Volume 2025
Issue 1
- Editors' Introduction
Rob Jansen (U.S. Naval Research Laboratory), Zubair Shafiq (University of California, Davis)
- Understanding Privacy Norms through Web Forms
[PDF] [Artifact: Reproduced]
Hao Cui (University of California, Irvine), Rahmadi Trimananda (University of California, Irvine), Athina Markopoulou (University of California, Irvine)
- Lightweight Two-Party Secure Sampling Protocol for Differential Privacy
[PDF]
Masanobu Kii (NTT Social Information Laboratories), Atsunori Ichikawa (NTT Social Information Laboratories), Takayuki Miura (NTT Social Information Laboratories)
- RSA Blind Signatures with Public Metadata
[PDF]
Ghous Amjad (Google), Kevin Yeo (Google), Moti Yung (Google)
- "What are they gonna do with my data?": Privacy Expectations, Concerns, and Behaviors in Virtual Reality
[PDF]
Abhinaya S.B. (North Carolina State University), Abhishri Agrawal (UNC Chapel Hill), Yaxing Yao (Virginia Tech), Yixin Zou (Max Planck Institute for Security and Privacy), Anupam Das (North Carolina State University)
- Identifying Privacy Personas
[PDF] [Artifact: Available]
Olena Hrynenko (Idiap Research Institute, École Polytechnique Fédérale de Lausanne), Andrea Cavallaro (Idiap Research Institute, École Polytechnique Fédérale de Lausanne)
- Beyond the Request: Harnessing HTTP Response Headers for Cross-Browser Web Tracker Detection in an Imbalanced Setting
[PDF] [Artifact: Available]
Wolf Rieder (Technische Universität Berlin), Philip Raschke (Technische Universität Berlin), Thomas Cory (Technische Universität Berlin)
- SoK: Descriptive Statistics Under Local Differential Privacy
[PDF] [Artifact: Reproduced]
René Raab (Friedrich-Alexander-Universität Erlangen-Nürnberg), Pascal Berrang (University of Birmingham), Paul Gerhart (TU Wien), Dominique Schröder (TU Wien, Friedrich-Alexander-Universität Erlangen-Nürnberg)
- Privacy Perceptions Across the XR Spectrum: An Extended Reality Cross-Platform Comparative Analysis of A Virtual House Tour
[PDF]
Chris Warin (University of Göttingen), Viktoriya Pak (University of Göttingen), Delphine Reinhardt (University of Göttingen)
- Communication Efficient Secure and Private Multi-Party Deep Learning
[PDF]
Sankha Das (Microsoft Research India), Sayak Ray Chowdhury (Microsoft Research India), Nishanth Chandran (Microsoft Research India), Divya Gupta (Microsoft Research India), Satya Lokam (Microsoft Research India), Rahul Sharma (Microsoft Research India)
- Revealing Hidden IoT Devices through Passive Detection, Fingerprinting, and Localization
[PDF]
Wei Sun (University of California San Diego), Hadi Givehchian (University of California San Diego), Dinesh Bharadia (University of California San Diego)
- DiDOTS: Knowledge Distillation from Large-Language-Models for Dementia Obfuscation in Transcribed Speech
[PDF] [Artifact: Functional]
Dominika Woszczyk (Imperial College London), Soteris Demetriou (Imperial College London)
- Analyzing the Differentially Private Theil-Sen Estimator for Simple Linear Regression
[PDF]
Jayshree Sarathy (Northeastern University), Salil Vadhan (Harvard University)
- Privacy-preserving Multiple Sequence Alignment Scheme for Long Gene Sequence
[PDF]
Yatong Jiang (Beihang University), Tao Shang (Beihang University), Jianwei Liu (Beihang University)
- High-Throughput Secure Multiparty Computation with an Honest Majority in Various Network Settings
[PDF] [Artifact: Functional]
Christopher Harth-Kitzerow (Technical University of Munich, BMW Group), Ajith Suresh (Technology Innovation Institute, Abu Dhabi), Yongqin Wang (University of Southern California), Hossein Yalame (Robert Bosch GmbH, Germany), Georg Carle (Technical University of Munich), Murali Annavaram (University of Southern California)
- Examining Caregiving Roles to Differentiate the Effects of Using a Mobile App for Community Oversight for Privacy and Security
[PDF]
Mamtaj Akter (New York Institute of Technology, USA), Jess Kropczynski (University of Cincinnati, USA), Heather Lipford (University of North Carolina, Charlotte, USA), Pamela Wisniewski (Vanderbilt University, USA)
- Mastic: Private Weighted Heavy-Hitters and Attribute-Based Metrics
[PDF] [Artifact: Reproduced]
Dimitris Mouris (Nillion & University of Delaware), Christopher Patton (Cloudflare), Hannah Davis (Seagate Technology), Pratik Sarkar (Supra Research), Nektarios Georgios Tsoutsos (University of Delaware)
- Real-World Deniability in Messaging
[PDF] [Artifact: Reproduced]
Daniel Collins (Purdue University), Simone Colombo (EPFL), Loïs Huguenin-Dumittan (Tune Insight)
- Practical Two-party Computational Differential Privacy with Active Security
[PDF]
Fredrik Meisingseth (Graz University of Technology), Christian Rechberger (Graz University of Technology), Fabian Schmid (Graz University of Technology)
- EpiOracle: Privacy-Preserving Cross-Facility Early Warning for Unknown Epidemics
[PDF] [Artifact: Reproduced]
Shiyu Li (University of Electronic Science and Technology of China), Yuan Zhang (University of Electronic Science and Technology of China), Yaqing Song (University of Electronic Science and Technology of China), Fan Wu (Central South University), Feng Lyu (Central South University), Kan Yang (University of Memphis), Qiang Tang (The University of Sydney)
- User-Centric Textual Descriptions of Privacy-Enhancing Technologies for Ad Tracking and Analytics
[PDF]
Lu Xian (University of Michigan), Song Mi Lee-Kan (University of Michigan), Jane Im (University of Michigan), Florian Schaub (University of Michigan)
- BehaVR: User Identification Based on VR Sensor Data
[PDF] [Artifact: Available]
Ismat Jarin (University of California, Irvine), Yu Duan (University of California, Irvine), Rahmadi Trimananda (University of California, Irvine), Hao Cui (University of California, Irvine), Salma Elmalaki (University of California, Irvine), Athina Markopoulou (University of California, Irvine)
- SoK: Computational and Distributed Differential Privacy for MPC
[PDF]
Fredrik Meisingseth (Graz University of Technology), Christian Rechberger (Graz University of Technology)
- Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy
[PDF] [Artifact: Reproduced]
Cong Zuo (Beijing Institute of Technology), Shangqi Lai (Monash University/CSIRO Data61), Shi-Feng Sun (Shanghai Jiao Tong University), Xingliang Yuan (The University of Melbourne), Joseph K. Liu (Monash University), Jun Shao (Zhejiang Gongshang University/Zhejiang E-Commerce Key Lab), Huaxiong Wang (Nanyang Technological University), Liehuang Zhu (Beijing Institute of Technology), Shujie Cui (Monash University)
- Misalignments and Demographic Differences in Expected and Actual Privacy Settings on Facebook
[PDF]
Byron Lowens (University of Michigan), Sean Scarnecchia (University of Michigan), Jane Im (University of Michigan), Tanisha Afnan (University of Michigan), Annie Chen (University of Michigan), Yixin Zou (Max Planck Institute for Security and Privacy), Florian Schaub (University of Michigan)
- SoK: (Un)usable Privacy: the Lack of Overlap between Privacy-Aware Sensing and Usable Privacy Research
[PDF] [Artifact: Reproduced]
Yasha Iravantchi (University of Michigan), Pardis Emami-Naeini (Duke University), Alanson Sample (University of Michigan)
- Gig Work at What Cost? Exploring Privacy Risks of Gig Work Platform Participation in the U.S.
