Volume 2016
Issue 1
- Editor’s Introduction
Apu Kapadia (Indiana University Bloomington)
- Fingerprinting Mobile Devices Using Personalized Configurations
[PDF]
Andreas Kurtz (FriedrichAlexander-Universität Erlangen-Nürnberg (FAU)), Hugo Gascon (University of Göttingen), Tobias Becker (Friedrich-Alexander-Universität ErlangenNürnberg (FAU)), Konrad Rieck (University of Göttingen), Felix Freiling (Friedrich-Alexander-Universität ErlangenNürnberg (FAU))
- Are You Sure You Want to Contact Us? Quantifying the Leakage of PII via Website Contact Forms
[PDF]
Oleksii Starov (Department of Computer Science, Stony Brook University), Phillipa Gill (Department of Computer Science, Stony Brook University), Nick Nikiforakis (Department of Computer Science, Stony Brook University)
- Automobile Driver Fingerprinting
[PDF]
Miro Enev (University of Washington), Alex Takakuwa (University of Washington), Karl Koscher (University of California, San Diego), Tadayoshi Kohno (University of Washington)
Issue 2
- Editors’ Introduction
Claudia Diaz (KU Leuven), Apu Kapadia (Indiana University Bloomington)
- Isolating Graphical Failure-Inducing Input for Privacy Protection in Error Reporting Systems
[PDF]
João Matos (INESC-ID / Instituto Superior Técnico da Universidade de Lisboa), João Garcia (INESC-ID / Instituto Superior Técnico da Universidade de Lisboa), Nuno Coração (Vodafone)
- Scalable and Anonymous Group Communication with MTor
[PDF]
Dong Lin (University of Pennsylvania), Micah Sherr (Georgetown University), Boon Thau Loo (University of Pennsylvania)
- Your Choice MATor(s)
[PDF]
Michael Backes (CISPA, Saarland University & MPI-SWS), Sebastian Meiser (CISPA, Saarland University), Marcin Slowik (CISPA, Saarland University)
- Towards a Model on the Factors Influencing Social App Users’ Valuation of Interdependent Privacy
[PDF]
Yu Pu (College of Information Sciences and Technology, The Pennsylvania State University), Jens Grossklags (College of Information Sciences and Technology, The Pennsylvania State University)
- Efficient Server-Aided 2PC for Mobile Phones
[PDF]
Payman Mohassel (Yahoo Labs), Ostap Orobets (University of Calgary), Ben Riva (Google)
- Towards Mining Latent Client Identifiers from Network Traffic
[PDF]
Sakshi Jain ([UC Berkeley, LinkedIn]), Mobin Javed (UC Berkeley), Vern Paxson ([UC Berkeley, ICSI])
- Riffle
[PDF]
Albert Kwon (MIT), David Lazar (MIT), Srinivas Devadas (MIT), Bryan Ford (EPFL)
- (Do Not) Track Me Sometimes: Users’ Contextual Preferences for Web Tracking
[PDF]
William Melicher (Carnegie Mellon University; {billy, mahmoods, jstan, lbauer), Mahmood Sharif (Carnegie Mellon University; {billy, mahmoods, jstan, lbauer), Joshua Tan (Carnegie Mellon University; {billy, mahmoods, jstan, lbauer), Lujo Bauer (Carnegie Mellon University; {billy, mahmoods, jstan, lbauer), Mihai Christodorescu (Qualcomm), Pedro Giovanni Leon (Carnegie Mellon University; {billy, mahmoods, jstan, lbauer)
- XPIR : Private Information Retrieval for Everyone
[PDF]
Carlos Aguilar-Melchor (Univ de Toulouse, IRIT, France), Joris Barrier (CNRS, Univ de Toulouse, LAAS, France), Laurent Fousse (Univ de Grenoble, LJK, France), Marc-Olivier Killijian (CNRS, Univ de Toulouse, LAAS, France)
- Mailet: Instant Social Networking under Censorship
[PDF]
Shuai Li (University of Minnesota), Nicholas Hopper (University of Minnesota)
Issue 3
- Editors’ Introduction
Claudia Diaz (KU Leuven), Apu Kapadia (Indiana University Bloomington)
- Linking Health Records for Federated Query Processing
[PDF]
Rinku Dewri (University of Denver), Toan Ong (University of Colorado, Denver), Ramakrishna Thurimella (University of Denver)
- Beeswax: a platform for private web apps
[PDF]
Jean-Sébastien Légaré (University of British Columbia), Robert Sumi (University of British Columbia), William Aiello (University of British Columbia)
- Building a RAPPOR with the Unknown: Privacy-Preserving Learning of Associations and Data Dictionaries
[PDF]
Giulia Fanti (U.C. Berkeley), Vasyl Pihur (Google), Úlfar Erlingsson (Google)
- Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way
[PDF]
Tibor Jager (Ruhr-University Bochum), Andy Rupp (Karlsruhe Institute of Technology)
- Crowdsourcing for Context: Regarding Privacy in Beacon Encounters via Contextual Integrity
[PDF]
Emmanuel Bello-Ogunu (UNC Charlotte), Mohamed Shehab (UNC Charlotte)
- SoK: Privacy on Mobile Devices – It’s Complicated
[PDF]
Chad Spensky (University of California, Santa Barbara), Jeffrey Stewart (MIT Lincoln Laboratory), Arkady Yerukhimovich (MIT Lincoln Laboratory), Richard Shay (MIT Lincoln Laboratory), Ari Trachtenberg (Boston University), Rick Housley (Stevens Institute of Technology), Robert K. Cunningham (MIT Lincoln Laboratory)
- Students and Taxes: a Privacy-Preserving Study Using Secure Computation
[PDF]
Dan Bogdanov (Cybernetica, Estonia.), Liina Kamm (Cybernetica, Estonia.), Baldur Kubo (Cybernetica, Estonia.), Reimo Rebane (Cybernetica, Estonia.), Ville Sokk (Cybernetica, Estonia.), Riivo Talviste (Cybernetica, Estonia and University of Tartu, Estonia.)
