All times on this page are UTC-4 (EDT, New York, Montreal, Puerto Rico). Find the original schedule here,

Other timezones can be found here: UTC, UTC+1, UTC+2, UTC+3, UTC+4, UTC+5, UTC+6, UTC+7, UTC+8, UTC+9, UTC+10, UTC+11, UTC+12, UTC-1, UTC-2, UTC-3, UTC-4, UTC-5, UTC-6, UTC-7, UTC-8, UTC-9, UTC-10, UTC-11, UTC-12

Important links: Zulip | Zulip help | Video streams

Conference Schedule

2:00

FOCI

Room: ANT-1129 2:00-11:30 Program

2:30

Opening Remarks (ANT-1031)

3:00

Session 1A: Anonymity and Traffic Analysis

Room: ANT-2024 Chair: Piyush Kumar 3:00-4:30 DeepSE-WF: Unified Security Estimation for Website Fingerprinting Defenses artifact [video] Alexander Veicht (ETH Zürich), Cedric Renggli (University of Zurich), and Diogo Barradas (University of Waterloo) RPM: Robust Anonymity at Scale artifact [video] Donghang Lu (Purdue University), Aniket Kate (Purdue University) iPET: Privacy Enhancing Traffic Perturbations for Secure IoT Communications artifact [video] Akshaye Shenoi (TUMCREATE Singapore), Prasanna Karthik Vairam (National University of Singapore), Kanav Sabharwal (National University of Singapore), Li Jialin (National University of Singapore), and Dinil Mon Divakaran (Acronis Research) RAVEN: Stateless Rapid IP Address Variation for Enterprise Networks artifact [video] Liang Wang (Princeton University), Hyojoon Kim (Princeton University), Prateek Mittal (Princeton University), Jennifer Rexford (Princeton University) Evaluating practical QUIC website fingerprinting defenses for the masses artifact [video] Sandra Siby (EPFL), Ludovic Barman (EPFL), Christopher Wood (Cloudflare Inc.), Marwan Fayed (Cloudflare Inc.), Nick Sullivan (Cloudflare Inc.), and Carmela Troncoso (EPFL) Data-Explainable Website Fingerprinting with Network Simulation artifact [video] Rob Jansen (U.S. Naval Research Laboratory) and Ryan Wails (Georgetown University, U.S. Naval Research Laboratory)

Session 1B: Privacy and AI/ML I

Room: ANT-1031 Chair: Lujo Bauer 3:00-4:30 Efficient decision tree training with new data structure for secure multi-party computation Koki Hamada (NTT Social Informatics Laboratories), Dai Ikarashi (NTT Social Informatics Laboratories), Ryo Kikuchi (NTT Social Informatics Laboratories), Koji Chida (Gunma University) On the Privacy Risks of Deploying Recurrent Neural Networks in Machine Learning Models artifact [video] Yunhao Yang (University of Texas at Austin), Parham Gohari (University of Texas at Austin), Ufuk Topcu (University of Texas at Austin) How Much Privacy Does Federated Learning with Secure Aggregation Guarantee? [video] Ahmed Roushdy Elkordy (University of Southern California), Jiang Zhang (University of Southern California), Yahya H. Ezzeldin (University of Southern California), Konstantinos Psounis (University of Southern California), Salman Avestimehr (University of Southern California) ezDPS: An Efficient and Zero-Knowledge Machine Learning Inference Pipeline [video] Haodi Wang (Beijing Normal University / Virginia Tech), Thang Hoang (Virginia Tech) Differentially Private Simple Genetic Algorithms artifact [video] Thomas Humphries (University of Waterloo) and Florian Kerschbaum (University of Waterloo) Towards Sentence Level Inference Attack Against Pre-trained Language Models artifact [video] Kang Gu (Dartmouth College), Ehsanul Kabir (Penn State University), Neha Ramsurrun (Dartmouth College), Soroush Vosoughi (Dartmouth College), Shagufta Mehnaz (Penn State University)

Session 1C: Privacy Perceptions I

Room: ANT-1129 Chair: Nathan Malkin 3:00-4:30 'Surprised, Shocked, Worried': User Reactions to Facebook Data Collection from Third Parties [video] Patricia Arias-Cabarcos (Paderborn University), Saina Khalili (KIT), Thorsten Strufe (KASTEL Security Research Labs, KIT) Exploring privacy implications of awareness and control mechanisms in smart home devices [video] Madiha Tabassum (University of North Carolina at Charlotte), Heather Lipford (University of North Carolina at Charlotte) Heads in the Clouds? Measuring Universities’ Migration to Public Clouds: Implications for Privacy & Academic Freedom artifact [video] Tobias Fiebig (Max-Planck-Institut für Informatik), Seda Gürses (TU Delft), Carlos H. Gañán (TU Delft), Erna Kotkamp (TU Delft), Fernando Kuipers (TU Delft), Martina Lindorfer (TU Wien), Menghua Prisse (TU Delft), Taritha Sari (No Affiliation) Is There a Reverse Privacy Paradox? An Exploratory Analysis of Gaps Between Privacy Perspectives and Privacy-Seeking Behaviors [video] Jessica Colnago (Carnegie Mellon University), Lorrie Cranor (Carnegie Mellon University), Alessandro Acquisti (Carnegie Mellon University) Investigating how users imagine their Personal Privacy Assistant [video] Alina Stöver (TU Darmstadt), Sara Hahn (TU Darmstadt), Felix Kretschmer (TU Darmstadt), Nina Gerber (TU Darmstadt) Structural and functional explanations for informing lay and expert users: The case of functional encryption [video] Ala Sarah Alaqra (Karlstad University), Farzaneh Karegar (Karlstad University), and Simone Fischer-Hübner (Karlstad University, Chalmers University of Technology)

