Volume 2021
Issue 1
- Editors’ Introduction
Aaron Johnson (U.S. Naval Research Laboratory), Florian Kerschbaum (University of Waterloo)
- SGX-MR: Regulating Dataflows for Protecting Access Patterns of Data-Intensive SGX Applications
[PDF]
A K M Mubashwir Alam (Marquette University), Sagar Sharma (HP Inc.), Keke Chen (Marquette University)
- Controlled Functional Encryption Revisited: Multi-Authority Extensions and Efficient Schemes for Quadratic Functions
[PDF]
Miguel Ambrona (NTT Secure Platform Laboratories), Dario Fiore (IMDEA Software Institute), Claudio Soriente (NEC Laboratories Europe)
- Unveiling Web Fingerprinting in the Wild Via Code Mining and Machine Learning
[PDF]
Valentino Rizzo (Ermes Cyber Security S.R.L., Turin, Italy), Stefano Traverso (Ermes Cyber Security S.R.L., Turin, Italy), Marco Mellia (Politecnico di Torino & Ermes Cyber Security S.R.L., Turin, Italy)
- Differential Privacy at Risk: Bridging Randomness and Privacy Budget
[PDF]
Ashish Dandekar (DI ENS, ENS, CNRS, PSL University & Inria, Paris, France), Debabrota Basu (Dept. of Computer Sci. and Engg., Chalmers University of Technology, Göteborg, Sweden), Stéphane Bressan (National University of Singapore, Singapore)
- Arezoo Rajabi*, Rakesh B. Bobba*, Mike Rosulek, Charles V. Wright, and Wu-chi Feng On the (Im)Practicality of Adversarial Perturbation for Image Privacy
[PDF]
Arezoo Rajabi (Oregon State University), Rakesh B. Bobba (Oregon State University), Mike Rosulek (Oregon State University), Charles V. Wright (Portland State University), Wu-chi Feng (Portland State University)
- SoK: Privacy-Preserving Reputation Systems
[PDF]
Stan Gurtler (University of Waterloo), Ian Goldberg (University of Waterloo)
- Scaling up Differentially Private Deep Learning with Fast Per-Example Gradient Clipping
[PDF] [Artifact]
Jaewoo Lee (University of Georgia), Daniel Kifer (Penn State University)
- Real-time Analysis of Privacy-(un)aware IoT Applications
[PDF]
Leonardo Babun (Florida International University), Z. Berkay Celik (Purdue University), Patrick McDaniel (Pennsylvania State University), A. Selcuk Uluagac (Florida International University)
- Secure training of decision trees with continuous attributes
[PDF]
Mark Abspoel (CWI), Daniel Escudero (Aarhus University), Nikolaj Volgushev (Pleo Technologies ApS)
- Falcon: Honest-Majority Maliciously Secure Framework for Private Deep Learning
[PDF] [Artifact]
Sameer Wagh (Princeton University & UC Berkeley), Shruti Tople (Microsoft Research), Fabrice Benhamouda (Algorand Foundation), Eyal Kushilevitz (Technion), Prateek Mittal (Princeton University), Tal Rabin (Algorand Foundation)
- The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services
[PDF]
Yuantian Miao (Swinburne University of Technology, Australia), Minhui Xue (The University of Adelaide, Australia), Chao Chen (James Cook University, Australia.), Lei Pan (Deakin University, Australia), Jun Zhang (Swinburne University of Technology, Australia), Benjamin Zi Hao Zhao (The University of New South Wales and CSIRO-Data61, Australia), Dali Kaafar (Macquarie University and CSIRO-Data61, Australia), Yang Xiang (Swinburne University of Technology, Australia)
- SoK: Managing Longitudinal Privacy of Publicly Shared Personal Online Data
[PDF]
