Accepted papers for PETS 2025

Issue 1

  • Understanding Privacy Norms through Web Forms
    Hao Cui (University of California, Irvine), Rahmadi Trimananda (University of California, Irvine), and Athina Markopoulou (University of California, Irvine)
  • BehaVR: User Identification Based on VR Sensor Data
    Ismat Jarin (University of California, Irvine), Yu Duan (University of California, Irvine), Rahmadi Trimananda (University of California, Irvine), Hao Cui (University of California, Irvine), Salma Elmalaki (University of California, Irvine), and Athina Markopoulou (University of California, Irvine)
  • Topology-Based Reconstruction Prevention for Decentralised Learning
    Florine W. Dekker (Delft University of Technology), Zekeriya Erkin (Delft University of Technology), and Mauro Conti (Università di Padova)
  • How Unique is Whose Web Browser? The role of demographics in browser fingerprinting among US users
    Alex Berke (MIT Media Lab), Badih Ghazi (Google), Enrico Bacis (Google), Pritish Kamath (Google), Ravi Kumar (Google), Robin Lassonde (Google), Pasin Manurangsi (Google), and Umar Syed (Google)
  • Lightweight Two-Party Secure Sampling Protocol for Differential Privacy
    Masanobu Kii (NTT Social Information Laboratories), Atsunori Ichikawa (NTT Social Information Laboratories), and Takayuki Miura (NTT Social Information Laboratories)
  • SoK: Descriptive Statistics Under Local Differential Privacy
    René Raab (Machine Learning and Data Analytics Lab, Friedrich-Alexander-Universität Erlangen-Nürnberg), Pascal Berrang (University of Birmingham), Paul Gerhart (TU Wien), and Dominique Schröder (TU Wien)
  • User Privacy Perceptions Across the XR Spectrum: An Extended Reality Cross-Platform Comparative Analysis of A Virtual House Tour
    Chris Warin (University of Göttingen), Viktoriya Pak (University of Göttingen), and Delphine Reinhardt (University of Göttingen)
  • Privacy-preserving Multiple Sequence Alignment Scheme for Long Gene Sequence
    Yatong Jiang (Beihang University), Tao Shang (Beihang University), and Jianwe Liu (Beihang University)
  • Examining Caregiving Roles to Differentiate the Effects of Using a Mobile App for Community Oversight for Privacy and Security
    Mamtaj Akter (Vanderbilt University), Jess Kropczynski (University of Cincinnati), Heather Lipford (University of North Carolina, Charlotte), and Pamela Wisniewski (Vanderbilt University)
  • Mastic: Private Weighted Heavy-Hitters and Attribute-Based Metrics
    Dimitris Mouris (Nillion & University of Delaware), Christopher Patton (Cloudflare), Hannah Davis (Seagate), Pratik Sarkar (Supra Research), and Nektarios Georgios Tsoutsos (University of Delaware)
  • Real-world Deniability in Messaging
    Daniel Collins (EPFL and Purdue University), Simone Colombo (EPFL), and Loïs Huguenin-Dumittan (EPFL)
  • Practical Two-party Computational Differential Privacy with Active Security
    Fredrik Meisingseth (TU Graz), Fabian Schmid (TU Graz), and Christian Rechberger (TU Graz)
  • EpiOracle: Privacy-Preserving Cross-Facility EarlyWarning for Unknown Epidemics
    Shiyu Li (University of Electronic Science and Technology of China), Yuan Zhang (University of Electronic Science and Technology of China), Yaqing Song (University of Electronic Science and Technology of China), Fan Wu (Central South University), Feng Lyu (Central South University), Kan Yang (The University of Memphis), and Qiang Tang (The University of Sydney)
  • User-Centric Textual Descriptions of Privacy-Enhancing Technologies for Ad Tracking and Analytics
    Lu Xian (University of Michigan), Song Mi Lee-Kan (University of Michigan), Jane Im (University of Michigan), and Florian Schaub (University of Michigan)
  • WatchWitch: Interoperability, Privacy, and Autonomy for the Apple Watch
