vasudevan (National University of Singapore)
- Leave no Data Behind - Empirical Insights into Data Erasure from Online Services
Eduard Rupp (Technical University of Munich), Emmanuel Syrmoudis (Technical University of Munich), and Jens Grossklags (Technical University of Munich)
- Mixnet optimization methods
Iness BEN GUIRAT (imec-COSIC, KU Leuven) and Claudia Diaz (imec-COSIC, KU Leuven)
- On dark patterns and manipulation of website publishers by CMPs
Michael Toth (Inria, Univ. Grenoble Alpes), Nataliia Bielova (Inria, Université Côte d'Azur), and Vincent Roca (Inria, Univ. Grenoble Alpes)
- DALock: Password Distribution-Aware Throttling
Jeremiah Blocki (Purdue University) and Wuwei Zhang (Purdue University)
- On Defeating Graph Analysis of Anonymous Transactions
Christoph Egger (Friedrich-Alexander-Universität Erlangen-Nürnberg), Russell W. F. Lai (Friedrich-Alexander-Universität Erlangen-Nürnberg), Viktoria Ronge (Friedrich-Alexander-Universität Erlangen-Nürnberg), Ivy K. Y. Woo (Independent), and Hoover H. F. Yin (The Chinese University of Hong Kong)
- User-friendly yet rarely read: A case study on the redesign of an online HIPAA authorization
Sarah Pearman (Carnegie Mellon University), Ellie Young (New College of Florida), and Lorrie Cranor (Carnegie Mellon University)
- OrgAn: Organizational Anonymity with Low Latency
Debajyoti Das (KU Leuven), Easwar Vivek Mangipudi (Purdue University), and Aniket Kate (Purdue University)
- FingerprinTV: Fingerprinting Smart TV Apps
Janus Varmarken (University of California, Irvine), Jad Al Aaraj (University of California, Irvine), Rahmadi Trimananda (University of California, Irvine), and Athina Markopoulou (University of California, Irvine)
- ZoomP$^3$: Privacy-Preserving Publishing of Online Video Conference Recordings
Yuanyi Sun (Penn State University), Sencun Zhu (Penn State University), and Yu Chen (Binghamton University, SUNY)
- PrivacyScout: Assessing Vulnerability to Shoulder Surfing on Mobile Devices
Mihai Bâce (Institute for Visualisation and Interactive Systems, University of Stuttgart, Stuttgart, Germany), Alia Saad (HCI Group, University of Duisburg-Essen, Essen, Germany), Dr. Mohamed Khamis (University of Glasgow, Glasgow, United Kingdom), Stefan Schneegass (HCI Group, University of Duisburg-Essen, Essen, Germany), and Andreas Bulling (Institute for Visualisation and Interactive Systems, University of Stuttgart, Stuttgart, Germany)
- SoK: Assumptions underlying Cryptocurrency Deanonymizations - A Taxonomy for Scientific Experts and Legal Practitioners
Dominic Deuber (Friedrich-Alexander-Universität Erlangen-Nürnberg), Viktoria Ronge (Friedrich-Alexander-Universität Erlangen-Nürnberg), and Christian Rückert (Friedrich-Alexander-Universität Erlangen-Nürnberg)
- Watch over your TV: A Security and Privacy Analysis of the Android TV ecosystem
Marcos Tileria (Royal Holloway, University of London) and Jorge Blasco (Royal Holloway, University of London)
- SoK: TEE-assisted Confidential Smart Contract
Rujia Li (Southern University of Science and Technology & University of Birmingham), Qin Wang (Swinburne University of Technology & CSIRO Data61), Qi Wang (Southern University of Science and Technology), David Galindo (University of Birmingham), and Mark Ryan (University of Birmingham)
- Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies
Anisa Halimi (IBM Research Europe - Ireland), Leonard Dervishi (Case Western Reserve University), Erman Ayday (Case Western Reserve University), Apostolos Pyrgelis (EPFL), Juan Ramon Troncoso-Pastoriza (Tune Insight), Jean-Pierre Hubaux (EPFL), Xiaoqian Jiang (University of Texas, Health Science Center), and Jaideep Vaidya (Rutgers Univeristy)
- My Cookie is a phoenix: detection, measurement, and lawfulness of cookie respawning with browser fingerprinting
Imane Fouad (Univ Lille, Inria), Cristiana Santos (Utrecht University), Arnaud Legout (Inria), and Nataliia Bielova (Inria)
- Exploring the Privacy Concerns of Bystanders in Smart Homes from the Perspectives of both Owners and Bystanders
Ahmed Alshehri (Colorado School of Mines), Joseph Spielman (Colorado School of Mines), Amiya Prasad (Colorado School of Mines), and Chuan Yue (Colorado School of Mines)
