Accepted papers for PETS 2023

Issue 1

  • Privacy Rarely Considered: Exploring Considerations in the Adoption of Third-Party Services by Websites
    Christine Utz (CISPA Helmholtz Center for Information Security), Sabrina Amft (CISPA Helmholtz Center for Information Security), Martin Degeling (Ruhr University Bochum), Thorsten Holz (CISPA Helmholtz Center for Information Security), Sascha Fahl (CISPA Helmholtz Center for Information Security), and Florian Schaub (University of Michigan)
  • Not Your Average App: A Large-scale Privacy Analysis of Android Browsers
    Amogh Pradeep (Northeastern University), Álvaro Feal (IMDEA Networks / Universidad Carlos III de Madrid), Julien Gamba (IMDEA Networks / Universidad Carlos III de Madrid), Ashwin Rao (University of Helsinki), Martina Lindorfer (TU Wien), Narseo Vallina-Rodriguez (IMDEA Networks / ICSI / AppCensus Inc.), and David Choffnes (Northeastern University)
  • “Revoked just now!” Users’ Behaviors Toward Fitness-Data Sharing with Third-Party Applications artifact
    Noé Zufferey (University of Lausanne), Kavous Salehzadeh Niksirat (University of Lausanne), Mathias Humbert (University of Lausanne), and Kévin Huguenin (University of Lausanne)
  • SoK: Secure Aggregation based on cryptographic schemes for Federated Learning
    Mohamad Mansouri (EURECOM), Melek Önen (EURECOM), Wafa Ben Jaballah (Thales SIX GTS), and Mauro Conti (University of Padua)
  • Exploring Model Inversion Attacks in the Black-box Setting
    Antreas Dionysiou (University of Cyprus), Vassilis Vassiliades (CYENS Centre of Excellence), and Elias Athanasopoulos (University of Cyprus)
  • No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps
    Enze Liu (University of California, San Diego), Sumanth Rao (University of California, San Diego), Sam Havron (Cornell Tech), Grant Ho (University of California, San Diego), Stefan Savage (University of California, San Diego), Geoffrey M. Voelker (University of California, San Diego), and Damon McCoy (New York University)
  • Designing a Location Trace Anonymization Contest artifact
    Takao Murakami (AIST), Hiromi Arai (RIKEN), Koki Hamada (NTT), Takuma Hatano (NSSOL), Makoto Iguchi (Kii Corporation), Hiroaki Kikuchi (Meiji University), Atsushi Kuromasa (Data Society Alliance), Hiroshi Nakagawa (RIKEN), Yuichi Nakamura (SoftBank Corp.), Kenshiro Nishiyama (LegalForce), Ryo Nojima (NICT), Hidenobu Oguri (Fujitsu Limited), Chiemi Watanabe (Tsukuba University of Technology), Akira Yamada (KDDI Research, Inc.), Takayasu Yamaguchi (Akita Prefectural University), and Yuji Yamaoka (Fujitsu Limited)
  • Detect your fingerprint in your photographs : Photography-based multi-feature Sybil detection
    Yerim Kim (Korea University), Minjae Kim (Korea University), Myungjae Chung (Korea University), and Junbeom Hur (Korea University)
  • StyleID: Identity Disentanglement for Anonymizing Faces artifact
    Minh-Ha Le (Linkoping University) and Niklas Carlsson (Linkoping University)
  • SoK: Secure E-Voting with Everlasting Privacy
    Thomas Haines (Australian National University), Rafieh Mosaheb (University of Luxembourg), Johannes Mueller (University of Luxembourg), and Ivan Pryvalov (University of Luxembourg)
  • Investigating Privacy Decision-Making Processes Among Nigerian Men and Women.
