Volume 2023
Issue 1
- Editors' Introduction
Michelle Mazurek (University of Maryland), Micah Sherr (Georgetown University)
- Privacy Rarely Considered: Exploring Considerations in the Adoption of Third-Party Services by Websites
[PDF]
Christine Utz (CISPA Helmholtz Center for Information Security), Sabrina Amft (CISPA Helmholtz Center for Information Security), Martin Degeling (Ruhr University Bochum), Thorsten Holz (CISPA Helmholtz Center for Information Security), Sascha Fahl (CISPA Helmholtz Center for Information Security), Florian Schaub (University of Michigan School of Information)
- Not Your Average App: A Large-scale Privacy Analysis of Android Browsers
[PDF]
Amogh Pradeep (Northeastern University), Álvaro Feal (IMDEA Networks Institute / Universidad Carlos III de Madrid), Julien Gamba (IMDEA Networks Institute / Universidad Carlos III de Madrid), Ashwin Rao (University of Helsinki), Martina Lindorfer (TU Wien), Narseo Vallina-Rodriguez (IMDEA Networks Institute / AppCensus Inc.), David Choffnes (Northeastern University)
- "Revoked just now!" Users' Behaviors Toward Fitness-Data Sharing with Third-Party Applications
[PDF] [Artifact]
Noé Zufferey (University of Lausanne), Kavous Salehzadeh Niksirat (University of Lausanne), Mathias Humbert (University of Lausanne), Kévin Huguenin (University of Lausanne)
- On the Privacy Risks of Deploying Recurrent Neural Networks in Machine Learning Models
[PDF] [Artifact]
Yunhao Yang (University of Texas at Austin), Parham Gohari (University of Texas at Austin), Ufuk Topcu (University of Texas at Austin)
- Blind My - An Improved Cryptographic Protocol to Prevent Stalking in Apple's Find My Network
[PDF]
Travis Mayberry (United States Naval Academy), Erik-Oliver Blass (Airbus), Ellis Fenske (US Naval Academy)
- Differentially Private Speaker Anonymization
[PDF]
Ali Shahin Shamsabadi (The Alan Turing Institute, Vector Institute, Université de Lille, Inria, CNRS, Centrale Lille, UMR 9189 - CRIStAL, F-59000 Lille, France), Brij Mohan Lal Srivastava (Université de Lille, Inria, CNRS, Centrale Lille, UMR 9189 - CRIStAL, F-59000 Lille, France), Aurélien Bellet (Université de Lille, Inria, CNRS, Centrale Lille, UMR 9189 - CRIStAL, F-59000 Lille, France), Nathalie Vauquier (Université de Lille, Inria, CNRS, Centrale Lille, UMR 9189 - CRIStAL, F-59000 Lille, France), Emmanuel Vincent (Université de Lorraine, CNRS, Inria, LORIA, F-54000 Nancy, France), Mohamed Maouche (Université de Lille, Inria, CNRS, Centrale Lille, UMR 9189 - CRIStAL, F-59000 Lille, France), Marc Tommasi (Université de Lille, Inria, CNRS, Centrale Lille, UMR 9189 - CRIStAL, F-59000 Lille, France), Nicolas Papernot (Vector Institute, University of Toronto)
- TWo-IN-one-SSE: Fast, Scalable and Storage-Efficient Searchable Symmetric Encryption for Conjunctive and Disjunctive Boolean Queries
[PDF] [Artifact]
Arnab Bag (Indian Institute of Technology, Kharagpur, India), Debadrita Talapatra (Indian Institute of Technology, Kharagpur, India), Ayushi Rastogi (Indian Institute of Technology, Kharagpur, India), Sikhar Patranabis (IBM Research India), Debdeep Mukhopadhyay (Indian Institute of Technology, Kharagpur, India)
- SoK: Secure Aggregation Based on Cryptographic Schemes for Federated Learning
[PDF]
Mohamad Mansouri (Thales SIX GTS / EURECOM), Melek Önen (EURECOM), Wafa Ben Jaballah (Thales SIX GTS), Mauro Conti (University of Padua)
- Individualized PATE: Differentially Private Machine Learning with Individual Privacy Guarantees
[PDF] [Artifact]
Franziska Boenisch (Vector Institute), Christopher Mühl (Free University Berlin), Roy Rinberg (Columbia University), Jannis Ihrig (Free University Berlin), Adam Dziedzic (University of Toronto, Vector Institute)
- Understanding Person Identification Through Gait
[PDF] [Artifact]
Simon Hanisch (Centre for Tactile Internet with Human-in-the-Loop (CeTI), TU Dresden), Evelyn Muschter (Centre for Tactile Internet with Human-in-the-Loop (CeTI), TU Dresden), Admantini Hatzipanayioti (Centre for Tactile Internet with Human-in-the-Loop (CeTI), TU Dresden), Shu-Chen Li (Centre for Tactile Internet with Human-in-the-Loop (CeTI), TU Dresden), Thorsten Strufe (Centre for Tactile Internet with Human-in-the-Loop (CeTI), TU Dresden and Karlsruhe Institute of Technology (KIT))
- Exploring Model Inversion Attacks in the Black-box Setting
[PDF]
Antreas Dionysiou (University of Cyprus), Vassilis Vassiliades (CYENS Centre of Excellence), Elias Athanasopoulos (University of Cyprus)
- No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps
[PDF]
Enze Liu (UC San Diego), Sumanth Rao (UC San Diego), Sam Havron (Cornell Tech), Grant Ho (UC San Diego), Stefan Savage (UC San Diego), Geoffrey M. Voelker (UC San Diego), Damon McCoy (New York University)
