Accepted papers for PETS 2024

Issue 1

Some of these papers are accepted conditionally on approval of a shepherd.

  • A Large-Scale Study of Cookie Banner Interaction Tools and their Impact on Users' Privacy
    Nurullah Demir (Institute for Internet Security & Karlsruhe Institute of Technology), Tobias Urban (Institute for Internet Security & secunet Security Networks AG), Christian Wressnegger (Karlsruhe Institute of Technology), and Norbert Pohlmann (Institute for Internet Security)
  • SoK: Data Privacy in Virtual Reality
    Gonzalo Munilla Garrido (TUM), Vivek Nair (UC Berkeley), and Dawn Song (UC Berkeley)
  • Interest-disclosing Mechanisms for Advertising are Privacy-Exposing (not Preserving)
    Yohan Beugin (University of Wisconsin-Madison) and Patrick McDaniel (University of Wisconsin-Madison)
  • "Those things are written by lawyers, and programmers are reading that." Mapping the Communication Gap Between Software Developers and Privacy Experts
    Stefan Albert Horstmann (Ruhr University Bochum), Samuel Domiks (Independent), Marco Gutfleisch (Ruhr University Bochum), Mindy Tran (Paderborn University), Yasemin Acar (Paderborn University & The George Washington University), Veelasha Moonsamy (Ruhr University Bochum), and Alena Naiakshina (Ruhr University Bochum)
  • Supporting Informed Choices about Browser Cookies: The Impact of Personalised Cookie Banners
    Tom Biselli (Technical University of Darmstadt, Science and Technology for Peace and Security (PEASEC)), Laura Utz (Technical University of Darmstadt, Science and Technology for Peace and Security (PEASEC)), and Christian Reuter (Technical University of Darmstadt, Science and Technology for Peace and Security (PEASEC))
  • Block Cookies, Not Websites: Analysing Mental Models and Usability of the Privacy-Preserving Browser Extension CookieBlock
    Lorin Schöni (ETH Zurich), Karel Kubicek (ETH Zurich), and Verena Zimmermann (ETH Zurich)
  • Mitigating Inference Risks with the NIST Privacy Framework
    Christopher B. Landis (Naval Postgraduate School) and Joshua A. Kroll (Naval Postgraduate School)
  • Why Privacy-Preserving Protocols Are Sometimes Not Enough: A Case Study of the Brisbane Toll Collection Infrastructure
    Amirhossein Adavoudi Jolfaei (University of Luxembourg), Andy Rupp (University of Luxembourg and KASTEL SRL), Stefan Schiffner (Berufliche Hochschule Hamburg (BHH)), and Thomas Engel (University of Luxembourg)
  • Generalizable Active Privacy Choice: Designing a Graphical User Interface for Global Privacy Control
    Sebastian Zimmeck (Wesleyan University), Eliza Kuller (Wesleyan University), Chunyue Ma (Wesleyan University), Bella Tassone (Wesleyan University), and Joe Champeau (Wesleyan University)
  • Opted Out, Yet Tracked: Are Regulations Enough to Protect Your Privacy?
    Zengrui Liu (Texas A&M University), Umar Iqbal (University of Washington), and Nitesh Saxena (Texas A&M University)
  • Privacy Preserving Feature Selection for Sparse Linear Regression
    Adi Akavia (University of Haifa), Ben Galili (Technion), Hayim Shaul (IBM Research), Mor Weiss (Bar Ilan University), and Zohar Yakhini (Reichman University and Technion)
  • Model-driven Privacy
    Srdan Krstic (ETH Zurich), Hoàng Bao Nguyen-Phuoc (ETH Zurich), and David Basin (ETH Zurich)
  • DP-ACT: Decentralized Privacy-Preserving Asymmetric Digital Contact Tracing
    Azra Abtahi Fahliani (Department of Electrical and Information Technology, Lund University, Lund), Mathias Payer (School of Computer and Communication Sciences, EPFL), and Amir Aminifar (Department of Electrical and Information Technology, Lund University, Lund)
  • CoStricTor: Collaborative HTTP Strict Transport Security in Tor Browser
    Killian Davitt (UCL), Dan Ristea (UCL), and Steven Murdoch (UCL)
  • DeVoS: Deniable Yet Verifiable Vote Updating
    Johannes Mueller (University of Luxembourg), Balázs Pejó (Budapest University of Technology and Economics), and Ivan Pryvalov (Brandenburgische Technische Universität Cottbus-Senftenberg)
  • Over Fences and Into Yards: Privacy Threats and Concerns of Commercial Satellites
    Rachel McAmis (University of Washington), Mattea Sim (Indiana University Bloomington), Mia Bennett (University of Washington), and Tadayoshi Kohno (University of Washington)
  • Constant-Round Private Decision Tree Evaluation for Secret Shared Data
    Nan Cheng (University of St.Gallen), Naman Gupta (IIT Delhi), Katerina Mitrokotsa (University of St.Gallen), Hiraku Morita (Aarhus University, University of Copenhagen), and Kazunari Tozawa (The University of Tokyo)
  • Data Isotopes for Data Provenance in DNNs
    Emily Wenger (University of Chicago), Xiuyu Li (UC Berkeley), Ben Zhao (University of Chicago), and Vitaly Shmatikov (Cornell Tech)
  • MAPLE: MArkov Process Leakage attacks on Encrypted Search