- Adversarial Images Against Super-Resolution Convolutional Neural Networks for Free
Arezoo Rajabi (University of Washington), Mahdieh Abbasi (Universté Laval), Rakesh B. Bobba (Oregon State University), and Kimia Tajik (Case Western Reserve University)
- Integrating Privacy into the Electric Vehicle Charging Architecture
Dustin Kern (Darmstadt University of Applied Sciences), Timm Lauser (Darmstadt University of Applied Sciences), and Christoph Krauß (Darmstadt University of Applied Sciences)
- "It Feels Like Whack-a-mole": User Experiences of Data Removal from People Search Websites
Kejsi Take (New York University), Kevin Gallagher (New York University), Andrea Forte (Drexel University), Damon McCoy (New York University), and Rachel Greenstadt (New York University)
- Learning to Behave: Improving Covert Channel Security with Behavior-Based Designs
Ryan Wails (Georgetown University, U.S. Naval Research Laboratory), Andrew Stange (Georgetown University), Eliana Troper (Georgetown University), Aylin Caliskan (University of Washington), Roger Dingledine (Tor Project), Rob Jansen (U.S. Naval Research Laboratory), and Micah Sherr (Georgetown University)
- I know what you did on Venmo: Discovering privacy leaks in mobile social payments
Rajat Tandon (University of Southern California Information Sciences Institute), Pithayuth Charnsethikul (University of Southern California Information Sciences Institute), Ishank Arora (University of Texas, Austin), Dhiraj Murthy (University of Texas, Austin), and Jelena Mirkovic (University of Southern California Information Sciences Institute)
- Privacy accounting economics: Improving differential privacy composition via a posteriori bounds
Valentin Hartmann (EPFL), Vincent Bindschaedler (University of Florida), Alexander Bentkamp (Vrije Universiteit Amsterdam & State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences), and Robert West (EPFL)
- Moby: A Blackout-resistant Anonymity Network for Mobile Devices
Amogh Pradeep (Northeastern University), Hira Javaid (Northeastern University), Ryan Williams (Northeastern University), Antoine Rault (EPFL), David Choffnes (Northeastern University), Stevens Le Blond (EPFL), and Bryan Ford (EPFL)
- Fully Secure PSI via MPC-in-the-Head
S. Dov Gordon (George Mason University), Carmit Hazay (Bar-Ilan University), and Phi Hung Le (George Mason University)
- Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor
Vera Rimmer (KU Leuven), Theodor Schnitzler (Ruhr-University Bochum), Tom Van Goethem (KU Leuven), Abel Rodríguez Romero (KU Leuven), Wouter Joosen (KU Leuven), and Katharina Kohls (Radboud University)
- SoK: SCT Auditing in Certificate Transparency
Sarah Meiklejohn (Google), Joe DeBlasio (Google), Devon O'Brien (Google), Chris Thompson (Google), Kevin Yeo (Google), and Emily Stark (Google)
- In Search of Lost Utility: Private Location Data
Szilvia Lestyan (Budapest University of Technology), Gergely Acs (Budapest University of Technology), and Gergely Biczok (Budapest University of Technology)
Issue 4
- SoK: Privacy-enhancing Smart Home Hubs
Igor Zavalyshyn (UCLouvain), Axel Legay (UCLouvain), Annanda Rath (Sirris), and Etienne Riviere (UCLouvain)
- Blocked or Broken? Automatically Detecting When Privacy Interventions Break Websites
Michael Smith (University of California, San Diego), Peter Snyder (Brave Software), Moritz Haller (Brave Software), Benjamin Livshits (Imperial College London), Deian Stefan (University of California, San Diego), and Hamed Haddadi (Imperial College London \ Brave Software)
- Machine Learning with Differentially Private Labels: Mechanisms and Frameworks
Xinyu Tang (Princeton University), Milad Nasr (University of Massachusetts Amherst), Saeed Mahloujifar (Princeton University), Virat Shejwalkar (University of Massachusetts Amherst), Liwei Song (Princeton University), Amir Houmansadr (University of Massachusetts Amherst), and Prateek Mittal (Princeton Univeristy)
- Pika: Secure Computation using Function Secret Sharing over Rings
Sameer Wagh (Devron Corporation)
- Flexible and scalable privacy assessment for very large datasets, with an application to official governmental microdata
