Volume 2019
Issue 1
- Editors’ Introduction
Kostas Chatzikokolakis (CNRS), Carmela Troncoso (EPFL)
- Olympus: Sensor Privacy through Utility Aware Obfuscation
[PDF]
Nisarg Raval (Duke University), Ashwin Machanavajjhala (Duke University), Jerry Pan (Duke University)
- RON-Gauss: Enhancing Utility in Non-Interactive Private Data Release
[PDF]
Thee Chanyaswad (Princeton University), Changchang Liu (Princeton University), Prateek Mittal (Princeton University)
- Privacy-Preserving Similar Patient Queries for Combined Biomedical Data
[PDF]
Ahmed Salem (CISPA, Saarland University), Pascal Berrang (CISPA, Saarland University), Mathias Humbert (Swiss Data Science Center, ETH Zurich and EPFL), Michael Backes (CISPA Helmholtz Center i.G.)
- Tithonus: A Bitcoin Based Censorship Resilient System
[PDF]
Ruben Recabarren (Florida Int’l University, Miami, FL 33199), Bogdan Carbunar (Florida Int’l University, Miami, FL 33199)
- Systematizing Genome Privacy Research: A Privacy-Enhancing Technologies Perspective
[PDF]
Alexandros Mittos (University College London), Bradley Malin (Vanderbilt University), Emiliano De Cristofaro (University College London)
- My Genome Belongs to Me: Controlling Third Party Computation on Genomic Data
[PDF]
Dominic Deuber (Friedrich-Alexander-Universität Erlangen-Nürnberg), Christoph Egger (Friedrich-Alexander-Universität Erlangen-Nürnberg), Katharina Fech (Friedrich-Alexander-Universität Erlangen-Nürnberg), Giulio Malavolta (Friedrich-Alexander-Universität Erlangen-Nürnberg), Dominique Schröder (Friedrich-Alexander-Universität Erlangen-Nürnberg), Sri Aravinda Krishnan Thyagarajan (Friedrich-Alexander-Universität Erlangen-Nürnberg), Florian Battke (CeGaT GmbH), Claudia Durand (CeGaT GmbH)
- LOGAN: Membership Inference Attacks Against Generative Models
[PDF]
Jamie Hayes (University College London), Luca Melis (University College London), George Danezis (University College London), Emiliano De Cristofaro (University College London)
- PD-DM: An efficient locality-preserving block device mapper with plausible deniability
[PDF]
Chen Chen (Stony Brook University), Anrin Chakraborti (Stony Brook University), Radu Sion (Stony Brook University)
- Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset
[PDF]
Thang Hoang (EECS, Oregon State University), Muslum Ozgur Ozmen (EECS, Oregon State University), Yeongjin Jang (EECS, Oregon State University), Attila A. Yavuz (CSE, University of South Florida)
- Choosing Epsilon for Privacy as a Service
[PDF]
Sara Krehbiel (University of Richmond)
- Lethe: Conceal Content Deletion from Persistent Observers
[PDF]
Mohsen Minaei (Purdue University), Mainack Mondal (University of Chicago), Patrick Loiseau (Univ. Grenoble Alpes, CNRS, Inria, Grenoble INP, LIG & MPI-SWS), Krishna Gummadi (MPI-SWS), Aniket Kate (Purdue University)
- Investigating sources of PII used in Facebook’s targeted advertising
[PDF]
Giridhari Venkatadri (Northeastern University), Elena Lucherini (Princeton University), Piotr Sapiezynski (Northeastern University), Alan Mislove (Northeastern University)
- Breach-Resistant Structured Encryption
[PDF]
Ghous Amjad (Brown University), Seny Kamara (Brown University), Tarik Moataz (Brown University)
- Private Evaluation of Decision Trees using Sublinear Cost
[PDF]
Anselme Tueno (SAP SE), Florian Kerschbaum (University of Waterloo), Stefan Katzenbeisser (TU Darmstadt)
Issue 2
- Editors’ Introduction
Kostas Chatzikokolakis (CNRS), Carmela Troncoso (EPFL)
- The (Co-)Location Sharing Game
[PDF]
Alexandra-Mihaela Olteanu (EPFL / UNIL–HEC Lausanne), Mathias Humbert (Swiss Data Science Center), Kévin Huguenin (UNIL–HEC Lausanne), Jean-Pierre Hubaux (EPFL)
- Cardinality Estimators do not Preserve Privacy
[PDF]
Damien Desfontaines (ETH Zurich / Google), Andreas Lochbihler (Digital Asset), David Basin (ETH Zurich)
- Together or Alone: The Price of Privacy in Collaborative Learning
[PDF]
Balázs Pejó (University of Luxembourg), Qiang Tang (Luxembourg Institute of Science and Technology), Gergely Biczók (CrySyS Lab, Dept. of Networked Systems and Services, Budapest Univ. of Technology and Economics)
- Mitigating Location Privacy Attacks on Mobile Devices using Dynamic App Sandboxing
[PDF]
Sashank Narain (College of Computer and Information Science, Northeastern University, Boston, MA, USA), Guevara Noubir (College of Computer and Information Science, Northeastern University, Boston, MA, USA)