    Nils Rollshausen (TU Darmstadt), Alexander Heinrich (TU Darmstadt), Matthias Hollick (TU Darmstadt), and Jiska Classen (Hasso Plattner Institute)
  • SoK: Computational and Distributed Differential Privacy for MPC
    Fredrik Meisingseth (TU Graz) and Christian Rechberger (TU Graz)
  • Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy
    Cong Zuo (Beijing Institute of Technology), Shangqi Lai (Monash University/CSIRO Data61), Shi-Feng Sun (Shanghai Jiao Tong University), Xingliang Yuan (The University of Melbourne), Joseph K. Liu (Monash University), Jun Shao (Zhejiang Gongshang University/Zhejiang E-Commerce Key Lab), Huaxiong Wang (Nanyang Technological University), Liehuang Zhu (Beijing Institute of Technology), and Shujie Cui (Monash University)
  • Misalignments and Demographic Differences in Expected and Actual Privacy Settings on Facebook
    Byron Lowens (University of Michigan), Sean Scarnecchia (University of Michigan), Jane Im (University of Michigan), Tanisha Afnan (tafnan@umich.edu), Annie Chen (anniechn@umich.edu), Yixin Zou (Max Planck Institute for Security and Privacy), and Florian Schaub (University of Michigan)
  • SoK: (Un)usable Privacy: the Lack of Overlap between Privacy-Aware Sensing and Usable Privacy Research
    Yasha Iravantchi (University of Michigan), Pardis Emami-Naeini (Duke University), and Alanson Sample (University of Michigan)
  • Gig Work at What Cost?: Exploring Privacy Risks of Gig Work Platform Participation in the U.S.
    Amogh Pradeep (Northeastern University), Johanna Gunawan (Northeastern University), Alvaro Feal (Northeastern University), Woodrow Hartzog (Boston University), and David Choffnes (Northeastern University)
  • Janus: Fast Privacy-Preserving Data Provenance For TLS
    Jan Lauinger (Technical University of Munich), Jen Ernstberger (Technical University of Munich), Andreas Finkenzeller (Technical University of Munich), and Sebastian Steinhorst (Technical University of Munich)
  • Improving the Performance and Security of Tor’s Onion Services
    Arushi Arora (Purdue University) and Christina Garman (Purdue University)
  • Private Computation on Common Fuzzy Records
    Kyoohyung Han (Samsung SDS), Seongkwang Kim (Samsung SDS), and Yongha Son (Sungshin Women's University)
  • Communication-Efficient Differentially Private Federated Learning Using Second-Order Information
    Mounssif Krouka (University of Oulu), Antti Koskela (Nokia Bell Labs), and Tejas Kulkarni (Nokia Bell Labs)
  • A Comprehensive Study of Privacy Risks in Curriculum Learning
    Joann Qiongna Chen (University of California, Irvine), Xinlei He (The CISPA Helmholtz Center for Information Security), Zheng Li (The CISPA Helmholtz Center for Information Security), Yang Zhang (The CISPA Helmholtz Center for Information Security), and Zhou Li (University of California, Irvine)
  • PrePaMS: Privacy-Preserving Participant Management System for Studies with Rewards and Prerequisites
    Echo Meißner (Ulm University), Frank Kargl (Ulm University), Benjamin Erb (Ulm University), and Felix Engelmann (Lund University)
  • “It’s Not My Data Anymore”: Exploring Non-Users’ Privacy Perceptions of Medical Data Donation Apps
    Sarah Abdelwahab Gaballah (Ruhr University Bochum), Lamya Abdullah (Technical University of Darmstadt), Ephraim Zimmer (Technical University of Darmstadt), Sascha Fahl (CISPA Helmholtz Center for Information Security), Max Mühlhäuser (Technical University of Darmstadt), and Karola Marky (Ruhr University Bochum)
  • MixBuy: Contingent Payment in the Presence of Coin Mixers
    Diego Castejon-Molina (IMDEA Software Institute, Universidad Politécnica de Madrid), Dimitrios Vasilopoulos (IMDEA Software Institute), and Pedro Moreno-Sanchez (IMDEA Software Institute, VISA Research)
  • The Battery Insertion Attack: Is Periodic Pseudo-randomization Sufficient for Beacon Privacy?