    Victor Yisa (Dalhousie University), Reza Ghaiumy Anaraky (Clemson University), Bart P. Knijnenburg (Clemson University), and Rita Orji (Dalhousie University)
  • Privacy by Projection: Federated Population Density Estimation by Projecting on Random Features
    Zixiao Zong (University of California, Irvine), Mengwei Yang (University of California, Irvine), Justin Scott Ley (University of California, Irvine), Athina Markopoulou (University of California, Irvine), and Carter Butts (University of California, Irvine)
  • HeLayers: A Tile Tensors Framework for Large Neural Networks on Encrypted Data artifact
    Ehud Aharoni (IBM Research - Haifa), Allon Adir (IBM Research - Haifa), Moran Baruch (IBM Research - Haifa and Bar Ilan University), Nir Drucker (IBM Research - Haifa), Gilad Ezov (IBM Research - Haifa), Ariel Farkash (IBM Research - Haifa), Lev Greenberg (IBM Research - Haifa), Ramy Masalha (IBM Research - Haifa), Guy Moshkowich (IBM Research - Haifa), Dov Murik (IBM Research - Haifa), Hayim Shaul (IBM Research - Haifa), and Omri Soceanu (IBM Research - Haifa)
  • Efficient decision tree training with new data structure for secure multi-party computation
    Koki Hamada (NTT), Dai Ikarashi (NTT), Ryo Kikuchi (NTT), and Koji Chida (Gunma University)
  • FrodoPIR: Simple, Scalable, Single-Server Private Information Retrieval artifact
    Alex Davidson (Brave Software), Gonçalo Pestana (Brave Software), and Sofía Celi (Brave Software)
  • "Surprised, Shocked, Worried": User Reactions to Facebook Data Collection from Third Parties
    Patricia Arias-Cabarcos (Paderborn University), Saina Kjalili (unaffiliated), and Thorsten Strufe (KIT)
  • MIAShield: Defending Membership Inference Attacks via Preemptive Exclusion of Members
    Ismat Jarin (University of Michigan-Dearborn) and Birhanu Eshete (University of Michigan-Dearborn)
  • Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable Encryption
    Ghous Amjad (Google), Sarvar Patel (Google), Giuseppe Persiano (University of Salerno), Kevin Yeo (Google), and Moti Yung (Google)
  • I-GWAS: Privacy-Preserving Interdependent Genome-Wide Association Studies
    Túlio Pascoal (University of Luxembourg), Jérémie Decouchant (TU Delft), Antoine Boutet (INSA, INRIA, University of Lyon, CITI), and Marcus Völp (University of Luxembourg)
  • Is There a Reverse Privacy Paradox? An Exploratory Analysis of Gaps Between Privacy Perspectives and Privacy-Seeking Behaviors
    Jessica Colnago (Google), Alessandro Acquisti (Carnegie Mellon University), and Lorrie Cranor (Carnegie Mellon University)
  • Privacy Concerns and Acceptance Factors of OSINT for Cybersecurity: A Representative Survey
    Thea Riebe (TU Darmstadt, PEASEC), Tom Biselli (TU Darmstadt, PEASEC), Marc-André Kaufhold (TU Darmstadt, PEASEC), and Christian Reuter (TU Darmstadt, PEASEC)
  • Lox: Protecting the Social Graph in Bridge Distribution artifact
    Lindsey Tulloch (University of Waterloo) and Ian Goldberg (University of Waterloo)
  • How Much Privacy Does Federated Learning with Secure Aggregation Guarantee?