Theodor Schnitzler† (RuhrUniversität Bochum, Bochum, Germany), Shujaat Mirza† (Courant Institute of Mathematical Sciences, New York University, New York City, NY, USA), Markus Dürmuth (Ruhr-Universität Bochum, Bochum, Germany), Christina Pöpper (New York University Abu Dhabi, Abu Dhabi, UAE)
Issue 2
- Editors’ Introduction
Aaron Johnson (U.S. Naval Research Laboratory), Florian Kerschbaum (University of Waterloo)
- Privacy-Preserving Multiple Tensor Factorization for Synthesizing Large-Scale Location Traces with Cluster-Specific Features
[PDF] [Artifact]
Takao Murakami (AIST), Koki Hamada (NTT/RIKEN), Yusuke Kawamoto (AIST), Takuma Hatano (NSSOL)
- “Warn Them” or “Just Block Them”?: Investigating Privacy Concerns Among Older and Working Age Adults
[PDF]
Hirak Ray (University of Maryland, Baltimore County), Flynn Wolf (University of Maryland, Baltimore County), Ravi Kuber (University of Maryland, Baltimore County), Adam J. Aviv (The George Washington University)
- Website Fingerprinting in the Age of QUIC
[PDF] [Artifact]
Jean-Pierre Smith (ETH Zurich), Prateek Mittal (Princeton University), Adrian Perrig (ETH Zurich)
- EL PASSO: Efficient and Lightweight Privacy-preserving Single Sign On
[PDF] [Artifact]
Zhiyi Zhang (UCLA, CA, USA.), Michał Król (City, University of London, United Kingdom.), Alberto Sonnino (Facebook Calibra and University College London, United Kingdom.), Lixia Zhang (UCLA, CA, USA.), Etienne Rivière (ICTEAM, UCLouvain, Belgium.)
- Automated Extraction and Presentation of Data Practices in Privacy Policies
[PDF] [Artifact]
Duc Bui (University of Michigan), Kang G. Shin (University of Michigan), Jong-Min Choi (Samsung Research), Junbum Shin (Samsung Research)
- Efficient homomorphic evaluation of k-NN classifiers
[PDF]
Martin Zuber (CEA, LIST), Renaud Sirdey (CEA, LIST)
- Defending Against Microphone-Based Attacks with Personalized Noise
[PDF]
Yuchen Liu (Indiana University Bloomington), Ziyu Xiang (Stanford University (This work was conducted while at Indiana University Bloomington)), Eun Ji Seong (Indiana University Bloomington), Apu Kapadia (Indiana University Bloomington), Donald S. Williamson (Indiana University Bloomington)
- Holes in the Geofence: Privacy Vulnerabilities in “Smart” DNS Services
[PDF]
Rahel A. Fainchtein (Georgetown University), Adam J. Aviv (The George Washington University), Micah Sherr (Georgetown University), Stephen Ribaudo (Georgetown University), Armaan Khullar (Georgetown University)
- Too Close for Comfort: Morasses of (Anti-) Censorship in the Era of CDNs
[PDF]
Devashish Gosain (IIIT Delhi, India), Mayank Mohindra (IIIT Delhi, India), Sambuddho Chakravarty (IIIT Delhi, India)
- Privacy-Preserving & Incrementally-Deployable Support for Certificate Transparency in Tor
[PDF] [Artifact]
Rasmus Dahlberg (Karlstad University), Tobias Pulls (Karlstad University), Tom Ritter, Paul Syverson (U.S. Naval Research Laboratory)
- DyPS: Dynamic, Private and Secure GWAS
[PDF]
Túlio Pascoal (SnT, University of Luxembourg.), Jérémie Decouchant (FSTM, University of Luxembourg.), Antoine Boutet (University of Lyon, INSA Lyon, Inria, CITI.), Paulo Esteves-Verissimo (KAUST - Resilient Computing and Cybersecurity Center (RC3). Work partly performed while this author was with the University of Luxembourg.)