- MorphIT: Morphing Packet Reports for Internet Transparency
[PDF]
Georgia Fragkouli (EPFL), Katerina Argyraki (EPFL), Bryan Ford (EPFL)
- On Privacy Notions in Anonymous Communication
[PDF]
Christiane Kuhn (TU Dresden), Martin Beck (TU Dresden), Stefan Schiffner (Université du Luxembourg), Eduard Jorswieck (TU Dresden), Thorsten Strufe (TU Dresden)
- 4 Years of EU Cookie Law: Results and Lessons Learned
[PDF]
Martino Trevisan (Politecnico di Torino), Stefano Traverso (Politecnico di Torino, Ermes Cyber Security SRL), Eleonora Bassi (Politecnico di Torino), Marco Mellia (Politecnico di Torino, Ermes Cyber Security SRL)
- Privacy Protection for Audio Sensing Against Multi-Microphone Adversaries
[PDF]
Chuhan Gao (University of Wisconsin-Madison), Kassem Fawaz (University of Wisconsin-Madison), Sanjib Sur (University of South Carolina), Suman Banerjee (University of Wisconsin-Madison)
- DPSelect: A Differential Privacy Based Guard Relay Selection Algorithm for Tor
[PDF]
Hans Hanley (Princeton University), Yixin Sun (Princeton University), Sameer Wagh (Princeton University), Prateek Mittal (Princeton University)
- SoK: Modular and Efficient Private Decision Tree Evaluation
[PDF]
Ágnes Kiss (TU Darmstadt), Masoud Naderpour (University of Helsinki), Jian Liu (University of California, Berkeley), N. Asokan (Aalto University), Thomas Schneider (TU Darmstadt)
- Skip, Skip, Skip, Accept!!!: A Study on the Usability of Smartphone Manufacturer Provided Default Features and User Privacy
[PDF]
Kopo M. Ramokapane (Bristol Cyber Security Group, University of Bristol), Anthony C. Mazeli (Security Lancaster Institute, Lancaster University), Awais Rashid (Bristol Cyber Security Group, University of Bristol)
- Oblivious DNS: Practical Privacy for DNS Queries
[PDF]
Paul Schmitt (Princeton University), Anne Edmundson (Princeton University), Allison Mankin (Salesforce), Nick Feamster (Princeton University)
- Privacy Loss Classes: The Central Limit Theorem in Differential Privacy
[PDF]
David M. Sommer (ETH Zurich), Sebastian Meiser (UCL), Esfandiar Mohammadi (ETH Zurich)
- Finding a Needle in a Haystack: The Traffic Analysis Version
[PDF]
Abdullah Qasem (Concordia University), Sami Zhioua (King Fahd University of Petroleum and Minerals), Karima Makhlouf (Imam Abdulrahman Bin Faisal University)
- AccessiLeaks: Investigating Privacy Leaks Exposed by the Android Accessibility Service
[PDF]
Mohammad Naseri (Saarland University), Nataniel P. Borges Jr. (CISPA Helmholtz Center i.G.), Andreas Zeller (CISPA Helmholtz Center i.G.), Romain Rouvoy (Univ. Lille / Inria / IUF)
Issue 3
- Editors’ Introduction
Kostas Chatzikokolakis (CNRS), Carmela Troncoso (EPFL)
- Cheaper Private Set Intersection via Differentially Private Leakage
[PDF]
Adam Groce (Reed College), Peter Rindal (Visa Research), Mike Rosulek (Oregon State University)
- SecureNN: 3-Party Secure Computation for Neural Network Training
[PDF]
Sameer Wagh (Princeton University), Divya Gupta (Microsoft Research, India), Nishanth Chandran (Microsoft Research, India)
- Tracking Anonymized Bluetooth Devices
[PDF]
Johannes K Becker (Boston University), David Li (Boston University), David Starobinski (Boston University)
- MAPS: Scaling Privacy Compliance Analysis to a Million Apps
[PDF]
Sebastian Zimmeck (Department of Mathematics and Computer Science, Wesleyan University), Peter Story (School of Computer Science, Carnegie Mellon University), Daniel Smullen (School of Computer Science, Carnegie Mellon University.), Abhilasha Ravichander (School of Computer Science, Carnegie Mellon University.), Ziqi Wang (School of Computer Science, Carnegie Mellon University.), Joel Reidenberg (School of Law, Fordham University.), N. Cameron Russell (School of Law, Fordham University.), Norman Sadeh (School of Computer Science, Carnegie Mellon University)
- Setup-Free Secure Search on Encrypted Data: Faster and Post-Processing Free
[PDF]
Adi Akavia (University of Haifa), Craig Gentry (IBM Research), Shai Halevi (IBM Research), Max Leibovich (University of Haifa)
- New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols
[PDF]
Ravishankar Borgaonkar (SINTEF Digital, Norway.), Lucca Hirschi (Inria & LORIA, France.), Shinjo Park (Technische Universität Berlin, Germany.), Altaf Shaik (Technische Universität, Berlin, Germany.)
- Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping Sleeping habits – Sense Sleep Monitor
[PDF]
Noah Apthorpe (Princeton University, Department of Computer Science), Danny Yuxing Huang (Princeton University, Department of Computer Science), Dillon Reisman (Princeton University, Department of Computer Science), Arvind Narayanan (Princeton University, Department of Computer Science), Nick Feamster (Princeton University, Department of Computer Science)
- Mesh: A Supply Chain Solution with Locally Private Blockchain Transactions
[PDF]
Riham AlTawy (University of Waterloo), Guang Gong (University of Waterlo)
- Encrypted Databases for Differential Privacy
[PDF]
Archita Agarwal (Brown University), Maurice Herlihy (Brown University), Seny Kamara (Brown University), Tarik Moataz (Brown University)
- p1-FP: Extraction, Classification, and Prediction of Website Fingerprints with Deep Learning
[PDF]
Se Eun Oh (University of Minnesota), Saikrishna Sunkam (University of Minnesota), Nicholas Hopper (University of Minnesota)
- Snapdoc: Authenticated snapshots with history privacy in peer-to-peer collaborative editing
[PDF]
Stephan A. Kollmann (University of Cambridge), Martin Kleppmann (University of Cambridge), Alastair R. Beresford (University of Cambridge)
- Investigating Statistical Privacy Frameworks from the Perspective of Hypothesis Testing
[PDF]
Changchang Liu (Princeton University), Xi He (University of Waterloo), Thee Chanyaswad (KBTG Machine Learning Team, Thailand), Shiqiang Wang (IBM Research US), Prateek Mittal (Princeton University)
- A QUIC Look at Web Tracking
[PDF]
Erik Sy (University of Hamburg), Christian Burkert (University of Hamburg), Hannes Federrath (University of Hamburg), Mathias Fischer (University of Hamburg)
- Investigating People’s Privacy Risk Perception
[PDF]
Nina Gerber (SECUSO, Karlsruhe Institute of Technology), Benjamin Reinheimer (SECUSO, Karlsruhe Institute of Technology), Melanie Volkamer (SECUSO, Karlsruhe Institute of Technology)
- ScrambleDB: Oblivious (Chameleon) Pseudonymization-as-a-Service
[PDF]
Anja Lehmann (IBM Research – Zurich)
- Improved Differentially Private Analysis of Variance
[PDF]
Marika Swanberg (Mathematics Department, Reed College), Ira Globus-Harris (Mathematics Department, Reed College), Iris Griffith (Mathematics Department, Reed College), Anna Ritz (Biology Department, Reed College), Adam Groce (Mathematics Department, Reed College), Andrew Bray (Mathematics Department, Reed College)
- ConsenSGX: Scaling Anonymous Communications Networks with Trusted Execution Environments
[PDF]
Sajin Sasy (Cheriton School of Computer Science, University of Waterloo), Ian Goldberg (Cheriton School of Computer Science, University of Waterloo)
- Circumventing Cryptographic Deniability with Remote Attestation
[PDF]
Lachlan J. Gunn (Aalto University), Ricardo Vieitez Parra (Aalto University), N. Asokan (Aalto University)
- StealthDB: a Scalable Encrypted Database with Full SQL Query Support
[PDF]
Dhinakaran Vinayagamurthy (IBM Research India), Alexey Gribov (Symbiont.io), Sergey Gorbunov (University of Waterloo and Algorand)
- Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments
[PDF]
Edwin Dauber (Drexel University), Aylin Caliskan (George Washington University), Richard Harang (Sophos Data Science Team), Gregory Shearer (ICF International), Michael Weisman (United States Army Research Laboratory), Frederica Nelson (United States Army Research Laboratory), Rachel Greenstadt (New York University)
- Cryptography for #MeToo
[PDF]
Benjamin Kuykendall (Princeton University), Hugo Krawczyk (Algorand Foundation), Tal Rabin (Algorand Foundation)
Issue 4
- Editors’ Introduction
Kostas Chatzikokolakis (CNRS), Carmela Troncoso (EPFL)
- Reducing Metadata Leakage from Encrypted Files and Communication with PURBs
[PDF]
Kirill Nikitin (EPFL), Ludovic Barman (EPFL), Wouter Lueks (EPFL), Matthew Underwood (unaffiliated), Jean-Pierre Hubaux (EPFL), Bryan Ford (EPFL)