- Designing a Location Trace Anonymization Contest
[PDF] [Artifact]
Takao Murakami (AIST), Hiromi Arai (RIKEN), Koki Hamada (NTT), Takuma Hatano (NSSOL), Makoto Iguchi (Kii Corporation), Hiroaki Kikuchi (Meiji University), Atsushi Kuromasa (Data Society Alliance), Hiroshi Nakagawa (RIKEN), Yuichi Nakamura (SoftBank Corp.), Kenshiro Nishiyama (LegalForce), Ryo Nojima (NICT), Hidenobu Oguri (Fujitsu Limited), Chiemi Watanabe (Tsukuba University of Technology), Akira Yamada (Kobe University), Takayasu Yamaguchi (Akita Prefectural University), Yuji Yamaoka (Fujitsu Limited)
- Detect Your Fingerprint in Your Photographs: Photography-based Multi-Feature Sybil Detection
[PDF]
Yerim Kim (Korea University), Minjae Kim (Korea University), Myungjae Chung (Korea University), Junbeom Hur (Korea University)
- StyleID: Identity Disentanglement for Anonymizing Faces
[PDF] [Artifact]
Minh-Ha Le (Linköping University), Niklas Carlsson (Linköping University)
- SoK: Secure E-Voting with Everlasting Privacy
[PDF]
Thomas Haines (Australian National University), Rafieh Mosaheb (University of Luxembourg), Johannes Müller (University of Luxembourg), Ivan Pryvalov (University of Luxembourg)
- Investigating Privacy Decision-Making Processes Among Nigerian Men and Women
[PDF]
Victor Yisa (Dalhousie University), Reza Ghaiumy Anaraky (Clemson University), Bart P. Knijnenburg (Clemson University), Rita Orji (Dalhousie University)
- Privacy by Projection: Federated Population Density Estimation by Projecting on Random Features
[PDF]
Zixiao Zong (University of California, Irvine), Mengwei Yang (University of California, Irvine), Justin Ley (University of California, Irvine), Athina Markopoulou (University of California, Irvine), Carter Butts (University of California, Irvine)
- HeLayers: A Tile Tensors Framework for Large Neural Networks on Encrypted Data
[PDF] [Artifact]
Ehud Aharoni (IBM Research - Israel), Allon Adir (IBM Research - Israel), Moran Baruch (IBM Research - Israel and Bar Ilan University), Nir Drucker (IBM Research - Israel), Gilad Ezov (IBM Research - Israel), Ariel Farkash (IBM Research - Israel), Lev Greenberg (IBM Research - Israel), Ramy Masalha (IBM Research - Israel), Guy Moshkowich (IBM Research - Israel), Dov Murik (IBM Research - Israel), Hayim Shaul (IBM Research - Israel), Omri Soceanu (IBM Research - Israel)
- Efficient decision tree training with new data structure for secure multi-party computation
[PDF]
Koki Hamada (NTT Social Informatics Laboratories), Dai Ikarashi (NTT Social Informatics Laboratories), Ryo Kikuchi (NTT Social Informatics Laboratories), Koji Chida (Gunma University)
- FrodoPIR: Simple, Scalable, Single-Server Private Information Retrieval
[PDF] [Artifact]
Alex Davidson (Brave Software), Gonçalo Pestana (Brave Software), Sofía Celi (Brave Software)
- 'Surprised, Shocked, Worried': User Reactions to Facebook Data Collection from Third Parties
[PDF]
Patricia Arias-Cabarcos (Paderborn University), Saina Khalili (KIT), Thorsten Strufe (KASTEL Security Research Labs, KIT)
- MIAShield: Defending Membership Inference Attacks via Preemptive Exclusion of Members
[PDF]
Ismat Jarin (University of Michigan, Dearborn, United States), Birhanu Eshete (University of Michigan, Dearborn, United States)
- Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable Encryption
[PDF]
Ghous Amjad (Google), Sarvar Patel (Google), Giuseppe Persiano (Università di Salerno), Kevin Yeo (Google), Moti Yung (Google)
- I-GWAS: Privacy-Preserving Interdependent Genome-Wide Association Studies
[PDF]
Túlio Pascoal (University of Luxembourg), Jérémie Decouchant (Delft University of Technology), Antoine Boutet (University of Lyon, INSA Lyon, Inria CITI), Marcus Völp (University of Luxembourg)
- Is There a Reverse Privacy Paradox? An Exploratory Analysis of Gaps Between Privacy Perspectives and Privacy-Seeking Behaviors
[PDF]
Jessica Colnago (Carnegie Mellon University), Lorrie Cranor (Carnegie Mellon University), Alessandro Acquisti (Carnegie Mellon University)
- Privacy Concerns and Acceptance Factors of OSINT for Cybersecurity: A Representative Survey
[PDF]
Thea Riebe (Technical University of Darmstadt), Tom Biselli (Technical University of Darmstadt), Marc-André Kaufhold (Technical University of Darmstadt), Christian Reuter (Technical University of Darmstadt)
- Lox: Protecting the Social Graph in Bridge Distribution
[PDF] [Artifact]
Lindsey Tulloch (University of Waterloo), Ian Goldberg (University of Waterloo)
- How Much Privacy Does Federated Learning with Secure Aggregation Guarantee?