- Validity and Reliability of the Scale Internet Users’ Information Privacy Concerns (IUIPC)
[PDF]
Thomas Groß (Newcastle University)
- A Calculus of Tracking: Theory and Practice
[PDF] [Artifact]
Giorgio Di Tizio (University of Trento), Fabio Massacci (University of Trento, Vrije Universiteit Amsterdam)
- “Did you know this camera tracks your mood?”: Understanding Privacy Expectations and Preferences in the Age of Video Analytics
[PDF]
Shikun Zhang (Carnegie Mellon University), Yuanyuan Feng (Carnegie Mellon University), Lujo Bauer (Carnegie Mellon University), Lorrie Faith Cranor (Carnegie Mellon University), Anupam Das (North Carolina State University), Norman Sadeh (Carnegie Mellon University)
- GANDaLF: GAN for Data-Limited Fingerprinting
[PDF] [Artifact]
Se Eun Oh (University of Minnesota), Nate Mathews (Rochester Institute of Technology), Mohammad Saidur Rahman (Rochester Institute of Technology), Matthew Wright (Rochester Institute of Technology), Nicholas Hopper (University of Minnesota)
- Scalable Privacy-Preserving Distributed Learning
[PDF]
David Froelicher (Laboratory for Data Security (LDS), EPFL), Juan R. Troncoso-Pastoriza (Laboratory for Data Security (LDS), EPFL), Apostolos Pyrgelis (Laboratory for Data Security (LDS), EPFL), Sinem Sav (Laboratory for Data Security (LDS), EPFL), Joao Sa Sousa (Laboratory for Data Security (LDS), EPFL), Jean-Philippe Bossuat (Laboratory for Data Security (LDS), EPFL), Jean-Pierre Hubaux (Laboratory for Data Security (LDS), EPFL)
- Revisiting Membership Inference Under Realistic Assumptions
[PDF]
Bargav Jayaraman (University of Virginia, USA), Lingxiao Wang (University of California Los Angeles, USA), Katherine Knipmeyer (University of Virginia, USA), Quanquan Gu (University of California Los Angeles, USA), David Evans (University of Virginia, USA)
- Face-Off: Adversarial Face Obfuscation
[PDF] [Artifact]
Varun Chandrasekaran (University of Wisconsin–Madison), Chuhan Gao (Microsoft, work done while at University of Wisconsin–Madison), Brian Tang (University of Wisconsin–Madison), Kassem Fawaz (University of Wisconsin–Madison), Somesh Jha (University of Wisconsin–Madison), Suman Banerjee (University of Wisconsin–Madison)
- Déjà vu: Abusing Browser Cache Headers to Identify and Track Online Users
[PDF] [Artifact]
Vikas Mishra (Inria, Univ. Lille), Pierre Laperdrix (Univ. Lille, CNRS, Inria), Walter Rudametkin (Univ. Lille, Inria), Romain Rouvoy (Univ. Lille, Inria, IUF)
Issue 3
- Editors’ Introduction
Aaron Johnson (U.S. Naval Research Laboratory), Florian Kerschbaum (University of Waterloo)
- Exploring mental models of the right to informational self-determination of office workers in Germany
[PDF]
Jan Tolsdorf (Bonn-Rhein-Sieg University of Applied Sciences), Florian Dehling (Bonn-Rhein-Sieg University of Applied Sciences), Delphine Reinhardt (University of Göttingen), Luigi Lo Iacono (Bonn-Rhein-Sieg University of Applied Sciences)
- Genome Reconstruction Attacks Against Genomic Data-Sharing Beacons
[PDF]
Kerem Ayoz (Bilkent University), Erman Ayday (Case Western Reverse University), A. Ercument Cicek (Bilkent University, Carnegie Mellon University)
- The Motivated Can Encrypt (Even with PGP)
[PDF]
Glencora Borradaile (School of Electrical Engineering and Computer Science Oregon State University), Kelsy Kretschmer (School of Public Policy Oregon State University), Michele Gretes (School of Electrical Engineering and Computer Science Oregon State University), Alexandria LeClerc (School of Electrical Engineering and Computer Science Oregon State University)
- Defining Privacy: How Users Interpret Technical Terms in Privacy Policies
[PDF]
Jenny Tang (Wellesley College), Hannah Shoemaker (Pomona College), Ada Lerner (Wellesley College), Eleanor Birrell (Pomona College)
- Unlinkable Updatable Hiding Databases and Privacy-Preserving Loyalty Programs
[PDF] [Artifact]
Aditya Damodaran (SnT, University of Luxembourg, Esch-sur-Alzette, Luxembourg.), Alfredo Rial (SnT, University of Luxembourg, Esch-sur-Alzette, Luxembourg.)
