default search action
Proceedings on Privacy Enhancing Technologies, Volume 2023
Volume 2023, Number 1, January 2023
- Michelle L. Mazurek, Micah Sherr:
Editors' Introduction. 1-4 - Christine Utz, Sabrina Amft, Martin Degeling, Thorsten Holz, Sascha Fahl, Florian Schaub:
Privacy Rarely Considered: Exploring Considerations in the Adoption of Third-Party Services by Websites. 5-28 - Amogh Pradeep, Álvaro Feal, Julien Gamba, Ashwin Rao, Martina Lindorfer, Narseo Vallina-Rodriguez, David R. Choffnes:
Not Your Average App: A Large-scale Privacy Analysis of Android Browsers. 29-46 - Noé Zufferey, Kavous Salehzadeh Niksirat, Mathias Humbert, Kévin Huguenin:
"Revoked just now!" Users' Behaviors Toward Fitness-Data Sharing with Third-Party Applications. 47-67 - Yunhao Yang, Parham Gohari, Ufuk Topcu:
On the Privacy Risks of Deploying Recurrent Neural Networks in Machine Learning Models. 68-84 - Travis Mayberry, Erik-Oliver Blass, Ellis Fenske:
Blind My - An Improved Cryptographic Protocol to Prevent Stalking in Apple's Find My Network. 85-97 - Ali Shahin Shamsabadi, Brij Mohan Lal Srivastava, Aurélien Bellet, Nathalie Vauquier, Emmanuel Vincent, Mohamed Maouche, Marc Tommasi, Nicolas Papernot:
Differentially Private Speaker Anonymization. 98-114 - Arnab Bag, Debadrita Talapatra, Ayushi Rastogi, Sikhar Patranabis, Debdeep Mukhopadhyay:
TWo-IN-one-SSE: Fast, Scalable and Storage-Efficient Searchable Symmetric Encryption for Conjunctive and Disjunctive Boolean Queries. 115-139 - Mohamad Mansouri, Melek Önen, Wafa Ben Jaballah, Mauro Conti:
SoK: Secure Aggregation Based on Cryptographic Schemes for Federated Learning. 140-157 - Franziska Boenisch, Christopher Mühl, Roy Rinberg, Jannis Ihrig, Adam Dziedzic:
Individualized PATE: Differentially Private Machine Learning with Individual Privacy Guarantees. 158-176 - Simon Hanisch, Evelyn Muschter, Admantini Hatzipanayioti, Shu-Chen Li, Thorsten Strufe:
Understanding Person Identification Through Gait. 177-189 - Antreas Dionysiou, Vassilis Vassiliades, Elias Athanasopoulos:
Exploring Model Inversion Attacks in the Black-box Setting. 190-206 - Enze Liu, Sumanth Rao, Sam Havron, Grant Ho, Stefan Savage, Geoffrey M. Voelker, Damon McCoy:
No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps. 207-224 - Takao Murakami, Hiromi Arai, Koki Hamada, Takuma Hatano, Makoto Iguchi, Hiroaki Kikuchi, Atsushi Kuromasa, Hiroshi Nakagawa, Yuichi Nakamura, Kenshiro Nishiyama, Ryo Nojima, Hidenobu Oguri, Chiemi Watanabe, Akira Yamada, Takayasu Yamaguchi, Yuji Yamaoka:
Designing a Location Trace Anonymization Contest. 225-243 - Yerim Kim, Minjae Kim, Myungjae Chung, Junbeom Hur:
Detect Your Fingerprint in Your Photographs: Photography-based Multi-Feature Sybil Detection. 244-263 - Minh-Ha Le, Niklas Carlsson:
StyleID: Identity Disentanglement for Anonymizing Faces. 264-278 - Thomas Haines, Rafieh Mosaheb, Johannes Müller, Ivan Pryvalov:
SoK: Secure E-Voting with Everlasting Privacy. 279-293 - Victor Yisa, Reza Ghaiumy Anaraky, Bart P. Knijnenburg, Rita Orji:
Investigating Privacy Decision-Making Processes Among Nigerian Men and Women. 294-308 - Zixiao Zong, Mengwei Yang, Justin Ley, Athina Markopoulou, Carter T. Butts:
Privacy by Projection: Federated Population Density Estimation by Projecting on Random Features. 309-324 - Ehud Aharoni, Allon Adir, Moran Baruch, Nir Drucker, Gilad Ezov, Ariel Farkash, Lev Greenberg, Ramy Masalha, Guy Moshkowich, Dov Murik, Hayim Shaul, Omri Soceanu:
HeLayers: A Tile Tensors Framework for Large Neural Networks on Encrypted Data. 325-342 - Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Koji Chida:
Efficient decision tree training with new data structure for secure multi-party computation. 343-364 - Alex Davidson, Gonçalo Pestana, Sofía Celi:
FrodoPIR: Simple, Scalable, Single-Server Private Information Retrieval. 365-383 - Patricia Arias Cabarcos, Saina Khalili, Thorsten Strufe:
'Surprised, Shocked, Worried'}: User Reactions to Facebook Data Collection from Third Parties. 384-399 - Ismat Jarin, Birhanu Eshete:
MIAShield: Defending Membership Inference Attacks via Preemptive Exclusion of Members. 400-416 - Ghous Amjad, Sarvar Patel, Giuseppe Persiano, Kevin Yeo, Moti Yung:
Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable Encryption. 417-436 - Túlio A. Pascoal, Jérémie Decouchant, Antoine Boutet, Marcus Völp:
I-GWAS: Privacy-Preserving Interdependent Genome-Wide Association Studies. 437-454 - Jessica Colnago, Lorrie Faith Cranor, Alessandro Acquisti:
Is There a Reverse Privacy Paradox? An Exploratory Analysis of Gaps Between Privacy Perspectives and Privacy-Seeking Behaviors. 455-476 - Thea Riebe, Tom Biselli, Marc-André Kaufhold, Christian Reuter:
Privacy Concerns and Acceptance Factors of OSINT for Cybersecurity: A Representative Survey. 477-493 - Lindsey Tulloch, Ian Goldberg:
Lox: Protecting the Social Graph in Bridge Distribution. 494-509 - Ahmed Roushdy Elkordy, Jiang Zhang, Yahya H. Ezzeldin, Konstantinos Psounis, Salman Avestimehr:
How Much Privacy Does Federated Learning with Secure Aggregation Guarantee? 510-526 - Adam Dziedzic, Christopher A. Choquette-Choo, Natalie Dullerud, Vinith M. Suriyakumar, Ali Shahin Shamsabadi, Muhammad Ahmad Kaleem, Somesh Jha, Nicolas Papernot, Xiao Wang:
Private Multi-Winner Voting for Machine Learning. 527-555 - Yuting Zhan, Hamed Haddadi, Afra Mashhadi:
Privacy-Aware Adversarial Network in Human Mobility Prediction. 556-570 - Madiha Tabassum, Heather Lipford:
Exploring privacy implications of awareness and control mechanisms in smart home devices. 571-588 - Piyush Kumar Sharma, Rishi Sharma, Kartikey Singh, Mukulika Maity, Sambuddho Chakravarty:
Dolphin: A Cellular Voice Based Internet Shutdown Resistance System. 589-607 - Alessandro N. Baccarini, Marina Blanton, Chen Yuan:
Multi-Party Replicated Secret Sharing over a Ring with Applications to Privacy-Preserving Machine Learning. 608-626 - Matthew Green, Mathias Hall-Andersen, Eric Hennenfent, Gabriel Kaptchuk, Benjamin Perez, Gijs Van Laer:
Efficient Proofs of Software Exploitability for Real-world Processors. 627-640
Volume 2023, Number 2, April 2023
- Michelle L. Mazurek, Micah Sherr:
Editors' Introduction. 1-4 - Sahar Mazloom, Benjamin E. Diamond, Antigoni Polychroniadou, Tucker Balch:
An Efficient Data-Independent Priority Queue and its Application to Dark Pools. 5-22 - Pranav Shriram A, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal:
Find Thy Neighbourhood: Privacy-Preserving Local Clustering. 23-39 - Dandan Yuan, Cong Zuo, Shujie Cui, Giovanni Russello:
Result-pattern-hiding Conjunctive Searchable Symmetric Encryption with Forward and Backward Privacy. 40-58 - Iyiola E. Olatunji, Mandeep Rathee, Thorben Funke, Megha Khosla:
Private Graph Extraction via Feature Explanations. 59-78 - Reham Mohamed, Habiba Farrukh, Yidong Lu, He Wang, Z. Berkay Celik:
iSTELAN: Disclosing Sensitive User Information by Mobile Magnetometer from Finger Touches. 79-96 - Jovan Powar, Alastair R. Beresford:
SoK: Managing risks of linkage attacks on data privacy. 97-116 - Tobias Fiebig, Seda F. Gürses, Carlos Gañán, Erna Kotkamp, Fernando Kuipers, Martina Lindorfer, Menghua Prisse, Taritha Sari:
Heads in the Clouds? Measuring Universities' Migration to Public Clouds: Implications for Privacy & Academic Freedom. 117-150 - Gonzalo Munilla Garrido, Xiaoyuan Liu, Florian Matthes, Dawn Song:
Lessons Learned: Surveying the Practicality of Differential Privacy in the Industry. 151-170 - Immanuel Kunz, Konrad Weiss, Angelika Schneider, Christian Banse:
Privacy Property Graph: Towards Automated Privacy Threat Modeling via Static Graph-based Analysis. 171-187 - Alexander Veicht, Cédric Renggli, Diogo Barradas:
DeepSE-WF: Unified Security Estimation for Website Fingerprinting Defenses. 188-205 - Akshaye Shenoi, Prasanna Karthik Vairam, Kanav Sabharwal, Jialin Li, Dinil Mon Divakaran:
iPET: Privacy Enhancing Traffic Perturbations for Secure IoT Communications. 206-220 - Nico Ebert, Tim Geppert, Joanna Strycharz, Melanie Knieps, Michael Hönig, Elke Brucker-Kley:
Creative beyond TikToks: Investigating Adolescents' Social Privacy Management on TikTok. 221-235 - Xue Jiang, Yufei Zhang, Xuebing Zhou, Jens Grossklags:
Distributed GAN-Based Privacy-Preserving Publication of Vertically-Partitioned Data. 236-250 - Alina Stöver, Nina Gerber, Henning Pridöhl, Max Maass, Sebastian Bretthauer, Indra Spiecker genannt Döhmann, Matthias Hollick, Dominik Herrmann:
How Website Owners Face Privacy Issues: Thematic Analysis of Responses from a Covert Notification Study Reveals Diverse Circumstances and Challenges. 251-264 - Sebastian Zimmeck, Oliver Wang, Kuba Alicki, Jocelyn Wang, Sophie Eng:
Usability and Enforceability of Global Privacy Control. 265-281 - Zishuai Cheng, Mihai Ordean, Flavio D. Garcia, Baojiang Cui, Dominik Rys:
Watching your call: Breaking VoLTE Privacy in LTE/5G Networks. 282-297 - Frederik Armknecht, Youzhe Heng, Rainer Schnell:
Strengthening Privacy-Preserving Record Linkage using Diffusion. 298-311 - Matteo Giomi, Franziska Boenisch, Christoph Wehmeyer, Borbála Tasnádi:
A Unified Framework for Quantifying Privacy Risk in Synthetic Data. 312-328 - Rana Salal Ali, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Tham Nguyen, Ian David Wood, Mohamed Ali Kâafar:
Unintended Memorization and Timing Attacks in Named Entity Recognition Models. 329-346 - Donghang Lu, Aniket Kate:
RPM: Robust Anonymity at Scale. 347-360 - César Sabater, Florian Hahn, Andreas Peter, Jan Ramon:
Private Sampling with Identifiable Cheaters. 361-383 - Alina Stöver, Sara Hahn, Felix Kretschmer, Nina Gerber:
Investigating how Users Imagine their Personal Privacy Assistant. 384-402 - Sarah Scheffler, Jonathan R. Mayer:
SoK: Content Moderation for End-to-End Encryption. 403-429 - Haodi Wang, Thang Hoang:
ezDPS: An Efficient and Zero-Knowledge Machine Learning Inference Pipeline. 430-448 - Sindhuja Madabushi, Parameswaran Ramanathan:
Two-Cloud Private Read Alignment to a Public Reference Genome. 449-463 - Lovedeep Gondara, Ke Wang:
PubSub-ML: A Model Streaming Alternative to Federated Learning. 464-479 - Nora McDonald, Rachel Greenstadt, Andrea Forte:
Intersectional Thinking about PETs: A Study of Library Privacy. 480-495 - Àlex Miranda-Pascual, Patricia Guerra-Balboa, Javier Parra-Arnau, Jordi Forné, Thorsten Strufe:
SoK: Differentially Private Publication of Trajectory Data. 496-516
Volume 2023, Number 3, July 2023
- Michelle L. Mazurek, Micah Sherr:
Editors' Introduction. 1-4 - Pratik Musale, Adam Lee:
Trust TEE?: Exploring the Impact of Trusted Execution Environments on Smart Home Privacy Norms. 5-23 - Pranav Shriram A, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal, Somya Sangal:
Ruffle: Rapid 3-Party Shuffle Protocols. 24-42 - Maxwell Bland, Anushya Iyer, Kirill Levchenko:
Story Beyond the Eye: Glyph Positions Break PDF Text Redaction. 43-61 - Kang Gu, Ehsanul Kabir, Neha Ramsurrun, Soroush Vosoughi, Shagufta Mehnaz:
Towards Sentence Level Inference Attack Against Pre-trained Language Models. 62-78 - Gabrielle Beck, Arka Rai Choudhuri, Matthew Green, Abhishek Jain, Pratyush Ranjan Tiwari:
Time-Deniable Signatures. 79-102 - Nikita Samarin, Shayna Kothari, Zaina Siyed, Oscar Bjorkman, Reena Yuan, Primal Wijesekera, Noura Alomar, Jordan Fischer, Chris Jay Hoofnagle, Serge Egelman:
Lessons in VCR Repair: Compliance of Android App Developers with the California Consumer Privacy Act (CCPA). 103-121 - Elisa Tsai, Deepak Kumar, Ram Sundara Raman, Gavin Li, Yael Eiger, Roya Ensafi:
CERTainty: Detecting DNS Manipulation at Scale using TLS Certificates. 122-137 - Andrick Adhikari, Sanchari Das, Rinku Dewri:
Evolution of Composition, Readability, and Structure of Privacy Policies over Two Decades. 138-153 - Charles Gouert, Dimitris Mouris, Nektarios Georgios Tsoutsos:
SoK: New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks. 154-172 - Christine Utz, Matthias Michels, Martin Degeling, Ninja Marnau, Ben Stock:
Comparing Large-Scale Privacy and Security Notifications. 173-193 - Liang Wang, Hyojoon Kim, Prateek Mittal, Jennifer Rexford:
RAVEN: Stateless Rapid IP Address Variation for Enterprise Networks. 194-210 - Matthew Jagielski, Stanley Wu, Alina Oprea, Jonathan R. Ullman, Roxana Geambasu:
How to Combine Membership-Inference Attacks on Multiple Updated Machine Learning Models. 211-232 - Faysal Hossain Shezan, Minjun Long, David Hasani, Gang Wang, Yuan Tian:
SenRev: Measurement of Personal Information Disclosure in Online Health Communities. 233-251 - Zhujun Xiao, Jenna Cryan, Yuanshun Yao, Yi Hong Gordon Cheo, Yuanchao Shu, Stefan Saroiu, Ben Y. Zhao, Haitao Zheng:
"My face, my rules": Enabling Personalized Protection Against Unacceptable Face Editing. 252-267 - Sebastian Pahl, Florian Adamsky, Daniel Kaiser, Thomas Engel:
Examining the Hydra: Simultaneously Shared Links in Tor and the Effects on its Performance. 268-285 - Antreas Dionysiou, Elias Athanasopoulos:
SoK: Membership Inference is Harder Than Previously Thought. 286-306 - Ali Shahin Shamsabadi, Nicolas Papernot:
Losing Less: A Loss for Differentially Private Deep Learning. 307-320 - Marc Rivinius, Pascal Reisert, Sebastian Hasler, Ralf Küsters:
Convolutions in Overdrive: Maliciously Secure Convolutions for MPC. 321-353 - Jean-Guillaume Dumas, Aude Maignan, Clément Pernet, Daniel S. Roche:
VESPo: Verified Evaluation of Secret Polynomials (with application to dynamic proofs of retrievability). 354-374 - Dana Keeler, Chelsea Komlo, Emily Lepert, Shannon Veitch, Xi He:
DPrio: Efficient Differential Privacy with High Utility for Prio. 375-390 - Abdul Haddi Amjad, Zubair Shafiq, Muhammad Ali Gulzar:
Blocking JavaScript Without Breaking the Web: An Empirical Investigation. 391-404 - Tina Marjanov, Maria Konstantinou, Magdalena Józwiak, Dayana Spagnuelo:
Data Security on the Ground: Investigating Technical and Legal Requirements under the GDPR. 405-417 - Nitin Kohli, Paul Laskowski:
Differential Privacy for Black-Box Statistical Analyses. 418-431 - Marina Blanton, Michael T. Goodrich, Chen Yuan:
Secure and Accurate Summation of Many Floating-Point Numbers. 432-445 - Kasra Edalatnejad, Mathilde Raynal, Wouter Lueks, Carmela Troncoso:
Private Collection Matching Protocols. 446-468 - Anselme Tueno, Jonas Janneck, David Boehm:
A Method for Securely Comparing Integers using Binary Trees. 469-487 - Omid Mir, Daniel Slamanig, Balthazar Bauer, René Mayrhofer:
Practical Delegatable Anonymous Credentials From Equivalence Class Signatures. 488-513
Volume 2023, Number 4, October 2023
- Michelle L. Mazurek, Micah Sherr:
Editors' Introduction. 1-4 - Yuzhou Jiang, Emre Yilmaz, Erman Ayday:
Robust Fingerprint of Privacy-Preserving Location Trajectories. 5-20 - Alberto Ibarrondo, Hervé Chabanne, Melek Önen:
Funshade: Function Secret Sharing for Two-Party Secure Thresholded Distance Evaluation. 21-34 - Tore Kasper Frederiksen, Julia Hesse, Bertram Poettering, Patrick Towa:
Attribute-based Single Sign-On: Secure, Private, and Efficient. 35-65 - Nikhil Jha, Martino Trevisan, Emilio Leonardi, Marco Mellia:
On the Robustness of Topics API to a Re-Identification Attack. 66-78 - Sandra Siby, Ludovic Barman, Christopher A. Wood, Marwan Fayed, Nick Sullivan, Carmela Troncoso:
Evaluating practical QUIC website fingerprinting defenses for the masses. 79-95 - Maximilian Kroschewski, Anja Lehmann:
Save The Implicit Flow? Enabling Privacy-Preserving RP Authentication in OpenID Connect. 96-116 - Florian Turati, Karel Kubicek, Carlos Cotrini, David A. Basin:
Locality-Sensitive Hashing Does Not Guarantee Privacy! Attacks on Google's FLoC and the MinHash Hierarchy System. 117-131 - Narmeen Shafqat, Nicole Gerzon, Maggie Van Nortwick, Victor Sun, Alan Mislove, Aanjhan Ranganathan:
Track You: A Deep Dive into Safety Alerts for Apple AirTags. 132-148 - Da Zhong, Ruotong Yu, Kun Wu, Xiuling Wang, Jun Xu, Wendy Hui Wang:
Disparate Vulnerability in Link Inference Attacks against Graph Neural Networks. 149-169 - Miroslaw Kutylowski, Giuseppe Persiano, Duong Hieu Phan, Moti Yung, Marcin Zawada:
The Self-Anti-Censorship Nature of Encryption: On the Prevalence of Anamorphic Cryptography. 170-183 - Tung Le, Thang Hoang:
MAPLE: A Metadata-Hiding Policy-Controllable Encrypted Search Platform with Minimal Trust. 184-203 - Evangelia Anna Markatou, Francesca Falzon, Zachary Espiritu, Roberto Tamassia:
Attacks on Encrypted Response-Hiding Range Search Schemes in Multiple Dimensions. 204-223 - Sina Faraji, Florian Kerschbaum:
Trifecta: Faster High-Throughput Three-Party Computation over WAN Using Multi-Fan-In Logic Gates. 224-237 - Vivek Nair, Gonzalo Munilla Garrido, Dawn Song, James F. O'Brien:
Exploring the Privacy Risks of Adversarial VR Game Design. 238-256 - Marika Swanberg, Damien Desfontaines, Samuel Haney:
DP-SIPS: A simpler, more scalable mechanism for differentially private partition selection. 257-268 - Rakibul Hasan:
Understanding EdTech's Privacy and Security Issues: Understanding the Perception and Awareness of Education Technologies' Privacy and Security Issues. 269-286 - Abraham H. Mhaidli, Selin Fidan, An Doan, Gina Herakovic, Mukund Srinath, Lee Matheson, Shomir Wilson, Florian Schaub:
Researchers' Experiences in Analyzing Privacy Policies: Challenges and Opportunities. 287-305 - Gwendal Patat, Mohamed Sabt, Pierre-Alain Fouque:
Your DRM Can Watch You Too: Exploring the Privacy Implications of Browsers (mis)Implementations of Widevine EME. 306-321 - Tarek Galal, Anja Lehmann:
Privacy-Preserving Outsourced Certificate Validation. 322-340 - Seyyed Mohammad Sadegh Moosavi Khorzooghi, Shirin Nilizadeh:
Examining StyleGAN as a Utility-Preserving Face De-identification Method. 341-358 - Ala Sarah Alaqra, Farzaneh Karegar, Simone Fischer-Hübner:
Structural and functional explanations for informing lay and expert users: the case of functional encryption. 359-380 - Alfredo Rial, Ania M. Piotrowska:
Compact and Divisible E-Cash with Threshold Issuance. 381-415 - Andrea Gallardo, Chris Choy, Jaideep Juneja, Efe Bozkir, Camille Cobb, Lujo Bauer, Lorrie Cranor:
Speculative Privacy Concerns about AR Glasses Data Collection. 416-435 - Gauri Gupta, Krithika Ramesh, Anwesh Bhattacharya, Divya Gupta, Rahul Sharma, Nishanth Chandran, Rijurekha Sen:
End-to-end Privacy Preserving Training and Inference for Air Pollution Forecasting with Data from Rival Fleets. 436-451 - Yana Dimova, Tom van Goethem, Wouter Joosen:
Everybody's Looking for SSOmething: A large-scale evaluation on the privacy of OAuth authentication on the web. 452-467 - Sadiq Aliyu, Kavous Salehzadeh Niksirat, Kévin Huguenin, Mauro Cherubini:
On the Role and Form of Personal Information Disclosure in Cyberbullying Incidents. 468-483 - Chen Sun, Evan Jacobs, Daniel Lehmann, Andrew Crouse, Supreeth Shastri:
GDPRxiv: Establishing the State of the Art in GDPR Enforcement. 484-499 - Sinem Sav, Abdulrahman Diaa, Apostolos Pyrgelis, Jean-Philippe Bossuat, Jean-Pierre Hubaux:
Privacy-Preserving Federated Recurrent Neural Networks. 500-521 - Jiang Zhang, Hadi Askari, Konstantinos Psounis, Zubair Shafiq:
A Utility-Preserving Obfuscation Approach for YouTube Recommendations. 522-539 - Thomas Humphries, Florian Kerschbaum:
Differentially Private Simple Genetic Algorithms. 540-558 - Rob Jansen, Ryan Wails:
Data-Explainable Website Fingerprinting with Network Simulation. 559-577 - Hannah Davis, Christopher Patton, Mike Rosulek, Phillipp Schoppmann:
Verifiable Distributed Aggregation Functions. 578-592 - Aaron Johnson, Aaron D. Jaggard, Paul Syverson:
Throwing Your Weight Around: Fixing Tor's Positional Weighting. 593-612
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.