Mário S. Alvim (Department of Computer Science, UFMG), Natasha Fernandes (School of Computing, Macquarie University), Annabelle McIver (School of Computing, Macquarie University), Carroll Morgan (UNSW and Data61), and Gabriel H. Nunes (Department of Computer Science, UFMG)
- "You offer privacy like you offer tea'': Investigating Mechanisms for Improving Guest Privacy in IoT-Equipped Households
Karola Marky (University of Glasgow), Nina Gerber (Technical University of Darmstadt), Michelle Gabriela Pelzer (Technical University of Darmstadt), Mohamed Khamis (University of Glasgow), and Max Mühlhäuser (Technical University of Darmstadt)
- Effects of privacy permissions on user choices in voice assistant app stores
Gary Liu (University of California, Berkeley) and Nathan Malkin (University of California, Berkeley & University of Maryland, College Park)
- Collection, Usage and Privacy of Mobility Data in the Enterprise and Public Administrations
Alexandra Kapp (Hochschule für Technik und Wirtschaft Berlin)
- Ctrl-Shift: How Privacy Sentiment Changed from 2019 to 2021
Angelica Goetzen (Max Planck Institute for Software Systems), Samuel Dooley (University of Maryland), and Elissa M. Redmiles (Max Planck Institute for Software Systems)
- Keeping Privacy Labels Honest
Simon Koch (Technische Universität Braunschweig), Malte Wessels (Technische Universität Braunschweig), Benjamin Altpeter (Technische Universität Braunschweig), Madita Olvermann (Technische Universität Braunschweig), and Martin Johns (Technische Universität Braunschweig)
- Zswap: zk-SNARK Based Non-Interactive Multi-Asset Swaps
Felix Engelmann (Aarhus University), Thomas Kerber (IOHK), Markulf Kohlweiss (University of Edinburgh, IOHK), and Mikhail Volkhov (University of Edinburgh)
- Formalizing and Estimating Distribution Inference Risks
Anshuman Suri (University of Virginia) and David Evans (University of Virginia)
- Connect the Dots: Tighter Discrete Approximations of Privacy Loss Distributions
Vadym Doroshenko (Google), Badih Ghazi (Google Research), Pritish Kamath (Google Research), Ravi Kumar (Google Research), and Pasin Manurangsi (Google Research)
- Hidden Issuer Anonymous Credential
Mathieu Gestin (INRIA - IRISA - Université Rennes 1), Davide Frey (INRIA - IRISA - Université Rennes 1), Guillaume Piolle (INRIA - IRISA - CentraleSupelec), and Daniel Bosk (KTH)
- A novel reconstruction attack on foreign-trade official statistics, with a Brazilian case study
Danilo Fabrino Favato (Universidade Federal de Minas Gerais), Gabriel de Morais Coutinho (Universidade Federal de Minas Gerais), Mário S. Alvim (Universidade Federal de Minas Gerais), and Natasha Fernandes (Macquarie University)
- Private Aggregation of Trajectories
Badih Ghazi (Google), Neel Kamal (Google), Ravi Kumar (Google), Pasin Manurangsi (Google), and Annika Zhang (Google)
- On the Challenges of Developing a Concise Questionnaire to Identify Privacy Personas
Tom Biselli (PEASEC, Technical University Darmstadt), Enno Steinbrink (PEASEC, Technical University Darmstadt), Franziska Herbert (PEASEC, Technical University Darmstadt), Gina Maria Schmidbauer-Wolf (PEASEC, Technical University Darmstadt), and Christian Reuter (PEASEC, Technical University Darmstadt)
- Homomorphically counting elements with the same property
Ilia Iliashenko (Ciphermode Labs, imec-COSIC - KU Leuven), Malika Izabachène (Cosmian), Axel Mertens (imec-COSIC - KU Leuven), and Hilder V. L. Pereira (imec-COSIC - KU Leuven)
- Time- and Space-Efficient Aggregate Range Queries over Encrypted Databases
Zachary Espiritu (Brown University), Evangelia Anna Markatou (Brown University), and Roberto Tamassia (Brown University)
- How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy
Michal Kepkowski (Macquarie University), Lucjan Hanzlik (CISPA Helmholtz Center for Information Security), Ian D. Wood (Macquarie University), and Mohamed Ali Kaafar (Macquarie University)
- Replay (Far) Away: Exploiting and Fixing Google/Apple Exposure Notification Contact Tracing
Christopher Ellis (The Ohio State University), Haohuang Wen (The Ohio State University), Zhiqiang Lin (The Ohio State University), and Anish Arora (The Ohio State University)
- Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation
Nuttapong Attrapadung (AIST), Koki Hamada (NTT), Dai Ikarashi (NTT), Ryo Kikuchi (NTT), Takahiro Matsuda (AIST), Ibuki Mishina (NTT), Hiraku Morita (University of St. Gallen), and Jacob C. N. Schuldt (AIST)
- Privately Connecting Mobility to Infectious Diseases via Applied Cryptography
Alexandros Bampoulidis (), Alessandro Bruni (KU Leuven), Lukas Helminger (TU Graz/Know-Center), Daniel Kales (TU Graz), Christian Rechberger (TU Graz), and Roman Walch (TU Graz/Know-Center)
- On the Cost of Suppressing Volume forEncrypted Multi-maps
Megumi Ando (MITRE) and Marilyn George (Brown University)
- XORBoost: Tree Boosting in the Multiparty Computation Setting
Kevin Deforth (Inpher), Marc Desgroseilliers (Inpher), Nicolas Gama (Inpher), Mariya Georgieva (Inpher), Dimitar Jetchev (Inpher), and Marius Vuille (Inpher)
- Neural Fuzzy Extractors: A Secure Way to Use Artificial Neural Networks for Biometric User Authentication
Abhishek Jana (Kansas State University), Bipin Paudel (Kansas State University), Md Kamruzzaman Sarker (Kansas State University), Monireh Ebrahimi (Kansas State University), Pascal Hitzler (Kansas State University), and George T Amariucai (Kansas State University)
- Analyzing the Monetization Ecosystem of Stalkerware
Cassidy Gibson (University of Florida), Vanessa Frost (University of Florida), Katie Platt (University of Florida), Washington Garcia (University of Florida), Luis Vargas (University of Florida), Sara Rampazzi (University of Florida), Vincent Bindschaedler (University of Florida), Patrick Traynor (University of Florida), and Kevin R. B. Butler (University of Florida)
- A Global Survey of Stalkerware Applications used in Intimate Partner Violence
Majed Almansoori (University of Wisconsin-Madison), Andrea Gallardo (Carnegie Mellon University), Julio Poveda (University of Maryland), Adil Ahmed (University of Wisconsin-Madison), and Rahul Chatterjee (University of Wisconsin-Madison)
- On the Feasibility of Linking Attack to Google/Apple Exposure Notification Framework
Kazuki Nomoto (Waseda University), Mitsuaki Akiyama (NTT), Masashi Eto (Ministry of Internal Affairs and Communications (MIC)), Atsuo Inomata (Osaka University), and Tatsuya Mori (Waseda University/NICT/RIKEN AIP)
- Towards Sparse Federated Analytics: Location Heatmaps under Distributed Differential Privacy with Secure Aggregation
Eugene Bagdasaryan (Cornell Tech), Peter Kairouz (Google), Stefan Mellem (Google), Adrià Gascón (Google), Kallista Bonawitz (Google), Deborah Estrin (Google), and Marco Gruteser (Google)
- 3LegRace: Privacy-Preserving DNN Training over TEEs and GPUs
Yue Niu (University of Southern California), Ramy E. Ali (University of Southern California), and Salman Avestimehr (University of Southern California)
- "How Usable Are iOS App Privacy Labels?
Shikun Zhang (Carnegie Mellon University), Yuanyuan Feng (University of Vermont), Yaxing Yao (University of Maryland, Baltimore County), Lorrie Faith Cranor (Carnegie Mellon University), and Norman Sadeh (Carnegie Mellon University)
- gOTzilla: Efficient Disjunctive Zero-Knowledge Proofs from MPC in the Head, with Application to Proofs of Assets in Cryptocurrencies
Foteini Baldimtsi (George Mason University), Panagiotis Chatzigiannis (George Mason University), S. Dov Gordon (George Mason University), Phi Hung Le (George Mason University), and Daniel McVicker (George Mason University)
- Developers Say the Darnedest Things: Privacy Compliance Processes Followed by Developers of Child-Directed Apps
Noura Alomar (University of California, Berkeley), Serge Egelman (University of California, Berkeley and International Computer Science Institute), and Jordan L. Fischer (University of California, Berkeley and Drexel University)
- LLAMA: A Low Latency Math Library for Secure Inference
Kanav Gupta (Microsoft Research), Deepak Kumaraswamy (Microsoft Research), Divya Gupta (Microsoft Research), and Nishanth Chandran (Microsoft Research)
- ATOM: Ad-network Tomography
Maaz Bin Musa (University of Iowa) and Rishab Nithyanand (University of Iowa)
- Investigating GDPR Fines in the Light of Dataflows
Marlene Saemann (Bosh), Daniel Theis (Institute for Internet Security), Martin Degeling (Ruhr University Bochum), and Tobias Urban (Institute for Internet Security & secunet Security Networks AG)