Volume 2018
Issue 1
- Editors’ Introduction
Rachel Greenstadt (Drexel University), Damon McCoy (New York University), Carmela Troncoso (IMDEA Software Institute)
- Efficient Dynamic Searchable Encryption with Forward Privacy
[PDF]
Mohammad Etemad (University of Virginia), Alptekin Küpçü (Koç University), Charalampos Papamanthou (University of Maryland, College Park), David Evans (University of Virginia)
- Improved Strongly Deniable Authenticated Key Exchanges for Secure Messaging
[PDF]
Nik Unger (School of Computer Science, University of Waterloo), Ian Goldberg (School of Computer Science, University of Waterloo)
- SafePub: A Truthful Data Anonymization Algorithm With Strong Privacy Guarantees
[PDF]
Raffael Bild (Technical University of Munich, Germany), Klaus A. Kuhn (Technical University of Munich, Germany), Fabian Prasser (Technical University of Munich, Germany)
- Every Move You Make: Exploring Practical Issues in Smartphone Motion Sensor Fingerprinting and Countermeasures
[PDF]
Anupam Das (Carnegie Mellon University), Nikita Borisov (University of Illinois at Urbana-Champaign), Edward Chou (Stanford University)
- I never signed up for this! Privacy implications of email tracking
[PDF]
Steven Englehardt (Princeton University), Jeffrey Han (Princeton University), Arvind Narayanan (Princeton University)
- Recognizing and Imitating Programmer Style: Adversaries in Program Authorship Attribution
[PDF]
Lucy Simko (Paul G. Allen School of Computer Science & Engineering, University of Washington), Luke Zettlemoyer (Paul G. Allen School of Computer Science & Engineering, University of Washington), Tadayoshi Kohno (Paul G. Allen School of Computer Science & Engineering, University of Washington)
- Guard Sets in Tor using AS Relationships
[PDF]
Mohsen Imani (The University of Texas at Arlington), Armon Barton (The University of Texas at Arlington), Matthew Wright (Rochester Institute of Technology)
Issue 2
- Editors’ Introduction
Rachel Greenstadt (Drexel University), Damon McCoy (New York University), Carmela Troncoso (IMDEA Software Institute)
- Privacy-preserving Wi-Fi Analytics
[PDF]
Mohammad Alaggan (Univ Lyon, Inria, INSA Lyon, CITI, Villeurbanne, France), Mathieu Cunche (Univ Lyon, INSA Lyon, Inria, CITI, Villeurbanne, France), Sébastien Gambs (Université du Québec à Montréal (UQAM), Canada)
- Dropping on the Edge: Flexibility and Traffic Confirmation in Onion Routing Protocols
[PDF]
Florentin Rochet (UCLouvain, ICTEAM, Crypto Group, B-1348 Louvain-la-Neuve, Belgium.), Olivier Pereira (UCLouvain, ICTEAM, Crypto Group, B-1348 Louvain-la-Neuve, Belgium.)
- Cracking ShadowCrypt: Exploring the Limitations of Secure I/O Systems in Internet Browsers
[PDF]
Michael Freyberger (Princeton University), Warren He (UC Berkeley), Devdatta Akhawe (Dropbox), Michelle L. Mazurek (University of Maryland), Prateek Mittal (Princeton University)
- Functional Credentials
[PDF]
Dominic Deuber (Friedrich-Alexander-Universität ErlangenNürnberg), Matteo Maffei (TU Wien), Giulio Malavolta (FriedrichAlexander-Universität Erlangen-Nürnberg), Max Rabkin, Dominique Schröder (Friedrich-Alexander-Universität Erlangen-Nürnberg), Mark Simkin (Aarhus University)
- Onion-AE: Foundations of Nested Encryption
[PDF]
Phillip Rogaway (Department of Computer Science, University of California, Davis.), Yusi Zhang (Department of Computer Science, University of California, Davis.)
- Möbius: Trustless Tumbling for Transaction Privacy
[PDF]
Sarah Meiklejohn (University College London), Rebekah Mercer (Aarhus University)
- Touch and You’re Trapp(ck)ed: Quantifying the Uniqueness of Touch Gestures for Tracking
[PDF]
Rahat Masood (CSIRO Data61 and University of New South Wales (UNSW), Sydney, Australia), Benjamin Zi Hao Zhao (CSIRO Data61, Sydney, Australia), Hassan Jameel Asghar (CSIRO Data61, Sydney, Australia), Mohamed Ali Kaafar (Macquarie University, Optus Macquarie University Cyber Security Hub, and CSIRO Data61, Sydney, Australia)
Issue 3
- Editors’ Introduction
Rachel Greenstadt (Drexel University), Damon McCoy (New York University), Carmela Troncoso (IMDEA Software Institute)
- Quantifying Privacy Loss of Human Mobility Graph Topology
[PDF]
Dionysis Manousakas (University of Cambridge), Cecilia Mascolo (University of Cambridge and the Alan Turing Institute), Alastair R. Beresford (University of Cambridge), Dennis Chan (University of Cambridge), Nikhil Sharma (University College London)
- Tempest: Temporal Dynamics in Anonymity Systems
[PDF]
Ryan Wails (U.S. Naval Research Laboratory), Yixin Sun (Princeton University), Aaron Johnson (U.S. Naval Research Laboratory), Mung Chiang (Princeton University), Prateek Mittal (Princeton University)
- Secure asymmetry and deployability for decoy routing systems
[PDF]
Cecylia Bocovich (Cheriton School of Computer Science, University of Waterloo), Ian Goldberg (Cheriton School of Computer Science, University of Waterloo)
- “Won’t Somebody Think of the Children?” Examining COPPA Compliance at Scale
[PDF]