- Handoff All Your Privacy – A Review of Apple’s Bluetooth Low Energy Continuity Protocol
[PDF]
Jeremy Martin (The MITRE Corporation), Douglas Alpuche (U.S. Naval Academy (USNA)), Kristina Bodeman (USNA), Lamont Brown (USNA), Ellis Fenske (USNA), Lucas Foppe (USNA), Travis Mayberry (USNA), Erik Rye (CMAND), Brandon Sipes (USNA), Sam Teplov (USNA)
- A Girl Has No Name: Automated Authorship Obfuscation using Mutant-X
[PDF]
Asad Mahmood (The University of Iowa), Faizan Ahmad (Lahore University of Management Sciences and University of Virginia), Zubair Shafiq (The University of Iowa), Padmini Srinivasan (The University of Iowa), Fareed Zaffar (Lahore University of Management Sciences)
- #DontTweetThis: Scoring Private Information in Social Networks
[PDF]
Qiaozhi Wang (The University of Kansas), Hao Xue (The University of Kansas), Fengjun Li (The University of Kansas), Dongwon Lee (The Pennsylvania State University), Bo Luo (The University of Kansas)
- TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing
[PDF]
Elena Pagnin (Department of Computer Science, Aarhus University), Gunnar Gunnarsson (Chalmers University of Technology), Pedram Talebi (Chalmers University of Technology), Claudio Orlandi (Department of Computer Science, DIGIT, Aarhus University), Andrei Sabelfeld (Chalmers University of Technology)
- A Bit More Than a Bit Is More Than a Bit Better
[PDF]
Syed Mahbub Hafiz (Indiana University), Ryan Henry (University of Calgary)
- Security-Efficiency Tradeoffs in Searchable Encryption
[PDF]
Raphael Bost (Direction Générale de l’Armement - Maîtrise de l’Information. The views and conclusions contained herein are those of the author and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the DGA or the French Government.), Pierre-Alain Fouque (Université de Rennes 1, France.)
- “Because... I was told... so much”: Linguistic Indicators of Mental Health Status on Twitter
[PDF]
Janith Weerasinghe (Affil), Kediel Morales (Affil), Rachel Greenstadt (Affil)
- No Place to Hide: Inadvertent Location Privacy Leaks on Twitter
[PDF]
Jonathan Rusert (University of Iowa), Osama Khalid (University of Iowa), Dat Hong (University of Iowa), Zubair Shafiq (University of Iowa), Padmini Srinivasan (University of Iowa)
- The privacy of the TLS 1.3 protocol
[PDF]
Ghada Arfaoui (Orange Labs, France), Xavier Bultel (IRISA, Rennes Univ, France), Pierre-Alain Fouque (IRISA, Rennes Univ, France), Adina Nedelcu (Orange Labs, IRISA, Rennes Univ, France), Cristina Onete (XLIM/CNRS 7252, France)
- “What if?” Predicting Individual Users’ Smart Home Privacy Preferences and Their Changes
[PDF]
Nata M. Barbosa (Syracuse University), Joon S. Park (Syracuse University), Yaxing Yao (Syracuse University), Yang Wang (Syracuse University)
- Monte Carlo and Reconstruction Membership Inference Attacks against Generative Models
[PDF]
Benjamin Hilprecht (TU Darmstadt, Darmstadt, Germany), Martin Härterich (SAP SE, Karlsruhe, Germany), Daniel Bernau (SAP SE, Karlsruhe, Germany)
- Privacy Attitudes of Smart Speaker Users
[PDF]
Nathan Malkin (University of California, Berkeley), Joe Deatrick (University of California, Berkeley), Allen Tong (University of California, Berkeley), Primal Wijesekera (University of California, Berkeley), Serge Egelman (University of California, Berkeley & International Computer Science Institute), David Wagner (University of California, Berkeley)
- Guard Placement Attacks on Path Selection Algorithms for Tor
[PDF]
Gerry Wan (Princeton University), Aaron Johnson (U.S. Naval Research Laboratory), Ryan Wails (U.S. Naval Research Laboratory), Sameer Wagh (Princeton University), Prateek Mittal (Princeton University)
- Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning
[PDF]
Sanjit Bhat (MIT PRIMES), David Lu (MIT PRIMES), Albert Kwon (MIT), Srinivas Devadas (MIT)
- Detecting TCP/IP Connections via IPID Hash Collisions
[PDF]
Geoffrey Alexander (University of New Mexico), Antonio M. Espinoza (University of New Mexico), Jedidiah R. Crandall (University of New Mexico)