- Don’t Interrupt Me While I Type: Inferring Text Entered Through Gesture Typing on Android Keyboards
[PDF]
Laurent Simon (University of Cambridge), Wenduan Xu (University of Cambridge), Ross Anderson (University of Cambridge)
- Blogs, Twitter Feeds, and Reddit Comments: Cross-domain Authorship Attribution
[PDF]
Rebekah Overdorf (Drexel University), Rachel Greenstadt (Drexel University)
- Flying Eyes and Hidden Controllers: A Qualitative Study of People’s Privacy Perceptions of Civilian Drones in The US
[PDF]
Yang Wang (SALT Lab, School of Information Studies, Syracuse University), Huichuan Xia (Syracuse University), Yaxing Yao (Syracuse University), Yun Huang (Syracuse University)
- Access Denied! Contrasting Data Access in the United States and Ireland
[PDF]
Samuel Grogan (Queen Mary, University of London), Aleecia M. McDonald (Non-resident Fellow, Stanford Center for Internet and Society)
- CovertCast:
[PDF]
Richard McPherson (The University of Texas at Austin), Amir Houmansadr (University of Massachusetts Amherst), Vitaly Shmatikov (Cornell Tech)
Issue 4
- Editors’ Introduction
Claudia Diaz (KU Leuven), Apu Kapadia (Indiana University Bloomington)
- Salmon: Robust Proxy Distribution for Censorship Circumvention
[PDF]
Frederick Douglas (University of Illinois Urbana-Champaign), Rorshach, Weiyang Pan (University of Illinois Urbana-Champaign), Matthew Caesar (University of Illinois Urbana-Champaign)
- On Realistically Attacking Tor with Website Fingerprinting
[PDF]
Tao Wang (Hong Kong University of Science and Technology), Ian Goldberg (University of Waterloo)
- SoK: Making Sense of Censorship Resistance Systems
[PDF]
Sheharbano Khattak (University of Cambridge), Tariq Elahi (KU Leuven), Laurent Simon (University of Cambridge), Colleen M. Swanson (University of California, Davis), Steven J. Murdoch (University College London), Ian Goldberg (University of Waterloo)
- Location Privacy with Randomness Consistency
[PDF]
Hao Wu (University of Illinois at Urbana-Champaign), Yih-Chun Hu (University of Illinois at Urbana-Champaign)
- A Framework for the Game-theoretic Analysis of Censorship Resistance
[PDF]
Tariq Elahi (KU Leuven), John A. Doucette (University of Waterloo), Hadi Hosseini (University of Waterloo), Steven J. Murdoch (University College London), Ian Goldberg (University of Waterloo)
- Privacy vs. Reward in Indoor Location-Based Services
[PDF]
Kassem Fawaz (University of Michigan), Kyu-Han Kim (Hewlett Packard Labs), Kang G. Shin (University of Michigan)
- The Curious Case of the PDF Converter that Likes Mozart: Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps
[PDF]
Hamza Harkous (EPFL), Rameez Rahman (EPFL), Bojan Karlas (EPFL), Karl Aberer (EPFL)
- Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation
[PDF]
Marina Blanton (University of Notre Dame), Fattaneh Bayatbabolghani (University of Notre Dame)
- On the Privacy Implications of Location Semantics
[PDF]
Berker Ağır (EPFL, Lausanne, Switzerland), Kévin Huguenin (LAAS-CNRS, Université de Toulouse, CNRS), Urs Hengartner (University of Waterloo, ON, Canada), Jean-Pierre Hubaux (EPFL, Lausanne, Switzerland)
- Lower-Cost -Private Information Retrieval
[PDF]
Raphael R. Toledo (University College London), George Danezis (University College London), Ian Goldberg (University of Waterloo)
- Polynomial Batch Codes for Efficient IT-PIR
[PDF]
Ryan Henry (Indiana University)
- Circuit-extension handshakes for Tor achieving forward secrecy in a quantum world
[PDF]
John M. Schanck (University of Waterloo and Security Innovation), William Whyte (Security Innovation), Zhenfei Zhang (Security Innovation)