Irwin Reyes (International Computer Science Institute), Primal Wijesekera (University of British Columbia), Joel Reardon (University of Calgary), Amit Elazari Bar On (University of California, Berkeley), Abbas Razaghpanah (Stony Brook University), Narseo Vallina-Rodriguez (IMDEA Networks and International Computer Science Institute), Serge Egelman (University of California, Berkeley and International Computer Science Institute)
- Toward Distribution Estimation under Local Differential Privacy with Small Samples
[PDF]
Takao Murakami (National Institute of Advanced Industrial Science and Technology (AIST)), Hideitsu Hino (University of Tsukuba / RIKEN Center for AIP), Jun Sakuma (University of Tsukuba / RIKEN Center for AIP)
- Undermining Privacy in the Aircraft Communications Addressing and Reporting System (ACARS)
[PDF]
Matthew Smith (Department of Computer Science, University of Oxford:), Daniel Moser (Department of Computer Science, ETH Zurich:), Martin Strohmeier (Department of Computer Science, University of Oxford:), Vincent Lenders (armasuisse:), Ivan Martinovic (Department of Computer Science, University of Oxford:)
- Privacy-preserving Machine Learning as a Service
[PDF]
Ehsan Hesamifard (Department of Computer Science and Engineering, University of North Texas, Denton, TX, USA), Hassan Takabi (Department of Computer Science and Engineering, University of North Texas, Denton, TX, USA), Mehdi Ghasemi (Department of Mathematics and Statistics, University of Saskatchewan, Saskatoon, Canada), Rebecca N. Wright (Department of Computer Science, Rutgers University, Piscataway, NJ, USA)
- An Empirical Analysis of Traceability in the Monero Blockchain
[PDF]
Malte Möser (Princeton University), Kyle Soska (Carnegie Mellon University), Ethan Heilman (Boston University), Kevin Lee (University of Illinois at Urbana-Champaign), Henry Heffan (Brookline High School), Shashvat Srivastava (Massachusetts Academy of Math and Science at WPI), Kyle Hogan (Massachusetts Institute of Technology), Jason Hennessey (Boston University), Andrew Miller (University of Illinois at Urbana-Champaign), Arvind Narayanan (Princeton University), Nicolas Christin (Carnegie Mellon University)
- Privacy Pass: Bypassing Internet Challenges Anonymously
[PDF]
Alex Davidson (Royal Holloway, University of London (work completed during an internship at Cloudflare)), Ian Goldberg (University of Waterloo), Nick Sullivan (Cloudflare), George Tankersley, Filippo Valsorda
- Consistent Synchronous Group Off-The-Record Messaging with SYM-GOTR
[PDF]
Michael Schliep (University of Minnesota), Eugene Vasserman (Kansas State University), Nicholas Hopper (University of Minnesota)
Issue 4
- Editors’ Introduction
Rachel Greenstadt (Drexel University), Damon McCoy (New York University), Carmela Troncoso (EPFL)
- Turtles, Locks, and Bathrooms: Understanding Mental Models of Privacy Through Illustration
[PDF]
Maggie Oates (Carnegie Mellon University (CMU)), Yama Ahmadullah (CMU), Abigail Marsh (CMU), Chelse Swoopes (CMU), Shikun Zhang (CMU), Rebecca Balebako (CMU), Lorrie Faith Cranor (CMU)
- Panoptispy: Characterizing Audio and Video Exfiltration from Android Applications
[PDF]
Elleen Pan (Northeastern University), Jingjing Ren (Northeastern University), Martina Lindorfer (UC Santa Barbara), Christo Wilson (Northeastern University), David Choffnes (Northeastern University)
- Exploiting TLS Client Authentication for Widespread User Tracking
[PDF]
Lucas Foppe (U.S. Naval Academy), Jeremy Martin (The MITRE Corporation, U.S. Naval Academy), Travis Mayberry (U.S. Naval Academy), Erik C. Rye (U.S. Naval Academy), Lamont Brown (U.S. Naval Academy)
- Differentially Private Oblivious RAM
[PDF]
Sameer Wagh (Princeton University), Paul Cuff (Renaissance Technonogies), Prateek Mittal (Princeton University)
- Diffusion of User Tracking Data in the Online Advertising Ecosystem
[PDF]
Muhammad Ahmad Bashir (Northeastern University), Christo Wilson (Northeastern University)
- Privacy-Preserving Search of Similar Patients in Genomic Data
[PDF]
Gilad Asharov (Cornell Tech, NY.), Shai Halevi (IBM Research, NY.), Yehuda Lindell (Bar-Ilan University, Israel.), Tal Rabin (IBM Research, NY.)
- NoMoAds: Effective and Efficient Cross-App Mobile Ad-Blocking
[PDF]
Anastasia Shuba (University of California, Irvine), Athina Markopoulou (University of California, Irvine), Zubair Shafiq (University of Iowa)
- Power to peep-all: Inference Attacks by Malicious Batteries on Mobile Devices
[PDF]
Pavel Lifshits (Technion), Roni Forte (Technion), Yedid Hoshen (Hebrew University), Matt Halpern (UT Austin), Manuel Philipose (UT Austin), Mohit Tiwari (UT Austin), Mark Silberstein (Technion)
- PIR-PSI: Scaling Private Contact Discovery
[PDF]
Daniel Demmler (TU Darmstadt), Peter Rindal (Oregon State University), Mike Rosulek (Oregon State University), Ni Trieu (Oregon State University)
- When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies
[PDF]
Steven Goldfeder (Princeton University), Harry Kalodner (Princeton University), Dillon Reisman, Arvind Narayanan (Princeton University)
- Feature Selection for Website Fingerprinting
[PDF]
Junhua Yan (UNC Chapel Hill), Jasleen Kaur (UNC Chapel Hill)