    Ahmed Roushdy Elkordy (University of Southern California), Jiang Zhang (University of Southern California), Yahya H. Ezzeldin (University of Southern California), Konstantinos Psounis (University of Southern California), and Salman Avestimehr (University of Southern California)
  • Private Multi-Winner Voting for Machine Learning
    Adam Dziedzic (University of Toronto and Vector Institute), Christopher A. Choquette-Choo (Google Brain), Natalie Dullerud (University of Toronto and Vector Institute), Vinith Suriyakumar (MIT), Ali Shahin Shamsabadi (The Alan Turing Institute), Muhammad Ahmad Kaleem (University of Toronto and Vector Institute), Somesh Jha (University of Wisconsin), Nicolas Papernot (University of Toronto and Vector Institute), and Xiao Wang (Northwestern University)
  • Privacy-Aware Adversarial Network in Human Mobility Prediction artifact
    Yuting Zhan (Imperial College London), Hamed Haddadi (Imperial College London), and Afra Mashhadi (University of Washington)
  • Exploring privacy implications of awareness and control mechanisms in smart home devices
    Madiha Tabassum (University of North Carolina at Charlotte) and Heather Richter Lipford (University of North Carolina at Charlotte)
  • Dolphin: A Cellular Voice Based Internet Shutdown Resistance System
    Piyush Kumar Sharma (IIIT Delhi), Rishi Sharma (IIIT Delhi), Kartikey Singh (IIIT Delhi), Mukulika Maity (IIIT Delhi), and Sambuddho Chakravarty (IIIT Delhi)
  • Multi-Party Replicated Secret Sharing over a Ring with Applications to Privacy-Preserving Machine Learning artifact
    Alessandro Baccarini (University at Buffalo), Marina Blanton (University at Buffalo), and Chen Yuan (University at Buffalo)
  • Efficient Proofs of Software Exploitability for Real-world Processors
    Matthew Green (Johns Hopkins University), Mathias Hall-Andersen (Aarhus University), Eric Hennenfent (Trail of Bits), Gabriel Kaptchuk (Boston University), Benjamin Perez (Trail of Bits), and Gijs Van Laer (Johns Hopkins University)
  • On the Privacy Risks of Deploying Recurrent Neural Networks in Machine Learning Models artifact
    Yunhao Yang (University of Texas at Austin), Parham Gohari (University of Texas at Austin), and Ufuk Topcu (University of Texas at Austin)
  • Blind My - Robust Stalking Prevention in Apple's Find My Network
    Travis Mayberry (United States Naval Academy), Erik-Oliver Blass (Airbus), and Ellis Fenske (US Naval Academy)
  • Differentially Private Speaker Anonymization
    Ali Shahin Shamsabadi (The Alan Turing Institute), Brij Mohan Lal Srivastava (INRIA), Aurélien Bellet (INRIA), Nathalie Vauquier (INRIA), Emmanuel Vincent (INRIA), Mohamed Maouche (INRIA), Marc Tommasi (INRIA), and Nicolas Papernot (University of Toronto and Vector Institute)
  • TWo-IN-one-SSE: Fast, Scalable and Storage-Efficient Searchable Symmetric Encryption for Conjunctive and Disjunctive Boolean Queries artifact
    Arnab Bag (Indian Institute of Technology Kharagpur), Debadrita Talapatra (Indian Institute of Technology Kharagpur), Ayushi Rastogi (Indian Institute of Technology Kharagpur), Sikhar Patranabis (IBM Research India), and Debdeep Mukhopadhyay (Indian Institute of Technology Kharagpur)
  • Individualized PATE: Differentially Private Machine Learning with Individual Privacy Guarantees artifact
    Franziska Boenisch (Free University Berlin), Christopher Mühl (Free University Berlin), Roy Rinberg (Columbia University), Jannis Ihrig (Free University Berlin), and Adam Dziedzic (University of Toronto and Vector Institute)
  • Understanding Person Identification Through Gait artifact
