Keynote: "Privacy Integrated Computing:” Cryptographic Protocols in Practice [video]
Moti YungAbstract:
The talk will cover why, when, and how to design privacy enhancing protocols for real scenarios that require care, and how to think about such scenarios within industrial settings, so as to assure successful deployment. Actual cases will be described.
Bio:
Moti Yung is a Security and Privacy Principal Research Scientist with Google. He got his PhD from Columbia University in 1988. Previously, he was with IBM Research, Certco, RSA Laboratories, and Snap. He is also an adjunct senior research faculty at Columbia, where he has co-advised and worked with PhD students. Among his awards: The IEEE Computer Society 2021 "Computer Pioneer Award" and 2018 "W. Wallace McDowell Award." In 2014 he received the ACM's "SIGSAC Outstanding Innovation Award," and ESORICS "Outstanding Research Award," while in 2010 he gave the IACR's Distinguished Lecture. Yung is a fellow of the ACM, IEEE, IACR, and EATCS (European Assoc. for Theoretical Computer Science). His current service includes being an editor of Springer's LNCS series, a board member of the IACR, and the president of the International Financial Cryptography Association. Yung's papers with over 365 authors broadly cover numerous areas of cryptography, privacy, and security.
Chair: Christiane Kuhn10:50–12:15CoverDrop: Blowing the Whistle Through A News AppMansoor Ahmed-Rengers (University of Cambridge), Diana A. Vasile (University of Cambridge), Daniel Hugenroth (University of Cambridge), Alastair R. Beresford (University of Cambridge), and Ross Anderson (University of Cambridge)Mixnet optimization methodsIness BEN GUIRAT (imec-COSIC, KU Leuven) and Claudia Diaz (imec-COSIC, KU Leuven)OrgAn: Organizational Anonymity with Low Latency [video]Debajyoti Das (KU Leuven), Easwar Vivek Mangipudi (Purdue University), and Aniket Kate (Purdue University)Learning to Behave: Improving Covert Channel Security with Behavior-Based DesignsRyan Wails (Georgetown University, U.S. Naval Research Laboratory), Andrew Stange (Georgetown University), Eliana Troper (Georgetown University), Aylin Caliskan (University of Washington), Roger Dingledine (Tor Project), Rob Jansen (U.S. Naval Research Laboratory), and Micah Sherr (Georgetown University)Leveraging Strategic Connection Migration-Powered Traffic Splitting for PrivacyMona Wang (Princeton University), Anunay Kulshrestha (Princeton University), Liang Wang (Princeton University), and Prateek Mittal (Princeton University)
Session 1C: Private Set Operations
Chair: Sherman S. M. Chow (online)10:50–12:15Updatable Private Set Intersection [video]Saikrishna Badrinarayanan (Visa Research), Peihan Miao (University of Illinois at Chicago), and Tiancheng Xie (University of California, Berkeley)Efficient Set Membership using MPC-in-the-Head [video]Aarushi Goel (Johns Hopkins University), Matthew Green (Johns Hopkins University), Mathias Hall-Anderson (Aarhus University), and Gabriel Kaptchuk (Boston University)Fully Secure PSI via MPC-in-the-Head [video]S. Dov Gordon (George Mason University), Carmit Hazay (Bar-Ilan University), and Phi Hung Le (George Mason University)Circuit-PSI with Linear Complexity via Relaxed Batch OPPRFNishanth Chandran (Microsoft Research, India), Divya Gupta (Microsoft Research, India), and Akash Shah (Microsoft Research, India)Homomorphically counting elements with the same property [video]Ilia Iliashenko (Ciphermode Labs, imec-COSIC - KU Leuven), Malika Izabachène (Cosmian), Axel Mertens (imec-COSIC - KU Leuven), and Hilder V. L. Pereira (imec-COSIC - KU Leuven)