4:30

Break

5:00

AMA with Serge Egelman, Susan Landau, and Carmela Troncoso (ANT-1031) [video]

6:00

Lunch

7:30

Session 2A: Cryptographic Approaches I

Room: ANT-2024 Chair: Nadim Kobeissi 7:30-9:00 Multi-Party Replicated Secret Sharing over a Ring with Applications to Privacy-Preserving Machine Learning artifact [video] Alessandro Baccarini (University at Buffalo (SUNY)), Marina Blanton (University at Buffalo (SUNY)), Chen Yuan (University at Buffalo (SUNY)) A Method for Securely Comparing Integers using Binary Trees [video] Anselme Tueno (SAP SE), Jonas Janneck (Ruhr University Bochum), David Boehm (SAP SE) Private Collection Matching Protocols artifact [video] Kasra EdalatNejad (EPFL), Mathilde Raynal (EPFL), Wouter Lueks (CISPA Helmholtz Center for Information Security), Carmela Troncoso (EPFL) Secure and Accurate Summation of Many Floating-Point Numbers artifact [video] Marina Blanton (University at Buffalo), Michael T. Goodrich (University of California, Irvine), Chen Yuan (Meta Platform Inc.) VESPo: Verified Evaluation of Secret Polynomials, with application to dynamic proofs of retrievability artifact [video] Jean-Guillaume Dumas (Univ. Grenoble Alpes), Aude Maignan (Univ. Grenoble Alpes), Clément Pernet (Univ. Grenoble Alpes), and Daniel S. Roche (U.S. Naval Academy) Trifecta: Faster High-Throughput Three-Party Computation over WAN Using Multi-Fan-In Logic Gates [video] Sina Faraji (University of Waterloo) and Florian Kerschbaum (University of Waterloo)

Session 2B: Data Privacy

Room: ANT-1031 Chair: Apostolos Pyrgelis 7:30-9:00 Distributed GAN-Based Privacy-Preserving Publication of Vertically-Partitioned Data [video] Xue Jiang (Technical University of Munich), Yufei Zhang (Technical University of Munich), Xuebing Zhou (Huawei Technologies Deutschland GmbH), and Jens Grossklags (Technical University of Munich) Lessons Learned: Surveying the Practicality of Differential Privacy in the Industry [video] Gonzalo Munilla Garrido (TUM, BMW Group), Xiaoyuan Liu (UC Berkeley), Floria Matthes (TUM), Dawn Song (UC Berkeley) SoK: Managing risks of linkage attacks on data privacy [video] Jovan Powar (University of Cambridge), Alastair R. Beresford (University of Cambridge) Strengthening Privacy-Preserving Record Linkage using Diffusion artifact [video] Frederik Armknecht (University of Mannheim), Youzhe Heng (University of Mannheim), Rainer Schnell (University of Duisburg-Essen) SoK: Membership Inference is Harder Than we Previously Thought artifact [video] Antreas Dionysiou (University of Cyprus), Elias Athanasopoulos (University of Cyprus) DP-SIPS: A simpler, more scalable mechanism for differentially private partition selection [video] Marika Swanberg (Boston University), Damien Desfontaines (Tumult Labs), and Samuel Haney (Tumult Labs)

Session 2C: Mobile, VR/AR, and Smart Homes

Room: ANT-1129 Chair: Sai Teja Peddinti 7:30-9:00 No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps [video] Enze Liu (UC San Diego), Sumanth Rao (UC San Diego), Sam Havron (Cornell Tech), Grant Ho (UC San Diego), Stefan Savage (UC San Diego), Geoffrey M. Voelker (UC San Diego), Damon McCoy (New York University) Not Your Average App: A Large-scale Privacy Analysis of Android Browsers Amogh Pradeep (Northeastern University), Álvaro Feal (IMDEA Networks Institute / Universidad Carlos III de Madrid), Julien Gamba (IMDEA Networks Institute / Universidad Carlos III de Madrid), Ashwin Rao (University of Helsinki), Martina Lindorfer (TU Wien), Narseo Vallina-Rodriguez (IMDEA Networks Institute / AppCensus Inc.), David Choffnes (Northeastern University) Watching your call: Breaking VoLTE Privacy in LTE/5G Networks [video] Zishuai Cheng (Beijing University of Posts and Telecommunications), Mihai Ordean (University of Birmingham), Flavio Garcia (University of Birmingham), Baojiang Cui (Beijing University of Posts and Telecommunications), Dominik Rys (University of Birmingham) Trust TEE?: Exploring the Impact of Trusted Execution Environments on Smart Home Privacy Norms [video] Pratik Musale (University of Pittsburgh), Adam Lee (University of Pittsburgh) Exploring the Privacy Risks of Adversarial VR Game Design artifact [video] Vivek Nair (UC Berkeley), Gonzalo Munilla Garrido (TU Munich), and Dawn Song (UC Berkeley) Speculative Privacy Attitudes and Concerns about AR Glasses Data Collection [video] Andrea Gallardo (Carnegie Mellon University), Chris Choy (Carnegie Mellon University), Jaideep Juneja (Carnegie Mellon University), Efe Bozkir (University of Tübingen), Camille Cobb (University of Illinois Urbana-Champaign), Lujo Bauer (Carnegie Mellon University), and Lorrie Cranor (Carnegie Mellon University)

9:00

Town Hall (ANT-1031) [video]