[PDF]
Ahmed Roushdy Elkordy (University of Southern California), Jiang Zhang (University of Southern California), Yahya H. Ezzeldin (University of Southern California), Konstantinos Psounis (University of Southern California), Salman Avestimehr (University of Southern California)
- Private Multi-Winner Voting for Machine Learning
[PDF]
Adam Dziedzic (University of Toronto and Vector Institute), Christopher A. Choquette-Choo (Google Research, Brain Tea), Natalie Dullerud (University of Toronto and Vector Institute), Vinith Suriyakumar (MIT), Ali Shahin Shamsabadi (The Alan Turing Institue), Muhammad Ahmad Kaleem (University of Toronto and Vector Institute), Somesh Jha (University of Wisconsin-Madison), Nicolas Papernot (University of Toronto and Vector Institute), Xiao Wang (Northwestern University)
- Privacy-Aware Adversarial Network in Human Mobility Prediction
[PDF] [Artifact]
Yuting Zhan (Imperial College London), Hamed Haddadi (Imperial College London), Afra Mashhadi (University of Washington)
- Exploring privacy implications of awareness and control mechanisms in smart home devices
[PDF]
Madiha Tabassum (University of North Carolina at Charlotte), Heather Lipford (University of North Carolina at Charlotte)
- Dolphin: A Cellular Voice Based Internet Shutdown Resistance System
[PDF]
Piyush Kumar Sharma (IIIT Delhi, imec-COSIC KU Leuven), Rishi Sharma (IIIT Delhi), Kartikey Singh (IIIT Delhi), Mukulika Maity (IIIT Delhi), Sambuddho Chakravarty (IIIT Delhi)
- Multi-Party Replicated Secret Sharing over a Ring with Applications to Privacy-Preserving Machine Learning
[PDF] [Artifact]
Alessandro Baccarini (University at Buffalo (SUNY)), Marina Blanton (University at Buffalo (SUNY)), Chen Yuan (University at Buffalo (SUNY))
- Efficient Proofs of Software Exploitability for Real-world Processors
[PDF]
Matthew Green (Johns Hopkins University), Mathias Hall-Andersen (Aarhus University), Eric Hennenfent (Trail of Bits), Gabriel Kaptchuk (Boston University), Benjamin Perez (Trail of Bits), Gijs Van Laer (Johns Hopkins University)
Issue 2
- Editors' Introduction
Michelle Mazurek (University of Maryland), Micah Sherr (Georgetown University)
- An Efficient Data-Independent Priority Queue and its Application to Dark Pools
[PDF]
Sahar Mazloom (J. P. Morgan AI Research), Benjamin Diamond (Coinbase), Antigoni Polychroniadou (J. P. Morgan AI Research), Tucker Balch (J. P. Morgan AI Research)
- Find Thy Neighbourhood: Privacy-Preserving Local Clustering
[PDF]
Pranav Shriram A (National Institute of Technology Tiruchirappalli), Nishat Koti (Indian Institute of Science), Varsha Bhat Kukkala (Indian Institute of Science), Arpita Patra (Indian Institute of Science), Bhavish Raj Gopal (Indian Institute of Science)
- Result-pattern-hiding Conjunctive Searchable Symmetric Encryption with Forward and Backward Privacy
[PDF]
Dandan Yuan (The University of Auckland), Cong Zuo (Beijing Institute of Technology), Shujie Cui (Monash University), Giovanni Russello (The University of Auckland)
- Private Graph Extraction via Feature Explanations
[PDF] [Artifact]
Iyiola E. Olatunji (L3S Research Center, Hannover, Germany), Mandeep Rathee (L3S Research Center, Hannover, Germany), Thorben Funke (L3S Research Center, Hannover, Germany), Megha Khosla (TU Delft, Delft, Netherlands)
- iSTELAN: Disclosing Sensitive User Information by Mobile Magnetometer from Finger Touches
[PDF]
Reham Mohamed (Purdue University), Habiba Farrukh (Purdue University), Yidong Lu (Purdue University), He Wang (Purdue University), Z. Berkay Celik (Purdue University)
- SoK: Managing risks of linkage attacks on data privacy
[PDF]
Jovan Powar (University of Cambridge), Alastair R. Beresford (University of Cambridge)
- Heads in the Clouds? Measuring Universities’ Migration to Public Clouds: Implications for Privacy & Academic Freedom
[PDF] [Artifact]
Tobias Fiebig (Max-Planck-Institut für Informatik), Seda Gürses (TU Delft), Carlos H. Gañán (TU Delft), Erna Kotkamp (TU Delft), Fernando Kuipers (TU Delft), Martina Lindorfer (TU Wien), Menghua Prisse (TU Delft), Taritha Sari (No Affiliation)
