Accepted papers for PETS 2022

Issue 1

  • Personal Information Inference from Voice Recordings: User Awareness and Privacy Concerns
    Jacob Leon Kröger (Technische Universität Berlin, Germany), Leon Konstantin Gellrich (Universität Potsdam, Germany), Sebastian Pape (Goethe Universität, Frankfurt, Germany), Saba Rebecca Brause (Technische Universität Berlin, Germany), Stefan Ullrich (Technische Universität Berlin, Germany)
  • MLEFlow: Learning from History to Improve Load Balancing in Tor
    Hussein Darir (University of Illinois at Urbana-Champaign), Hussein Sibai (University of Illinois at Urbana-Champaign), Chin-Yu Cheng (University of Illinois at Urbana-Champaign), Nikita Borisov (University of Illinois at Urbana-Champaign), Geir Dullerud (University of Illinois at Urbana-Champaign), and Sayan Mitra (University of Illinois at Urbana-Champaign)
  • How Can and Would People Protect from Online Tracking?
    Maryam Mehrnezhad (Newcastle University), Kovila Coopamootoo (Newcastle University), and Ehsan Toreini (Durham University)
  • Towards Improving Code Stylometry Analysis in Underground Forums
    Michal Tereszkowski-Kaminski (King's College London), Sergio Pastrana (Universidad Carlos III de Madrid), Jorge Blasco (Royal Holloway, University of London), and Guillermo Suarez-Tangil (IMDEA Networks Institute and King's College London)
  • Ulixes: Facial Recognition Privacy with Adversarial Machine Learning
    Thomas Cilloni (University of Mississippi), Wei Wang (Xi'an Jiaotong-Liverpool University), Charles Walter (University of Mississippi), and Charles Fleming (University of Mississippi)
  • If This Context Then That Concern: Exploring users' concerns with IFTTT applets
    Mahsa Saeidi (Oregon State University), McKenzie Calvert (Oregon State University), Audrey W. Au (Oregon State University), Anita Sarma (Oregon State University), and Rakesh B. Bobba (Oregon State University)
  • User Perceptions of Gmail’s Confidential Mode
    Elham Al Qahtani (University of North Carolina at Charlotte), Yousra Javed (National University of Sciences and Technology), and Mohamed Shehab (University of North Carolina at Charlotte)
  • Toward Uncensorable, Anonymous and Private Access Over Satoshi Blockchains
    Ruben Recabarren (Facebook) and Bogdan Carbunar (Florida International University)
  • OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers
    Darion Cassel (Carnegie Mellon University), Su-Chin Lin (National Taiwan University), Alessio Buraggina (University of Miami), William Wang (University of Chicago), Andrew Zhang (University of Illinos Urbana-Champaign), Lujo Bauer (Carnegie Mellon University), Hsu-Chun Hsiao (National Taiwan University), Limin Jia (Carnegie Mellon University), and Timothy Libert (Google)
  • Making the Most of Parallel Composition in Differential Privacy
    Josh Smith (Data61, CSIRO), Hassan Jameel Asghar (Macquarie University and Data61, CSIRO), Gianpaolo Gioiosa (Data61, CSIRO), Sirine Mrabet (Data61, CSIRO), Serge Gaspers (University of New South Wales), and Paul Tyler (Data61, CSIRO)
  • Zen and the art of model adaptation: Low-utility-cost attack mitigations in collaborative machine learning
    Dmitrii Usynin (Imperial College, TU Munich), Jonathan Passerat-Palmbach (Imperial College, ConsenSys Health), Georgios Kaissis (TU Munich, Imperial College), and Daniel Rueckert (TU Munich, Imperial College)
  • AriaNN: Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing
    Théo Ryffel (INRIA, DI ENS, ENS, CNRS, PSL University, Paris, France), Pierre Tholoniat (Columbia University, New York, USA), David Pointcheval (DI ENS, ENS, CNRS, PSL University, INRIA, Paris, France), and Francis Bach (INRIA, DI ENS, ENS, CNRS, PSL University, Paris, France)
  • Proof-of-Vax: Studying User Preferences and Perception of Covid Vaccination Certificates
    Marvin Kowalewski (Ruhr University Bochum), Franziska Herbert (Ruhr University Bochum), Theodor Schnitzler (Ruhr University Bochum), and Markus Dürmuth (Ruhr University Bochum)
  • Differentially private partition selection
    Damien Desfontaines (Google / ETH Zürich), James Voss (Google), Bryant Gipson (Google), and Chinmoy Mandayam (Google)
  • Circuit-PSI with Linear Complexity via Relaxed Batch OPPRF
    Nishanth Chandran (Microsoft Research, India), Divya Gupta (Microsoft Research, India), and Akash Shah (Microsoft Research, India)
  • Multiparty Reach and Frequency Histogram: Private, Secure and Practical
    Badih Ghazi (Google), Ravi Kumar (Google), Ben Kreuter (Google), Pasin Manurangsi (Google), Jiayu Peng (Google), Evgeny Skvortsov (Google), Yao Wang (Google), and Craig Wright (Google)
  • Polymath: Low-Latency MPC via Secure Polynomial Evaluations and its Applications
    Donghang Lu (Purdue University), Albert Yu (Purdue University), Aniket Kate (Purdue University), and Hemanta Maji (Purdue University)
  • Privacy-preserving FairSwap: Fairness and Privacy Interplay
    Sepideh Avizheh (University of Calgary), Preston Haffey (University of Calgary), and Reihaneh Safavi-Naini (University of Calgary)
  • If You Like Me, Please Don’t "Like" Me: Inferring Vendor Bitcoin Addresses From Positive Reviews
    Jochen Schäfer (University of Mannheim), Christian Müller (University of Mannheim), and Frederik Armknecht (University of Mannheim)
  • Disparate Vulnerability to Membership Inference Attacks
    Bogdan Kulynych (EPFL), Mohammad Yaghini (University of Toronto), Giovanni Cherubin (Alan Turing Institute), Michael Veale (University College London), and Carmela Troncoso (EPFL)
  • Privacy-preserving High-dimensional Data Collection with Federated Generative Autoencoder
    Xue Jiang (Technical University of Munich), Xuebing Zhou (Huawei Technologies Duesseldorf GmbH), and Jens Grossklags (Technical University of Munich)
  • Masking Feedforward Neural Networks against Power Analysis Attacks
    Konstantinos Athanasiou (Northeastern University), Thomas Wahl (Northeastern University), A. Adam Ding (Northeastern University), and Yunsi Fei (Northeastern University)
  • From "Onion Not Found" to Guard Discovery
    Lennart Oldenburg (imec-COSIC KU Leuven), Gunes Acar (imec-COSIC KU Leuven), and Claudia Diaz (imec-COSIC KU Leuven)
  • Polaris: Transparent Succinct Zero-Knowledge Arguments for R1CS with Efficient Verifier
    Shihui Fu (University of Waterloo) and Guang Gong (University of Waterloo)
  • DataProVe: Fully Automated Conformance Verification Between Data Protection Policies and System Architectures
    Vinh Thong Ta (Edge Hill University) and Max Hashem Eiza (University of Central Lancashire)
  • SoK: Cryptographic Confidentiality of Data on Mobile Devices
    Maximilian Zinkus (Johns Hopkins University), Tushar M. Jois (Johns Hopkins University), and Matthew Green (Johns Hopkins University)
  • Setting the Bar Low: Are Websites Complying With the Minimum Requirements of the CCPA?