    Seny Kamara (MongoDB & Brown University), Abdelkarim Kati (Mohammed VI Polytechnic University), Tarik Moataz (MongoDB), Jamie DeMaria (Brown University), Andrew Park (Carnegie Mellon University), and Amos Treiber (Rohde & Schwarz Cybersecurity GmbH)
  • SocIoTy: Practical At-Home Cryptography from IoT Devices
    Tushar Jois (City College of New York), Gabrielle Beck (Johns Hopkins University), Sofia Belikovetsky (Johns Hopkins University), Joseph Carrigan (Johns Hopkins University), Alishah Chator (Boston University), Logan Kostick (Johns Hopkins University), Maximilian Zinkus (Johns Hopkins University), Gabriel Kaptchuk (University of Maryland), and Aviel D. Rubin (Johns Hopkins University)
  • Communication Breakdown: Modularizing Application Tunneling for Signaling Around Censorship
    Paul Vines (Two Six Technologies)
  • On the Quality of Privacy Policy Documents of Virtual Personal Assistant Applications
    Chuan Yan (University of Queensland), Fuman Xie (University of Queensland), Mark Huasong Meng (National University of Singapore), Yanjun Zhang (Deakin University), and Guangdong Bai (University of Queensland)
  • SEDMA: Self-Distillation with Model Aggregation for Membership Privacy
    Tsunato Nakai (Mitsubishi Electric), Ye Wang (Mitsubishi Electric Research Laboratories), Kota Yoshida (Ritsumeikan University), and Takeshi Fujino (Ritsumeikan University)
  • SoK: Metadata-Protecting Communication Systems
    Sajin Sasy (University of Waterloo) and Ian Goldberg (University of Waterloo)
  • A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses
    Caelin Gordon Kaplan (Inria, Université Côte d’Azur, SAP Labs France), Chuan Xu (Inria, Université Côte d’Azur), Othmane Marfoq (Inria, Université Côte d’Azur, Accenture Labs), Giovanni Neglia (Inria, Université Côte d’Azur), and Anderson Santana de Oliveira (SAP Labs France)
  • SWiSSSE: System-Wide Security for Searchable Symmetric Encryption
    Zichen Gui (ETH Zürich), Kenneth G. Paterson (ETH Zürich), Sikhar Patranabis (IBM Research India), and Bogdan Warinschi (University of Bristol/Dfinity)
  • PRIVIC: A privacy-preserving method for incremental collection of location data
    Sayan Biswas (INRIA, École polytechnique) and Catuscia Palamidessi (INRIA, École polytechnique)
  • User-controlled Privacy: Taint, Track, and Control
    François Hublet (ETH Zürich), David Basin (ETH Zürich), and Srđan Krstić (ETH Zürich)
  • SGXonerated: Finding (and Partially Fixing) Privacy Flaws in TEE-based Smart Contract Platforms Without Breaking the TEE
    Nerla Jean-Louis (University of Illinois Urbana Champaign), Yunqi Li (University of Illinois Urbana Champaign), Yan Ji (Cornell University), Harjasleen Malvai (University of Illinois Urbana Champaign), Thomas Yurek (University of Illinois Urbana Champaign), Sylvain Bellemare (IC3 (Cornell University)), and Andrew Miller (University of Illinois Urbana Champaign)
  • Tailoring Digital Privacy Education Interventions for Older Adults: A Comparative Study on Modality Preferences and Effectiveness
    Heba Aly (Clemson University), Yizhou Liu (Clemson University), Reza Ghaiumy Anaraky (New York University), Sushmita Khan (Clemson University), Moses Namara (Clemson University), Kaileigh Angela Byrne (Clemson University), and Bart Knijnenburg (Clemson University)
  • QUICKeR: Quicker Updates Involving Continuous Key Rotation
    Lawrence Lim (University of California, Santa Barbara), Wei-Yee Goh (University of California, Santa Barbara), Divyakant Agrawal (University of California, Santa Barbara), Amr El Abbadi (University of California, Santa Barbara), and Trinabh Gupta (University of California, Santa Barbara)
  • Efficiently Compiling Secure Computation Protocols From Passive to Active Security: Beyond Arithmetic Circuits
    Marina Blanton (University at Buffalo), Dennis Murphy (University at Buffalo), and Chen Yuan (Meta Inc.)
  • DeTorrent: An Adversarial Padding-only Traffic Analysis Defense
    James K Holland (University of Minnesota), Jason Carpenter (University of Minnesota), Se Eun Oh (Ewha Womans University), and Nick Hopper (University of Minnesota)
  • A False Sense of Privacy: Towards a Reliable Evaluation Methodology for the Anonymization of Biometric Data
    Simon Hanisch (Technical University Dresden), Julian Todt (Karlsruhe Institute of Technology), Jose Patino (Cerence), Nicholas Evans (EURECOM), and Thorsten Strufe (Karlsruhe Institute of Technology)
  • Cross-Contextual Examination of Older Adults' Privacy Concerns, Behaviors, and Vulnerabilities
    Yixin Zou (Max Planck Institute for Security and Privacy), Kaiwen Sun (University of Michigan), Tanisha Afnan (University of Michigan), Ruba Abu-Salma (King’s College London), Robin Brewer (University of Michigan), and Florian Schaub (University of Michigan)