Accepted papers for PETS 2023
Issue 1
- Privacy Rarely Considered: Exploring Considerations in the Adoption of
Third-Party Services by Websites
Christine Utz (CISPA Helmholtz Center for Information Security), Sabrina Amft (CISPA Helmholtz Center for Information Security), Martin Degeling (Ruhr University Bochum), Thorsten Holz (CISPA Helmholtz Center for Information Security), Sascha Fahl (CISPA Helmholtz Center for Information Security), and Florian Schaub (University of Michigan) - Not Your Average App: A Large-scale Privacy Analysis of Android
Browsers
Amogh Pradeep (Northeastern University), Álvaro Feal (IMDEA Networks / Universidad Carlos III de Madrid), Julien Gamba (IMDEA Networks / Universidad Carlos III de Madrid), Ashwin Rao (University of Helsinki), Martina Lindorfer (TU Wien), Narseo Vallina-Rodriguez (IMDEA Networks / ICSI / AppCensus Inc.), and David Choffnes (Northeastern University) - “Revoked just now!” Users’ Behaviors Toward Fitness-Data Sharing with
Third-Party Applications
Noé Zufferey (University of Lausanne), Kavous Salehzadeh Niksirat (University of Lausanne), Mathias Humbert (University of Lausanne), and Kévin Huguenin (University of Lausanne) - SoK: Secure Aggregation based on cryptographic schemes for Federated
Learning
Mohamad Mansouri (EURECOM), Melek Önen (EURECOM), Wafa Ben Jaballah (Thales SIX GTS), and Mauro Conti (University of Padua) - Exploring Model Inversion Attacks in the Black-box Setting
Antreas Dionysiou (University of Cyprus), Vassilis Vassiliades (CYENS Centre of Excellence), and Elias Athanasopoulos (University of Cyprus) - No Privacy Among Spies: Assessing the Functionality and Insecurity of
Consumer Android Spyware Apps
Enze Liu (University of California, San Diego), Sumanth Rao (University of California, San Diego), Sam Havron (Cornell Tech), Grant Ho (University of California, San Diego), Stefan Savage (University of California, San Diego), Geoffrey M. Voelker (University of California, San Diego), and Damon McCoy (New York University) - Designing a Location Trace Anonymization Contest
Takao Murakami (AIST), Hiromi Arai (RIKEN), Koki Hamada (NTT), Takuma Hatano (NSSOL), Makoto Iguchi (Kii Corporation), Hiroaki Kikuchi (Meiji University), Atsushi Kuromasa (Data Society Alliance), Hiroshi Nakagawa (RIKEN), Yuichi Nakamura (SoftBank Corp.), Kenshiro Nishiyama (LegalForce), Ryo Nojima (NICT), Hidenobu Oguri (Fujitsu Limited), Chiemi Watanabe (Tsukuba University of Technology), Akira Yamada (KDDI Research, Inc.), Takayasu Yamaguchi (Akita Prefectural University), and Yuji Yamaoka (Fujitsu Limited) - Detect your fingerprint in your photographs : Photography-based
multi-feature Sybil detection
Yerim Kim (Korea University), Minjae Kim (Korea University), Myungjae Chung (Korea University), and Junbeom Hur (Korea University) - StyleID: Identity Disentanglement for Anonymizing Faces
Minh-Ha Le (Linkoping University) and Niklas Carlsson (Linkoping University) - SoK: Secure E-Voting with Everlasting Privacy
Thomas Haines (Australian National University), Rafieh Mosaheb (University of Luxembourg), Johannes Mueller (University of Luxembourg), and Ivan Pryvalov (University of Luxembourg) - Investigating Privacy Decision-Making Processes Among Nigerian Men and
Women.