- Tales from the Dark Side: Privacy Dark Strategies and Privacy Dark Patterns
[PDF]
Christoph Bösch (Institute of Distributed Systems, Ulm University), Benjamin Erb (Institute of Distributed Systems, Ulm University), Frank Kargl (Institute of Distributed Systems, Ulm University), Henning Kopp (Institute of Distributed Systems, Ulm University), Stefan Pfattheicher (Department of Social Psychology, Ulm University)
- Achieving Better Privacy for the 3GPP AKA Protocol
[PDF]
Pierre-Alain Fouque (Université de Rennes 1/ IRISA), Cristina Onete (INSA Rennes/IRISA), Benjamin Richard (Orange Labs)
- Data-plane Defenses against Routing Attacks on Tor
[PDF]
Henry Tan (Georgetown University), Micah Sherr (Georgetown University), Wenchao Zhou (Georgetown University)
- Anonymity in Peer-assisted CDNs: Inference Attacks and Mitigation
[PDF]
Yaoqi Jia (National University of Singapore), Guangdong Bai (National University of Singapore), Prateek Saxena (National University of Singapore), Zhenkai Liang (National University of Singapore)
- Privacy Challenges in the Quantified Self Movement – An EU Perspective
[PDF]
Dominik Leibenger (CISPA, Saarland University, Germany), Frederik Möllers (CISPA, Saarland University, Germany), Anna Petrlic (Independent Researcher), Ronald Petrlic (Commissioner for Data Protection BadenWürttemberg, Germany), Christoph Sorge (CISPA, Saarland University, Germany)
- Privately Evaluating Decision Trees and Random Forests
[PDF]
David J. Wu (Stanford University), Tony Feng (Stanford University), Michael Naehrig (Microsoft Research; {mnaehrig), Kristin Lauter (Microsoft Research; {mnaehrig)
- DeNASA: Destination-Naive AS-Awareness in Anonymous Communications
[PDF]
Armon Barton (UT Arlington), Matthew Wright (UT Arlington)
- Efficient Verifiable Range and Closest Point Queries in Zero-Knowledge
[PDF]
Esha Ghosh (Dept. of Computer Science, Brown University, Providence RI, USA), Olga Ohrimenko (Microsoft Research), Roberto Tamassia (Dept. of Computer Science, Brown University, Providence RI, USA)
- The Right to be Forgotten in the Media: A Data-Driven Study
[PDF]
Minhui Xue (East China Normal University (ECNU) and NYU Shanghai), Gabriel Magno (Federal University of Minas Gerais (UFMG)), Evandro Cunha (Federal University of Minas Gerais (UFMG) and Leiden University), Virgilio Almeida (Federal University of Minas Gerais (UFMG) and Harvard University), Keith W. Ross (New York University (NYU) and NYU Shanghai)
- On the (In)effectiveness of Mosaicing and Blurring as Tools for Document Redaction
[PDF]
Steven Hill (UC San Diego), Zhimin Zhou, Lawrence Saul, Hovav Shacham
- Individual versus Organizational Computer Security and Privacy Concerns in Journalism
[PDF]
Susan E. McGregor (Columbia Journalism School), Franziska Roesner (University of Washington), Kelly Caine (Clemson University)
- Listening to Whispers of Ripple: Linking Wallets and Deanonymizing Transactions in the Ripple Network
[PDF]
Pedro Moreno-Sanchez (Purdue University), Muhammad Bilal Zafar (MPI-SWS), Aniket Kate (Purdue University)
- Selfrando: Securing the Tor Browser against De-anonymization Exploits
[PDF]
Mauro Conti (Università degli Studi di Padova), Stephen Crane (Immunant, Inc.), Tommaso Frassetto (CASED/Technische Universität Darmstadt, Germany), Andrei Homescu (Immunant, Inc.), Georg Koppen (The Tor Project), Per Larsen (Immunant, Inc.), Christopher Liebchen (CASED/Technische Universität Darmstadt, Germany), Mike Perry (The Tor Project), Ahmad-Reza Sadeghi (CASED/Technische Universität Darmstadt, Germany)
- Near-Optimal Fingerprinting with Constraints
[PDF]
Gábor György Gulyás (INRIA), Gergely Acs (INRIA), Claude Castelluccia (INRIA)