    Simon Hanisch (Technische Universität Dresden), Evelyn Muschter (Technische Universität Dresden), Adamantini Chatzipanagioti (Technische Universität Dresden), Shu-Chen Li (Technische Universität Dresden), and Thorsten Strufe (Karlsruhe Institute of Technology)

Issue 2

  • Intersectional Thinking about PETs: A Study of Library Privacy
    Nora McDonald (George Mason University), Rachel Greenstadt (New York University), and Andrea Forte (Drexel University)
  • Heads in the Clouds? Measuring Universities’ Migration to Public Clouds: Implications for Privacy & Academic Freedom
    Tobias Fiebig (Max-Planck-Institut für Informatik), Seda Gürses (TU Delft), Carlos H. Gañán (TU Delft), Erna Kotkamp (TU Delft), Fernando Kuipers (TU Delft), Martina Lindorfer (TU Wien), Menghua Prisse (TU Delft), and Taritha Sari (TU Delft)
  • Lessons Learned: Surveying the Practicality of Differential Privacy in the Industry
    Gonzalo Munilla Garrido (Technical University of Munich, BMW Group), Xiaoyuan Liu (UC Berkeley), Florian Matthes (Technical University of Munich), and Dawn Song (UC Berkeley)
  • Privacy Property Graph: Towards Automated Privacy Threat Modeling via Static Graph-based Analysis
    Immanuel Kunz (Fraunhofer AISEC), Konrad Weiss (Fraunhofer AISEC), Christian Banse (Fraunhofer AISEC), and Angelika Schneider (Fraunhofer AISEC)
  • DeepSE-WF: Unified Security Estimation for Website Fingerprinting Defenses artifact
    Alexander Veicht (ETH Zürich), Cedric Renggli (University of Zurich), and Diogo Barradas (University of Waterloo)
  • iPET: Privacy Enhancing Traffic Perturbations for Secure IoT Communications artifact
    Akshaye Shenoi (TUMCREATE Singapore), Prasanna Karthik Vairam (National University of Singapore), Kanav Sabharwal (National University of Singapore), Li Jialin (National University of Singapore), and Dinil Mon Divakaran (Acronis Research)
  • Creative beyond TikToks: Investigating Adolescents’ Social Privacy Management on TikTok artifact
    Nico Ebert (ZHAW School of Management and Law), Tim Geppert (ZHAW School of Management and Law), Joanna Strycharz (University of Amsterdam), Melanie Knieps (University of Zurich), Michael Hönig (ZHAW School of Management and Law), and Elke Brucker-Kley (ZHAW School of Management and Law)
  • Distributed GAN-Based Privacy-Preserving Publication of Vertically-Partitioned Data
    Xue Jiang (Technical University of Munich), Yufei Zhang (Technical University of Munich), Xuebing Zhou (Huawei Technologies Deutschland GmbH), and Jens Grossklags (Technical University of Munich)
  • How Website Owners Face Privacy Issues: Thematic Analysis of Responses from a Covert Notification Study Reveals Diverse Circumstances and Challenges
    Alina Stöver (TU Darmstadt), Nina Gerber (TU Darmstadt), Henning Pridöhl (Universität Bamberg), Max Maass (), Sebastian Bretthauer (Goethe-Universität Frankfurt), Indra Spiecker (Goethe-Universität Frankfurt), Matthias Hollick (TU Darmstadt), and Dominik Herrmann (Universität Bamberg)
  • Usability and Enforceability of Global Privacy Control artifact
    Sebastian Zimmeck (Wesleyan University), Oliver Wang (Wesleyan University), Kuba Alicki (Wesleyan University), Jocelyn Wang (Wesleyan University), and Sophie Eng (Wesleyan University)
  • Watching your call: Breaking VoLTE Privacy in LTE/5G Networks
    Zishuai Cheng (Beijing University of Posts and Telecommunications), Mihai Ordean (University of Birmingham), Flavio D. Garcia (University of Birmingham), Baojiang Cui (Beijing University of Posts and Telecommunications), and Dominik Rys (University of Birmingham)
  • Strengthening Privacy-Preserving Record Linkage using Diffusion artifact
    Frederik Armknecht (University of Mannheim), Youzhe Heng (University of Mannheim), and Rainer Schnell (University of Duisburg-Essen)
  • A Unified Framework for Quantifying Privacy Risk in Synthetic Data artifact
