PETS 2024 Posters

These posters did not undergo peer review and were selected on a first-come, first-served basis. They were reviewed only for relevance to PETS. Posters will be presentd Wednesday at 17:00 in the Humanities Gallery.

  • PrivacyLens: On-Device PII Removal from RGB Images using Thermally-Enhanced Sensing
    Yasha Iravantchi (University of Michigan), Thomas Krolikowski (University of Michigan), William Wang (University of Michigan), Kang G. Shin (University of Michigan), Alanson Sample (University of Michigan)
  • Privacy Perspectives and Practices of Chinese Smart Home Device Developers
    Shijing He (King's College London), Yaxiong Lei (University of St.Andrews), Xiao Zhan (King's College London), Chi Zhang (University of St.Andrews), Ye Juan (University of St.Andrews), Ruba Abu-Salma (King's College London), Jose Such (King's College London)
  • SyRA: Sybil-Resilient Anonymous Signatures with Applications to Decentralized Identity
    Elizabeth Crites (Web3 Foundation), Aggelos Kiayias (The University of Edinburgh & IOG), Markulf Kohlweiss (The University of Edinburgh & IOG), Amirreza Sarencheh (The University of Edinburgh & IOG)
  • Privacy and Utility Analysis of the Topics API for the Web
    Yohan Beugin (University of Wisconsin-Madison), Patrick McDaniel (University of Wisconsin-Madison)
  • Raising the Bar: Improved Fingerprinting Attacks and Defenses for Video Streaming Traffic
    David Hasselquist (Linköping University & Sectra Communications), Ethan Witwer (Linköping University), August Carlson (Linköping University), Niklas Johansson (Linköping University & Sectra Communications), Niklas Carlsson (Linköping University)
  • A Large-Scale Study of Cookie Banner Interaction Tools and Their Impact on Users’ Privacy
    Nurullah Demir (Institute for Internet Security), Tobias Urban (Institute for Internet Security), Christian Wressnegger (Karlsruhe Institute of Technology), Norbert Pohlmann (Institute for Internet Security)
  • Beyond Linear TV: Exploring Tracking and Transparency Mechanisms in the European HbbTV Ecosystem
    Christian Böttger (Westphalian University of Applied Sciences, Institute for Internet-Security), Tobias Urban (Westphalian University of Applied Sciences, Institute for Internet-Security), Nurullah Demir (Westphalian University of Applied Sciences, Institute for Internet-Security), Jan Hörnemann (Westphalian University of Applied Sciences; AWARE7 GmbH), Christian Wressnegger (Karlsruhe Institute of Technology), Matteo Grosse-Kampmann (Rhine-Waal University of Applied Sciences; AWARE7 GmbH), Henry Hosseini (University of Münster), Christine Utz (Radboud University), Norbert Pohlmann (Westphalian University of Applied Sciences, Institute for Internet-Security), Thomas Hupperich (University of Münster)
  • TrustRate: A Decentralized Platform for Hijack-Resistant Anonymous Reviews
    Rohit Dwivedula (University of Texas at Austin), Sriram Sridhar (University of California, Berkeley), Sambhav Satija (University of Wisconsin, Madison), Muthian Sivathanu (Microsoft Research), Nishanth Chandran (Microsoft Research), Divya Gupta (Microsoft Research), Satya Lokam (Microsoft Research)
  • Fingerprinting VPN Traffic: A Preliminary Evaluation of Website Fingerprinting Attacks on Modern Virtual Private Network Applications
    Oufan Hai (University of Rochester)
  • The Impact of Attacker’s Auxiliary Information for Membership Inference Risk while Sharing Genomic Research Findings
    Maryam Ghasemian (Case Western Reserve University), Lynette Hammond Gerido (Case Western Reserve University), Erman Ayday (Case Western Reserve University)
  • PixelGraph: Detecting and Characterizing Diverse Configurations of Tracking Pixels
    Yash Vekaria (University of California, Davis), Zubair Shafiq (University of California, Davis)
  • Inter-Template-Space Matching: Template Inversion with Limited Knowledge
    Tim Van hamme, Davy Preuveneers, Wouter Joosen, willem verheyen (Distrinet, KU Leuven)
  • Differentially Private Next-Token Prediction of Large Language Models
    James Flemings (University of Southern California), Meisam Razaviyayn (University of Southern California), Murali Annavaram (University of Southern California)
  • CLAM: Client-Aware Routing in Mix Networks
    Mahdi Rahimi (COSIC (KU Leuven))
  • SEBA: Strong Evaluation of Biometric Anonymizations
    Julian Todt (Karlsruhe Institute of Technology), Simon Hanisch (Technical University Dresden), Thorsten Strufe (Karlsruhe Institute of Technology)
  • What's in a game? A review of game-based methods for privacy and security in the SDLC.