[PDF]
Amogh Pradeep (Northeastern University), Johanna Gunawan (Northeastern University), Álvaro Feal (Northeastern University), Woodrow Hartzog (Boston University), David Choffnes (Northeastern University)
- Janus: Fast Privacy-Preserving Data Provenance For TLS
[PDF] [Artifact: Reproduced]
Jan Lauinger (Technical University of Munich), Jens Ernstberger (Technical University of Munich), Andreas Finkenzeller (Technical University of Munich), Sebastian Steinhorst (Technical University of Munich)
- Improving the Performance and Security of Tor's Onion Services
[PDF] [Artifact: Functional]
Arushi Arora (Purdue University), Christina Garman (Purdue University)
- Topology-Based Reconstruction Prevention for Decentralised Learning
[PDF] [Artifact: Reproduced]
Florine W. Dekker (Delft University of Technology), Zekeriya Erkin (Delft University of Technology), Mauro Conti (Università di Padova)
- Private Computation on Common Fuzzy Records
[PDF]
Kyoohyung Han (Samsung SDS), Seongkwang Kim (Samsung SDS), Yongha Son (Sungshin Women's University)
- Communication Efficient Differentially Private Federated Learning Using Second Order Information
[PDF]
Mounssif Krouka (University of Oulu), Antti Koskela (Nokia Bell Labs), Tejas Kulkarni (Nokia Bell Labs)
- A Comprehensive Study of Privacy Risks in Curriculum Learning
[PDF]
Joann Qiongna Chen (San Diego State University), Xinlei He (Hong Kong University of Science and Technology (Guangzhou)), Zheng Li (CISPA Helmholtz Center for Information Security), Yang Zhang (CISPA Helmholtz Center for Information Security), Zhou Li (University of California, Irvine)
- PrePaMS: Privacy-Preserving Participant Management System for Studies with Rewards and Prerequisites
[PDF] [Artifact: Reproduced]
Echo Meißner (Institute of Distributed Systems, Ulm University), Frank Kargl (Institute of Distributed Systems, Ulm University), Benjamin Erb (Institute of Distributed Systems, Ulm University), Felix Engelmann (MAX-IV Laboratory, Lund University)
- “It’s Not My Data Anymore”: Exploring Non-Users’ Privacy Perceptions of Medical Data Donation Apps
[PDF]
Sarah Abdelwahab Gaballah (Ruhr University Bochum), Lamya Abdullah (Technical University of Darmstadt), Ephraim Zimmer (Ruhr University Bochum), Sascha Fahl (CISPA Helmholtz Center for Information Security), Max Mühlhäuser (Technical University of Darmstadt), Karola Marky (Ruhr University Bochum)
- MixBuy: Contingent Payment in the Presence of Coin Mixers
[PDF]
Diego Castejon-Molina (Universidad Politécnica de Madrid / IMDEA Software Institute), Dimitrios Vasilopoulos (IMDEA Software Institute), Pedro Moreno-Sanchez (IMDEA Software Institute / VISA Research)
- The Battery Insertion Attack: Is Periodic Pseudo-randomization Sufficient for Beacon Privacy?
[PDF]
Liron David (Weizmann Institute of Science and Google Research), Avinatan Hassidim (Bar-Ilan University and Google Research), Yossi David (Tel-Aviv University and Google Research), Moti Yung (Columbia University and Google Privacy, Security, and Safety Research)
- How Unique is Whose Web Browser? The role of demographics in browser fingerprinting among US users
[PDF] [Artifact: Available]
Alex Berke (MIT Media Lab), Badih Ghazi (Google), Enrico Bacis (Google), Pritish Kamath (Google), Ravi Kumar (Google), Robin Lassonde (Google), Pasin Manurangsi (Google), Umar Syed (Google)
- Hardware-Accelerated Encrypted Execution of General-Purpose Applications
[PDF]
Charles Gouert (University of Delaware), Vinu Joseph (NVIDIA), Steven Dalton (NVIDIA), Cedric Augonnet (NVIDIA), Michael Garland (NVIDIA), Nektarios Georgios Tsoutsos (University of Delaware)
- PrivacyGuard: Exploring Hidden Cross-App Privacy Leakage Threats In IoT Apps
[PDF] [Artifact: Reproduced]
Zhaohui Wang (The University of Kansas), Bo Luo (The University of Kansas), Fengjun Li (The University of Kansas)
- Re-visiting Authorized Private Set Intersection: A New Privacy-Preserving Variant and Two Protocols
[PDF] [Artifact: Available]
Francesca Falzon (ETH Zürich), Evangelia Anna Markatou (TU Delft)
- The Impact of Default Mobile SDK Usage on Privacy and Data Protection
[PDF] [Artifact: Available]
Simon Koch (TU Braunschweig), Manuel Karl (TU Braunschweig), Robin Kirchner (TU Braunschweig), Malte Wessels (TU Braunschweig), Anne Paschke (TU Braunschweig), Martin Johns (TU Braunschweig)
- Noiseless Privacy-Preserving Decentralized Learning
[PDF] [Artifact: Functional]
Sayan Biswas (EPFL, Switzerland), Mathieu Even (Inria, DI ENS, PSL University, France), Anne-Marie Kermarrec (EPFL, Switzerland), Laurent Massoulié (Inria, DI ENS, PSL University, France), Rafael Pires (EPFL, Switzerland), Rishi Sharma (EPFL, Switzerland), Martijn de Vos (EPFL, Switzerland)
- Towards Privacy-preserving and Fairness-aware Federated Learning Framework
[PDF] [Artifact: Available]
Adda-Akram Bendoukha (Samovar, Télécom SudParis, Institut Polytechnique de Paris, France), Didem Demirag (Université du Québec à Montréal (UQAM), Canada), Nesrine Kaaniche (Samovar, Télécom SudParis, Institut Polytechnique de Paris, France), Aymen Boudguiga (CEA List, Université Paris-Saclay, France), Renaud Sirdey (CEA List, Université Paris-Saclay, France), Sébastien Gambs (Samovar, Télécom SudParis, Institut Polytechnique de Paris, France)
Issue 2
- Editors' Introduction
Rob Jansen (U.S. Naval Research Laboratory), Zubair Shafiq (University of California, Davis)
- Time-Efficient Locally Relevant Geo-Location Privacy Protection
[PDF] [Artifact: Functional]
Chenxi Qiu (University of North Texas), Ruiyao Liu (University of North Texas), Primal Pappachan (Portland State University), Anna Squicciarini (Pennsylvania State University), Xinpeng Xie (University of North Texas)
- TETRIS: Composing FHE Techniques for Private Functional Exploration Over Large Datasets
[PDF]
Malika Izabachène (Independent), Jean-Philippe Bossuat (Independent)
- Unlearning Clients, Features and Samples in Vertical Federated Learning
[PDF]
Ayush K. Varshney (Umeå University), Konstantinos Vandikas (Ericsson Research, Ericsson), Vicenç Torra (Umeå University)
- DiffPrivate: Facial Privacy Protection with Diffusion Models
[PDF] [Artifact: Functional]
Minh-ha Le (Linköping University), Niklas Carlsson (Linköping University)