Victor Yisa (Dalhousie University), Reza Ghaiumy Anaraky (Clemson University), Bart P. Knijnenburg (Clemson University), and Rita Orji (Dalhousie University) - Privacy by Projection: Federated Population Density Estimation by
Projecting on Random Features
Zixiao Zong (University of California, Irvine), Mengwei Yang (University of California, Irvine), Justin Scott Ley (University of California, Irvine), Athina Markopoulou (University of California, Irvine), and Carter Butts (University of California, Irvine) - HeLayers: A Tile Tensors Framework for Large Neural Networks on
Encrypted Data
Ehud Aharoni (IBM Research - Haifa), Allon Adir (IBM Research - Haifa), Moran Baruch (IBM Research - Haifa and Bar Ilan University), Nir Drucker (IBM Research - Haifa), Gilad Ezov (IBM Research - Haifa), Ariel Farkash (IBM Research - Haifa), Lev Greenberg (IBM Research - Haifa), Ramy Masalha (IBM Research - Haifa), Guy Moshkowich (IBM Research - Haifa), Dov Murik (IBM Research - Haifa), Hayim Shaul (IBM Research - Haifa), and Omri Soceanu (IBM Research - Haifa) - Efficient decision tree training with new data structure for secure
multi-party computation
Koki Hamada (NTT), Dai Ikarashi (NTT), Ryo Kikuchi (NTT), and Koji Chida (Gunma University) - FrodoPIR: Simple, Scalable, Single-Server Private Information
Retrieval
Alex Davidson (Brave Software), Gonçalo Pestana (Brave Software), and Sofía Celi (Brave Software) - "Surprised, Shocked, Worried": User Reactions to Facebook Data
Collection from Third Parties
Patricia Arias-Cabarcos (Paderborn University), Saina Kjalili (unaffiliated), and Thorsten Strufe (KIT) - MIAShield: Defending Membership Inference Attacks via Preemptive
Exclusion of Members
Ismat Jarin (University of Michigan-Dearborn) and Birhanu Eshete (University of Michigan-Dearborn) - Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to
Searchable Encryption
Ghous Amjad (Google), Sarvar Patel (Google), Giuseppe Persiano (University of Salerno), Kevin Yeo (Google), and Moti Yung (Google) - I-GWAS: Privacy-Preserving Interdependent Genome-Wide Association
Studies
Túlio Pascoal (University of Luxembourg), Jérémie Decouchant (TU Delft), Antoine Boutet (INSA, INRIA, University of Lyon, CITI), and Marcus Völp (University of Luxembourg) - Is There a Reverse Privacy Paradox? An Exploratory Analysis of Gaps
Between Privacy Perspectives and Privacy-Seeking Behaviors
Jessica Colnago (Google), Alessandro Acquisti (Carnegie Mellon University), and Lorrie Cranor (Carnegie Mellon University) - Privacy Concerns and Acceptance Factors of OSINT for Cybersecurity: A
Representative Survey
Thea Riebe (TU Darmstadt, PEASEC), Tom Biselli (TU Darmstadt, PEASEC), Marc-André Kaufhold (TU Darmstadt, PEASEC), and Christian Reuter (TU Darmstadt, PEASEC) - Lox: Protecting the Social Graph in Bridge Distribution
Lindsey Tulloch (University of Waterloo) and Ian Goldberg (University of Waterloo) - How Much Privacy Does Federated Learning with Secure Aggregation
Guarantee?
Ahmed Roushdy Elkordy (University of Southern California), Jiang Zhang (University of Southern California), Yahya H. Ezzeldin (University of Southern California), Konstantinos Psounis (University of Southern California), and Salman Avestimehr (University of Southern California) - Private Multi-Winner Voting for Machine Learning
Adam Dziedzic (University of Toronto and Vector Institute), Christopher A. Choquette-Choo (Google Brain), Natalie Dullerud (University of Toronto and Vector Institute), Vinith Suriyakumar (MIT), Ali Shahin Shamsabadi (The Alan Turing Institute), Muhammad Ahmad Kaleem (University of Toronto and Vector Institute), Somesh Jha (University of Wisconsin), Nicolas Papernot (University of Toronto and Vector Institute), and Xiao Wang (Northwestern University) - Privacy-Aware Adversarial Network in Human Mobility Prediction
Yuting Zhan (Imperial College London), Hamed Haddadi (Imperial College London), and Afra Mashhadi (University of Washington) - Exploring privacy implications of awareness and control mechanisms in
smart home devices
Madiha Tabassum (University of North Carolina at Charlotte) and Heather Richter Lipford (University of North Carolina at Charlotte) - Dolphin: A Cellular Voice Based Internet Shutdown Resistance System