10:00

BoFs

11:00

BoFs

  • Ethics concerns in S&P research (ANT-1031), contact: Lujo Bauer
  • Cryptographic Tools for Privacy (ANT-1129), contact: Nadim Kobeissi
  • Women in PETS (ANT-2024), contacts: Anna Lorimer and Bailey Kacsmer
  • Board Games (ANT-3021), contact: Rebekah Overdorf
  • Hallway track with refreshments

12:00

Awards Ceremony (ANT-1031) and Reception [video]

3:00

Session 3A: Authentication

Room: ANT-2024 Chair: Nick Hopper 3:00-4:30 Practical Delegatable Anonymous Credentials From Equivalence Class Signatures artifact [video] Omid Mir (Johannes Kepler University Linz, LIT Secure and Correct Systems Lab, Linz , Austria ), Daniel Slamanig (AIT Austrian Institute of Technology Vienna, Austria), Balthazar Bauer (IRIF, Université de Paris Cité Paris, France), René Mayrhofer (Johannes Kepler University Linz, Institute of Networks and Security, Linz , Austria) Attribute-based Single Sign-On. Secure, Private, and Efficient artifact [video] Tore K. Frederiksen (), Julia Hesse (IBM Research Europe - Zurich), Bertram Poettering (IBM Research Europe - Zurich), and Patrick Towa (Aztec) Everybody's Looking for SSOmething: A large-scale evaluation on the privacy of OAuth authentication on the web [video] Yana Dimova (imec-DistriNet), Tom Van Goethem (Google), and Wouter Joosen (imec-DistriNet) Save The Implicit Flow? Enabling Privacy-Preserving RP Authentication in OpenID Connect [video] Maximilian Kroschewski (Hasso-Plattner-Institute, University of Potsdam) and Anja Lehmann (Hasso-Plattner-Institute, University of Potsdam) Understanding Person Identification Through Gait artifact [video] Simon Hanisch (Centre for Tactile Internet with Human-in-the-Loop (CeTI), TU Dresden), Evelyn Muschter (Centre for Tactile Internet with Human-in-the-Loop (CeTI), TU Dresden), Admantini Hatzipanayioti (Centre for Tactile Internet with Human-in-the-Loop (CeTI), TU Dresden), Shu-Chen Li (Centre for Tactile Internet with Human-in-the-Loop (CeTI), TU Dresden), Thorsten Strufe (Centre for Tactile Internet with Human-in-the-Loop (CeTI), TU Dresden and Karlsruhe Institute of Technology (KIT)) Time-Deniable Signatures [video] Gabrielle Beck (Johns Hopkins University), Arka Rai Choudhuri (NTT Research), Matthew Green (Johns Hopkins University), Abhishek Jain (Johns Hopkins University), Pratyush Ranjan Tiwari (Johns Hopkins University)

Session 3B: Privacy and AI/ML II

Room: ANT-1031 Chair: Tobias Fiebig 3:00-4:30 Exploring Model Inversion Attacks in the Black-box Setting [video] Antreas Dionysiou (University of Cyprus), Vassilis Vassiliades (CYENS Centre of Excellence), Elias Athanasopoulos (University of Cyprus) Individualized PATE: Differentially Private Machine Learning with Individual Privacy Guarantees artifact [video] Franziska Boenisch (Vector Institute), Christopher Mühl (Free University Berlin), Roy Rinberg (Columbia University), Jannis Ihrig (Free University Berlin), Adam Dziedzic (University of Toronto, Vector Institute) Private Multi-Winner Voting for Machine Learning [video] Adam Dziedzic (University of Toronto and Vector Institute), Christopher A. Choquette-Choo (Google Research, Brain Tea), Natalie Dullerud (University of Toronto and Vector Institute), Vinith Suriyakumar (MIT), Ali Shahin Shamsabadi (The Alan Turing Institue), Muhammad Ahmad Kaleem (University of Toronto and Vector Institute), Somesh Jha (University of Wisconsin-Madison), Nicolas Papernot (University of Toronto and Vector Institute), Xiao Wang (Northwestern University) Find Thy Neighbourhood: Privacy-Preserving Local Clustering [video] Pranav Shriram A (National Institute of Technology Tiruchirappalli), Nishat Koti (Indian Institute of Science), Varsha Bhat Kukkala (Indian Institute of Science), Arpita Patra (Indian Institute of Science), Bhavish Raj Gopal (Indian Institute of Science) How to Combine Membership-Inference Attacks on Multiple Updated Machine Learning Models [video] Matthew Jagielski (Google Research), Stanley Wu (Northeastern University), Alina Oprea (Northeastern University), Jonathan Ullman (Northeastern University), Roxana Geambasu (Columbia University) PubSub-ML: A Model Streaming Alternative to Federated Learning [video] Lovedeep Gondara (Simon Fraser University), Ke Wang (Simon Fraser University)