- Lessons Learned: Surveying the Practicality of Differential Privacy in the Industry
[PDF]
Gonzalo Munilla Garrido (TUM, BMW Group), Xiaoyuan Liu (UC Berkeley), Floria Matthes (TUM), Dawn Song (UC Berkeley)
- Privacy Property Graph: Towards Automated Privacy Threat Modeling via Static Graph-based Analysis
[PDF]
Immanuel Kunz (Fraunhofer AISEC), Konrad Weiss (Fraunhofer AISEC), Angelika Schneider (Fraunhofer AISEC), Christian Banse (Fraunhofer AISEC)
- DeepSE-WF: Unified Security Estimation for Website Fingerprinting Defenses
[PDF] [Artifact]
Alexander Veicht (ETH Zurich), Cedric Renggli (University of Zurich), Diogo Barradas (University of Waterloo)
- iPET: Privacy Enhancing Traffic Perturbations for Secure IoT Communications
[PDF] [Artifact]
Akshaye Shenoi (National University of Singapore), Prasanna Karthik Vairam (National University of Singapore), Kanav Sabharwal (National University of Singapore), Jialin Li (National University of Singapore), Dinil Mon Divakaran (Acronis Research)
- Creative beyond TikToks: Investigating Adolescents' Social Privacy Management on TikTok
[PDF] [Artifact]
Nico Ebert (Zurich University of Applied Sciences), Tim Geppert (Zurich University of Applied Sciences), Joanna Strycharz (University of Amsterdam), Melanie Knieps (University of Zurich), Michael Hönig (Zurich University of Applied Sciences), Elke Brucker-Kley (Zurich University of Applied Sciences)
- Distributed GAN-Based Privacy-Preserving Publication of Vertically-Partitioned Data
[PDF]
Xue Jiang (Technical University of Munich), Yufei Zhang (Technical University of Munich), Xuebing Zhou (Huawei Munich Research Center), Jens Grossklags (Technical University of Munich)
- How Website Owners Face Privacy Issues: Thematic Analysis of Responses from a Covert Notification Study Reveals Diverse Circumstances and Challenges
[PDF]
Alina Stöver (TU Darmstadt), Nina Gerber (TU Darmstadt), Henning Pridöhl (University of Bamberg), Max Maass (iteratec GmbH), Sebastian Bretthauer (University of Frankfurt), Indra Spiecker gen. Döhmann (University of Frankfurt), Matthias Hollick (TU Darmstadt), Dominik Herrmann (University of Bamberg)
- Usability and Enforceability of Global Privacy Control
[PDF] [Artifact]
Sebastian Zimmeck (Wesleyan University), Oliver Wang (Wesleyan University), Kuba Alicki (Princeton University), Jocelyn Wang (Wesleyan University), Sophie Eng (Wesleyan University)
- Watching your call: Breaking VoLTE Privacy in LTE/5G Networks
[PDF]
Zishuai Cheng (Beijing University of Posts and Telecommunications), Mihai Ordean (University of Birmingham), Flavio Garcia (University of Birmingham), Baojiang Cui (Beijing University of Posts and Telecommunications), Dominik Rys (University of Birmingham)
- Strengthening Privacy-Preserving Record Linkage using Diffusion
[PDF] [Artifact]
Frederik Armknecht (University of Mannheim), Youzhe Heng (University of Mannheim), Rainer Schnell (University of Duisburg-Essen)
- A Unified Framework for Quantifying Privacy Risk in Synthetic Data
[PDF] [Artifact]
Matteo Giomi (Statice GmbH), Franziska Boenisch (Vector Institute), Christoph Wehmeyer (Statice GmbH), Borbála Tasnádi (Statice GmbH)
- Unintended Memorization and Timing Attacks in Named Entity Recognition Models
[PDF]
Rana Salal Ali (Macquarie University), Benjamin Zi Hao Zhao (Macquarie University), Hassan Jameel Asghar (Macquarie University), Tham Nguyen (Macquarie University), Ian David Wood (Macquarie University), Mohamed Ali Kaafar (Macquarie University)
- RPM: Robust Anonymity at Scale
[PDF] [Artifact]
Donghang Lu (Purdue University), Aniket Kate (Purdue University)
- Private Sampling with Identifiable Cheaters
[PDF] [Artifact]
César Sabater (INRIA Lille), Florian Hahn (University of Twente), Andreas Peter (University of Oldenburg), Jan Ramon (INRIA Lille)
- Investigating how Users Imagine their Personal Privacy Assistant
[PDF]
