Privacy Enhancing Technologies Symposium 2022 July 11, 2022 to July 15, 2022, Sydney, Australia

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Editors’ Introduction Florian Kerschbaum , Michelle l. Mazurek , Florian Maryland) N/A
Personal information inference from voice recordings: User awareness and privacy concerns Jacob Leon Kröger , Leon Pape , Saba Ullrich Through voice characteristics and manner of expression, even seemingly benign voice recordings can reveal sensitive ...
Forward and Backward-Secure Range-Searchable Symmetric Encryption Jiafan Engineering , The Kong) , Sherman Engineering Dynamic searchable symmetric encryption (DSSE) allows a client to query or update an outsourced encrypted ...
MLEFlow: Learning from History to Improve Load Balancing in Tor Hussein Urbana-champaign) , Chin-yu Urbana-champaign) , Nikita Urbana-champaign) , Geir Urbana-champaign) Tor has millions of daily users seeking privacy while browsing the Internet. It has thousands ...
How Can and Would People Protect From Online Tracking? Maryam University , Uk) , Kovila University , Ehsan Uk) Online tracking is complex and users find it challenging to protect themselves from it. While ...
Towards Improving Code Stylometry Analysis in Underground Forums Michal London) , Sergio Madrid) , Jorge Holloway , University London) Code Stylometry has emerged as a powerful mechanism to identify programmers. While there have been ...
Ulixes: Facial Recognition Privacy with Adversarial Machine Learning Thomas Mississippi) , Wei University) , Charles Mississippi) Facial recognition tools are becoming exceptionally accurate in identifying people from images. However, this comes ...
If This Context Then That Concern: Exploring users’ concerns with IFTTT applets Mahsa Saeidi (affil) , Mckenzie Calvert (affil) , Audrey (affil) , Anita (affil) End users are increasingly using trigger-action platforms like If-This-Then-That (IFTTT) to create applets to connect ...
User Perceptions of Gmail’s Confidential Mode Elham Charlotte) , Yousra Charlotte) Gmail’s confidential mode enables a user to send confidential emails and control access to their ...
Toward Uncensorable, Anonymous and Private Access Over Satoshi Blockchains Ruben University , Miami , Fl 33199) , Bogdan University , Miami 33199) t: Providing unrestricted access to sensitive content such as news and software is difficult in ...
OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers Darion University) , Su-chin University) , Alessio Miami) , William Chicago) , Andrew Urbana-champaign) , Lujo University) , Hsu-chun University) , Limin (google) ver half of all visits to websites now take place in a mobile browser, yet ...
Making the Most of Parallel Composition in Differential Privacy Josh (csiro) , Australia) , Hassan (csiro) , Gianpaolo (csiro) , Sirine (csiro) , Serge Wales , Paul Australia) We show that the ‘optimal’ use of the parallel composition theorem corresponds to finding the ...
Zen and the art of model adaptation: Low-utility-cost attack mitigations in collaborative machine learning Dmitrii Computing , Imperial Radiology , Technical Munich) , Daniel Medicine , Technical Computing , Imperial College London) , Jonathan Computing , Imperial Health , New York , Ny , Usa) , Georgios Medicine , Imperial Germany) : In this study, we aim to bridge the gap between the theoretical understanding of ...
Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing New York , Usa) , Théo Ryffel (inria , Département L’ens , Ens , Cnrs , Psl University , Paris , France) , Pierre University , David L’ens , Inria , Francis Bach (inria , Paris 2022 We propose AriaNN, a low-interaction privacy-preserving framework for private neural network training and inference on ...
Proof-of-Vax: Studying User Preferences and Perception of Covid Vaccination Certificates Marvin Bochum) , Franziska Bochum) , Theodor Bochum) Digital tools play an important role in fighting the current global COVID-19 pandemic. We conducted ...
Differentially private partition selection Damien Labs) , James Voss (google) , Bryant (google) Many data analysis operations can be expressed as a GROUP BY query on an unbounded ...
Circuit-PSI With Linear Complexity via Relaxed Batch OPPRF Nishanth Research.) , Divya Research.) In 2-party Circuit-based Private Set Intersection (Circuit-PSI), P0 and P1 hold sets S0 and S1 ...
Multiparty Reach and Frequency Histogram: Private, Secure, and Practical Badih Research) , Ben Kreuter (google) , Ravi Research) , Pasin Research) , Jiayu Peng (google) , Evgeny Skvortsov (google) , Yao (google) Consider the setting where multiple parties each hold a multiset of users and the task ...