    Jonah Bellemans (DistriNet, Dept. of Computer Science, KU Leuven), Dimitri Van Landuyt (DistriNet, Dept. of Computer Science, KU Leuven), Laurens Sion (DistriNet, Dept. of Computer Science, KU Leuven), Lieven Desmet (DistriNet, Dept. of Computer Science, KU Leuven)
  • Google Tag Manager: Hidden Data Leaks and and its Potential Violations under EU Data Protection Law
    Gilles Mertens (Inria), Nataliia Bielova (Inria), Vincent Roca (Inria), Cristiana Santos (Utrecht University)
  • From Wires to Webs: Are Online Trackers Wiretapping Web Browsers?
    Shaoor Munir (University of California, Davis), Nurullah Demir (Institute for Internet Security), Zubair Shafiq (University of California, Davis)
  • MPC-Pipe: An Efficient Pipeline Scheme for Semi-honest MPC Machine Learning
    Yongqin Wang (University of Southern California), Murali Annavaram (University of Southern California)
  • CompactTag: Minimizing Tag Computation in Actively-Secure MPC for Neural Networks
    Yongqin Wang (University of Southern California), Murali Annavaram (University of Southern California)
  • Privacy-Preserving Data Sharing For Collaborative Agriculture Research
    Osama Zafar (Case Western Reserve University), Rosemarie Santa González (Georgia Institute of Technology), Gabriel Wilkins (University of Wisconsin–Madison), Alfonso Morales (University of Wisconsin–Madison), Erman Ayday (Case Western Reserve University)
  • The Long Road to Trajectory Privacy
    Erik Buchholz (UNSW Sydney), Sharif Abuadbba (CSIRO's Data61), Shuo Wang (CSIRO's Data61), Surya Nepal (CSIRO's Data61), Salil S. Kanhere (UNSW Sydney)
  • Usability and User Interaction with Browser Privacy Tools: Insights from CookieBlock
    Lorin Schöni (ETH Zurich), Karel Kubicek (ETH Zurich), Verena Zimmermann (ETH Zurich)
  • Causal Discovery Under Local Privacy
    Ruta Binkyte (CISPA – Helmholtz Center for Information Security), Carlos Pinzón (INRIA Saclay-Ile-de-France), Szilvia Lestyán (INRIA Saclay-Ile-de-France), Kangsoo Jung (INRIA Saclay-Ile-de-France), Héber H. Arcolezi (INRIA Grenoble), Catuscia Palamidessi (INRIA Saclay-Ile-de-France)
  • Bluetooth Security Analysis of FemTech IoT Devices and Apps
    Maryam Mehrnezhad (Royal Holloway University of London)
  • When Privacy Notices Matters: Investigating the Impact of Timing on the Salience of Smartphone App Privacy Notices
    Jialiang Yan (University of Alberta), Bailey Kacsmar (University of Alberta)
  • Haze and Daze: Compliant Privacy Mixers
    Stanislaw Baranski (Gdansk University of Technology), Maya Dotan (The Hebrew University), Ayelet Lotem (The Hebrew University), Margarita Vald (Reichman University)
  • Exploring utility-privacy tradeoffs in genomic databases through source coding
    Tianxi Ji (Texas Tech University), Erman Ayday (Case Western Reserve University), Dana Crawford (Case Western Reserve University)
  • Model-driven Privacy
    Hoang Nguyen (ETH Zurich), Srdan Krstic (ETH Zurich), David Basin (ETH Zurich)
  • Privacy Preserving Epigenetic PaceMaker Stronger Privacy and Improved Efficiency
    Meir Goldenberg (University Of Haifa), Loay Mualem (University Of Haifa), Amit Shahar (University Of Haifa), Sagi Snir (University Of Haifa), Adi Akavia (University Of Haifa)
  • Better Safe than Sorry: Privacy by Design using Runtime Enforcement
    François Hublet (ETH Zürich), Srđan Krstić (ETH Zürich)
  • Security and Privacy of Assistive Technologies for People with Visual Impairments
    James Clarke (University of Surrey)
  • Mobile Fingerprinting: Post-Advertising-ID Tracking Era
    Soumaya Boussaha (SAP / Eurecom), Simon Koch (TU Braunschweig), Miguel Bermejo (UC3M), Martin Johns (TU Braunschweig), Ruben Cuevas Rumin (UC3M), Angel Cuevas Rumin (UC3M), Daniele Antonioli (Eurecom), Thomas barber (SAP)
  • PoliPoly: A Polymorphic ChatGPT-Based Framework for User-Centric Privacy Policy Visual Analysis