- Echoes of Privacy: Uncovering the Profiling Practices of Voice Assistants
[PDF] [Artifact: Functional]
Tina Khezresmaeilzadeh (University of Southern California), Elaine Zhu (Northeastern University), Kiersten Grieco (Northeastern University), Daniel Dubois (Northeastern University), Konstantinos Psounis (University of Southern California), David Choffnes (Northeastern University)
- AnoFel: Supporting Anonymity for Privacy-Preserving Federated Learning
[PDF] [Artifact: Available]
Ghada Almashaqbeh (University of Connecticut), Zahra Ghodsi (Purdue University)
- Surveillance Disguised as Protection: A Comparative Analysis of Sideloaded and In-Store Parental Control Apps
[PDF] [Artifact: Available]
Eva-Maria Maier (St. Pölten University of Applied Sciences), Leonie Maria Tanczer (University College London), Lukas Daniel Klausner (St. Pölten University of Applied Sciences)
- Unmasking the Shadows: A Cross-Country Study of Online Tracking in Illegal Movie Streaming Services
[PDF] [Artifact: Reproduced]
Hussein Sheaib (Saarland University), Anja Feldmann (Max Planck Institute for Informatics), Ha Dao (Max Planck Institute for Informatics)
- SPINML: Customized Synthetic Data Generation for Private Training of Specialized ML Models
[PDF] [Artifact: Functional]
Jiang Zhang (University of Southern California), Rohan Sequeira (University of Southern California), Konstantinos Psounis (University of Southern California)
- Private Shared Random Minimum Spanning Forests
[PDF] [Artifact: Reproduced]
Marian Dietz (ETH Zurich), Florian Kerschbaum (University of Waterloo)
- Privacy Settings of Third-Party Libraries in Android Apps: A Study of Facebook SDKs
[PDF] [Artifact: Available]
David Rodriguez (ETSI Telecomunicación, Universidad Politécnica de Madrid), Joseph A. Calandrino, Jose M. Del Alamo (ETSI Telecomunicación, Universidad Politécnica de Madrid), Norman Sadeh (Carnegie Mellon University)
- Privacy Perceptions and Behaviors Towards Targeted Advertising on Social Media: A Cross-Country Study on the Effect of Culture and Religion
[PDF]
Smirity Kaushik (University of Illinois Urbana-Champaign), Tanusree Sharma (University of Illinois Urbana-Champaign), Yaman Yu (University of Illinois Urbana-Champaign), Amna Ali (University of Illinois Urbana-Champaign), Bart Piet Knijnenburg (Clemson University), Yang Wang (University of Illinois Urbana-Champaign), Yixin Zou (Max Planck Institute for Security and Privacy)
- ZIPNet: Low-bandwidth anonymous broadcast from (dis)Trusted Execution Environments
[PDF]
Michael Rosenberg, Maurice Shih (University of Maryland), Zhenyu Zhao (Tsinghua University), Rui Wang (Purdue University), Ian Miers (University of Maryland), Fan Zhang (Yale University)
- The Impact of Generalization Techniques on the Interplay Among Privacy, Utility, and Fairness
[PDF]
Ahmad Hassanpour (Norwegian University of Science and Technology), Amir Zarei (Norwegian University of Science and Technology), Khawla Mallat (SAP Company), Anderson Santana de Oliveira (SAP Company), Bian Yang (Norwegian University of Science and Technology)
- Are Neuromorphic Architectures Inherently Privacy-preserving? An Exploratory Study
[PDF] [Artifact: Functional]
Ayana Moshruba (George Mason University), Ihsen Alouani (Centre for Secure Information Technologies (CSIT), Queen's University Belfast), Maryam Parsa (George Mason University)
- Practical, Private Assurance of the Value of Collaboration via Fully Homomorphic Encryption
[PDF] [Artifact: Functional]
Hassan Jameel Asghar (Macquarie University), Zhigang Lu (Western Sydney University), Zhongrui Zhao (James Cook University), Dali Kaafar (Macquarie University)
- Automating Governing Knowledge Commons and Contextual Integrity (GKC-CI) Privacy Policy Annotations with Large Language Models
[PDF] [Artifact: Functional]
Jake Chanenson (University of Chicago), Madison Pickering (University of Chicago), Noah Apthorpe (Colgate University)
- Understanding Regional Filter Lists: Efficacy and Impact
[PDF] [Artifact: Functional]
Christian Böttger (Institute for Internet Security; Westphalian University of Applied Sciences), Nurullah Demir (Institute for Internet Security; Westphalian University of Applied Sciences), Jan Hörnemann (AWARE7 GmbH), Bhupendra Acharya (CISPA), Norbert Pohlmann (Institute for Internet Security; Westphalian University of Applied Sciences), Thorsten Holz (CISPA), Matteo Grosse-Kampmann (Rhine-Waal University of Applied Sciences and AWARE7 GmbH), Tobias Urban (Institute for Internet Security; Westphalian University of Applied Sciences)
- Can Social Media Privacy and Safety Features Protect Targets of Interpersonal Attacks? A Systematic Analysis
[PDF]
Majed Almansoori (University of Wisconsin--Madison and United Arab Emirates University (UAEU)), Rahul Chatterjee (University of Wisconsin--Madison)
- VIMz: Private Proofs of Image Manipulation using Folding-based zkSNARKs
[PDF] [Artifact: Reproduced]
Stefan Dziembowski (University of Warsaw / IDEAS NCBR), Shahriar Ebrahimi (IDEAS NCBR), Parisa Hassanizadeh (IPPT PAN / IDEAS NCBR)
- To Reveal or Conceal: Privacy and Marginalization in Avatars
[PDF]
Mattea Sim (Indiana University), Basia Radka (University of Washington), Emi Yoshikawa (University of Washington), Franziska Roesner (University of Washington), Kurt Hugenberg (Indiana University), Tadayoshi Kohno (University of Washington)
- The Last Hop Attack: Why Loop Cover Traffic over Fixed Cascades Threatens Anonymity
[PDF] [Artifact: Reproduced]
Maximilian Weisenseel (TU Dresden), Christoph Döpmann (TU Berlin), Florian Tschorsch (TU Dresden)
- White-box Membership Inference Attacks against Diffusion Models
[PDF] [Artifact: Reproduced]
Yan Pang (University of Virginia), Tianhao Wang (University of Virginia), Xuhui Kang (University of Virginia), Mengdi Huai (Iowa State University), Yang Zhang (CISPA Helmholtz Center for Information Security)
- ORIGO: Proving Provenance of Sensitive Data with Constant Communication
[PDF]
Jens Ernstberger (Technical University of Munich), Jan Lauinger (Technical University of Munich), Yinnan Wu (Technical University of Munich), Arthur Gervais (University College London), Sebastian Steinhorst (Technical University of Munich)
- DB-PAISA: Discovery-Based Privacy-Agile IoT Sensing+Actuation