Alina Stöver (TU Darmstadt), Sara Hahn (TU Darmstadt), Felix Kretschmer (TU Darmstadt), Nina Gerber (TU Darmstadt)
- SoK: Content Moderation for End-to-End Encryption
[PDF]
Sarah Scheffler (Princeton University), Jonathan Mayer (Princeton University)
- ezDPS: An Efficient and Zero-Knowledge Machine Learning Inference Pipeline
[PDF]
Haodi Wang (Beijing Normal University / Virginia Tech), Thang Hoang (Virginia Tech)
- Two-Cloud Private Read Alignment to a Public Reference Genome
[PDF] [Artifact]
Sindhuja Madabushi (University of Wisconsin-Madison), Parameswaran Ramanathan (University of Wisconsin-Madison)
- PubSub-ML: A Model Streaming Alternative to Federated Learning
[PDF]
Lovedeep Gondara (Simon Fraser University), Ke Wang (Simon Fraser University)
- Intersectional Thinking about PETs: A Study of Library Privacy
[PDF]
Nora McDonald (George Mason University), Rachel Greenstadt (New York University), Andrea Forte (Drexel University)
- SoK: Differentially Private Publication of Trajectory Data
[PDF]
Àlex Miranda-Pascual (Universitat Politècnica de Catalunya and Karlsruhe Institute of Technology), Patricia Guerra-Balboa (Karlsruhe Institute of Technology), Javier Parra-Arnau (Universitat Politècnica de Catalunya and Karlsruhe Institute of Technology), Jordi Forné (Universitat Politècnica de Catalunya), Thorsten Strufe (Karlsruhe Institute of Technology)
Issue 3
- Editors' Introduction
Michelle Mazurek (University of Maryland), Micah Sherr (Georgetown University)
- Trust TEE?: Exploring the Impact of Trusted Execution Environments on Smart Home Privacy Norms
[PDF]
Pratik Musale (University of Pittsburgh), Adam Lee (University of Pittsburgh)
- Ruffle: Rapid 3-Party Shuffle Protocols
[PDF]
Pranav Shriram A (JP Morgan Chase), Nishat Koti (Indian Institute of Science), Varsha Bhat Kukkala (Indian Institute of Science), Arpita Patra (Indian Institute of Science), Bhavish Raj Gopal (Indian Institute of Science), Somya Sangal (Indian Institute of Science)
- Story Beyond the Eye: Glyph Positions Break PDF Text Redaction
[PDF] [Artifact]
Maxwell Bland (University of Illinois, Urbana-Champaign), Anushya Iyer (University of Illinois, Urbana-Champaign), Kirill Levchenko (University of Illinois, Urbana-Champaign)
- Towards Sentence Level Inference Attack Against Pre-trained Language Models
[PDF] [Artifact]
Kang Gu (Dartmouth College), Ehsanul Kabir (Penn State University), Neha Ramsurrun (Dartmouth College), Soroush Vosoughi (Dartmouth College), Shagufta Mehnaz (Penn State University)
- Time-Deniable Signatures
[PDF]
Gabrielle Beck (Johns Hopkins University), Arka Rai Choudhuri (NTT Research), Matthew Green (Johns Hopkins University), Abhishek Jain (Johns Hopkins University), Pratyush Ranjan Tiwari (Johns Hopkins University)
- Lessons in VCR Repair: Compliance of Android App Developers with the California Consumer Privacy Act (CCPA)
[PDF]
Nikita Samarin (UC Berkeley and ICSI), Shayna Kothari (UC Berkeley), Zaina Siyed (UC Berkeley), Oscar Bjorkman (UC Berkeley), Reena Yuan (UC Berkeley), Primal Wijesekera (UC Berkeley and ICSI), Noura Alomar (UC Berkeley), Jordan Fischer (UC Berkeley and Drexel Kline School of Law), Chris Hoofnagle (UC Berkeley), Serge Egelman (UC Berkeley and ICSI)
- CERTainty: Detecting DNS Manipulation at Scale using TLS Certificates
[PDF]
Elisa Tsai (University of Michigan), Deepak Kumar (Stanford University), Ram Sundara Raman (University of Michigan), Gavin Li (University of Michigan), Yael Eiger (University of Michigan), Roya Ensafi (University of Michigan)
- Evolution of Composition, Readability, and Structure of Privacy Policies over Two Decades
[PDF]
Andrick Adhikari (University of Denver), Sanchari Das (University of Denver), Rinku Dewri (University of Denver)
- SoK: New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks
[PDF] [Artifact]
Charles Gouert (University of Delaware), Dimitris Mouris (University of Delaware), Nektarios Tsoutsos (University of Delaware)
- Comparing Large-Scale Privacy and Security Notifications