Piyush Kumar Sharma (IIIT Delhi), Rishi Sharma (IIIT Delhi), Kartikey Singh (IIIT Delhi), Mukulika Maity (IIIT Delhi), and Sambuddho Chakravarty (IIIT Delhi) - Multi-Party Replicated Secret Sharing over a Ring with Applications to
Privacy-Preserving Machine Learning
Alessandro Baccarini (University at Buffalo), Marina Blanton (University at Buffalo), and Chen Yuan (University at Buffalo) - Efficient Proofs of Software Exploitability for Real-world
Processors
Matthew Green (Johns Hopkins University), Mathias Hall-Andersen (Aarhus University), Eric Hennenfent (Trail of Bits), Gabriel Kaptchuk (Boston University), Benjamin Perez (Trail of Bits), and Gijs Van Laer (Johns Hopkins University) - On the Privacy Risks of Deploying Recurrent Neural Networks in Machine
Learning Models
Yunhao Yang (University of Texas at Austin), Parham Gohari (University of Texas at Austin), and Ufuk Topcu (University of Texas at Austin) - Blind My - Robust Stalking Prevention in Apple's Find My Network
Travis Mayberry (United States Naval Academy), Erik-Oliver Blass (Airbus), and Ellis Fenske (US Naval Academy) - Differentially Private Speaker Anonymization
Ali Shahin Shamsabadi (The Alan Turing Institute), Brij Mohan Lal Srivastava (INRIA), Aurélien Bellet (INRIA), Nathalie Vauquier (INRIA), Emmanuel Vincent (INRIA), Mohamed Maouche (INRIA), Marc Tommasi (INRIA), and Nicolas Papernot (University of Toronto and Vector Institute) - TWo-IN-one-SSE: Fast, Scalable and Storage-Efficient Searchable
Symmetric Encryption for Conjunctive and Disjunctive Boolean Queries
Arnab Bag (Indian Institute of Technology Kharagpur), Debadrita Talapatra (Indian Institute of Technology Kharagpur), Ayushi Rastogi (Indian Institute of Technology Kharagpur), Sikhar Patranabis (IBM Research India), and Debdeep Mukhopadhyay (Indian Institute of Technology Kharagpur) - Individualized PATE: Differentially Private Machine Learning with
Individual Privacy Guarantees
Franziska Boenisch (Free University Berlin), Christopher Mühl (Free University Berlin), Roy Rinberg (Columbia University), Jannis Ihrig (Free University Berlin), and Adam Dziedzic (University of Toronto and Vector Institute) - Understanding Person Identification Through Gait
Simon Hanisch (Technische Universität Dresden), Evelyn Muschter (Technische Universität Dresden), Adamantini Chatzipanagioti (Technische Universität Dresden), Shu-Chen Li (Technische Universität Dresden), and Thorsten Strufe (Karlsruhe Institute of Technology)
Issue 2
- Intersectional Thinking about PETs: A Study of Library Privacy
Nora McDonald (George Mason University), Rachel Greenstadt (New York University), and Andrea Forte (Drexel University) - Heads in the Clouds? Measuring Universities’ Migration to Public Clouds: Implications for Privacy & Academic Freedom
Tobias Fiebig (Max-Planck-Institut für Informatik), Seda Gürses (TU Delft), Carlos H. Gañán (TU Delft), Erna Kotkamp (TU Delft), Fernando Kuipers (TU Delft), Martina Lindorfer (TU Wien), Menghua Prisse (TU Delft), and Taritha Sari (TU Delft) - Lessons Learned: Surveying the Practicality of Differential Privacy in the Industry
Gonzalo Munilla Garrido (Technical University of Munich, BMW Group), Xiaoyuan Liu (UC Berkeley), Florian Matthes (Technical University of Munich), and Dawn Song (UC Berkeley) - Privacy Property Graph: Towards Automated Privacy Threat Modeling via Static Graph-based Analysis
Immanuel Kunz (Fraunhofer AISEC), Konrad Weiss (Fraunhofer AISEC), Christian Banse (Fraunhofer AISEC), and Angelika Schneider (Fraunhofer AISEC) - DeepSE-WF: Unified Security Estimation for Website Fingerprinting Defenses
Alexander Veicht (ETH Zürich), Cedric Renggli (University of Zurich), and Diogo Barradas (University of Waterloo) - iPET: Privacy Enhancing Traffic Perturbations for Secure IoT Communications
Akshaye Shenoi (TUMCREATE Singapore), Prasanna Karthik Vairam (National University of Singapore), Kanav Sabharwal (National University of Singapore), Li Jialin (National University of Singapore), and Dinil Mon Divakaran (Acronis Research) - Creative beyond TikToks: Investigating Adolescents’ Social Privacy Management on TikTok