    Maggie Van Nortwick (Northeastern University) and Christo Wilson (Northeastern University)
  • The Effectiveness of Adaptation Methods in Improving User Engagement and Privacy Protection on Social Network Sites
    Moses Namara (Clemson University), Henry Sloan (Binghamton University), and Bart P. Knijnenburg (Clemson University)
  • Forward and Backward-Secure Range-Searchable Symmetric Encryption
    Jiafan Wang (Chinese University of Hong Kong) and Sherman S. M. Chow (Chinese University of Hong Kong)
  • (ε, δ)-Indistinguishable Mixing for Cryptocurrencies
    Foteini Baldimtzi (GMU), S. Dov Gordon (GMU), Ioanna Karantaidou (GMU), Mingyu Liang (GMU), and Mayank Varia (BU)
  • Issue 2

  • Are iPhones Really Better for Privacy? A Comparative Study of iOS and Android
    Konrad Kollnig (University of Oxford), Anastasia Shuba (Broadcom Inc.), Reuben Binns (University of Oxford), Max Van Kleek (University of Oxford), and Nigel Shadbolt (University of Oxford)
  • Employees’ privacy perceptions: exploring the dimensionality and antecedents of personal data sensitivity and willingness to disclose
    Jan Tolsdorf (Bonn-Rhein-Sieg University of Applied Sciences), Delphine Reinhardt (University of Göttingen), and Luigi Lo Iacono (Bonn-Rhein-Sieg University of Applied Sciences)
  • Revisiting Identification Issues in GDPR `Right Of Access' Policies: A Technical and Longitudinal Analysis
    Mariano Di Martino (tUL - Hasselt University, Expertise Center of Digital Media), Isaac Meers (tUL - Hasselt University, Expertise Center of Digital Media), Peter Quax (tUL - Hasselt University, Expertise Center of Digital Media, Flanders Make), Ken Andries (Hasselt University, Law Faculty), and Wim Lamotte (tUL - Hasselt University, Expertise Center of Digital Media)
  • Understanding Privacy-Related Advice on Stack Overflow
    Mohammad Tahaei (University of Bristol), Tianshi Li (Carnegie Mellon University), and Kami Vaniea (University of Edinburgh)
  • SoK: Plausibly Deniable Storage
    Chen Chen (), Xiao Liang (Stony Brook University), Bogdan Carbunar (FIU), and Radu Sion (Stony Brook University)
  • Increasing Adoption of Tor Browser Using Informational and Planning Nudges
    Peter Story (Clark University), Daniel Smullen (Carnegie Mellon University), Rex Chen (Carnegie Mellon University), Yaxing Yao (University of Maryland, Baltimore County), Alessandro Acquisti (Carnegie Mellon University), Lorrie Faith Cranor (Carnegie Mellon University), Norman Sadeh (Carnegie Mellon University), and Florian Schaub (University of Michigan)
  • Differentially Private Simple Linear Regression
    Daniel Alabi (Harvard University), Audra McMillan (Apple), Jayshree Sarathy (Harvard University), Adam Smith (Boston University), and Salil Vadhan (Harvard University)
  • Privacy-Preserving Training of Tree Ensembles over Continuous Data
    Samuel Adams (University of Washington Tacoma), Chaitali Choudhary (University of Washington Tacoma), Martine De Cock (University of Washington Tacoma), Rafael Dowsley (Monash University), David Melanson (University of Washington Tacoma), Anderson Nascimento (University of Washington Tacoma), Davis Railsback (University of Washington Tacoma), and Jianwei Shen (University of Arizona)
  • User-Level Label Leakage from Gradients in Federated Learning
    Aidmar Wainakh (Technical University of Darmstadt), Fabrizio Ventola (Technical University of Darmstadt), Till Müßig (Technical University of Darmstadt), Jens Keim (Technical University of Darmstadt), Carlos Garcia Cordero (Technical University of Darmstadt), Ephraim Zimmer (Technical University of Darmstadt), Tim Grube (Technical University of Darmstadt), Kristian Kersting (Technical University of Darmstadt), and Max Mühlhäuser (Technical University of Darmstadt)
  • Understanding Utility and Privacy of Demographic Data in Education Technology by Causal Analysis and Adversarial-Censoring
    Rakibul Hasan (CISPA Helmholtz Center for Information Security) and Mario Fritz (CISPA Helmholtz Center for Information Security)
  • Comprehensive Analysis of Privacy Leakage in Vertical Federated Learning During Prediction
    Xue Jiang (Technical University of Munich), Xuebing Zhou (Huawei Technologies Duesseldorf GmbH), and Jens Grossklags (Technical University of Munich)