[PDF]
Christine Utz (CISPA Helmholtz Center for Information Security), Matthias Michels (Saarland University), Martin Degeling (Ruhr University Bochum), Ninja Marnau (CISPA Helmholtz Center for Information Security), Ben Stock (CISPA Helmholtz Center for Information Security)
- RAVEN: Stateless Rapid IP Address Variation for Enterprise Networks
[PDF] [Artifact]
Liang Wang (Princeton University), Hyojoon Kim (Princeton University), Prateek Mittal (Princeton University), Jennifer Rexford (Princeton University)
- How to Combine Membership-Inference Attacks on Multiple Updated Machine Learning Models
[PDF]
Matthew Jagielski (Google Research), Stanley Wu (Northeastern University), Alina Oprea (Northeastern University), Jonathan Ullman (Northeastern University), Roxana Geambasu (Columbia University)
- SenRev: Measurement of Personal Information Disclosure in Online Health Communities
[PDF]
Faysal Hossain Shezan (University of Virginia), Minjun Long (University of Virginia), David Hasani (University of Virginia), Gang Wang (University of Illinois at Urbana-Champaign), Yuan Tian (University of California Los Angeles)
- "My face, my rules": Enabling Personalized Protection Against Unacceptable Face Editing
[PDF]
Zhujun Xiao (University of Chicago), Jenna Cryan (University of Chicago), Yuanshun Yao (University of Chicago), Yi Hong Gordon Cheo (University of Chicago), Yuanchao Shu (Zhejiang University), Stefan Saroiu (Microsoft Research), Ben Y. Zhao (University of Chicago), Haitao Zheng (University of Chicago)
- Examining the Hydra: Simultaneously Shared Links in Tor and the Effects on its Performance
[PDF] [Artifact]
Sebastian Pahl (Institute of Information Systems (iisys) -- Hof University of Applied Sciences), Florian Adamsky (Institute of Information Systems (iisys) -- Hof University of Applied Sciences), Daniel Kaiser (Status Research & Development GmbH), Thomas Engel (University of Luxembourg)
- SoK: Membership Inference is Harder Than Previously Thought
[PDF] [Artifact]
Antreas Dionysiou (University of Cyprus), Elias Athanasopoulos (University of Cyprus)
- Losing Less: A Loss for Differentially Private Deep Learning
[PDF]
Ali Shahin Shamsabadi (The Alan Turing Institute), Nicolas Papernot (Vector Institute, University of Toronto)
- Convolutions in Overdrive: Maliciously Secure Convolutions for MPC
[PDF] [Artifact]
Marc Rivinius (University of Stuttgart), Pascal Reisert (University of Stuttgart), Sebastian Hasler (University of Stuttgart), Ralf Küsters (University of Stuttgart)
- VESPo: Verified Evaluation of Secret Polynomials (with application to dynamic proofs of retrievability)
[PDF] [Artifact]
Jean-Guillaume Dumas (Univ. Grenoble Alpes), Aude Maignan (Univ. Grenoble Alpes), Clément Pernet (Univ. Grenoble Alpes), Daniel S. Roche (United States Naval Academy)
- DPrio: Efficient Differential Privacy with High Utility for Prio
[PDF] [Artifact]
Dana Keeler (Mozilla Corporation), Chelsea Komlo (University of Waterloo, Zcash Foundation), Emily Lepert (University of Waterloo), Shannon Veitch (Eth Zürich), Xi He (University of Waterloo)
- Blocking JavaScript Without Breaking the Web: An Empirical Investigation
[PDF] [Artifact]
Abdul Haddi Amjad (Virginia Tech), Zubair Shafiq (University of California, Davis), Muhammad Ali Gulzar (Virginia Tech)
- Data Security on the Ground: Investigating Technical and Legal Requirements under the GDPR
[PDF] [Artifact]
Tina Marjanov (University of Cambridge), Maria Konstantinou (Vrije Universiteit Amsterdam and Freshfields Bruckhaus Deringer), Magdalena Jóźwiak (Tilburg University), Dayana Spagnuelo (TNO)
- Differential Privacy for Black-Box Statistical Analyses
[PDF]
Nitin Kohli (UC Berkeley Center for Effective Global Action), Paul Laskowski (UC Berkeley School of Information)
- Secure and Accurate Summation of Many Floating-Point Numbers
[PDF] [Artifact]
Marina Blanton (University at Buffalo), Michael T. Goodrich (University of California, Irvine), Chen Yuan (Meta Platform Inc.)