Nico Ebert (ZHAW School of Management and Law), Tim Geppert (ZHAW School of Management and Law), Joanna Strycharz (University of Amsterdam), Melanie Knieps (University of Zurich), Michael Hönig (ZHAW School of Management and Law), and Elke Brucker-Kley (ZHAW School of Management and Law) - Distributed GAN-Based Privacy-Preserving Publication of Vertically-Partitioned Data
Xue Jiang (Technical University of Munich), Yufei Zhang (Technical University of Munich), Xuebing Zhou (Huawei Technologies Deutschland GmbH), and Jens Grossklags (Technical University of Munich) - How Website Owners Face Privacy Issues: Thematic Analysis of Responses from a Covert Notification Study Reveals Diverse Circumstances and Challenges
Alina Stöver (TU Darmstadt), Nina Gerber (TU Darmstadt), Henning Pridöhl (Universität Bamberg), Max Maass (), Sebastian Bretthauer (Goethe-Universität Frankfurt), Indra Spiecker (Goethe-Universität Frankfurt), Matthias Hollick (TU Darmstadt), and Dominik Herrmann (Universität Bamberg) - Usability and Enforceability of Global Privacy Control
Sebastian Zimmeck (Wesleyan University), Oliver Wang (Wesleyan University), Kuba Alicki (Wesleyan University), Jocelyn Wang (Wesleyan University), and Sophie Eng (Wesleyan University) - Watching your call: Breaking VoLTE Privacy in LTE/5G Networks
Zishuai Cheng (Beijing University of Posts and Telecommunications), Mihai Ordean (University of Birmingham), Flavio D. Garcia (University of Birmingham), Baojiang Cui (Beijing University of Posts and Telecommunications), and Dominik Rys (University of Birmingham) - Strengthening Privacy-Preserving Record Linkage using Diffusion
Frederik Armknecht (University of Mannheim), Youzhe Heng (University of Mannheim), and Rainer Schnell (University of Duisburg-Essen) - A Unified Framework for Quantifying Privacy Risk in Synthetic Data
Matteo Giomi (Statice GmbH), Franziska Boenisch (Vector Institute), Christoph Wehmeyer (Statice GmbH), and Borbála Tasnádi (Statice GmbH) - Unintended Memorization and Timing Attacks in Named Entity Recognition Models
Rana Salal Ali (Macquarie University), Benjamin Zi Hao Zhao (Macquarie University), Hassan Asghar (Macquarie University), Tham Nguyen (Macquarie University), Ian Wood (Macquarie University), and Mohamed Ali Kaafar (Macquarie University) - RPM: Robust Anonymity at Scale
Donghang Lu (Purdue University) and Aniket Kate (Purdue University) - Private Sampling with Identifiable Cheaters
César Sabater (INRIA), Florian Hahn (University of Twente), Andreas Peter (University of Oldenburg), and Jan Ramon (INRIA) - Investigating how users imagine their Personal Privacy Assistant
Alina Stöver (TU Darmstadt), Sara Hahn (TU Darmstadt), Felix Kretschmer (), and Nina Gerber (TU Darmstadt) - SoK: Content Moderation for End-to-End Encryption
Sarah Scheffler (Princeton University) and Jonathan Mayer (Princeton University) - ezDPS: An Efficient and Zero-Knowledge Machine Learning Inference Pipeline
Haodi Wang (Beijing Normal University / Virginia Tech) and Thang Hoang (Virginia Tech) - Two-Cloud Private Read Alignment to a Public Reference Genome
Sindhuja Madabushi (University of Wisconsin-Madison) and Parameswaran Ramanathan (University of Wisconsin-Madison) - PubSub-ML: A Model Streaming Alternative to Federated Learning
Lovedeep Gondara (Simon Fraser University) and Ke Wang (Simon Fraser University) - SoK: Differentially Private Publication of Trajectory Data
Àlex Miranda-Pascual (Universitat Politècnica de Catalunya, Karlsruhe Institute of Technology), Patricia Guerra-Balboa (Karlsruhe Institute of Technology), Javier Parra-Arnau (Universitat Politècnica de Catalunya, Karlsruhe Institute of Technology), Jordi Forné (Universitat Politècnica de Catalunya), and Thorsten Strufe (Karlsruhe Institute of Technology) - An Efficient Data-Independent Priority Queue and its Application to Dark Pools
Sahar Mazloom (J. P. Morgan AI Research), Benjamin Diamond (Coinbase), Antigoni Polychroniadou (J. P. Morgan AI Research), and Tucker Balch (J. P. Morgan AI Research) - Find Thy Neighbourhood: Privacy-Preserving Local Clustering