[PDF] [Artifact: Functional]
Isita Bagayatkar (University of California, Irvine), Youngil Kim (University of California, Irvine), Gene Tsudik (University of California, Irvine)
- PGUP: Pretty Good User Privacy for 5G-enabled Secure Mobile Communication Protocols
[PDF]
Rabiah Alnashwan (Imam Mohammad Ibn Saud Islamic University, University of Sheffield), Prosanta Gope (University of Sheffield), Benjamin Dowling (King's College London), Yang Yang (National University of Singapore)
- SecurED: Secure Multiparty Edit Distance for Genomic Sequences
[PDF]
Jiahui Gao (Arizona State University), Yagaagowtham Palanikumar (Arizona State University), Dimitris Mouris (Nillion), Duong Nguyen (Arizona State University), Ni Trieu (Arizona State University)
- SoK: The Spectre of Surveillance and Censorship in Future Internet Architectures
[PDF]
Michael Wrana (University of Waterloo), Diogo Barradas (University of Waterloo), N Asokan (University of Waterloo)
- Onion-Location Measurements and Fingerprinting
[PDF] [Artifact: Reproduced]
Paul Syverson (U.S. Naval Research Laboratory), Rasmus Dahlberg (Independent), Tobias Pulls (Karlstad University), Rob Jansen (U.S. Naval Research Laboratory)
- Oryx: Private detection of cycles in federated graphs
[PDF]
Ke Zhong (University of Pennsylvania), Sebastian Angel (University of Pennsylvania)
- Efficient Verifiable Differential Privacy with Input Authenticity in the Local and Shuffle Model
[PDF] [Artifact: Reproduced]
Tariq Bontekoe (University of Groningen), Hassan Jameel Asghar (Macquarie University), Fatih Turkmen (University of Groningen)
- RPKI-Based Location-Unaware Tor Guard Relay Selection Algorithms
[PDF] [Artifact: Functional]
Zhifan Lu (University of Virginia), Siyang Sun (University of Virginia), Yixin Sun (University of Virginia)
- MProve-Nova: A Privacy-Preserving Proof of Reserves Protocol for Monero
[PDF] [Artifact: Reproduced]
Varun Thakore (Indian Institute of Technology Bombay), Saravanan Vijayakumaran (Indian Institute of Technology Bombay)
- Recycling Scraps: Improving Private Learning by Leveraging Checkpoints]{Recycling Scraps: Improving Private Learning by Leveraging Checkpoints
[PDF]
Virat Shejwalkar (Google Deepmind), Arun Ganesh (Google Research), Rajiv Mathews (Google Deepmind), Yarong Mu (Google), Shuang Song (Google Deepmind), Om Thakkar (OpenAI), Abhradeep Thakurta (Google Deepmind), Xinyi Zheng (Google)
- OPPID: Single Sign-On with Oblivious Pairwise Pseudonyms
[PDF] [Artifact: Reproduced]
Maximilian Kroschewski (Hasso Plattner Institute, University of Potsdam), Anja Lehmann (Hasso Plattner Institute, University of Potsdam), Cavit Özbay (Hasso Plattner Institute, University of Potsdam)
- Enhancing Metric Privacy With a Shuffler
[PDF] [Artifact: Reproduced]
Andreas Athanasiou (INRIA and LIX, École Polytechnique), Konstantinos Chatzikokolakis (National and Kapodistrian University of Athens), Catuscia Palamidessi (INRIA and LIX, École Polytechnique)
- Maliciously Secure Circuit Private Set Intersection via SPDZ-Compatible Oblivious PRF
[PDF]
Yaxi Yang (Singapore University of Technology and Design), Xiaojian Liang (Ant International, Ant Group, China), Xiangfu Song (National University of Singapore & Guangzhou University), Ye Dong (Singapore University of Technology and Design), Linting Huang (Guangzhou University), Hongyu Ren (Guangzhou University), Changyu Dong (Guangzhou University), Jianying Zhou (Singapore University of Technology and Design)
- Wave Hello to Privacy: Efficient Mixed-Mode MPC using Wavelet Transforms
[PDF] [Artifact: Available]
Jose Reis (Nillion), Mehmet Ugurbil (Nillion), Sameer Wagh (SecretBit Ventures LLC), Ryan Henry (University of Calgary), Miguel de Vega (Nillion)
- Why Am I Seeing Double? An Investigation of Device Management Flaws in Voice Assistant Platforms
[PDF]
Muslum Ozgur Ozmen (Arizona State University), Mehmet Oguz Sakaoglu (Purdue University), Jackson Bizjak (Purdue University), Jianliang Wu (Simon Fraser University), Antonio Bianchi (Purdue University), Dave (Jing) Tian (Purdue University), Z. Berkay Celik (Purdue University)
Issue 3
- Editors' Introduction
Rob Jansen (U.S. Naval Research Laboratory), Zubair Shafiq (University of California, Davis)
- 'AI is from the devil.' Behaviors and Concerns Toward Personal Data Sharing with LLM-based Conversational Agents
[PDF]
Noé Zufferey (ETH Zurich), Sarah Abdelwahab Gaballah (Ruhr University of Bochum), Karola Marky (Ruhr University of Bochum), Verena Zimmermann (ETH Zurich)
- Differentially Private Release of Hierarchical Origin/Destination Data with a TopDown Approach
[PDF] [Artifact: Reproduced]
Fabrizio Boninsegna (University of Padova), Francesco Silvestri (University of Padova)
- Achieving Data Reconstruction Hardness and Efficient Computation in Multiparty Minimax Training
[PDF] [Artifact: Available]
Truong Son Nguyen (Arizona State University), Yi Ren (Arizona State University), Guangyu Nie (Arizona State University), Ni Trieu (Arizona State University)
- GNNBleed: Inference Attacks to Unveil Private Edges in Graphs with Realistic Access to GNN Models
[PDF] [Artifact: Functional]
Zeyu Song (Penn State University), Ehsanul Kabir (Penn State University), Shagufta Mehnaz (Penn State University)
- PIGEON: A High Throughput Framework for Private Inference of Neural Networks using Secure Multiparty Computation
[PDF] [Artifact: Reproduced]
Christopher Harth-Kitzerow (Technical University of Munich, BMW Group), Yongqin Wang (University of Southern California), Rachit Rajat (University of Southern California), Georg Carle (Technical University of Munich), Murali Annavaram (University of Southern California)
- Who Cares? Contextual Privacy Judgments from Owner and Bystander Perspectives in Different Smart Home Situations
[PDF]
Alisa Frik (International Computer Science Institute), Xiao Zhan (King’s College London), Noura Abdi (Liverpool Hope University), Julia Bernd (International Computer Science Institute)
- Referrer Policy: Implementation and Circumvention
[PDF]
Luqman Zagi (Radboud University), Zahra Moti (Radboud University), Gunes Acar (Radboud University)
- A non comparison oblivious sort and its application to k-NN
[PDF] [Artifact: Reproduced]