Chair: Diogo Barradas (online)8:05-9:30SoK: Assumptions underlying Cryptocurrency Deanonymizations [video]Dominic Deuber (Friedrich-Alexander-Universität Erlangen-Nürnberg), Viktoria Ronge (Friedrich-Alexander-Universität Erlangen-Nürnberg), and Christian Rückert (Friedrich-Alexander-Universität Erlangen-Nürnberg)(ε, δ)-Indistinguishable Mixing for Cryptocurrencies [video]Foteini Baldimtzi (GMU), S. Dov Gordon (GMU), Ioanna Karantaidou (GMU), Mingyu Liang (GMU), and Mayank Varia (BU)On Defeating Graph Analysis of Anonymous Transactions [video]Christoph Egger (Friedrich-Alexander-Universität Erlangen-Nürnberg), Russell W. F. Lai (Friedrich-Alexander-Universität Erlangen-Nürnberg), Viktoria Ronge (Friedrich-Alexander-Universität Erlangen-Nürnberg), Ivy K. Y. Woo (Independent), and Hoover H. F. Yin (The Chinese University of Hong Kong)Toward Uncensorable, Anonymous and Private Access Over Satoshi Blockchains [video]Ruben Recabarren (Florida International University) and Bogdan Carbunar (Florida International University)SoK: TEE-assisted Confidential Smart Contract [video]Rujia Li (Southern University of Science and Technology & University of Birmingham), Qin Wang (Swinburne University of Technology & CSIRO Data61), Qi Wang (Southern University of Science and Technology), David Galindo (University of Birmingham), and Mark Ryan (University of Birmingham)
9:30
Break
9:45
Session 7A: Smart Devices
Chair: Rakibul Hasan9:45-11:10FingerprinTV: Fingerprinting Smart TV Apps [video]Janus Varmarken (University of California, Irvine), Jad Al Aaraj (University of California, Irvine), Rahmadi Trimananda (University of California, Irvine), and Athina Markopoulou (University of California, Irvine)Watch Over Your TV: A Security and Privacy Analysis of the Android TV ecosystem [video]Marcos Tileria (Royal Holloway, University of London) and Jorge Blasco (Royal Holloway, University of London)Building a Privacy-Preserving Smart Camera System [video]Yohan Beugin (The Pennsylvania State University), Quinn Burke (The Pennsylvania State University), Blaine Hoak (The Pennsylvania State University), Ryan Sheatsley (The Pennsylvania State University), Eric Pauley (The Pennsylvania State University), Gang Tan (The Pennsylvania State University), Syed Rafiul Hussain (The Pennsylvania State University), and Patrick McDaniel (The Pennsylvania State University)Personal Information Inference from Voice Recordings: User Awareness and Privacy ConcernsJacob Leon Kröger (Technische Universität Berlin, Germany), Leon Konstantin Gellrich (Universität Potsdam, Germany), Sebastian Pape (Goethe Universität, Frankfurt, Germany), Saba Rebecca Brause (Technische Universität Berlin, Germany), Stefan Ullrich (Technische Universität Berlin, Germany)Effects of privacy permissions on user choices in voice assistant app storesGary Liu (University of California, Berkeley) and Nathan Malkin (University of California, Berkeley & University of Maryland, College Park)
Chair: Kassem Fawaz (online)9:45-11:10PrivacyScout: Assessing Vulnerability to Shoulder Surfing on Mobile Devices [video]Mihai Bâce (Institute for Visualisation and Interactive Systems, University of Stuttgart, Stuttgart, Germany), Alia Saad (HCI Group, University of Duisburg-Essen, Essen, Germany), Dr. Mohamed Khamis (University of Glasgow, Glasgow, United Kingdom), Stefan Schneegass (HCI Group, University of Duisburg-Essen, Essen, Germany), and Andreas Bulling (Institute for Visualisation and Interactive Systems, University of Stuttgart, Stuttgart, Germany)Neural Fuzzy Extractors: A Secure Way to Use Artificial Neural Networks for Biometric User Authentication [video]Abhishek Jana (Kansas State University), Bipin Paudel (Kansas State University), Md Kamruzzaman Sarker (Kansas State University), Monireh Ebrahimi (Kansas State University), Pascal Hitzler (Kansas State University), and George T Amariucai (Kansas State University)I know what you did on Venmo: Discovering privacy leaks in mobile social payments [video]Rajat Tandon (University of Southern California Information Sciences Institute), Pithayuth Charnsethikul (University of Southern California Information Sciences Institute), Ishank Arora (University of Texas, Austin), Dhiraj Murthy (University of Texas, Austin), and Jelena Mirkovic (University of Southern California Information Sciences Institute)SoK: Cryptographic Confidentiality of Data on Mobile Devices [video]Maximilian Zinkus (Johns Hopkins University), Tushar M. Jois (Johns Hopkins University), and Matthew Green (Johns Hopkins University)Moby: A Blackout-resistant Anonymity Network for Mobile DevicesAmogh Pradeep (Northeastern University), Hira Javaid (Northeastern University), Ryan Williams (Northeastern University), Antoine Rault (EPFL), David Choffnes (Northeastern University), Stevens Le Blond (EPFL), and Bryan Ford (EPFL)