Pranav Shriram A (National Institute of Technology Tiruchirappalli), Nishat Koti (Indian Institute of Science Bangalore), Varsha Bhat Kukkala (Indian Institute of Science Bangalore), Arpita Patra (Indian Institute of Science Bangalore), and Bhavish Raj Gopal (Indian Institute of Science Bangalore) - Result-pattern-hiding Conjunctive Searchable Symmetric Encryption with Forward Privacy
Dandan Yuan (The University of Auckland), Cong Zuo (Nanyang Technological University), Shujie Cui (Monash University), and Giovanni Russello (The University of Auckland) - Private Graph Extraction via Feature Explanations
Iyiola Emmanuel Olatunji (L3S Research Center, Leibniz University Hannover), Mandeep Rathee (L3S Research Center, Leibniz University Hannover), Thorben Funke (L3S Research Center, Leibniz University Hannover), and Megha Khosla (TU Delft) - iStelan: Disclosing Sensitive User Information by Mobile Magnetometer from Finger Touches
Reham Aburas (Purdue University), Habiba Farrukh (Purdue University), He Wang (Purdue University), Yidong Lu (Purdue University), and Z. Berkay Celik (Purdue University) - SoK: Managing risks of linkage attacks on data privacy
Jovan Powar (University of Cambridge) and Alastair Beresford (University of Cambridge)
Issue 3
- Trust TEE?: Exploring the Impact of Trusted Execution Environments on Smart Home Privacy Norms
Pratik Musale (University of Pittsburgh) and Adam Lee (University of Pittsburgh) - Evolution of Composition, Readability, and Structure of Privacy Policies over Two Decades
Andrick Adhikari (University of Denver), Sanchari Das (University of Denver), and Rinku Dewri (University of Denver) - SoK: New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks
Charles Gouert (University of Delaware), Dimitris Mouris (University of Delaware), and Nektarios Georgios Tsoutsos (University of Delaware) - Comparing Large-Scale Privacy and Security Notifications
Christine Utz (CISPA Helmholtz Center for Information Security), Matthias Michels (Saarland University), Martin Degeling (Ruhr University Bochum), Ninja Marnau (CISPA Helmholtz Center for Information Security), and Ben Stock (CISPA Helmholtz Center for Information Security) - RAVEN: Stateless Rapid IP Address Variation for Enterprise Networks
Liang Wang (Princeton University), Hyojoon Kim (Princeton University), Prateek Mittal (Princeton University), and Jennifer Rexford (Princeton University) - How to Combine Membership-Inference Attacks on Multiple Updated Models
Matthew Jagielski (Google), Stanley Wu (Northeastern University), Alina Oprea (Northeastern University), Jonathan Ullman (Northeastern University), and Roxana Geambasu (Columbia University) - SenRev: Measurement of Personal Information Disclosure in Online Health Communities
Faysal Hossain Shezan (University of Virginia), Minjun Long (University of Virginia), David Hasani (University of Virginia), Gang Wang (University of Illinois at Urbana-Champaign), and Yuan Tian (University of California Los Angeles) - "My face, my rules": Enabling Personalized Protection against Unacceptable Face Editing
Zhujun Xiao (University of Chicago), Jenna Cryan (University of Chicago), Yuanshun Yao (University of Chicago), Yi Hong Gordon Cheo (University of Chicago), Yuanchao Shu (Microsoft Research), Stefan Saroiu (Microsoft Research), Ben Y. Zhao (University of Chicago), and Haitao Zheng (University of Chicago) - Examining the Hydra: Simultaneously Shared Links in Tor and the Effects on its Performance
Sebastian Pahl (Hof University of Applied Sciences, Institute of Information Systems (iisys)), Florian Adamsky (Hof University of Applied Sciences, Institute of Information Systems (iisys)), Daniel Kaiser (Status Research & Development GmbH), and Thomas Engel (University of Luxembourg) - SoK: Membership Inference is Harder Than we Previously Thought
Antreas Dionysiou (University of Cyprus) and Elias Athanasopoulos (University of Cyprus) - Losing Less: A Loss for Differentially Private Deep Learning
Ali Shahin Shamsabadi (The Alan Turing Institute and Vector Institute) and Nicolas Papernot (University of Toronto and Vector Institute) - Convolutions in Overdrive: Maliciously Secure Convolutions for MPC
Marc Rivinius (University of Stuttgart), Pascal Reisert (University of Stuttgart), Sebastian Hasler (University of Stuttgart), and Ralf Küsters (University of Stuttgart) - VESPo: Verified Evaluation of Secret Polynomials, with application to dynamic proofs of retrievability