Session 3C: Law and Policy

Room: ANT-1129 Chair: Serge Egelman 3:00-4:30 SoK: Content Moderation for End-to-End Encryption Sarah Scheffler (Princeton University), Jonathan Mayer (Princeton University) Data Security on the Ground: Investigating Technical and Legal Requirements under the GDPR artifact [video] Tina Marjanov (University of Cambridge), Maria Konstantinou (Vrije Universiteit Amsterdam and Freshfields Bruckhaus Deringer), Magdalena Jóźwiak (Tilburg University), Dayana Spagnuelo (TNO) Evolution of Composition, Readability, and Structure of Privacy Policies over Two Decades [video] Andrick Adhikari (University of Denver), Sanchari Das (University of Denver), Rinku Dewri (University of Denver) Lessons in VCR Repair: Compliance of Android App Developers with the California Consumer Privacy Act (CCPA) [video] Nikita Samarin (UC Berkeley and ICSI), Shayna Kothari (UC Berkeley), Zaina Siyed (UC Berkeley), Oscar Bjorkman (UC Berkeley), Reena Yuan (UC Berkeley), Primal Wijesekera (UC Berkeley and ICSI), Noura Alomar (UC Berkeley), Jordan Fischer (UC Berkeley and Drexel Kline School of Law), Chris Hoofnagle (UC Berkeley), Serge Egelman (UC Berkeley and ICSI) GDPRxiv: Establishing the State of the Art in GDPR Enforcement artifact [video] Chen Sun (University of Iowa), Evan Jacobs (University of Iowa), Daniel Lehmann (University of Copenhagen), Andrew Crouse (University of Iowa), and Supreeth Shastri (University of Iowa) Researchers’ Experiences in Analyzing Privacy Policies: Challenges and Opportunities [video] Abraham Mhaidli (University of Michigan), Selin Fidan (University of Michigan), An Doan (University of Michigan), Gina Herakovic (University of Michigan), Mukund Srinath (Penn State University), Lee Matheson (Future for Privacy Forum), Shomir Wilson (Penn State University), and Florian Schaub (University of Michigan)

4:30

Break

5:00

Speed Mentoring (ANT-1031, info and signup)

6:00

Lunch

7:30

Session 4A: Censorship + Anonymity

Room: ANT-2024 Chair: Steven Murdoch 7:30-8:45 Dolphin: A Cellular Voice Based Internet Shutdown Resistance System [video] Piyush Kumar Sharma (IIIT Delhi, imec-COSIC KU Leuven), Rishi Sharma (IIIT Delhi), Kartikey Singh (IIIT Delhi), Mukulika Maity (IIIT Delhi), Sambuddho Chakravarty (IIIT Delhi) Lox: Protecting the Social Graph in Bridge Distribution artifact [video] Lindsey Tulloch (University of Waterloo), Ian Goldberg (University of Waterloo) Examining the Hydra: Simultaneously Shared Links in Tor and the Effects on its Performance artifact [video] Sebastian Pahl (Institute of Information Systems (iisys) -- Hof University of Applied Sciences), Florian Adamsky (Institute of Information Systems (iisys) -- Hof University of Applied Sciences), Daniel Kaiser (Status Research & Development GmbH), Thomas Engel (University of Luxembourg) The Self-Anti-Censorship Nature of Encryption: On the Prevalence of Anamorphic Cryptography [video] Mirek Kutylowski (Wroclaw University of Science and Technology), Giuseppe Persiano (UNISA and Google), Duong Hieu Phan (Telecom Paris, Institut Polytechnique de Paris), Moti Yung (Google and Columbia), and Marcin Zawada (Wroclaw University of Science and Technology) Throwing Your Weight Around: Fixing Tor’s Positional Weighting [video] Aaron M. Johnson (U.S. Naval Research Laboratory), Aaron D. Jaggard (U.S. Naval Research Laboratory), and Paul F. Syverson (U.S. Naval Research Laboratory)

Session 4B: Location Privacy

Room: ANT-1031 Chair: Sébastien Gambs 7:30-8:45 Designing a Location Trace Anonymization Contest artifact [video] Takao Murakami (AIST), Hiromi Arai (RIKEN), Koki Hamada (NTT), Takuma Hatano (NSSOL), Makoto Iguchi (Kii Corporation), Hiroaki Kikuchi (Meiji University), Atsushi Kuromasa (Data Society Alliance), Hiroshi Nakagawa (RIKEN), Yuichi Nakamura (SoftBank Corp.), Kenshiro Nishiyama (LegalForce), Ryo Nojima (NICT), Hidenobu Oguri (Fujitsu Limited), Chiemi Watanabe (Tsukuba University of Technology), Akira Yamada (Kobe University), Takayasu Yamaguchi (Akita Prefectural University), Yuji Yamaoka (Fujitsu Limited) Privacy by Projection: Federated Population Density Estimation by Projecting on Random Features [video] Zixiao Zong (University of California, Irvine), Mengwei Yang (University of California, Irvine), Justin Ley (University of California, Irvine), Athina Markopoulou (University of California, Irvine), Carter Butts (University of California, Irvine) Robust Fingerprint of Location Trajectories Under Differential Privacy artifact [video] Yuzhou Jiang (Case Western Reserve University), Emre Yilmaz (University of Houston-Downtown), and Erman Ayday (Case Western Reserve University) Privacy-Aware Adversarial Network in Human Mobility Prediction artifact [video] Yuting Zhan (Imperial College London), Hamed Haddadi (Imperial College London), Afra Mashhadi (University of Washington) End-to-end Privacy Preserving Training and Inference for Air Pollution Forecasting with Data from Rival Fleets [video] Gauri Gupta (Massachusetts Institute of Technology), Krithika Ramesh (Manipal Institute of Technology, India), Anwesh Bhattacharya (Microsoft Research, India), Divya Gupta (Microsoft Research, India), Rahul Sharma (Microsoft Research, India), Nishanth Chandran (Microsoft Research, India), and Rijurekha Sen (IIT Delhi)