    Matteo Giomi (Statice GmbH), Franziska Boenisch (Vector Institute), Christoph Wehmeyer (Statice GmbH), and Borbála Tasnádi (Statice GmbH)
  • Unintended Memorization and Timing Attacks in Named Entity Recognition Models
    Rana Salal Ali (Macquarie University), Benjamin Zi Hao Zhao (Macquarie University), Hassan Asghar (Macquarie University), Tham Nguyen (Macquarie University), Ian Wood (Macquarie University), and Mohamed Ali Kaafar (Macquarie University)
  • RPM: Robust Anonymity at Scale
    Donghang Lu (Purdue University) and Aniket Kate (Purdue University)
  • Private Sampling with Identifiable Cheaters artifact
    César Sabater (INRIA), Florian Hahn (University of Twente), Andreas Peter (University of Oldenburg), and Jan Ramon (INRIA)
  • Investigating how users imagine their Personal Privacy Assistant
    Alina Stöver (TU Darmstadt), Sara Hahn (TU Darmstadt), Felix Kretschmer (), and Nina Gerber (TU Darmstadt)
  • SoK: Content Moderation for End-to-End Encryption
    Sarah Scheffler (Princeton University) and Jonathan Mayer (Princeton University)
  • ezDPS: An Efficient and Zero-Knowledge Machine Learning Inference Pipeline
    Haodi Wang (Beijing Normal University / Virginia Tech) and Thang Hoang (Virginia Tech)
  • Two-Cloud Private Read Alignment to a Public Reference Genome artifact
    Sindhuja Madabushi (University of Wisconsin-Madison) and Parameswaran Ramanathan (University of Wisconsin-Madison)
  • PubSub-ML: A Model Streaming Alternative to Federated Learning
    Lovedeep Gondara (Simon Fraser University) and Ke Wang (Simon Fraser University)
  • SoK: Differentially Private Publication of Trajectory Data
    Àlex Miranda-Pascual (Universitat Politècnica de Catalunya, Karlsruhe Institute of Technology), Patricia Guerra-Balboa (Karlsruhe Institute of Technology), Javier Parra-Arnau (Universitat Politècnica de Catalunya, Karlsruhe Institute of Technology), Jordi Forné (Universitat Politècnica de Catalunya), and Thorsten Strufe (Karlsruhe Institute of Technology)
  • An Efficient Data-Independent Priority Queue and its Application to Dark Pools
    Sahar Mazloom (J. P. Morgan AI Research), Benjamin Diamond (Coinbase), Antigoni Polychroniadou (J. P. Morgan AI Research), and Tucker Balch (J. P. Morgan AI Research)
  • Find Thy Neighbourhood: Privacy-Preserving Local Clustering
    Pranav Shriram A (National Institute of Technology Tiruchirappalli), Nishat Koti (Indian Institute of Science Bangalore), Varsha Bhat Kukkala (Indian Institute of Science Bangalore), Arpita Patra (Indian Institute of Science Bangalore), and Bhavish Raj Gopal (Indian Institute of Science Bangalore)
  • Result-pattern-hiding Conjunctive Searchable Symmetric Encryption with Forward Privacy
    Dandan Yuan (The University of Auckland), Cong Zuo (Nanyang Technological University), Shujie Cui (Monash University), and Giovanni Russello (The University of Auckland)
  • Private Graph Extraction via Feature Explanations artifact
    Iyiola Emmanuel Olatunji (L3S Research Center, Leibniz University Hannover), Mandeep Rathee (L3S Research Center, Leibniz University Hannover), Thorben Funke (L3S Research Center, Leibniz University Hannover), and Megha Khosla (TU Delft)
  • iStelan: Disclosing Sensitive User Information by Mobile Magnetometer from Finger Touches
    Reham Aburas (Purdue University), Habiba Farrukh (Purdue University), He Wang (Purdue University), Yidong Lu (Purdue University), and Z. Berkay Celik (Purdue University)
  • SoK: Managing risks of linkage attacks on data privacy
    Jovan Powar (University of Cambridge) and Alastair Beresford (University of Cambridge)

Issue 3

Some of these papers are accepted conditionally on approval of a shepherd.