- Growing synthetic data through differentially-private vine copulas
[PDF] [Artifact]
Sébastien Gambs (UQAM), Frédéric Ladouceur (Ericsson Montréal), Antoine Laurent (UQAM), Alexandre Roy-Gaumond (UQAM)
- privGAN: Protecting GANs from membership inference attacks at low cost to utility
[PDF]
Sumit Mukherjee (AI for Good Research Lab, Microsoft, USA.), Yixi Xu (AI for Good Research Lab, Microsoft, USA.), Anusua Trivedi (AI for Good Research Lab, Microsoft, USA.), Nabajyoti Patowary (Microsoft, USA.), Juan L. Ferres (AI for Good Research Lab, Microsoft, USA.)
- Three Years Later: A Study of MAC Address Randomization In Mobile Devices And When It Succeeds
[PDF]
Ellis Fenske (USNA), Dane Brown (USNA), Jeremy Martin (MITRE), Travis Mayberry (USNA), Peter Ryan (MITRE), Erik Rye (CMAND)
- SoK: Privacy-Preserving Collaborative Tree-based Model Learning
[PDF]
Sylvain Chatel (Laboratory for Data Security – EPFL), Apostolos Pyrgelis (Laboratory for Data Security – EPFL), Juan Ramón Troncoso-Pastoriza (Laboratory for Data Security – EPFL), Jean-Pierre Hubaux (Laboratory for Data Security – EPFL)
- FoggySight: A Scheme for Facial Lookup Privacy
[PDF]
Ivan Evtimov (Paul G. Allen School of Computer Science & Engineering, University of Washington), Pascal Sturmfels (Paul G. Allen School of Computer Science & Engineering, University of Washington), Tadayoshi Kohno (Paul G. Allen School of Computer Science & Engineering, University of Washington)
- Who Can Find My Devices? Security and Privacy of Apple’s Crowd-Sourced Bluetooth Location Tracking System
[PDF] [Artifact]
Alexander Heinrich (Secure Mobile Networking Lab, Technical University of Darmstadt, Germany), Milan Stute (Secure Mobile Networking Lab, Technical University of Darmstadt, Germany), Tim Kornhuber (Secure Mobile Networking Lab, Technical University of Darmstadt, Germany), Matthias Hollick (Secure Mobile Networking Lab, Technical University of Darmstadt, Germany)
- Faster homomorphic comparison operations for BGV and BFV
[PDF]
Ilia Iliashenko (imec-COSIC, KU Leuven), Vincent Zucca (DALI, Université de Perpignan Via Domitia, France)
- Foundations of Ring Sampling
[PDF]
Viktoria Ronge (Friedrich-Alexander-Universität Erlangen-Nürnberg), Christoph Egger (Friedrich-Alexander-Universität Erlangen-Nürnberg), Russell W. F. Lai (Friedrich-Alexander-Universität Erlangen-Nürnberg), Dominique Schröder (Friedrich-Alexander-Universität Erlangen-Nürnberg), Hoover H. F. Yin (The Chinese University of Hong Kong 1 https://coinmarketcap.com/currencies/monero/ 28 Nov. 2020)
- Fast Privacy-Preserving Punch Cards
[PDF] [Artifact]
Saba Eskandarian (Stanford University)
- Awareness, Adoption, and Misconceptions of Web Privacy Tools
[PDF]
Peter Story (School of Computer Science, Carnegie Mellon University), Daniel Smullen (School of Computer Science, Carnegie Mellon University), Yaxing Yao (Department of Information Systems, University of Maryland, Baltimore County. Previously a postdoctoral associate at Carnegie Mellon University’s School of Computer Science.), Alessandro Acquisti (Heinz College of Information Systems and Public Policy, Carnegie Mellon University), Lorrie Faith Cranor (School of Computer Science, Carnegie Mellon University), Norman Sadeh (School of Computer Science, Carnegie Mellon University), Florian Schaub (School of Information, University of Michigan)
- The Role of Privacy in Digitalization – Analyzing Perspectives of German Farmers
[PDF]