Session 4C: Personal Safety

Room: ANT-1129 Chair: Yixin Zou 7:30-8:45 Blind My - Robust Stalking Prevention in Apple's Find My Network [video] Travis Mayberry (United States Naval Academy), Erik-Oliver Blass (Airbus), Ellis Fenske (US Naval Academy) Creative beyond TikToks: Investigating Adolescents’ Social Privacy Management on TikTok artifact [video] Nico Ebert (Zurich University of Applied Sciences), Tim Geppert (Zurich University of Applied Sciences), Joanna Strycharz (University of Amsterdam), Melanie Knieps (University of Zurich), Michael Hönig (Zurich University of Applied Sciences), Elke Brucker-Kley (Zurich University of Applied Sciences) SoK: Differentially Private Publication of Trajectory Data [video] Àlex Miranda-Pascual (Universitat Politècnica de Catalunya and Karlsruhe Institute of Technology), Patricia Guerra-Balboa (Karlsruhe Institute of Technology), Javier Parra-Arnau (Universitat Politècnica de Catalunya and Karlsruhe Institute of Technology), Jordi Forné (Universitat Politècnica de Catalunya), Thorsten Strufe (Karlsruhe Institute of Technology) On the Role and Form of Personal Information Disclosure in Cyberbullying Incidents artifact [video] Sadiq Aliyu (University of Lausanne), Kavous Salehzadeh Niksirat (University of Lausanne), Kévin Huguenin (University of Lausanne), and Mauro Cherubini (University of Lausanne) Track You: A Deep Dive into Safety Alerts for Apple AirTags [video] Narmeen Shafqat (Northeastern University), Nicole Gerzon (Northeastern University), Maggie Van Nortwick (Northeastern University), Victor Sun (Northeastern University), Alan Mislove (Northeastern University), and Aanjhan Ranganathan (Northeastern University)

8:45

Break

9:00

Poster Session (Hallway between ANT-1031 and ANT-1129)

10:00

Break

10:30

Rump Session (ANT-1031) [video]

11:30

Break

12:00

3:00

Session 5A: Cryptographic Approaches II

Room: ANT-2024 Chair: Frederik Armknecht 3:00-4:30 An Efficient Data-Independent Priority Queue and its Application to Dark Pools [video] Sahar Mazloom (J. P. Morgan AI Research), Benjamin Diamond (Coinbase), Antigoni Polychroniadou (J. P. Morgan AI Research), Tucker Balch (J. P. Morgan AI Research) Private Sampling with Identifiable Cheaters artifact [video] César Sabater (INRIA), Florian Hahn (University of Twente), Andreas Peter (University of Oldenburg), and Jan Ramon (INRIA) Convolutions in Overdrive: Maliciously Secure Convolutions for MPC artifact [video] Marc Rivinius (University of Stuttgart), Pascal Reisert (University of Stuttgart), Sebastian Hasler (University of Stuttgart), Ralf Küsters (University of Stuttgart) Ruffle: Rapid 3-Party Shuffle Protocols artifact [video] Pranav Shriram A (JP Morgan Chase), Nishat Koti (Indian Institute of Science), Varsha Bhat Kukkala (Indian Institute of Science), Arpita Patra (Indian Institute of Science), Bhavish Raj Gopal (Indian Institute of Science), Somya Sangal (Indian Institute of Science) Funshade: Function Secret Sharing for Two-Party Secure Thresholded Distance Evaluation [video] Alberto Ibarrondo (Copper.co), Herve Chabanne (Idemia & Telecom Paris), and Melek Onen (EURECOM) Verifiable Distributed Aggregation Functions artifact [video] Hannah Davis (University of California, San Diego), Christopher Patton (Cloudflare), MIke Rosulek (Oregon State University), and Phillipp Schoppmann (Google)

Session 5B: Attacks and Defenses

Room: ANT-1031 Chair: Rebekah Overdorf 3:00-4:30 Unintended Memorization and Timing Attacks in Named Entity Recognition Models [video] Rana Salal Ali (Macquarie University), Benjamin Zi Hao Zhao (Macquarie University), Hassan Jameel Asghar (Macquarie University), Tham Nguyen (Macquarie University), Ian David Wood (Macquarie University), Mohamed Ali Kaafar (Macquarie University) Story Beyond the Eye: Glyph Positions Break PDF Text Redaction artifact [video] Maxwell Bland (University of Illinois, Urbana-Champaign), Anushya Iyer (University of Illinois, Urbana-Champaign), Kirill Levchenko (University of Illinois, Urbana-Champaign) Disparate Vulnerability in Link Inference Attacks against Graph Neural Networks artifact [video] Da Zhong (Stevens Institute of Technology), Ruotong Yu (University of Utah), Kun Wu (Stevens Institute of Technology), Xiuling Wang (Stevens Institute of Technology), Jun Xu (University of Utah), and Wendy Hui Wang (Stevens Institute of Technology Locality-Sensitive Hashing Does Not Guarantee Privacy! Attacks on Google's FLoC and the MinHash Hierarchy System artifact [video] Florian Turati (ETH Zurich), Carlos Cotrini (ETH Zurich), Karel Kubicek (ETH Zurich), and David Basin (ETH Zurich) Efficient Proofs of Software Exploitability for Real-world Processors [video] Matthew Green (Johns Hopkins University), Mathias Hall-Andersen (Aarhus University), Eric Hennenfent (Trail of Bits), Gabriel Kaptchuk (Boston University), Benjamin Perez (Trail of Bits), Gijs Van Laer (Johns Hopkins University) iStelan: Disclosing Sensitive User Information by Mobile Magnetometer from Finger Touches [video] Reham Mohamed (Purdue University), Habiba Farrukh (Purdue University), Yidong Lu (Purdue University), He Wang (Purdue University), Z. Berkay Celik (Purdue University)