  • Trust TEE?: Exploring the Impact of Trusted Execution Environments on Smart Home Privacy Norms
    Pratik Musale (University of Pittsburgh) and Adam Lee (University of Pittsburgh)
  • Evolution of Composition, Readability, and Structure of Privacy Policies over Two Decades
    Andrick Adhikari (University of Denver), Sanchari Das (University of Denver), and Rinku Dewri (University of Denver)
  • SoK: New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks
    Charles Gouert (University of Delaware), Dimitris Mouris (University of Delaware), and Nektarios Georgios Tsoutsos (University of Delaware)
  • Comparing Large-Scale Privacy and Security Notifications
    Christine Utz (CISPA Helmholtz Center for Information Security), Matthias Michels (Saarland University), Martin Degeling (Ruhr University Bochum), Ninja Marnau (CISPA Helmholtz Center for Information Security), and Ben Stock (CISPA Helmholtz Center for Information Security)
  • RAVEN: Stateless Rapid IP Address Variation for Enterprise Networks
    Liang Wang (Princeton University), Hyojoon Kim (Princeton University), Prateek Mittal (Princeton University), and Jennifer Rexford (Princeton University)
  • How to Combine Membership-Inference Attacks on Multiple Updated Models
    Matthew Jagielski (Google), Stanley Wu (Northeastern University), Alina Oprea (Northeastern University), Jonathan Ullman (Northeastern University), and Roxana Geambasu (Columbia University)
  • SenRev: Measurement of Personal Information Disclosure in Online Health Communities
    Faysal Hossain Shezan (University of Virginia), Minjun Long (University of Virginia), David Hasani (University of Virginia), Gang Wang (University of Illinois at Urbana-Champaign), and Yuan Tian (University of California Los Angeles)
  • "My face, my rules": Enabling Personalized Protection against Unacceptable Face Editing
    Zhujun Xiao (University of Chicago), Jenna Cryan (University of Chicago), Yuanshun Yao (University of Chicago), Yi Hong Gordon Cheo (University of Chicago), Yuanchao Shu (Microsoft Research), Stefan Saroiu (Microsoft Research), Ben Y. Zhao (University of Chicago), and Haitao Zheng (University of Chicago)
  • Examining the Hydra: Simultaneously Shared Links in Tor and the Effects on its Performance
    Sebastian Pahl (Hof University of Applied Sciences, Institute of Information Systems (iisys)), Florian Adamsky (Hof University of Applied Sciences, Institute of Information Systems (iisys)), Daniel Kaiser (Status Research & Development GmbH), and Thomas Engel (University of Luxembourg)
  • SoK: Membership Inference is Harder Than we Previously Thought
    Antreas Dionysiou (University of Cyprus) and Elias Athanasopoulos (University of Cyprus)
  • Losing Less: A Loss for Differentially Private Deep Learning
    Ali Shahin Shamsabadi (The Alan Turing Institute and Vector Institute) and Nicolas Papernot (University of Toronto and Vector Institute)
  • Convolutions in Overdrive: Maliciously Secure Convolutions for MPC
    Marc Rivinius (University of Stuttgart), Pascal Reisert (University of Stuttgart), Sebastian Hasler (University of Stuttgart), and Ralf Küsters (University of Stuttgart)
  • VESPo: Verified Evaluation of Secret Polynomials, with application to dynamic proofs of retrievability
    Jean-Guillaume Dumas (Univ. Grenoble Alpes), Aude Maignan (Univ. Grenoble Alpes), Clément Pernet (Univ. Grenoble Alpes), and Daniel S. Roche (U.S. Naval Academy)
  • DPrio: Efficient Differential Privacy with High Utility for Prio
    Dana Keeler (Mozilla Corporation), Emily Lepert (University of Waterloo), Chelsea Komlo (University of Waterloo), Shannon Veitch (ETH Zurich), and Xi He (University of Waterloo)