Sofiane Azogagh (University of Quebec at Montreal), Marc-Olivier Killijian (University of Quebec at Montreal), Félix Larose-Gervais (University of Quebec at Montreal)
- The Effect of Platform Policies on App Privacy Compliance: A Study of Child-Directed Apps
[PDF]
Noura Alomar (University of California, Berkeley), Joel Reardon (University of Calgary), Aniketh Girish (IMDEA Networks Institute), Narseo Vallina-Rodriguez (IMDEA Networks Institute), Serge Egelman (University of California, Berkeley and International Computer Science Institute (ICSI))
- Client-Efficient Online-Offline Private Information Retrieval
[PDF]
Hoang-Dung Nguyen (Virginia Tech), Jorge Guajardo (Robert Bosch LLC --- RTC), Thang Hoang (Virginia Tech)
- Understanding User Privacy Perceptions in Video Conferencing: Insights from a Feature-Specific User Study
[PDF]
Hobin Kim (KAIST), Wonho Song (KAIST), Joseph Seering (KAIST), Min Suk Kang (KAIST)
- Locally Differentially Private Frequency Estimation via Joint Randomized Response
[PDF]
Ye Zheng (Rochester Institute of Technology), Shafizur Rahman Seeam (Rochester Institute of Technology), Yidan Hu (Rochester Institute of Technology), Rui Zhang (University of Delaware), Yanchao Zhang (Arizona State University)
- Learning Privacy from Visual Entities
[PDF] [Artifact: Functional]
Alessio Xompero (Queen Mary University of London), Andrea Cavallaro (Idiap Research Institute / École Polytechnique Fédérale de Lausanne)
- Teaching an Old Dog New Tricks: Verifiable FHE Using Commodity Hardware
[PDF]
Jules Drean (MIT CSAIL), Fisher Jepsen (MIT CSAIL), Edward Suh (NVIDIA), Srini Devadas (MIT CSAIL), Aamer Jaleel (NVIDIA), Gururaj Saileshwar (University of Toronto)
- Privacy and Security of FIDO2 Revisited
[PDF]
Manuel Barbosa (Universidade do Porto (FCUP) & INESC TEC & Max Planck Institute for Security and Privacy), Alexandra Boldyreva (Georgia Institute of Technology), Shan Chen (Southern University of Science and Technology), Kaishuo Cheng (Georgia Institute of Technology), Luís Esquível (Universidade do Porto (FCUP) & INESC TEC)
- Vote&Check: Secure Postal Voting with Reduced Trust Assumptions
[PDF] [Artifact: Reproduced]
Véronique Cortier (Université de Lorraine, CNRS, Inria, LORIA, France), Alexandre Debant (Université de Lorraine, CNRS, Inria, LORIA, France), Pierrick Gaudry (Université de Lorraine, CNRS, Inria, LORIA, France), Léo Louistisserand (Université de Lorraine, CNRS, Inria, LORIA, France)
- Does Coding Style Really Survive Compilation? Stylometry of Executable Code Revisited
[PDF] [Artifact: Functional]
Muaz Ali (University of Arizona), Tugay Bilgis (University of Arizona), Nimet Beyza Bozdag (University of Arizona), Saumya Debray (University of Arizona), Sazzadur Rahaman (University of Arizona)
- Your Signal, Their Data: An Empirical Privacy Analysis of Wireless-scanning SDKs in Android
[PDF]
Aniketh Girish (IMDEA Networks Institute/Universidad Carlos III de Madrid), Joel Reardon (University of Calgary), Juan Tapiador (Universidad Carlos III de Madrid), Srdjan Matic (IMDEA Software Institute), Narseo Vallina-Rodriguez (IMDEA Networks Institute)
- On the Differential Privacy and Interactivity of Privacy Sandbox Reports
[PDF]
Badih Ghazi (Google), Charlie Harrison (Google), Arpana Hosabettu (Google), Pritish Kamath (Google), Alexander Knop (Google), Ravi Kumar (Google), Ethan Leeman (Google), Pasin Manurangsi (Google), Mariana Raykova (Google), Vikas Sahu (Google), Phillipp Schoppmann (Google)
- Panopticon: The Design and Evaluation of a Game that Teaches Data Science Students Designing Privacy
[PDF] [Artifact: Available]
Yuhe Tian (University of California, San Diego), Shao-Yu Chu (University of California, San Diego), Yuxuan Liu (University of California, San Diego), Haojian Jin (University of California, San Diego)
- SCIF: Privacy-Preserving Statistics Collection with Input Validation and Full Security
[PDF]
Jianan Su (Georgetown University), Laasya Bangalore (SandboxAQ), Harel Berger (Ariel University), Jason Yi (Georgetown University), Sophia Castor (Georgetown University), Micah Sherr (Georgetown University), Muthuramakrishnan Venkitasubramaniam (Georgetown University)
- Empirically Measuring Data Localization in the EU
[PDF]
Alexander Gamero-Garrido (University of California, Davis), Kicho Yu (University of Southern California), Sumukh Vasisht Shankar (Yale University), Sachin Kumar Singh (University of Utah), Sindhya Balasubramanian (Northeastern University), Alexander Wilcox (Northeastern University), David Choffnes (Northeastern University)
- Low-Cost Privacy-Preserving Decentralized Learning
[PDF] [Artifact: Available]
Sayan Biswas (EPFL), Davide Frey (Univ Rennes, Inria, CNRS, IRISA), Romaric Gaudel (Univ Rennes, Inria, CNRS, IRISA), Anne-Marie Kermarrec (EPFL), Dimitri Lerévérend (Univ Rennes, Inria, CNRS, IRISA), Rafael Pires (EPFL), Rishi Sharma (EPFL), François Taïani (Univ Rennes, Inria, CNRS, IRISA)
- Unbalanced PSI from Client-Independent Relaxed Oblivious PRF
[PDF]
Xiaodong Wang (Tsinghua University & Beijing Institute of Mathematical Sciences and Applications), Zijie Lu (Beijing Institute of Mathematical Sciences and Applications), Bei Liang (Beijing Institute of Mathematical Sciences and Applications), Shengzhe Meng (Tsinghua University & Beijing Institute of Mathematical Sciences and Applications)
- WaKA: Data Attribution using K-Nearest Neighbors and Membership Privacy Principles
[PDF]
Patrick Mesana (HEC Montréal), Clément Bénesse (University du Québec à Montréal), Hadrien Lautraite (University du Québec à Montréal), Gilles Caporossi (HEC Montréal), Sébastien Gambs (University du Québec à Montréal)
- "Free WiFi is not ultimately free": Privacy Perceptions of Users in the US regarding City-wide WiFi Services
[PDF]
Prianka Mandal (William & Mary), Tu Le (University of California, Irvine), Amit Seal Ami (William & Mary), Yuan Tian (University of California, Los Angeles), Adwait Nadkarni (William & Mary)
- Stochastic Models for Remote Timing Attacks
[PDF]
Simone Bozzolan (Università Ca' Foscari Venezia), Diletta Olliaro (Università Ca' Foscari Venezia), Stefano Calzavara (Università Ca' Foscari Venezia), Andrea Marin (Università Ca' Foscari Venezia), Gianfranco Balbo (Università di Torino), Matteo Sereno (Università di Torino)