Sebastian Linsner (Science and Technology for Peace and Security (PEASEC) Technical University of Darmstadt), Franz Kuntke (Science and Technology for Peace and Security (PEASEC) Technical University of Darmstadt), Enno Steinbrink (Science and Technology for Peace and Security (PEASEC) Technical University of Darmstadt), Jonas Franken (Science and Technology for Peace and Security (PEASEC) Technical University of Darmstadt), Christian Reuter (Science and Technology for Peace and Security (PEASEC) Technical University of Darmstadt)
- Data Portability between Online Services: An Empirical Analysis on the Effectiveness of GDPR Art. 20
[PDF]
Emmanuel Syrmoudis (Technical University of Munich), Stefan Mager (Ludwig-Maximilians-University of Munich), Sophie Kuebler-Wachendorff (Ludwig-MaximiliansUniversity of Munich), Paul Pizzinini (Ludwig-Maximilians-University of Munich), Jens Grossklags (Technical University of Munich), Johann Kranz (Ludwig-Maximilians-University of Munich)
- Digital Inequality Through the Lens of Self-Disclosure
[PDF]
Jooyoung Lee (Pennsylvania State University), Sarah Rajtmajer (Pennsylvania State University), Eesha Srivatsavaya (Pennsylvania State University), Shomir Wilson (Pennsylvania State University)
- The CNAME of the Game: Large-scale Analysis of DNS-based Tracking Evasion
[PDF]
Yana Dimova (imec-DistriNet, KU Leuven), Gunes Acar (imec-COSIC, KU Leuven), Lukasz Olejnik (European Data Protection Supervisor, independent researcher), Wouter Joosen (imec-DistriNet), Tom Van Goethem (imec-DistriNet)
- DNA Sequencing Flow Cells and the Security of the Molecular-Digital Interface
[PDF]
Peter Ney (University of Washington), Lee Organick (University of Washington), Jeff Nivala (University of Washington), Luis Ceze (University of Washington), Tadayoshi Kohno (University of Washington)
- A First Look at Private Communications in Video Games using Visual Features
[PDF]
Abdul Wajid (National University of Sciences & Technology (NUST), Pakistan.), Nasir Kamal (NUST), Muhammad Sharjeel (NUST), Raaez Muhammad Sheikh (NUST), Huzaifah Bin Wasim (NUST), Muhammad Hashir Ali (NUST), Wajahat Hussain (NUST), Syed Taha Ali (NUST), Latif Anjum (NUST)
- ML-CB: Machine Learning Canvas Block
[PDF] [Artifact]
Nathan Reitinger (University of Maryland), Michelle L. Mazurek (University of Maryland)
Issue 4
- Editors’ Introduction
Aaron Johnson (U.S. Naval Research Laboratory), Florian Kerschbaum (University of Waterloo)
- ZKSENSE: A Friction-less Privacy-Preserving Human Attestation Mechanism for Mobile Devices
[PDF]
Iñigo Querejeta-Azurmendi (Universidad Carlos III Madrid / ITFI, CSIC. Part of the work performed while working at Brave Software.), Panagiotis Papadopoulos (Telefónica Research), Matteo Varvello (Bell Labs), Antonio Nappa (University of California, Berkeley), Jiexin Zhang (University of Cambridge), Benjamin Livshits (Brave Software/Imperial College)
- You May Also Like... Privacy: Recommendation Systems Meet PIR
[PDF]
Adithya Vadapalli (Indiana University), Fattaneh Bayatbabolghani (University of California, Berkeley), Ryan Henry (University of Calgary)
- “I would have to evaluate their objections”: Privacy tensions between smart home device owners and incidental users
[PDF]
Camille Cobb (Carnegie Mellon University), Sruti Bhagavatula (Carnegie Mellon University), Kalil Anderson Garrett (Carnegie Mellon University), Alison Hoffman (Carnegie Mellon University), Varun Rao (Carnegie Mellon University), Lujo Bauer (Carnegie Mellon University)
- HashWires: Hyperefficient Credential-Based Range Proofs
[PDF] [Artifact]
