Volume 2015
Issue 1
- Editors’ Introduction
Apu Kapadia (Indiana University Bloomington), Steven J. Murdoch (University College London)
- 20,000 In League Under the Sea: Anonymous Communication, Trust, MLATs, and Undersea Cables
[PDF]
Aaron D. Jaggard (U.S. Naval Research Laboratory), Aaron Johnson (U.S. Naval Research Laboratory), Sarah Cortes (Northeastern University), Paul Syverson (U.S. Naval Research Laboratory), Joan Feigenbaum (Yale University)
- Know Thy Neighbor: Crypto Library Detection in Cloud
[PDF]
Gorka Irazoqui (Worcester Polytechnic Institute), Mehmet Sinan İncİ (Worcester Polytechnic Institute), Thomas Eisenbarth (Worcester Polytechnic Institute), Berk Sunar (Worcester Polytechnic Institute)
- Portrait of a Privacy Invasion
[PDF]
Yan Shoshitaishvili (UC Santa Barbara), Christopher Kruegel (UC Santa Barbara), Giovanni Vigna (UC Santa Barbara)
- Analyzing the Great Firewall of China Over Space and Time
[PDF]
Roya Ensafi (University of New Mexico), Philipp Winter (Karlstad University), Abdullah Mueen (University of New Mexico), Jedidiah R. Crandall (University of New Mexico)
- A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients
[PDF]
Vasile C. Perta (Sapienza University of Rome), Marco V. Barbera (Sapienza University of Rome), Gareth Tyson (Queen Mary University of London), Hamed Haddadi (Queen Mary University of London), Alessandro Mei (Sapienza University of Rome)
- Automated Experiments on Ad Privacy Settings
[PDF]
Amit Datta (Carnegie Mellon University), Michael Carl Tschantz (International Computer Science Institute), Anupam Datta (Carnegie Mellon University)
Issue 2
- Editors’ Introduction
Apu Kapadia (Indiana University Bloomington), Steven J. Murdoch (University College London)
- DP5: A Private Presence Service
[PDF]
Nikita Borisov (University of Illinois at Urbana-Champaign), George Danezis (University College London), Ian Goldberg (University of Waterloo)
- A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing
[PDF]
Ghada Arfaoui (Orange Labs, F-14066 Caen, INSA Centre Val de Loire, F-18020 Bourges, France), Jean-François Lalande (INSA Centre Val de Loire - Inria, F-18020 Bourges), Jacques Traoré (Orange Labs, F-14066 Caen, France), Nicolas Desmoulins (Orange Labs, F-14066 Caen, France), Pascal Berthomé (INSA Centre Val de Loire, F-18020 Bourges, France), Saïd Gharout (Orange Labs, F-92130 Issy-les-moulineaux, France)
- Blocking-resistant communication through domain fronting
[PDF]
David Fifield (University of California, Berkeley), Chang Lan (University of California, Berkeley), Rod Hynes (Psiphon Inc), Percy Wegmann (Brave New Software), Vern Paxson (University of California, Berkeley and the International Computer Science Institute)
- Guard Sets for Onion Routing
[PDF]
Jamie Hayes (UCL), George Danezis (UCL)
- Practical Forward-Secure Range and Sort Queries with Update-Oblivious Linked Lists
[PDF]
Erik-Oliver Blass (Airbus Group Innovations, 81663 Munich, Germany), Travis Mayberry (Center for Cyber Security Studies, US Naval Academy, Annapolis MD21402, USA), Guevara Noubir (College of Computer and Information Science, Northeastern University, Boston MA-02115, USA)
- De-anonymizing Genomic Databases Using Phenotypic Traits
[PDF]
Mathias Humbert (EPFL, Lausanne, Switzerland), Kévin Huguenin (LAAS-CNRS, Toulouse, France), Joachim Hugonot (EPFL, Lausanne, Switzerland), Erman Ayday (Bilkent University, Ankara, Turkey), Jean-Pierre Hubaux (EPFL, Lausanne, Switzerland)
- Recursive Trees for Practical ORAM
[PDF]
Tarik Moataz (Dept. of Computer Science, Colorado State University, Fort Collins, CO , and IMT, Telecom Bretagne, France), Erik-Oliver Blass (Airbus Group Innovations, 81663 Munich, Germany), Guevara Noubir (College of Computer and Information Science, Northeastern University, Boston, MA)
- Toward Mending Two Nation-Scale Brokered Identification Systems
[PDF]
Luís T. A. N. Brandão (Carnegie Mellon University & University of Lisbon), Nicolas Christin (Carnegie Mellon University), George Danezis (University College London), Anonymous (06ac01f8898481dd 2acdaacbe7cea1fd 5cdec8e65fe87db5 8605e865b1860f8e (SHA256 commitment))
- Constructing elastic distinguishability metrics for location privacy
[PDF]
Konstantinos Chatzikokolakis (CNRS and LIX, École Polytechnique, France), Catuscia Palamidessi (INRIA and LIX, École Polytechnique, France), Marco Stronati (LIX, École Polytechnique, France)
- Defending Tor from Network Adversaries: A Case Study of Network Path Prediction
[PDF]
Joshua Juen (University of Illinois at Urbana-Champaignl), Aaron Johnson (Naval Research Laboratory), Anupam Das (University of Illinois at Urbana-Champaign), Nikita Borisov (University of Illinois at Urbana-Champaign), Matthew Caesar (University of Illinois at Urbana-Champaign)
- Parallel Oblivious Array Access for Secure Multiparty Computation and Privacy-Preserving Minimum Spanning Trees
[PDF]
Peeter Laud (Cybernetica AS)
- Accountable Metadata-Hiding Escrow: A Group Signature Case Study
[PDF]
Markulf Kohlweiss (Microsoft Research), Ian Miers (The Johns Hopkins University)
- Optimal Rate Private Information Retrieval from Homomorphic Encryption
[PDF]
Aggelos Kiayias (National and Kapodistrian University of Athens, Greece), Nikos Leonardos (Université Paris Diderot – Paris 7, France), Helger Lipmaa (University of Tartu, Estonia), Kateryna Pavlyk (University of Tartu, Estonia), Qiang Tang (University of Connecticut, USA)
- Secure and scalable match: overcoming the universal circuit bottleneck using group programs
[PDF]
Rajesh Krishnan (Cosocket LLC), Ravi Sundaram (Northeastern University)
- Substring-Searchable Symmetric Encryption
[PDF]
Melissa Chase (Microsoft Research), Emily Shen (MIT Lincoln Laboratory)
- An Automated Approach for Complementing Ad Blockers’ Blacklists
[PDF]
David Gugelmann (ETH Zurich, Switzerland), Markus Happe (ETH Zurich, Switzerland), Bernhard Ager (ETH Zurich, Switzerland), Vincent Lenders (armasuisse, Switzerland)
- Privacy Games: Optimal User-Centric Data Obfuscation
[PDF]
Reza Shokri (University of Texas at Austin)