Session 5C: Genomes and Biometrics

Room: ANT-1129 Chair: Dali Kaafar 3:00-4:30 Differentially Private Speaker Anonymization [video] Ali Shahin Shamsabadi (The Alan Turing Institute, Vector Institute, Université de Lille, Inria, CNRS, Centrale Lille, UMR 9189 - CRIStAL, F-59000 Lille, France), Brij Mohan Lal Srivastava (Université de Lille, Inria, CNRS, Centrale Lille, UMR 9189 - CRIStAL, F-59000 Lille, France), Aurélien Bellet (Université de Lille, Inria, CNRS, Centrale Lille, UMR 9189 - CRIStAL, F-59000 Lille, France), Nathalie Vauquier (Université de Lille, Inria, CNRS, Centrale Lille, UMR 9189 - CRIStAL, F-59000 Lille, France), Emmanuel Vincent (Université de Lorraine, CNRS, Inria, LORIA, F-54000 Nancy, France), Mohamed Maouche (Université de Lille, Inria, CNRS, Centrale Lille, UMR 9189 - CRIStAL, F-59000 Lille, France), Marc Tommasi (Université de Lille, Inria, CNRS, Centrale Lille, UMR 9189 - CRIStAL, F-59000 Lille, France), Nicolas Papernot (Vector Institute, University of Toronto) I-GWAS: Privacy-Preserving Interdependent Genome-Wide Association Studies [video] Túlio Pascoal (University of Luxembourg), Jérémie Decouchant (Delft University of Technology), Antoine Boutet (University of Lyon, INSA Lyon, Inria CITI), Marcus Völp (University of Luxembourg) StyleID: Identity Disentanglement for Anonymizing Faces artifact [video] Minh-Ha Le (Linköping University), Niklas Carlsson (Linköping University) "My face, my rules": Enabling Personalized Protection against Unacceptable Face Editing [video] Zhujun Xiao (University of Chicago), Jenna Cryan (University of Chicago), Yuanshun Yao (University of Chicago), Yi Hong Gordon Cheo (University of Chicago), Yuanchao Shu (Zhejiang University), Stefan Saroiu (Microsoft Research), Ben Y. Zhao (University of Chicago), Haitao Zheng (University of Chicago) Two-Cloud Private Read Alignment to a Public Reference Genome artifact [video] Sindhuja Madabushi (University of Wisconsin-Madison), Parameswaran Ramanathan (University of Wisconsin-Madison) Examining StyleGAN as a Utility-Preserving Face De-identification Method [video] Seyyed Mohammad Sadegh Moosavi Khorzooghi (The University of Texas at Arlington) and Shirin Nilizadeh (The University of Texas at Arlington)

4:30

Break

5:00

Poster Session

5:00

BoFs

6:00

Lunch

7:30

Session 6A: Cornucopia

Room: ANT-2024 Chair: Ryan Wails 7:30-9:00 Compact and Divisible E-Cash with Threshold Issuance artifact [video] Alfredo Rial (Nym Technologies) and Ania Piotrowska (Nym Technologies) Detect your fingerprint in your photographs : Photography-based multi-feature Sybil detection [video] Yerim Kim (Korea University), Minjae Kim (Korea University), Myungjae Chung (Korea University), Junbeom Hur (Korea University) A Utility-Preserving Obfuscation Approach for YouTube Recommendations [video] Jiang Zhang (University of Southern California), Hadi Askari (University of California, Davis), Konstantinos Psounis (University of Southern California), and Zubair Shafiq (University of California, Davis) Privacy Property Graph: Towards Automated Privacy Threat Modeling via Static Graph-based Analysis [video] Immanuel Kunz (Fraunhofer AISEC), Konrad Weiss (Fraunhofer AISEC), Angelika Schneider (Fraunhofer AISEC), Christian Banse (Fraunhofer AISEC) SoK: Secure E-Voting with Everlasting Privacy [video] Thomas Haines (Australian National University), Rafieh Mosaheb (University of Luxembourg), Johannes Müller (University of Luxembourg), Ivan Pryvalov (University of Luxembourg) Privacy-Preserving Outsourced Certificate Validation [video] Tarek Galal (Hasso-Plattner Institute, University of Potsdam) and Anja Lehmann (Hasso-Plattner Institute, University of Potsdam)

Session 6B: Privacy and AI/ML III

Room: ANT-1031 Chair: Vera Rimmer 7:30-9:00 HeLayers: A Tile Tensors Framework for Large Neural Networks on Encrypted Data artifact [video] Ehud Aharoni (IBM Research - Israel), Allon Adir (IBM Research - Israel), Moran Baruch (IBM Research - Israel and Bar Ilan University), Nir Drucker (IBM Research - Israel), Gilad Ezov (IBM Research - Israel), Ariel Farkash (IBM Research - Israel), Lev Greenberg (IBM Research - Israel), Ramy Masalha (IBM Research - Israel), Guy Moshkowich (IBM Research - Israel), Dov Murik (IBM Research - Israel), Hayim Shaul (IBM Research - Israel), Omri Soceanu (IBM Research - Israel) MIAShield: Defending Membership Inference Attacks via Preemptive Exclusion of Members [video] Ismat Jarin (University of Michigan, Dearborn, United States), Birhanu Eshete (University of Michigan, Dearborn, United States) SoK: Secure Aggregation based on cryptographic schemes for Federated Learning [video] Mohamad Mansouri (Thales SIX GTS / EURECOM), Melek Önen (EURECOM), Wafa Ben Jaballah (Thales SIX GTS), Mauro Conti (University of Padua) Private Graph Extraction via Feature Explanations artifact [video] Iyiola E. Olatunji (L3S Research Center, Hannover, Germany), Mandeep Rathee (L3S Research Center, Hannover, Germany), Thorben Funke (L3S Research Center, Hannover, Germany), Megha Khosla (TU Delft, Delft, Netherlands) Losing Less: A Loss for Differentially Private Deep Learning [video] Ali Shahin Shamsabadi (The Alan Turing Institute), Nicolas Papernot (Vector Institute, University of Toronto) Privacy-Preserving Federated Recurrent Neural Networks [video] Sinem Sav (EPFL), Abdulrahman Diaa (University of Waterloo), Apostolos Pyrgelis (EPFL), Jean-Philippe Bossuat (Tune Insight SA), and Jean-Pierre Hubaux (EPFL)