Konstantinos Chalkias (Novi / Facebook), Shir Cohen (Novi / Facebook / Technion), Kevin Lewi (Novi / Facebook), Fredric Moezinia (Novi / Facebook), Yolan Romailler (Novi / Facebook / Kudelski Security)
- Less is More: A privacy-respecting Android malware classifier using federated learning
[PDF]
Rafa Gálvez (imec-COSIC KU Leuven), Veelasha Moonsamy (Ruhr University Bochum), Claudia Diaz (imec-COSIC KU Leuven)
- Private Stream Aggregation with Labels in the Standard Model†
[PDF] [Artifact]
Johannes Ernst (University of St. Gallen (most of the work done while at KIT, Karlsruhe)), Alexander Koch (Competence Center for Applied Security Technology (KASTEL), Karlsruhe Institute of Technology † An extended abstract of this work appeared in [19])
- SoK: Privacy-Preserving Computation Techniques for Deep Learning
[PDF]
José Cabrero-Holgueras (CERN/Universidad Carlos III de Madrid), Sergio Pastrana (Universidad Carlos III de Madrid)
- DPlis: Boosting Utility of Differentially Private Deep Learning via Randomized Smoothing
[PDF]
Wenxiao Wang (Tsinghua University.), Tianhao Wang (Harvard University.), Lun Wang (University of California, Berkeley.), Nanqing Luo (Huazhong University of Science and Technology.), Pan Zhou (Huazhong University of Science and Technology.), Dawn Song (University of California, Berkeley.), Ruoxi Jia (Virginia Tech.)
- LogPicker: Strengthening Certificate Transparency Against Covert Adversaries
[PDF] [Artifact]
Alexandra Dirksen (TU Braunschweig), David Klein (TU Braunschweig), Robert Michael (TU Braunschweig), Tilman Stehr, Konrad Rieck (TU Braunschweig), Martin Johns (TU Braunschweig)
- “We, three brothers have always known everything of each other”: A Cross-cultural Study of Sharing Digital Devices and Online Accounts
[PDF]
Mahdi Nasrullah Al-Ameen (Utah State University), Huzeyfe Kocabas (Utah State University), Swapnil Nandy (Jadavpur University), Tanjina Tamanna (University of Dhaka)
- SoK: Efficient Privacy-preserving Clustering
[PDF] [Artifact]
Aditya Hegde (IIIT-Bangalore), Helen Möllering (Technical University of Darmstadt), Thomas Schneider (Technical University of Darmstadt), Hossein Yalame (Technical University of Darmstadt)
- Privacy Preference Signals: Past, Present and Future
[PDF] [Artifact]
Maximilian Hils (University of Innsbruck, Austria), Daniel W. Woods (University of Innsbruck, Austria), Rainer Böhme (University of Innsbruck, Austria)
- SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges
[PDF] [Artifact]
Felix Engelmann (Aarhus University, Denmark), Lukas Müller (Ulm University, Germany), Andreas Peter (University of Twente, The Netherlands), Frank Kargl (Ulm University, Germany), Christoph Bösch (Ulm University, Germany)
- Multiparty Homomorphic Encryption from Ring-Learning-with-Errors
[PDF] [Artifact]
Christian Mouchet (École polytechnique fédérale de Lausanne), Juan Troncoso-Pastoriza (École polytechnique fédérale de Lausanne), Jean-Philippe Bossuat (École polytechnique fédérale de Lausanne), Jean-Pierre Hubaux (École polytechnique fédérale de Lausanne)
- Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules
[PDF]
Brandon Broadnax, Alexander Koch (Competence Center for Applied Security Technology (KASTEL), Karlsruhe Institute of Technology (KIT)), Jeremias Mechler (Competence Center for Applied Security Technology (KASTEL), Karlsruhe Institute of Technology (KIT)), Tobias Müller, Jörn Müller-Quade (Competence Center for Applied Security Technology (KASTEL), Karlsruhe Institute of Technology (KIT)), Matthias Nagel
- Secure integer division with a private divisor