    Maksim Kalameyets (Newcastle University), Rebecca Owens (Newcastle University), Han Wu (University of Birmingham), Anton Kalyuzhnyy (University of Liverpool), David Lam (University of Birmingham), Maryam Mehrnezhad (Royal Holloway University of London), Ben Farrand (Newcastle University), Lei Shi (Newcastle University)
  • Curl: Private LLMs through Wavelet-Encoded Look-Up Tables
    Manuel B. Santos (Nillion), Dimitris Mouris (Nillion), Mehmet Ugurbil (Nillion), Stanislaw Jarecki (University of California, Irvine), José Reis (Nillion), Shubho Sengupta (Meta Inc.), Miguel de Vega (Nillion)
  • Privacy-Preserving Verification of Preprocessing in Machine Learning Models
    Wenbiao Li (Case Western Reserve University), Anisa Halimi (IBM Research), Xiaoqian Jiang (UThealth), Jaideep Vaidya (Rutgers University), Erman Ayday (Case Western Reserve University)
  • Finding Bugs with Friends: Incentivizing Vulnerability Discovery Through Teaming and Collaboration
    Yangheran Piao (University of Edinburgh), Temima Hrle (University of Edinburgh), Daniel W. Woods (University of Edinburgh), Ross Anderson (University of Cambridge)
  • Evaluating Google's Protected Audience Protocol
    Minjun Long (University of Virginia), David Evans (University of Virginia)
  • Are IoT privacy and security standards usable?
    Andrew Baldrian (University of Bristol), Joseph Hallett (University of Bristol)
  • Topic-based Watermarks for LLM-Generated Text
    Alexander Nemecek (Case Western Reserve University), Yuzhou Jiang (Case Western Reserve University), Erman Ayday (Case Western Reserve University)
  • Privacy-Preserving Analytics of Epidemiological Data
    Apostolos Pyrgelis (RISE Research Institute of Sweden), Vera Rimmer (DistriNet, KU Leuven), Lorenzo Dall’Amico (ISI Foundation), Ciro Cattuto (ISI Foundation), Carmela Troncoso (EPFL)
  • Cookie Crumbs: The Nexus of Banner Interaction and Tracking Cookies
    Ali Rasaii (Max Planck Institute for Informatics)
  • Shadow Health-Related Data: Definition, Categorization & User Perspectives
    Yamane El Zein (CSEM / UNIL), Kavous Salehzadeh Niksirat (UNIL / EPFL), Noé Zufferey (ETH Zurich), Mathias Humbert (UNIL), Kévin Huguenin (UNIL)
  • Citizens' Security and Privacy in the Age of Smart Cities
    WEJDAN ALSARIH (University of Bristol), Kopo M. Ramokapane (University of Bristol)
  • Privacy-Preserving Collaborative Genomic Research: A Real-Life Deployment and Vision
    Nahal Shahini (Case Western Reserve University), Zahra Rahmani (Case Western Reserve University), Nadav Gat (Tel Aviv University), Zebin Yun (Tel Aviv University), Yuzhou Jiang (Case Western Reserve University), Ofir Farchy (Lynx.MD), Yaniv Hare (Tel Aviv University), Vipin Chaudhary (Case Western Reserve University), Mahmood Sharif (Tel Aviv University), Erman Ayday (Case Western Reserve University)
  • Depth-Aware Arithmetization of Common Primitives in Finite Fields
    Jelle Vos (Delft University of Technology), Mauro Conti (University of Padua), Zekeriya Erkin (Delft University of Technology)
  • Empirical evaluation of traffic fingerprinting against the Nym mixnet
    Simon Wicky (Nym Technologies), Ania Piotrowska (Nym Technologies), Eric Joelle (EPFL), Carmela Troncoso (EPFL), Harry Halpin (Nym Technologies)
  • WhisperTest: A Library for iOS App Automation
    Zahra Moti (Radboud University), Steven Monteiro (University of Twente), Tom Janssen Groesbeek (Radboud University), Gunes Acar (Radboud University), Andrea Continella (University of Twente)
  • Enhancing Performance of Local Differentially Private Models in Federated Networks
    Uday Bhaskar K (International Institute of Information Technology, Hyderabad), Varul Srivastava (International Institute of Information Technology, Hyderabad), Avyukta Manjunatha Vummintala (International Institute of Information Technology, Hyderabad), Naresh Manwani (International Institute of Information Technology, Hyderabad), Sujit Gujar (International Institute of Information Technology, Hyderabad), Sudhir Upadyaya (JPMC), Lokesh Thopegowda (JPMC), Suresh Shetty (JPMC), Ganesh Anantwar (JPMC)