- Private Collection Matching Protocols
[PDF] [Artifact]
Kasra EdalatNejad (EPFL), Mathilde Raynal (EPFL), Wouter Lueks (CISPA Helmholtz Center for Information Security), Carmela Troncoso (EPFL)
- A Method for Securely Comparing Integers using Binary Trees
[PDF]
Anselme Tueno (SAP SE), Jonas Janneck (Ruhr University Bochum), David Boehm (SAP SE)
- Practical Delegatable Anonymous Credentials From Equivalence Class Signatures
[PDF] [Artifact]
Omid Mir (Johannes Kepler University Linz, LIT Secure and Correct Systems Lab, Linz , Austria ), Daniel Slamanig (AIT Austrian Institute of Technology Vienna, Austria), Balthazar Bauer (IRIF, Université de Paris Cité Paris, France), René Mayrhofer (Johannes Kepler University Linz, Institute of Networks and Security, Linz , Austria)
Issue 4
- Editors' Introduction
Michelle Mazurek (University of Maryland), Micah Sherr (Georgetown University)
- Robust Fingerprint of Privacy-Preserving Location Trajectories
[PDF]
Yuzhou Jiang (Case Western Reserve University), Emre Yilmaz (University of Houston-Downtown), Erman Ayday (Case Western Reserve University)
- Funshade: Function Secret Sharing for Two-Party Secure Thresholded Distance Evaluation
[PDF]
Alberto Ibarrondo (Copper.co), Hervé Chabanne (Idemia & Telecom Paris), Melek Önen (EURECOM)
- Attribute-based Single Sign-On: Secure, Private, and Efficient
[PDF] [Artifact]
Tore Kasper Frederiksen (Zama), Julia Hesse (IBM Research Europe - Zurich), Bertram Poettering (IBM Research Europe - Zurich), Patrick Towa (Aztec Network)
- On the Robustness of Topics API to a Re-Identification Attack
[PDF] [Artifact]
Nikhil Jha (Politecnico di Torino), Martino Trevisan (Università degli Studi di Trieste), Emilio Leonardi (Politecnico di Torino), Marco Mellia (Politecnico di Torino)
- Evaluating practical QUIC website fingerprinting defenses for the masses
[PDF] [Artifact]
Sandra Siby (Imperial College London), Ludovic Barman (EPFL), Christopher Wood (Cloudflare Inc.), Marwan Fayed (Cloudflare Inc.), Nick Sullivan (Cloudflare Inc.), Carmela Troncoso (EPFL)
- Save The Implicit Flow? Enabling Privacy-Preserving RP Authentication in OpenID Connect
[PDF]
Maximilian Kroschewski (Hasso Plattner Institute, University of Potsdam), Anja Lehmann (Hasso Plattner Institute, University of Potsdam)
- Locality-Sensitive Hashing Does Not Guarantee Privacy! Attacks on Google's FLoC and the MinHash Hierarchy System
[PDF] [Artifact]
Florian Turati (ETH Zurich), Karel Kubicek (ETH Zurich), Carlos Cotrini (ETH Zurich), David Basin (ETH Zurich)
- Track You: A Deep Dive into Safety Alerts for Apple AirTags
[PDF]
Narmeen Shafqat (Northeastern University), Nicole Gerzon (Northeastern University), Maggie Van Nortwick (Northeastern University), Victor Sun (Northeastern University), Alan Mislove (Northeastern University), Aanjhan Ranganathan (Northeastern University)
- Disparate Vulnerability in Link Inference Attacks against Graph Neural Networks
[PDF] [Artifact]
Da Zhong (Stevens Institute of Technology), Ruotong Yu (University of Utah), Kun Wu (Stevens Institute of Technology), Xiuling Wang (Stevens Institute of Technology), Jun Xu (University of Utah), Wendy Hui Wang (Stevens Institute of Technology)
- The Self-Anti-Censorship Nature of Encryption: On the Prevalence of Anamorphic Cryptography
[PDF]
Miroslaw Kutylowski (Wroclaw University of Science and Technology, and NASK), Giuseppe Persiano (Università di Salerno and Google LLC), Duong Hieu Phan (Telecom Paris, Institute Polytechnique de Paris), Moti Yung (Google LLC and Columbia University), Marcin Zawada (Wroclaw University of Science and Technology)
- MAPLE: A Metadata-Hiding Policy-Controllable Encrypted Search Platform with Minimal Trust
[PDF]
Tung Le (Virginia Tech), Thang Hoang (Virginia Tech)
- Attacks on Encrypted Response-Hiding Range Search Schemes in Multiple Dimensions
[PDF] [Artifact]
Evangelia Anna Markatou (Brown University), Francesca Falzon (Brown University, University of Chicago), Zachary Espiritu (Brown University), Roberto Tamassia (Brown University)
- Trifecta: Faster High-Throughput Three-Party Computation over WAN Using Multi-Fan-In Logic Gates
[PDF]
Sina Faraji (University of Waterloo), Florian Kerschbaum (University of Waterloo)
- Exploring the Privacy Risks of Adversarial VR Game Design
[PDF] [Artifact]
Vivek Nair (UC Berkeley), Gonzalo Munilla Garrido (TU Munich), Dawn Song (UC Berkeley), James O'Brien (UC Berkeley)
- DP-SIPS: A simpler, more scalable mechanism for differentially private partition selection
[PDF] [Artifact]
Marika Swanberg (Boston University), Damien Desfontaines (Tumult Labs), Samuel Haney (Tumult Labs)