Jean-Guillaume Dumas (Univ. Grenoble Alpes), Aude Maignan (Univ. Grenoble Alpes), Clément Pernet (Univ. Grenoble Alpes), and Daniel S. Roche (U.S. Naval Academy) - DPrio: Efficient Differential Privacy with High Utility for Prio
Dana Keeler (Mozilla Corporation), Emily Lepert (University of Waterloo), Chelsea Komlo (University of Waterloo), Shannon Veitch (ETH Zurich), and Xi He (University of Waterloo) - Blocking JavaScript without Breaking the Web: An Empirical Investigation
Abdul Haddi Amjad (Virginia Tech), Zubair Shafiq (UC Davis), and Muhammad Ali Gulzar (Virginia Tech) - Data Security on the Ground: Investigating Technical and Legal Requirements under the GDPR
Tina Marjanov (University of Cambridge, Vrije Universiteit Amsterdam), Maria Konstantinou (Vrije Universiteit Amsterdam), Dayana Spagnuelo (Vrije Universiteit Amsterdam, TNO), and Magdalena Jozwiak (Tilburg University) - Differential Privacy for Black-Box Statistical Analyses
Nitin Kohli (UC Berkeley) and Paul Laskowski (UC Berkeley) - Secure and Accurate Summation of Many Floating-Point Numbers
Marina Blanton (University at Buffalo), Michael T. Goodrich (University of California, Irvine), and Chen Yuan (Meta Platforms, Inc.,) - Private Collection Matching Protocols
Kasra EdalatNejad (EPFL), Mathilde Raynal (EPFL), Wouter Lueks (CISPA Helmholtz Center for Information Security), and Carmela Troncoso (EPFL) - A Method for Securely Comparing Integers using Binary Trees
Anselme Tueno (SAP), Jonas Janneck (Ruhr University Bochum), and David Boehm (SAP) - Practical Delegatable Anonymous Credentials From Equivalence Class Signatures
Omid Mir (The Institute of Networks and Security, Johannes Kepler University Linz), Daniel Slamanig (AIT Austrian Institute of Technology, Vienna, Austria), Balthazar Bauer (IRIF, Université de Paris Cité, France), and René Mayrhofer (The Institute of Networks and Security, Johannes Kepler University Linz) - Ruffle: Rapid 3-Party Shuffle Protocols
Pranav Shriram A (National Institute of Technology, Tiruchirapalli), Nishat Koti (Indian Institute of Science), Varsha Bhat Kukkala (Indian Institute of Science), Arpita Patra (Indian Institute of Science), Bhavish Raj Gopal (Indian Institute of Science), and Somya Sangal (Indian Institute of Science) - Story Beyond the Eye: Glyph Positions Break PDF Text Redaction
Maxwell Bland (University of Illinois, Urbana-Champaign), Anushya Iyer (University of Illinois, Urbana-Champaign), and Kirill Levchenko (University of Illinois, Urbana-Champaign) - Towards Sentence Level Inference Attack Against Pre-trained Language Models
Kang Gu (Dartmouth College), Ehsanul Kabir (Dartmouth College), Soroush Vosoughi (Dartmouth College), and Shagufta Mehnaz (The Pennsylvania State University) - Time-Deniable Signatures
Gabrielle Beck (Johns Hopkins University), Arka Rai Choudhuri (NTT Research), Matthew Green (Johns Hopkins University), Abhishek Jain (Johns Hopkins University), and Pratyush Ranjan Tiwari (Johns Hopkins University) - Measuring the Compliance of Android App Developers with the California Consumer Privacy Act (CCPA)
Nikita Samarin (University of California, Berkeley / ICSI), Shayna Kothari (University of California, Berkeley), Zaina Siyed (University of California, Berkeley), Oscar Bjorkman (University of California, Berkeley), Reena Yuan (University of California, Berkeley), Primal Wijesekera (University of California, Berkeley / ICSI), Noura Alomar (University of California, Berkeley), Jordan Fischer (University of California, Berkeley / Drexel Kline School of Law), Chris Hoofnagle (University of California, Berkeley), and Serge Egelman (University of California, Berkeley / ICSI) - Detecting DNS Manipulation using TLS Certificates
Elisa Tsai (University of Michigan - Ann Arbor), Deepak Kumar (Stanford University), Ram Sundara Raman (University of Michigan - Ann Arbor), Gavin Li (University of Michigan - Ann Arbor), Yael Eiger (University of Michigan - Ann Arbor), and Roya Ensafi (University of Michigan - Ann Arbor)
Issue 4
Some of these papers are accepted conditionally on approval of a shepherd.