- SoK: Web Authentication and Recovery in the Age of End-to-End Encryption
[PDF]
Jenny Blessing (University of Cambridge), Daniel Hugenroth (University of Cambridge), Ross Anderson (University of Cambridge), Alastair Beresford (University of Cambridge)
- Evaluating a Data Fiduciary Standard for Privacy: Developer and End-user Perspectives
[PDF]
Michele Tang (Pomona College), Liam Bayer (Pomona College), Leonardo Torres (Pomona College), Eleanor Birrell (Pomona College)
Issue 4
- Editors' Introduction
Rob Jansen (U.S. Naval Research Laboratory), Zubair Shafiq (University of California, Davis)
- LANShield: Analysing and Protecting Local Network Access on Mobile Devices
[PDF]
Angelos Beitis (DistriNet, KU Leuven), Jeroen Robben (DistriNet, KU Leuven), Alexander Matern (Technical University of Darmstadt), Zhen Lei (Taiyuan University of Technology), Yijia Li (Taiyuan University of Technology), Nian Xue (Shandong University of Technology), Yongle Chen (Taiyuan University of Technology), Vik Vanderlinden (DistriNet, KU Leuven), Mathy Vanhoef (DistriNet, KU Leuven)
- Lost in Translation: Exploring the Risks of Web-to-Cross-platform Application Migration
[PDF]
Claudio Paloscia (University of Illinois Chicago), Kostas Solomos (University of Illinois Chicago), Mir Masood Ali (University of Illinois Chicago), Jason Polakis (University of Illinois Chicago)
- PrivDiffuser: Privacy-Guided Diffusion Model for Data Obfuscation in Sensor Networks
[PDF]
Xin Yang (University of Alberta), Omid Ardakanian (University of Alberta)
- TEEMS: A Trusted Execution Environment based Metadata-protected Messaging System
[PDF]
Sajin Sasy (CISPA Helmholtz Center for Information Security), Aaron Johnson (U.S. Naval Research Laboratory), Ian Goldberg (University of Waterloo)
- ``Erasing the Echo'': The Usability of Data Deletion in Smart Personal Assistants
[PDF]
Cheng Cheng (University of Bristol), Kopo M. Ramokapane (University of Bristol)
- WatchWitch: Interoperability, Privacy, and Autonomy for the Apple Watch
[PDF]
Nils Rollshausen (Secure Mobile Networking Lab, Technical University of Darmstadt), Alexander Heinrich (Secure Mobile Networking Lab, Technical University of Darmstadt), Matthias Hollick (Secure Mobile Networking Lab, Technical University of Darmstadt), Jiska Classen (Hasso Plattner Institute, University of Potsdam)
- An Analysis of Chinese Censorship Bias in LLMs
[PDF]
Mohamed Ahmed (Citizen Lab, University of Toronto), Jeffrey Knockel (Citizen Lab / Bowdoin College), Rachel Greenstadt (New York University)
- Improved Open-World Fingerprinting Increases Threat to Streaming Video Privacy but Realistic Scenarios Remain Difficult
[PDF]
Timothy Walsh (Naval Postgraduate School), Armon Barton (Naval Postgraduate School), Mathias Kölsch (Naval Postgraduate School)
- Optimal Piecewise-based Mechanism for Collecting Bounded Numerical Data under Local Differential Privacy
[PDF]
Ye Zheng (Rochester Institute of Technology), Sumita Mishra (Rochester Institute of Technology), Yidan Hu (Rochester Institute of Technology)
- Measuring the Accuracy and Effectiveness of PII Removal Services
[PDF]
Jiahui He (The Hong Kong University of Science and Technology (Guangzhou)), Peter Snyder (Brave Software Inc), Hamed Haddadi (Imperial College London & Brave Software Inc), Fabián E. Bustamante (Northwestern University), Gareth Tyson (The Hong Kong University of Science and Technology (Guangzhou))
- Robust and Efficient Watermarking of Large Language Models Using Error Correction Codes
[PDF]
Xiaokun Luan (Peking University), Zeming Wei (Peking University), Yihao Zhang (Peking University), Meng Sun (Peking University)
- Unveiling Client Privacy Leakage from Public Dataset Usage in Federated Distillation
[PDF]
Haonan Shi (Case Western Reserve University), Tu Ouyang (Case Western Reserve University), An Wang (Case Western Reserve University)
- Help Me Help You: Privacy Considerations for Third Party IoT Device Repair
[PDF]
Nathan Reitinger (University of Maryland), Weijia He (University of Southampton), Chelsea Bruno (University of Michigan), Susan Landau (Tufts University), Carl A. Gunter (University of Illinois at Urbana-Champaign), Mounib Khanafer (American University of Kuwait), Ravindra Mangar (Dartmouth College), Denise Anthony (University of Michigan)
- Estimating Group Means Under Local Differential Privacy
[PDF]
René Raab (Friedrich-Alexander-Universität Erlangen-Nürnberg), Arijana Bohr (Friedrich-Alexander-Universität Erlangen-Nürnberg), Kai Klede (Friedrich-Alexander-Universität Erlangen-Nürnberg), Benjamin Gmeiner (Novartis Pharma GmbH), Bjoern M. Eskofier (Friedrich-Alexander-Universität Erlangen-Nürnberg and Institute of AI for Health, Helmholtz Zentrum München - German Research Center for Environmental Health)
- Leaky Diffusion: Attribute Leakage in Text-Guided Image Generation
[PDF]
Anastasios Lepipas (Imperial College London), Marios Charalambides (Imperial College London), Jiani Liu (Imperial College London), Yiying Guan (Imperial College London), Dominika C Woszczyk (Imperial College London), Mansi (Imperial College London), Thanh Hai Le (Imperial College London), Soteris Demetriou (Imperial College London)
- Aimless Onions: Mixing without Topology Information
[PDF]
Daniel Schadt (Karlsruhe Institute of Technology), Christoph Coijanovic (Karlsruhe Institute of Technology), Thorsten Strufe (Karlsruhe Institute of Technology)
- Match Quest: Fast and Secure Pattern Matching
[PDF]
Pranav Jangir (New York University), Nishat Koti (Aztec Labs), Varsha Bhat Kukkala (IIT Tirupati), Arpita Patra (Indian Institute of Science), Bhavish Raj Gopal (Indian Institute of Science)
- Johnny Can’t Revoke Consent Either: Measuring Compliance of Consent Revocation on the Web
[PDF]
Gayatri Priyadarsini Kancherla (Indian Institute of Technology Gandhinagar), Nataliia Bielova (Inria Centre at University Côte d'Azur), Cristiana Santos (Utrecht University), Abhishek Bichhawat (Indian Institute of Technology Gandhinagar)
- AlphaFL: Secure Aggregation with Malicious2 Security for Federated Learning against Dishonest Majority
[PDF]
Yufan Jiang (KASTEL Security Research Labs), Maryam Zarezadeh (Barkhausen Institut), Tianxiang Dai (Lancaster University Leipzig), Stefan Köpsell (Barkhausen Institut)