  • Blocking JavaScript without Breaking the Web: An Empirical Investigation
    Abdul Haddi Amjad (Virginia Tech), Zubair Shafiq (UC Davis), and Muhammad Ali Gulzar (Virginia Tech)
  • Data Security on the Ground: Investigating Technical and Legal Requirements under the GDPR
    Tina Marjanov (University of Cambridge, Vrije Universiteit Amsterdam), Maria Konstantinou (Vrije Universiteit Amsterdam), Dayana Spagnuelo (Vrije Universiteit Amsterdam, TNO), and Magdalena Jozwiak (Tilburg University)
  • Differential Privacy for Black-Box Statistical Analyses
    Nitin Kohli (UC Berkeley) and Paul Laskowski (UC Berkeley)
  • Secure and Accurate Summation of Many Floating-Point Numbers
    Marina Blanton (University at Buffalo), Michael T. Goodrich (University of California, Irvine), and Chen Yuan (Meta Platforms, Inc.,)
  • Private Collection Matching Protocols
    Kasra EdalatNejad (EPFL), Mathilde Raynal (EPFL), Wouter Lueks (CISPA Helmholtz Center for Information Security), and Carmela Troncoso (EPFL)
  • A Method for Securely Comparing Integers using Binary Trees
    Anselme Tueno (SAP), Jonas Janneck (Ruhr University Bochum), and David Boehm (SAP)
  • Practical Delegatable Anonymous Credentials From Equivalence Class Signatures
    Omid Mir (The Institute of Networks and Security, Johannes Kepler University Linz), Daniel Slamanig (AIT Austrian Institute of Technology, Vienna, Austria), Balthazar Bauer (IRIF, Université de Paris Cité, France), and René Mayrhofer (The Institute of Networks and Security, Johannes Kepler University Linz)
  • Ruffle: Rapid 3-Party Shuffle Protocols
    Pranav Shriram A (National Institute of Technology, Tiruchirapalli), Nishat Koti (Indian Institute of Science), Varsha Bhat Kukkala (Indian Institute of Science), Arpita Patra (Indian Institute of Science), Bhavish Raj Gopal (Indian Institute of Science), and Somya Sangal (Indian Institute of Science)
  • Story Beyond the Eye: Glyph Positions Break PDF Text Redaction
    Maxwell Bland (University of Illinois, Urbana-Champaign), Anushya Iyer (University of Illinois, Urbana-Champaign), and Kirill Levchenko (University of Illinois, Urbana-Champaign)
  • Towards Sentence Level Inference Attack Against Pre-trained Language Models
    Kang Gu (Dartmouth College), Ehsanul Kabir (Dartmouth College), Soroush Vosoughi (Dartmouth College), and Shagufta Mehnaz (The Pennsylvania State University)
  • Time-Deniable Signatures
    Gabrielle Beck (Johns Hopkins University), Arka Rai Choudhuri (NTT Research), Matthew Green (Johns Hopkins University), Abhishek Jain (Johns Hopkins University), and Pratyush Ranjan Tiwari (Johns Hopkins University)
  • Measuring the Compliance of Android App Developers with the California Consumer Privacy Act (CCPA)
    Nikita Samarin (University of California, Berkeley / ICSI), Shayna Kothari (University of California, Berkeley), Zaina Siyed (University of California, Berkeley), Oscar Bjorkman (University of California, Berkeley), Reena Yuan (University of California, Berkeley), Primal Wijesekera (University of California, Berkeley / ICSI), Noura Alomar (University of California, Berkeley), Jordan Fischer (University of California, Berkeley / Drexel Kline School of Law), Chris Hoofnagle (University of California, Berkeley), and Serge Egelman (University of California, Berkeley / ICSI)
  • Detecting DNS Manipulation using TLS Certificates
    Elisa Tsai (University of Michigan - Ann Arbor), Deepak Kumar (Stanford University), Ram Sundara Raman (University of Michigan - Ann Arbor), Gavin Li (University of Michigan - Ann Arbor), Yael Eiger (University of Michigan - Ann Arbor), and Roya Ensafi (University of Michigan - Ann Arbor)