    Liron David (Weizmann Institute of Science and Google Research), Moti Yung (Columbia University and Google Privacy, Security, and Safety Research), Avinatan Hassidim (Bar-Ilan University and Google Research), and Yossi Matias (Tel-Aviv University and Google Research)
  • Hardware-Accelerated Encrypted Execution of General-Purpose Applications
    Charles Gouert (University of Delaware), Vinu Joseph (NVIDIA), Steven Dalton (NVIDIA), Cedric Augonnet (NVIDIA), Michael Garland (NVIDIA), and Nektarios Georgios Tsoutsos (University of Delaware)
  • PrivacyGuard: Exploring Hidden Cross-App Privacy Leakage Threats In IoT Apps
    Zhaohui Wang (The University of Kansas), Bo Luo (The University of Kansas), and Fengjun Li (The University of Kansas)
  • Re-visiting Authorized Private Set Intersection: A New Privacy-Preserving Variant and Two Protocols
    Francesca Falzon (ETH Zürich) and Evangelia Anna Markatou (TU Delft)
  • The Impact of Default Mobile SDK Usage on Privacy and Data Protection
    Simon Koch (TU Braunschweig), Manuel Karl (TU Braunschweig), Robin Kirchner (TU Braunschweig), Malte Wessels (TU Braunschweig), Anne Paschke (TU Braunschweig), and Martin Johns (TU Braunschweig)
  • Noiseless Privacy-Preserving Decentralized Learning
    Sayan Biswas (EPFL), Mathieu Even (INRIA), Anne-Marie Kermarrec (EPFL), Laurent Massoulie (INRIA), Rafael Pires (EPFL), Rishi Sharma (EPFL), and Martijn de Vos (EPFL)
  • Towards Privacy-preserving and Fairness-aware Federated Learning Framework
    Adda Akram Bendoukha (Télécom SudParis, Institut Polytechnique de Paris), Didem Demirag (Université du Québec à Montréal (UQAM)), Nesrine Kaaniche (Samovar, Telecom-SudParis, Institut Polytechnique de Paris), Aymen Boudguiga (CEA List, Université Paris-Saclay), Renaud Sirdey (CEA List, Université Paris-Saclay), and Sébastien Gambs (Université du Québec à Montréal (UQAM))
  • RSA Blind Signatures with Public Metadata
    Ghous Amjad (Google), Kevin Yeo (Google and Columbia University), and Moti Yung (Google)
  • "What are they gonna do with my data?": Privacy Expectations, Concerns, and Behaviors in Virtual Reality
    Abhinaya S.B. (North Carolina State University), Abhishri Agrawal (UNC Chapel Hill), Yaxing Yao (Virginia Tech), Yixin Zou (Max Planck Institute for Security and Privacy), and Anupam Das (North Carolina State University)
  • Identifying Privacy Personas
    Olena Hrynenko (Idiap Research Institute, École Polytechnique Fédérale de Lausanne) and Andrea Cavallaro (Idiap Research Institute, École Polytechnique Fédérale de Lausanne)
  • Beyond the Request: Harnessing HTTP Response Headers for Cross-Browser Web Tracker Classification in an Imbalanced Setting
    Wolf Rieder (Technische Universität Berlin), Philip Raschke (Technische Universität Berlin), and Thomas Cory (Technische Universität Berlin)
  • Communication Efficient Secure and Private Multi-Party Deep Learning
    Sankha Das (Microsoft Research India), Sayak Ray Chowdhury (Microsoft Research India), Nishanth Chandran (Microsoft Research India), Divya Gupta (Microsoft Research India), Satya Lokam (Microsoft Research India), and Rahul Sharma (Microsoft Research India)
  • Revealing Hidden IoT Devices through Passive Detection, Fingerprinting, and Localization
    Wei Sun (UC San Diego), Hadi Givehchian (UC San Diego), and Dinesh Bharadia (UC San Diego)
  • DiDOTS: Knowledge Distillation from Large-Language-Models for Dementia Obfuscation in Transcribed Speech
    Dominika Woszczyk (Imperial College London) and Soteris Demetriou (Imperial College London)
  • Analyzing the Differentially Private Theil-Sen Estimator for Simple Linear Regression
    Jayshree Sarathy (Northeastern University) and Salil Vadhan (Harvard University)
  • High-Throughput Secure Multiparty Computation with an Honest Majority in Various Network Settings
    Christopher Harth-Kitzerow (Technical University of Munich (TUM), BMW Group), Ajith Suresh (Technology Innovation Institue (TII), Abu Dhabi), Yongqin Wang (University of Southern California (USC)), Hossein Yalame (Bosch GmbH, Germany), Georg Carle (Technical University of Munich (TUM)), and Murali Annavaram (University of Southern California (USC))