- SoK: Truncation Untangled: Scaling Fixed-Point Arithmetic for Privacy-Preserving Machine Learning to Large Models and Datasets
[PDF]
Christopher Harth-Kitzerow (Technical University of Munich, BMW Group), Ajith Suresh (Technology Innovation Institute, Abu Dhabi), Georg Carle (Technical University of Munich)
- Privacy Bills of Materials (PriBOM): A Transparent Privacy Information Inventory for Collaborative Privacy Notice Generation in Mobile App Development
[PDF]
Zhen Tao (CSIRO's Data61 & Australian National University), Shidong Pan (CSIRO's Data61 & Australian National University), Zhenchang Xing (CSIRO's Data61 & Australian National University), Xiaoyu Sun (Australian National University), Omar Haggag (Monash University), John Grundy (Monash University), Jingjie Li (University of Edinburgh), Liming Zhu (CSIRO’s Data61 & UNSW)
- Mission: Impossible – Image-Based Geolocation with Large Vision Language Models
[PDF]
Yi Liu (Quantstamp), Gelei Deng (Nanyang Technological University), Junchen Ding (University of New South Wales), Yuekang Li (University of New South Wales), Tianwei Zhang (Nanyang Technological University), Weisong Sun (Nanyang Technological University), Yaowen Zheng (Institute of Information Engineering, Chinese Academy of Sciences), Jingquan Ge (Nanyang Technological University)
- Intractable Cookie Crumbs: Unveiling the Nexus of Stateful Banner Interaction and Tracking Cookies
[PDF]
Ali Rasaii (Max Planck Institute for Informatics), Ha Dao (Max Planck Institute for Informatics), Anja Feldmann (Max Planck Institute for Informatics), Mohammadmahdi Javid (Max Planck Institute for Informatics), Oliver Gasser (IPinfo), Devashish Gosain (Indian Institute of Technology Bombay)
- Akeso: Bringing Post-Compromise Security to Cloud Storage
[PDF]
Lily Gloudemans (William & Mary), Pankaj Niroula (William & Mary), Aashutosh Poudel (William & Mary), Collin MacDonald (William & Mary), Stephen Herwig (William & Mary)
- Path to Encrypted DNS with DDR: Adoption, Configuration Patterns, and Privacy Implications
[PDF]
vasilis ververis (Hasso Plattner Institute, University of Potsdam, Germany), Steffen Sassala (Hasso Plattner Institute, University of Potsdam, Germany), Felix Roth (Hasso Plattner Institute, University of Potsdam, Germany), Vaibhav Bajpai (Hasso Plattner Institute, University of Potsdam, Germany)
- SoK: Private Knowledge Sharing in Distributed Learning
[PDF]
Yasas Supeksala (Swinburne University of Technology), Thilina Ranbaduge (CSIRO's Data61), Ming Ding (CSIRO's Data61), Dinh C. Nguyen (University of Alabama), Bo Liu (University of Technology Sydney), Caslon Chua (Swinburne University of Technology), Jun Zhang (Swinburne University of Technology)
- Sheep's clothing, wolfish intent: Automated detection and evaluation of problematic 'allowed' advertisements
[PDF]
Ritik Roongta (New York University), Julia Jose (New York University), Hussam Habib (New York University), Rachel Greenstadt (New York University)
- Who’s Watching You Zoom? Investigating Privacy of Third-Party Zoom Apps
[PDF]
Saharsh Goenka (Arizona State University), Adit Prabhu (Arizona State University), Payge Sakurai (Arizona State University), Mrinaal Ramachandran (Arizona State University), Rakibul Hasan (Arizona State University)
- Defining Privacy Engineering as a Profession
[PDF]
Nikita Samarin (University of California, Berkeley), Nandita Rao Narla (Future of Privacy Forum), Liam Webster (University of California, Berkeley), Daniel Smullen (CableLabs)
- TimberStrike: Dataset Reconstruction Attack Revealing Privacy Leakage in Federated Tree-Based Systems
[PDF]
Marco Di Gennaro (Politecnico di Milano), Giovanni De Lucia (Politecnico di Milano), Stefano Longari (Politecnico di Milano), Stefano Zanero (Politecnico di Milano), Michele Carminati (Politecnico di Milano)
- HyDia:FHE-based Facial Matching with Hybrid Approximations and Diagonalization
[PDF]
Sam Martin (University of Notre Dame), Nirajan Koirala (University of Notre Dame), Helena Berens (University of Notre Dame), Thomas Rozgonyi (University of Notre Dame), Micah Brody (University of Notre Dame), Taeho Jung (University of Notre Dame)
- Okay Google, Where’s My Tracker? Security, Privacy, and Performance Evaluation of Google's Find My Device Network
[PDF]
Leon Böttger (Technical University of Darmstadt), Alexander Matern (Technical University of Darmstadt), Dennis Arndt (Technical University of Darmstadt), Matthias Hollick (Technical University of Darmstadt)
- Navigating Social Media Privacy: Awareness, Preferences, and Discoverability
[PDF]
Pithayuth Charnsethikul (University of Southern California Information Sciences Institute), Almajd Zunquti (University of Southern California Information Sciences Institute), Gale Lucas (University of Southern California Institute for Creative Technologies), Jelena Mirkovic (University of Southern California Information Sciences Institute)
- Sybil-Resistant Parallel Mixing
[PDF]
Maya Kleinstein (Hebrew University of Jerusalem), Riad Wahby (Carnegie Mellon University), Yossi Gilad (Hebrew University of Jerusalem)
- Models Matter: Setting Accurate Privacy Expectations for Local and Central Differential Privacy
[PDF]
Mary Anne Smart (Purdue University), Priyanka Nanayakkara (Harvard University), Rachel Cummings (Columbia University), Gabriel Kaptchuk (University of Maryland, College Park), Elissa Redmiles (Georgetown University)
- Tracker Installations Are Not Created Equal: Understanding Tracker Configuration of Form Data Collection
[PDF]
Julia B. Kieserman (New York University), Athanasios Andreou (New York University), Chris Geeng (Northeastern University), Tobias Lauinger (New York University), Damon McCoy (New York University)
- Meta-Learn to Unlearn: Enhanced Exact Machine Unlearning in Recommendation Systems with Meta-Learning
[PDF]
Abdulla Alshabanah (University of Southern California), Keshav Balasubramanian (University of Southern California), Murali Annavaram (University of Southern California)
- CenPush: Blocking-Resistant Control Channel Using Push Notifications
[PDF]