- Locality-Sensitive Hashing Does Not Guarantee Privacy! Attacks on Google's FLoC and the MinHash Hierarchy System
Florian Turati (ETH Zurich), Carlos Cotrini (ETH Zurich), Karel Kubicek (ETH Zurich), and David Basin (ETH Zurich) - Researchers’ Experiences in Analyzing Privacy Policies: Challenges and Opportunities
Abraham Mhaidli (University of Michigan), Selin Fidan (University of Michigan), An Doan (University of Michigan), Gina Herakovic (University of Michigan), Mukund Srinath (Penn State University), Lee Matheson (Future for Privacy Forum), Shomir Wilson (Penn State University), and Florian Schaub (University of Michigan) - Structural and functional explanations for informing lay and expert users: The case of functional encryption
Ala Sarah Alaqra (Karlstad University), Farzaneh Karegar (Karlstad University), and Simone Fischer-Hübner (Karlstad University, Chalmers University of Technology) - Compact and Divisible E-Cash with Threshold Issuance
Alfredo Rial (Nym Technologies) and Ania Piotrowska (Nym Technologies) - Speculative Privacy Attitudes and Concerns about AR Glasses Data Collection
Andrea Gallardo (Carnegie Mellon University), Chris Choy (Carnegie Mellon University), Jaideep Juneja (Carnegie Mellon University), Efe Bozkir (University of Tübingen), Camille Cobb (University of Illinois Urbana-Champaign), Lujo Bauer (Carnegie Mellon University), and Lorrie Cranor (Carnegie Mellon University) - End-to-end Privacy Preserving Training and Inference for Air Pollution Forecasting with Data from Rival Fleets
Gauri Gupta (Massachusetts Institute of Technology), Krithika Ramesh (Manipal Institute of Technology, India), Anwesh Bhattacharya (Microsoft Research, India), Divya Gupta (Microsoft Research, India), Rahul Sharma (Microsoft Research, India), Nishanth Chandran (Microsoft Research, India), and Rijurekha Sen (IIT Delhi) - Everybody's Looking for SSOmething: A large-scale evaluation on the privacy of OAuth authentication on the web
Yana Dimova (imec-DistriNet), Tom Van Goethem (Google), and Wouter Joosen (imec-DistriNet) - On the Role and Form of Personal Information Disclosure in Cyberbullying Incidents
Sadiq Aliyu (University of Lausanne), Kavous Salehzadeh Niksirat (University of Lausanne), Kévin Huguenin (University of Lausanne), and Mauro Cherubini (University of Lausanne) - GDPRxiv: Establishing the State of the Art in GDPR Enforcement
Chen Sun (University of Iowa), Evan Jacobs (University of Iowa), Daniel Lehmann (University of Copenhagen), Andrew Crouse (University of Iowa), and Supreeth Shastri (University of Iowa) - Privacy-Preserving Federated Recurrent Neural Networks
Sinem Sav (EPFL), Abdulrahman Diaa (University of Waterloo), Apostolos Pyrgelis (EPFL), Jean-Philippe Bossuat (Tune Insight SA), and Jean-Pierre Hubaux (EPFL) - No Video Left Behind: A Utility-Preserving Obfuscation Approach for YouTube Recommendations
Jiang Zhang (University of Southern California), Hadi Askari (University of California, Davis), Konstantinos Psounis (University of Southern California), and Zubair Shafiq (University of California, Davis) - Differentially Private Simple Genetic Algorithms
Thomas Humphries (University of Waterloo) and Florian Kerschbaum (University of Waterloo) - Data-Explainable Website Fingerprinting with Network Simulation
Rob Jansen (U.S. Naval Research Laboratory) and Ryan Wails (Georgetown University, U.S. Naval Research Laboratory) - Verifiable Distributed Aggregation Functions
Hannah Davis (University of California, San Diego), Christopher Patton (Cloudflare), MIke Rosulek (Oregon State University), and Phillipp Schoppmann (Google) - Robust Fingerprint of Location Trajectories Under Differential Privacy
Yuzhou Jiang (Case Western Reserve University), Emre Yilmaz (University of Houston-Downtown), and Erman Ayday (Case Western Reserve University) - Funshade: Function Secret Sharing for Two-Party Secure Thresholded Distance Evaluation
Alberto Ibarrondo (Copper.co), Herve Chabanne (Idemia & Telecom Paris), and Melek Onen (EURECOM) - Attribute-based Single Sign-On. Secure, Private, and Efficient.