Chair: Roger Dingledine14:50-16:00MLEFlow: Learning from History to Improve Load Balancing in Tor [video]Hussein Darir (University of Illinois at Urbana-Champaign), Hussein Sibai (University of Illinois at Urbana-Champaign), Chin-Yu Cheng (University of Illinois at Urbana-Champaign), Nikita Borisov (University of Illinois at Urbana-Champaign), Geir Dullerud (University of Illinois at Urbana-Champaign), and Sayan Mitra (University of Illinois at Urbana-Champaign)From "Onion Not Found" to Guard Discovery [video]Lennart Oldenburg (imec-COSIC KU Leuven), Gunes Acar (imec-COSIC KU Leuven), and Claudia Diaz (imec-COSIC KU Leuven)Increasing Adoption of Tor Browser Using Informational and Planning Nudges [video]Peter Story (Clark University), Daniel Smullen (Carnegie Mellon University), Rex Chen (Carnegie Mellon University), Yaxing Yao (University of Maryland, Baltimore County), Alessandro Acquisti (Carnegie Mellon University), Lorrie Faith Cranor (Carnegie Mellon University), Norman Sadeh (Carnegie Mellon University), and Florian Schaub (University of Michigan)Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor [video]Vera Rimmer (KU Leuven), Theodor Schnitzler (Ruhr-University Bochum), Tom Van Goethem (KU Leuven), Abel Rodríguez Romero (KU Leuven), Wouter Joosen (KU Leuven), and Katharina Kohls (Radboud University)
Chair: Alptekin Küpçü (online)16:15-17:25Adversarial Images Against Super-Resolution Convolutional Neural Networks for Free [video]Arezoo Rajabi (University of Washington), Mahdieh Abbasi (Universté Laval), Rakesh B. Bobba (Oregon State University), and Kimia Tajik (Case Western Reserve University)User-Level Label Leakage from Gradients in Federated Learning [video]Aidmar Wainakh (Technical University of Darmstadt), Fabrizio Ventola (Technical University of Darmstadt), Till Müßig (Technical University of Darmstadt), Jens Keim (Technical University of Darmstadt), Carlos Garcia Cordero (Technical University of Darmstadt), Ephraim Zimmer (Technical University of Darmstadt), Tim Grube (Technical University of Darmstadt), Kristian Kersting (Technical University of Darmstadt), and Max Mühlhäuser (Technical University of Darmstadt)Comprehensive Analysis of Privacy Leakage in Vertical Federated Learning During Prediction [video]Xue Jiang (Technical University of Munich), Xuebing Zhou (Huawei Technologies Duesseldorf GmbH), and Jens Grossklags (Technical University of Munich)Ulixes: Facial Recognition Privacy with Adversarial Machine Learning [video]Thomas Cilloni (University of Mississippi), Wei Wang (Xi'an Jiaotong-Liverpool University), Charles Walter (University of Mississippi), and Charles Fleming (University of Mississippi)
18:30-19:30Hosts: Rebekah Overdorf and Carmela Troncoso, Track C in gather.town
Room 1
8:00
Social Coffee Hour with Light Breakfast
9:00
Opening/Keynote: Sex, Work, and Technology: Lessons for Internet Governance & Digital Safety [video]
Elissa M. RedmilesAbstract:
Sex workers sit at the intersection of multiple marginalized identities and make up a sizable workforce: the UN estimates that at least 42 million sex workers are conducting business across the globe. Sex workers face a unique and significant set of digital, social, political, legal, and safety risks; yet their digital experiences have received little study in the CS and HCI literature. In this talk we will review findings from four years of research we have conducted with sex workers on their use of technology to conduct business, the multifaceted safety risks they face, and their carefully curated strategies for online and offline safety. Drawing on these findings, we will discuss open questions in internet governance, digital discrimination, and safety protections for marginalized and vulnerable users whose experiences bisect the digital and physical.