Piyush Kumar Sharma (University of Michigan), Diwen Xue (University of Michigan), Aaron Ortwein (University of Michigan), Cecylia Bocovich (The Tor Project), Harry (Independent), Roya Ensafi (University of Michigan)
- Hypersphere Secure Sketch Revisited: Probabilistic Linear Regression Attack on IronMask in Multiple Usage
[PDF]
Pengxu Zhu (Shanghai Jiao Tong University), Lei Wang (Shanghai Jiao Tong University)
- Tracking Without Borders: Studying the Role of WebViews in Bridging Mobile and Web Tracking
[PDF]
Nipuna Weerasekara (IMDEA Networks Institute / Universidad Carlos III de Madrid), José Miguel Moreno (Universidad Carlos III de Madrid), Srdjan Matic (IMDEA Software Institute), Joel Reardon (University of Calgary / AppCensus), Juan Tapiador (Universidad Carlos III de Madrid), Narseo Vallina-Rodríguez (IMDEA Networks Institute / AppCensus)
- Uncovering the App Cloud Access Risks under Recommended IAM Security Practices
[PDF]
Hengtong Lu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China,), Yan Zhang (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China,), Qingfeng Tang (Macau University of Science and Technology, FIE), Pengwei Zhan (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China,)
- Making Web Applications GDPR Compliant: A Comparative Evaluation of GDPR-Enforcement Frameworks
[PDF]
Felix Kalinowski (Ruhr University Bochum), David Klein (Technische Universität Braunschweig), Martin Johns (Technische Universität Braunschweig), Veelasha Moonsamy (Ruhr University Bochum)
- Rethinking Fingerprinting: An Assessment of Behavior-based Methods at Scale and Implications for Web Tracking
[PDF]
Kyle Crichton (Georgetown University), Lorrie Faith Cranor (Carnegie Mellon University), Nicolas Christin (Carnegie Mellon University)
- My Data or Our Data? A Comparative Study of Collaborative Family Apps and Parents' Experiences with Apple's Family Sharing
[PDF]
Amel Bourdoucen (Aalto University), Janne Lindqvist (Aalto University)
- Hoovered up as a data point: Exploring Privacy Behaviours, Awareness, and Concerns Among UK Users of LLM-based Conversational Agents
[PDF]
Lisa Mekioussa Malki (University College London), Akhil Polamarasetty (University College London), Majid Hatamian (Google), Mark Warner (University College London), Enrico Costanza (University College London)
- TeleSparse: Practical Privacy-Preserving Verification of Deep Neural Networks
[PDF]
Mohammad M Maheri (Imperial College London), Hamed Haddadi (Imperial College London), Alex Davidson (LASIGE, Universidade de Lisboa)
- SoK: Usability Studies in Differential Privacy
[PDF]
Onyinye Dibia (University of Vermont), Prianka Bhattacharjee (University of Vermont), Brad Stenger (University of Vermont), Steven Baldasty (University of Vermont), Mako Bates (University of Vermont), Ivoline Ngong (University of Vermont), Yuanyuan Feng (University of Vermont), Joseph Near (University of Vermont)
- What WeChat Knows: Pervasive First-Party Tracking in a Billion-User Super-App Ecosystem
[PDF]
Mona Wang (Princeton University), Pellaeon Lin (Citizen Lab), Jeffrey Knockel (Citizen Lab / Bowdoin College), Will Greenberg (Electronic Frontier Foundation), Jonathan Mayer (Princeton University), Prateek Mittal (Princeton University)
- Buy it Now, Track Me Later: Attacking User Privacy via Wi-Fi AP Online Auctions
[PDF]
Steven Su (University of Maryland), Erik Rye (University of Maryland), Dave Levin (University of Maryland), Robert Beverly (San Diego State University)
- Toxic Decoys: A Path to Scaling Privacy-Preserving Cryptocurrencies
[PDF]
Christian Cachin (University of Bern), François-Xavier Wicht (University of Bern)
- MultiCent: Secure and Scalable Computation of Centrality Measures on Multilayer Graphs
[PDF]
Andreas Brüggemann (Technical University of Darmstadt), Nishat Koti (Aztec Labs), Varsha Bhat Kukkala (IIT Tirupati), Thomas Schneider (Technical University of Darmstadt)
- "Do It to Know It": Reshaping the Privacy Mindset of Computer Science Undergraduates
[PDF]
Maisha Boteju (University of Auckland, New Zealand), Danielle Lottridge (University of Auckland, New Zealand), Thilina Ranbaduge (CSIRO's Data61, Canberra, Australia), Dinusha Vatsalan (Macquarie University, Australia), Ni Ding (University of Auckland, New Zealand)
- Silent Splitter: Privacy for Payment Splitting via New Protocols for Distributed Point Functions
[PDF]
Margaret Pierce (University of North Carolina at Chapel Hill), Saba Eskandarian (University of North Carolina at Chapel Hill)
- More and Scammier Ads: The Perils of YouTube's Ad Privacy Settings
[PDF]
Cat Mai (New York University), Bruno Coelho (New York University), Julia Kieserman (New York University), Lexie Matsumoto (New York University), Kyle Spinelli (New York University), Eric Yang (SUNY Buffalo), Athanasios Andreou (New York University), Rachel Greenstadt (New York University), Tobias Lauinger (New York University), Damon McCoy (New York University)
- "If You Want to Encrypt It Really, Really Hardcore...": User Perceptions of Key Transparency in WhatsApp
[PDF]
Konstantin Fischer (Ruhr University Bochum), Markus Keil (Ruhr University Bochum), Annalina Buckmann (Ruhr University Bochum), M. Angela Sasse (Ruhr University Bochum)
- Non-Interactive Verifiable Aggregation
[PDF]
Ojaswi Acharya (University of Massachusetts Amherst), Suvasree Biswas (The George Washington University), Weiqi Feng (University of Massachusetts Amherst), Adam O'Neill (University of Massachusetts Amherst), Arkady Yerukhimovich (The George Washington University)
- Optimizing Encrypted Neural Networks: Model Design, Quantization and Fine-Tuning Using FHEW/TFHE
[PDF]
Yu-Te Ku (Data Science Degree Program, National Taiwan University and Academia Sinica), Feng-Hao Liu (Washington State University), Chih-Fan Hsu (Inventec Corporation), Ming-Ching Chang (State University of New York, University at Albany), Shih-Hao Hung (Data Science Degree Program, National Taiwan University and Academia Sinica), I-Ping Tu (Data Science Degree Program, National Taiwan University and Academia Sinica), Wei-Chao Chen (Inventec Corporation)
- Message Authentication Code with Fast Verification over Encrypted Data and Applications
[PDF]
Adi Akavia (University of Haifa), Meir Goldenberg (University of Haifa), Neta Oren (University of Haifa), Rita Vald (Intuit Inc)