[PDF]
Thijs Veugen (TNO, The Netherlands), Mark Abspoel (CWI, The Netherlands)
- CrowdNotifier: Decentralized Privacy-Preserving Presence Tracing
[PDF]
Wouter Lueks (EPFL), Seda Gürses (TU Delft), Michael Veale (UCL), Edouard Bugnion (EPFL), Marcel Salathé (EPFL), Kenneth G. Paterson (ETH Zürich), Carmela Troncoso (EPFL)
- Blocking Without Breaking: Identification and Mitigation of Non-Essential IoT Traffic
[PDF]
Anna Maria Mandalari (Imperial College London), Daniel J. Dubois (Northeastern University), Roman Kolcun (Imperial College London), Muhammad Talha Paracha (Northeastern University), Hamed Haddadi (Imperial College London), David Choffnes (Northeastern University)
- Residue-Free Computing
[PDF] [Artifact]
Logan Arkema (Georgetown University), Micah Sherr (Georgetown University)
- Differentially Private Naïve Bayes Classifier Using Smooth Sensitivity
[PDF]
Farzad Zafarani (Department of Computer Science, Purdue University, USA.), Chris Clifton (Department of Computer Science, Purdue University, USA.)
- Domain name encryption is not enough: privacy leakage via IP-based website fingerprinting
[PDF] [Artifact]
Nguyen Phong Hoang (Stony Brook University), Arian Akhavan Niaki (University of Massachusetts Amherst), Phillipa Gill (University of Massachusetts - Amherst), Michalis Polychronakis (Stony Brook University)
- Mercurial Signatures for Variable-Length Messages
[PDF]
Elizabeth C. Crites (IOHK), Anna Lysyanskaya (Brown University)
- Supervised Authorship Segmentation of Open Source Code Projects
[PDF]
Edwin Dauber (Drexel University), Robert Erbacher (United States Army Research Laboratory), Gregory Shearer (ICF International), Michael Weisman (United States Army Research Laboratory), Frederica Nelson (United States Army Research Laboratory), Rachel Greenstadt (New York University)
- Unifying Privacy Policy Detection
[PDF]
Henry Hosseini (University of Münster & Ruhr University Bochum), Martin Degeling (Ruhr University Bochum), Christine Utz (Ruhr University Bochum), Thomas Hupperich (University of Münster)
- Managing Potentially Intrusive Practices in the Browser: A User-Centered Perspective
[PDF]
Daniel Smullen (Carnegie Mellon University), Yaxing Yao (University of Maryland, Baltimore County), Yuanyuan Feng (Carnegie Mellon University), Norman Sadeh (Carnegie Mellon University), Arthur Edelstein (Mozilla), Rebecca Weiss (Mozilla)
- Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC
[PDF]
Ghada Almashaqbeh (University of Connecticut), Fabrice Benhamouda (Algorand Foundation), Seungwook Han (Columbia University), Daniel Jaroslawicz (Columbia University), Tal Malkin (Columbia University), Alex Nicita (Columbia University), Tal Rabin (University of Pennsylvania, Algorand Foundation), Abhishek Shah (Columbia University), Eran Tromer (Columbia University, Tel-Aviv University)
- Privacy-Preserving Approximate k-Nearest-Neighbors Search that Hides Access, Query and Volume Patterns
[PDF]
Alexandra Boldyreva (Georgia Institute of Technology, USA), Tianxin Tang (Georgia Institute of Technology, USA)
- Oblivious DNS over HTTPS (ODoH): A Practical Privacy Enhancement to DNS
[PDF]
Sudheesh Singanamalla (University of Washington, and Cloudflare Inc.), Suphanat Chunhapanya (Cloudflare Inc.), Jonathan Hoyland (Cloudflare Inc.), Marek Vavruša (Cloudflare Inc.), Tanya Verma (Cloudflare Inc.), Peter Wu (Cloudflare Inc.), Marwan Fayed (Cloudflare Inc.), Kurtis Heimerl (University of Washington), Nick Sullivan (Cloudflare Inc.), Christopher Wood (Cloudflare Inc.)