Session 6C: Web Privacy

Room: ANT-1129 Chair: Gunes Acar 7:30-9:00 Privacy Rarely Considered: Exploring Considerations in the Adoption of Third-Party Services by Websites [video] Christine Utz (CISPA Helmholtz Center for Information Security), Sabrina Amft (CISPA Helmholtz Center for Information Security), Martin Degeling (Ruhr University Bochum), Thorsten Holz (CISPA Helmholtz Center for Information Security), Sascha Fahl (CISPA Helmholtz Center for Information Security), Florian Schaub (University of Michigan School of Information) How Website Owners Face Privacy Issues: Thematic Analysis of Responses from a Covert Notification Study Reveals Diverse Circumstances and Challenges [video] Alina Stöver (TU Darmstadt), Nina Gerber (TU Darmstadt), Henning Pridöhl (University of Bamberg), Max Maass (iteratec GmbH), Sebastian Bretthauer (University of Frankfurt), Indra Spiecker gen. Döhmann (University of Frankfurt), Matthias Hollick (TU Darmstadt), Dominik Herrmann (University of Bamberg) Usability and Enforceability of Global Privacy Control artifact [video] Sebastian Zimmeck (Wesleyan University), Oliver Wang (Wesleyan University), Kuba Alicki (Princeton University), Jocelyn Wang (Wesleyan University), Sophie Eng (Wesleyan University) Blocking JavaScript without Breaking the Web: An Empirical Investigation artifact [video] Abdul Haddi Amjad (Virginia Tech), Zubair Shafiq (University of California, Davis), Muhammad Ali Gulzar (Virginia Tech) On the Robustness of Topics API to a Re-Identification Attack artifact [video] Nikhil Jha (Politecnico di Torino), Martino Trevisan (Università degli studi di Trieste), Emilio Leonardi (Politecnico di Torino), and Marco Mellia (Politecnico di Torino) Your DRM Can Watch You Too: Exploring the Privacy Implications of Browsers (mis)Implementations of Widevine EME artifact [video] Gwendal Patat (Univ Rennes, CNRS, IRISA), Mohamed Sabt (Univ Rennes, CNRS, IRISA), and Pierre-Alain Fouque (Univ Rennes, CNRS, IRISA)

9:00

Break

9:30

Session 7A: Private Search and Retrieval

Room: ANT-2024 Chair: Kasra Edalatnejadkhamene 9:30-11:00 Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable Encryption [video] Ghous Amjad (Google), Sarvar Patel (Google), Giuseppe Persiano (Università di Salerno), Kevin Yeo (Google), Moti Yung (Google) TWo-IN-one-SSE: Fast, Scalable and Storage-Efficient Searchable Symmetric Encryption for Conjunctive and Disjunctive Boolean Queries artifact [video] Arnab Bag (Indian Institute of Technology, Kharagpur, India), Debadrita Talapatra (Indian Institute of Technology, Kharagpur, India), Ayushi Rastogi (Indian Institute of Technology, Kharagpur, India), Sikhar Patranabis (IBM Research India), Debdeep Mukhopadhyay (Indian Institute of Technology, Kharagpur, India) Attacks on Encrypted Response-Hiding Range Search Schemes in Multiple Dimensions artifact [video] Evangelia Anna Markatou (Brown University), Francesca Falzon (Brown University, University of Chicago), Zachary Espiritu (Brown University), and Roberto Tamassia (Brown University) Result-pattern-hiding Conjunctive Searchable Symmetric Encryption with Forward Privacy [video] Dandan Yuan (The University of Auckland), Cong Zuo (Beijing Institute of Technology), Shujie Cui (Monash University), Giovanni Russello (The University of Auckland) MAPLE: A Metadata-Hiding Policy-Controllable Encrypted Search Platform with Minimal Trust [video] Tung Le (Virginia Tech) and Thang Hoang (Virginia Tech) FrodoPIR: Simple, Scalable, Single-Server Private Information Retrieval artifact [video] Alex Davidson (Brave Software), Gonçalo Pestana (Brave Software), Sofía Celi (Brave Software)

Session 7B: Measurement and Data Privacy

Room: ANT-1031 Chair: Aaron Johnson 9:30-11:00 Differential Privacy for Black-Box Statistical Analyses [video] Nitin Kohli (UC Berkeley Center for Effective Global Action), Paul Laskowski (UC Berkeley School of Information) DPrio: Efficient Differential Privacy with High Utility for Prio artifact [video] Dana Keeler (Mozilla Corporation), Chelsea Komlo (University of Waterloo, Zcash Foundation), Emily Lepert (University of Waterloo), Shannon Veitch (Eth Zürich), Xi He (University of Waterloo) A Unified Framework for Quantifying Privacy Risk in Synthetic Data artifact [video] Matteo Giomi (Statice GmbH), Franziska Boenisch (Vector Institute), Christoph Wehmeyer (Statice GmbH), Borbála Tasnádi (Statice GmbH) SenRev: Measurement of Personal Information Disclosure in Online Health Communities [video] Faysal Hossain Shezan (University of Virginia), Minjun Long (University of Virginia), David Hasani (University of Virginia), Gang Wang (University of Illinois at Urbana-Champaign), Yuan Tian (University of California Los Angeles) SoK: New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks artifact [video] Charles Gouert (University of Delaware), Dimitris Mouris (University of Delaware), Nektarios Tsoutsos (University of Delaware) CERTainty: Detecting DNS Manipulation at Scale using TLS Certificates Elisa Tsai (University of Michigan), Deepak Kumar (Stanford University), Ram Sundara Raman (University of Michigan), Gavin Li (University of Michigan), Yael Eiger (University of Michigan), Roya Ensafi (University of Michigan)