Tore K. Frederiksen (), Julia Hesse (IBM Research Europe - Zurich), Bertram Poettering (IBM Research Europe - Zurich), and Patrick Towa (Aztec) - On the Robustness of Topics API to a Re-Identification Attack
Nikhil Jha (Politecnico di Torino), Martino Trevisan (Università degli studi di Trieste), Emilio Leonardi (Politecnico di Torino), and Marco Mellia (Politecnico di Torino) - Evaluating practical QUIC website fingerprinting defenses for the masses.
Sandra Siby (EPFL), Ludovic Barman (EPFL), Christopher Wood (Cloudflare Inc.), Marwan Fayed (Cloudflare Inc.), Nick Sullivan (Cloudflare Inc.), and Carmela Troncoso (EPFL) - Throwing Your Weight Around: Fixing Tor’s Positional Weighting
Aaron M. Johnson (U.S. Naval Research Laboratory), Aaron D. Jaggard (U.S. Naval Research Laboratory), and Paul F. Syverson (U.S. Naval Research Laboratory) - Save The Implicit Flow? Enabling Privacy-Preserving RP Authentication in OpenID Connect
Maximilian Kroschewski (Hasso-Plattner-Institute, University of Potsdam) and Anja Lehmann (Hasso-Plattner-Institute, University of Potsdam) - Track You: A Deep Dive into Safety Alerts for Apple AirTags
Narmeen Shafqat (Northeastern University), Nicole Gerzon (Northeastern University), Maggie Van Nortwick (Northeastern University), Victor Sun (Northeastern University), Alan Mislove (Northeastern University), and Aanjhan Ranganathan (Northeastern University) - Disparate Vulnerability in Link Inference Attacks against Graph Neural Networks
Da Zhong (Stevens Institute of Technology), Ruotong Yu (University of Utah), Kun Wu (Stevens Institute of Technology), Xiuling Wang (Stevens Institute of Technology), Jun Xu (University of Utah), and Wendy Hui Wang (Stevens Institute of Technology) - The Self-Anti-Censorship Nature of Encryption: On the Prevalence of Anamorphic Cryptography
Mirek Kutylowski (Wroclaw University of Science and Technology), Giuseppe Persiano (UNISA and Google), Duong Hieu Phan (Telecom Paris, Institut Polytechnique de Paris), Moti Yung (Google and Columbia), and Marcin Zawada (Wroclaw University of Science and Technology) - MAPLE: A Metadata-Hiding Policy-Controllable Encrypted Search Platform with Minimal Trust
Tung Le (Virginia Tech) and Thang Hoang (Virginia Tech) - Attacks on Encrypted Response-Hiding Range Search Schemes in Multiple Dimensions
Evangelia Anna Markatou (Brown University), Francesca Falzon (Brown University, University of Chicago), Zachary Espiritu (Brown University), and Roberto Tamassia (Brown University) - Trifecta: Faster High-Throughput Three-Party Computation over WAN Using Multi-Fan-In Logic Gates
Sina Faraji (University of Waterloo) and Florian Kerschbaum (University of Waterloo) - Exploring the Privacy Risks of Adversarial VR Game Design
Vivek Nair (UC Berkeley), Gonzalo Munilla Garrido (TU Munich), and Dawn Song (UC Berkeley) - DP-SIPS: A simpler, more scalable mechanism for differentially private partition selection
Marika Swanberg (Boston University), Damien Desfontaines (Tumult Labs), and Samuel Haney (Tumult Labs) - Understanding the Perception and Awareness of Education Technologies' Privacy and Security Issues
Rakibul Hasan (Arizona State University) - Your DRM Can Watch You Too: Exploring the Privacy Implications of Browsers (mis)Implementations of Widevine EME
Gwendal Patat (Univ Rennes, CNRS, IRISA), Mohamed Sabt (Univ Rennes, CNRS, IRISA), and Pierre-Alain Fouque (Univ Rennes, CNRS, IRISA) - Privacy-Preserving Outsourced Certificate Validation
Tarek Galal (Hasso-Plattner Institute, University of Potsdam) and Anja Lehmann (Hasso-Plattner Institute, University of Potsdam) - Examining StyleGAN as a Utility-Preserving Face De-identification Method
Seyyed Mohammad Sadegh Moosavi Khorzooghi (The University of Texas at Arlington) and Shirin Nilizadeh (The University of Texas at Arlington)