- Understanding EdTech's Privacy and Security Issues: Understanding the Perception and Awareness of Education Technologies' Privacy and Security Issues
[PDF]
Rakibul Hasan (Arizona State University)
- Researchers’ Experiences in Analyzing Privacy Policies: Challenges and Opportunities
[PDF]
Abraham Mhaidli (University of Michigan), Selin Fidan (University of Michigan), An Doan (University of Michigan), Gina Herakovic (University of Michigan), Mukund Srinath (Penn State University), Lee Matheson (Future of Privacy Forum), Shomir Wilson (Penn State University), Florian Schaub (University of Michigan)
- Your DRM Can Watch You Too: Exploring the Privacy Implications of Browsers (mis)Implementations of Widevine EME
[PDF] [Artifact]
Gwendal Patat (Univ Rennes, CNRS, IRISA), Mohamed Sabt (Univ Rennes, CNRS, IRISA), Pierre-Alain Fouque (Univ Rennes, CNRS, IRISA)
- Privacy-Preserving Outsourced Certificate Validation
[PDF]
Tarek Galal (Hasso-Plattner-Institute, University of Potsdam), Anja Lehmann (Hasso-Plattner-Institute, University of Potsdam)
- Examining StyleGAN as a Utility-Preserving Face De-identification Method
[PDF]
Seyyed Mohammad Sadegh Moosavi Khorzooghi (The University of Texas at Arlington), Shirin Nilizadeh (The University of Texas at Arlington)
- Structural and functional explanations for informing lay and expert users: the case of functional encryption
[PDF]
Ala Sarah Alaqra (Karlstad University), Farzaneh Karegar (Karlstad University), Simone Fischer-Hübner (Karlstad University & Chalmers University of Technology)
- Compact and Divisible E-Cash with Threshold Issuance
[PDF] [Artifact]
Alfredo Rial (Nym Technologies), Ania M. Piotrowska (Nym Technologies)
- Speculative Privacy Concerns about AR Glasses Data Collection
[PDF]
Andrea Gallardo (Carnegie Mellon University), Chris Choy (Carnegie Mellon University), Jaideep Juneja (Carnegie Mellon University), Efe Bozkir (University of Tübingen), Camille Cobb (University of Illinois), Lujo Bauer (Carnegie Mellon University), Lorrie Cranor (Carnegie Mellon University)
- End-to-end Privacy Preserving Training and Inference for Air Pollution Forecasting with Data from Rival Fleets
[PDF]
Gauri Gupta (MIT), Krithika Ramesh (John Hopkins University), Anwesh Bhattacharya (Microsoft Research India), Divya Gupta (Microsoft Research India), Rahul Sharma (Microsoft Research India), Nishanth Chandran (Microsoft Research India), Rijurekha Sen (IIT Delhi)
- Everybody's Looking for SSOmething: A large-scale evaluation on the privacy of OAuth authentication on the web
[PDF]
Yana Dimova (imec-DistriNet, KU Leuven), Tom Van Goethem (Google / imec-DistriNet, KU Leuven), Wouter Joosen (imec-DistriNet, KU Leuven)
- On the Role and Form of Personal Information Disclosure in Cyberbullying Incidents
[PDF] [Artifact]
Sadiq Aliyu (University of Lausanne), Kavous Salehzadeh Niksirat (University of Lausanne), Kévin Huguenin (University of Lausanne), Mauro Cherubini (University of Lausanne)
- GDPRxiv: Establishing the State of the Art in GDPR Enforcement
[PDF] [Artifact]
Chen Sun (University of Iowa), Evan Jacobs (University of Iowa), Daniel Lehmann (University of Copenhagen), Andrew Crouse (University of Iowa), Supreeth Shastri (University of Iowa)
- Privacy-Preserving Federated Recurrent Neural Networks
[PDF]
Sinem Sav (EPFL), Abdulrahman Diaa (University of Waterloo), Apostolos Pyrgelis (EPFL), Jean-Philippe Bossuat (Tune Insight SA), Jean-Pierre Hubaux (EPFL and Tune Insight SA)
- A Utility-Preserving Obfuscation Approach for YouTube Recommendations
[PDF]
Jiang Zhang (University of Southern California), Hadi Askari (University of California, Davis), Konstantinos Psounis (University of Southern California), Zubair Shafiq (University of California, Davis)
- Differentially Private Simple Genetic Algorithms
[PDF] [Artifact]
Thomas Humphries (University of Waterloo), Florian Kerschbaum (University of Waterloo)
- Data-Explainable Website Fingerprinting with Network Simulation
[PDF] [Artifact]
Rob Jansen (U.S. Naval Research Laboratory), Ryan Wails (U.S. Naval Research Laboratory, Georgetown University)
- Verifiable Distributed Aggregation Functions
[PDF] [Artifact]
Hannah Davis (University of California, San Diego), Christopher Patton (Cloudflare), Mike Rosulek (Oregon State University), Phillipp Schoppmann (Google)
- Throwing Your Weight Around: Fixing Tor's Positional Weighting
[PDF]
Aaron Johnson (U.S. Naval Research Laboratory), Aaron D. Jaggard (U.S. Naval Research Laboratory), Paul Syverson (U.S. Naval Research Laboratory)