Session 7C: Privacy Perceptions II

Room: ANT-1129 Chair: Bailey Kacsmar 9:30-11:00 "Revoked just now!" Users' Behaviors Toward Fitness-Data Sharing with Third-Party Applications artifact [video] Noé Zufferey (University of Lausanne), Kavous Salehzadeh Niksirat (University of Lausanne), Mathias Humbert (University of Lausanne), Kévin Huguenin (University of Lausanne) Investigating Privacy Decision-Making Processes Among Nigerian Men and Women [video] Victor Yisa (Dalhousie University), Reza Ghaiumy Anaraky (Clemson University), Bart P. Knijnenburg (Clemson University), Rita Orji (Dalhousie University) Privacy Concerns and Acceptance Factors of OSINT for Cybersecurity: A Representative Survey [video] Thea Riebe (Technical University of Darmstadt), Tom Biselli (Technical University of Darmstadt), Marc-André Kaufhold (Technical University of Darmstadt), Christian Reuter (Technical University of Darmstadt) Intersectional Thinking about PETs: A Study of Library Privacy [video] Nora McDonald (George Mason University), Rachel Greenstadt (New York University), Andrea Forte (Drexel University) Comparing Large-Scale Privacy and Security Notifications [video] Christine Utz (CISPA Helmholtz Center for Information Security), Matthias Michels (Saarland University), Martin Degeling (Ruhr University Bochum), Ninja Marnau (CISPA Helmholtz Center for Information Security), Ben Stock (CISPA Helmholtz Center for Information Security) Understanding the Perception and Awareness of Education Technologies' Privacy and Security Issues [video] Rakibul Hasan (Arizona State University)

11:00

Closing Remarks (ANT-1031) [video]

3:00

Opening Remarks

3:15

Session A

Room: ANT-1129 3:15–4:35 Data for good: US data breach visualization and classification [video] Aleecia M. McDonald and Emory Roane Female mHealth Apps: Opportunities and Challenges [video] Ina Kaleva (King’s College London), Lisa Mekioussa Malki (King’s College London), Dilisha Patel (Global Disability Innovation Hub, University College London), Mark Warner (University College London), and Ruba Abu-Salma (King’s College London) Dataveillance: An Overlooked Side of Dark Patterns [video] Maria Sameen (University of Bristol, UK) and Awais Rashid (University of Bristol, UK)

4:35

Coffee Break

5:00

Keynote: The Power of Community Participation in Shaping Digital Rights Tech [video]

Maria Xynou, Open Observatory of Network Interference (OONI) Room: ANT-1129 5:00–6:00 Abstract: Control of the internet—such as online surveillance or internet censorship—is a political issue, warranting a political response. The nature of internet control varies from country to country, requiring different responses from communities on the ground. Decentralization, PETs and free and open source software (FOSS) are important means to fight back, but it's also important to engage impacted communities in the design and creation of such technologies to ensure that their needs are met. Through examples from OONI's community-driven approach to global censorship measurement, this talk will share how and why there is power in involving communities from around the world in shaping digital rights protecting technology. Bio: Maria Xynou co-leads the Open Observatory of Network Interference (OONI), a non-profit, free software project measuring internet censorship globally. Since 2016, Maria has published more than 60 reports documenting internet censorship around the world, and has led global OONI community engagement efforts on censorship measurement. Previously, Maria worked with Tactical Tech on investigating the data industry, creating privacy and digital security resources, and facilitating digital security workshops for human rights defenders. Maria also worked with India's Centre for Internet and Society (CIS) on investigating surveillance in India and volunteered with Privacy International.

6:00

Lunch

7:00

ATTENTION CHANGE: PROGRAM SHIFTED BY 30 MINUTES

7:30

Session B

Room: ANT-1129 7:30–9:00 Impacts of Growing Tor – A Neglected Aspect of Tor Evolution? [video] Christoph Döpmann (Technische Universität Berlin) Are PETS and algorithmic accountability at loggerheads? [video] Anders Dalskov (Partisia) and Kris Shrishak (Irish Council for Civil Liberties) Who are users in privacy discussions? [video] Priyanka Nanayakkara (Northwestern University)

9:00

Ice Cream!

10:00

Session C

Room: ANT-1129 10:00-11:00 Where Do Threat Models Come From? Challenging Implicit Assumptions [video] Lucy Qin (Brown University), Leah Namisa Rosenbloom (Brown University), and Kris Shrishak (Irish Council for Civil Liberties) Bridging the Gap between Privacy Incidents and PETs [video] Shannon Veitch (ETH Zurich), Lena Csomor (ETH Zurich), Alexander Viand (ETH Zurich), Anwar Hithnawi(ETH Zurich), and Bailey Kacsmar (University of Alberta)

11:00

Closing Remarks and Award (ANT-1031) [video]

3:00

PETS Hike - Le Pont

3:00-12:00 Please see the hike page for full details, including map, schedule, and tips on what to bring and wear.