Bio:
Dr. Elissa M. Redmiles is a faculty member and research group leader at the Max Planck Institute for Software Systems. She uses computational, economic, and social science methods to understand users’ security, privacy, and online safety-related decision-making processes. Her work has been recognized with multiple paper awards at USENIX Security, ACM CCS and ACM CHI and has been featured in popular press publications such as the New York Times, Wall Street Journal, Scientific American, Rolling Stone, Wired, Business Insider, and CNET. Dr. Redmiles will be a Visiting Scholar at the Berkman Klein Center for Internet & Society at Harvard University for the 2022-2023 academic year and has additionally served as a consultant and researcher at multiple institutions, including Microsoft Research, Facebook, the World Bank, the Center for Democracy and Technology, and the University of Zurich.
10:00
Break
10:15
Discussion: Novel methods to teach foreign ideas in information security to the public
Discussion Lead: Ali Parsaee
10:45
Discussion: Improving Usability of Internet Censorship Data through a Censorship Dashboard
Invitied Talk: Learning from Low-Tech PETS [video]
Susan McGregorAbstract:
Long before the advent of digital computing, individuals and communities
have found ways to both keep information private - and share it with
specific groups. This talk will review examples of these (mostly)
pre-digital technologies, to see how historical PETS can help us think more
creatively about the PETS that people want and need, even today.
12:00
Lunch + Ice Cream + time to explore Sydney on your own
Vanessa TeagueAbstract:
Right To Ask is an open-source Australian project designed to help
people raise and focus political questions. The questions are intended to be
either answered by members of parliament, or raised in parliament or
committees. Participants can up-vote (or downvote by dismissing) questions,
allowing us to sort them by popularity. The difficult part is protecting the
privacy of individuals' up-voting patterns. Although we can use some of the
techniques from cryptographic election protocols, the ongoing nature of the
vote aggregation, and the fact that people may only respond to a small
subset of the questions, means that traditional notions of vote privacy are
not enough.
Joint work with a large number of colleagues, friends and volunteers.
15:30
Discussion: More than informed: Why rational decision-making for privacy matters
Discussion Lead: Anna Leschanowsky
16:00
Break
16:15
Discussion: Biometrics in Humanitarian Aid: Blessing or Curse?
Discussion Lead: Wouter Lueks
16:45
Discussion: Privacy Preserving Telemetry in Reality, an illusion bound to silicon?
Discussion Lead: Antonio Nappa
17:15
Break
17:30
Keynote: "Each of us is a micro-media": citizen mobilisation as digital media practices in the context of Russia's war in Ukraine [video]
Tanya LokotAbstract:
In participatory warfare, opportunities for participating in conflicts are greatly expanded, often through networked means. Russia's ongoing war in Ukraine has been characterised by high levels of social media use – and media activity – by governments, military actors, media outlets, and ordinary citizens. Ukrainian citizens in particular have relied on the openness and power of horizontal networks to mobilise for collective action away from or alongside centralised authority.
On social media, this activity has manifested as a range of digital media practices, both strategic and impromptu ones. The resulting assemblage of practices includes (re)framing and articulating messages; privacy and security practices; crowdsourcing resources and expertise; and prebunking and debunking activity. I argue that in a complex environment where the realities of war mix with platform algorithms, state disinformation, and mainstream media logics, these digitally mediated "micro-media" practices can act as drivers of democracy, resistance, and resilience - and therefore demand greater scholarly attention and understanding.
Bio:
Dr Tanya (Tetyana) Lokot is Associate Professor in Digital Media and Society at the School of Communications in Dublin City University, Ireland. She researches threats to digital rights, networked authoritarianism, digital resistance, internet freedom, and internet governance in Eastern Europe. She is the author of Beyond the Protest Square: Digital Media and Augmented Dissent(Rowman & Littlefield, 2021), an in-depth study of protest and digital media in Ukraine and Russia.
8:00
PETS Hike - Wattamolla to Garie Beach
8:00-17:00Please see the hike page for full details, including map, schedule, and tips on what to bring and wear.