  • Checking Websites' GDPR Consent Compliance for Marketing Emails
    Karel Kubicek (ETH Zurich), Jakob Merane (ETH Zurich), Carlos Cotrini (ETH Zurich), Alexander Stremitzer (ETH Zurich), Stefan Bechtold (ETH Zurich), and David Basin (ETH Zurich)
  • Efficient Set Membership using MPC-in-the-Head
    Aarushi Goel (Johns Hopkins University), Matthew Green (Johns Hopkins University), Mathias Hall-Anderson (Aarhus University), and Gabriel Kaptchuk (Boston University)
  • Privacy-Preserving Positioning in Wi-Fi Fine Timing Measurement
    Domien Schepers (Northeastern University) and Aanjhan Ranganathan (Northeastern University)
  • Leveraging Strategic Connection Migration-Powered Traffic Splitting for Privacy
    Mona Wang (Princeton University), Anunay Kulshrestha (Princeton University), Liang Wang (Princeton University), and Prateek Mittal (Princeton University)
  • RegulaTor: A Straightforward Website Fingerprinting Defense
    James K Holland (University of Minnesota) and Nicholas Hopper (University of Minnesota)
  • Knowledge Cross-Distillation for Membership Privacy
    Rishav Chourasia (NUS School of Computing), Batnyam Enkhtaivan (NEC Corporation), Kunihiro Ito (NEC Corporation), Junki Mori (NEC Corporation), Isamu Teranishi (NEC Corporation), and Hikaru Tsuchida (NEC Corporation)
  • Updatable Private Set Intersection
    Saikrishna Badrinarayanan (Visa Research), Peihan Miao (University of Illinois at Chicago), and Tiancheng Xie (University of California, Berkeley)
  • d3p - A Python Package for Differentially-Private Probabilistic Programming
    Lukas Prediger (Aalto University, Finland), Niki Loppi (NVIDIA AI Technology Center, Finland), Samuel Kaski (Aalto University, Finland & University of Manchester, UK), and Antti Honkela (University of Helsinki, Finland)
  • Who Knows I Like Jelly Beans? An Investigation Into Search Privacy
    Daniel Kats (NortonLifeLock Research Group), Johann Roturier (NortonLifeLock Research Group), and David Silva (NortonLifeLock Research Group)
  • PUBA: Privacy-Preserving User-Data Bookkeeping and Analytics
    Valerie Fetzer (Karlsruhe Institute of Technology, Germany), Marcel Keller (CSIRO's Data61), Sven Maier (Karlsruhe Institute of Technology, Germany), Markus Raiber (Karlsruhe Institute of Technology, Germany), Andy Rupp (University of Luxembourg), and Rebecca Schwerdt (Karlsruhe Institute of Technology, Germany)
  • How to prove any NP statement jointly? Efficient Distributed-prover Zero-Knowledge Protocols
    PANKAJ DAYAMA (IBM Research), ARPITA PATRA (Indian Institute of Science Bangalore), PROTIK PAUL (Indian Institute of Science Bangalore), NITIN SINGH (IBM Research), and DHINAKARAN VINAYAGAMURTHY (IBM Research)
  • FP-Radar: Longitudinal Measurement and Early Detection of Browser Fingerprinting
    Pouneh Nikkhah Bahrami (University of California, Davis), Umar Iqbal (University of Iowa), and Zubair Shafiq (University of California, Davis)
  • Analyzing the Feasibility and Generalizability of Fingerprinting Internet of Things Devices
    Dilawer Ahmed (North Carolina State University), Anupam Das (North Carolina State University), and Fareed Zaffar (Lahore University of Management Sciences)
  • Visualizing Privacy-Utility Trade-Offs in Differentially Private Data Releases
    Priyanka Nanayakkara (Northwestern University), Johes Bater (Duke University), Xi He (University of Waterloo), Jessica Hullman (Northwestern University), and Jennie Rogers (Northwestern University)
  • Building a Privacy-Preserving Smart Camera System
    Yohan Beugin (The Pennsylvania State University), Quinn Burke (The Pennsylvania State University), Blaine Hoak (The Pennsylvania State University), Ryan Sheatsley (The Pennsylvania State University), Eric Pauley (The Pennsylvania State University), Gang Tan (The Pennsylvania State University), Syed Rafiul Hussain (The Pennsylvania State University), and Patrick McDaniel (The Pennsylvania State University)
  • CoverDrop: Blowing the Whistle Through A News App
    Mansoor Ahmed-Rengers (University of Cambridge), Diana A. Vasile (University of Cambridge), Daniel Hugenroth (University of Cambridge), Alastair R. Beresford (University of Cambridge), and Ross Anderson (University of Cambridge)