Polymath: Low-Latency MPC via Secure Polynomial Evaluations and Its Applications Donghang University) , Albert University) , Aniket University) While the practicality of secure multi-party computation (MPC) has been extensively analyzed and improved over ...
Privacy-preserving FairSwap: Fairness and privacy interplay Sepideh Calgary , Ab , Canada) , Preston Calgary , Reihaneh Calgary , Ab And Canada) Fair exchange protocols are among the most important cryptographic primitives in electronic commerce. A basic ...
If You Like Me, Please Don’t “Like” Me: Inferring Vendor Bitcoin Addresses From Positive Reviews Jochen Mannheim) , Christian Mannheim) Bitcoin and similar cryptocurrencies are becoming increasingly popular as a payment method in both legitimate ...
Disparate Vulnerability to Membership Inference Attacks Bogdan Kulynych (epfl) , Mohammad Toronto , Vector Institute) , Giovanni Institute) , Michael (epfl) : A membership inference attack (MIA) against a machine-learning model enables an attacker to determine ...
Privacy-Preserving High-dimensional Data Collection with Federated Generative Autoencoder Xue München , Huawei Gmbh) , Xuebing München) Business intelligence and AI services often involve the collection of copious amounts of multidimensional personal ...
Masking Feedforward Neural Networks Against Power Analysis Attacks Konstantinos University , Boston , Ma) , Thomas University , A. University , Yunsi University , Boston And Ma) Recent advances in machine learning have enabled Neural Network (NN) inference directly on constrained embedded ...
From “Onion Not Found” to Guard Discovery Lennart Leuven) , Gunes Leuven) We present a novel web-based attack that identifies a Tor user’s guard in a matter ...
Polaris: Transparent Succinct Zero-Knowledge Arguments for R1CS with Efficient Verifier Shihui Waterloo) We present a new zero-knowledge succinct argument of knowledge (zkSNARK) scheme for Rank-1 Constraint Satisfaction ...
DataProVe: Fully Automated Conformance Verification Between Data Protection Policies and System Architectures Uk) , Vinh University , Ormskirk , Max University , Liverpool And Uk) Privacy and data protection by design are relevant parts of the General Data Protection Regulation ...
SoK: Cryptographic Confidentiality of Data on Mobile Devices Maximilian University) , Tushar University , {jois) , Matthew {jois) Mobile devices have become an indispensable component of modern life. Their high storage capacity gives ...
Setting the Bar Low: Are Websites Complying With the Minimum Requirements of the CCPA? Maggie University) On June 28, 2018, the California State Legislature passed the California Consumer Privacy Act (CCPA), ...
The Effectiveness of Adaptation Methods in Improving User Engagement and Privacy Protection on Social Network Sites Moses University) , Henry University) Research finds that the users of Social Networking Sites (SNSs) often fail to comprehensively engage ...
Are iPhones Really Better for Privacy? A Comparative Study of iOS and Android Apps Konrad Science , University Of Oxford) , Anastasia Researcher) , Reuben Science , Max Science , Nigel Oxford) While many studies have looked at privacy properties of the Android and Google Play app ...
Building a Privacy-Preserving Smart Camera System Yohan University) , Quinn University) , Blaine University) , Ryan University) , Eric University) , Gang University) , Syed University) Millions of consumers depend on smart camera systems to remotely monitor their homes and businesses. ...
CoverDrop: Blowing the Whistle Through A News App Mansoor Cambridge) , Diana Technology , University Of Cambridge) , Daniel Technology , Alastair Technology , Ross Cambridge) t: Whistleblowing is hazardous in a world of pervasive surveillance, yet many leading newspapers expect ...
Employees’ privacy perceptions: exploring the dimensionality and antecedents of personal data sensitivity and willingness to disclose Jan Sciences) , Delphine Sciences) The processing of employees’ personal data is dramatically increasing, yet there is a lack of ...
Revisiting Identification Issues in GDPR ‘Right Of Access’ Policies: A Technical and Longitudinal Analysis Mariano Tul , Expertise (edm)) , Isaac Tul , Expertise Media) , Peter Tul , Expertise Media , Flanders Make) , Ken Faculty , Attorney Bar) , Wim Media) Several data protection regulations permit individuals to request all personal information that an organization holds ...
Understanding Privacy-Related Advice on Stack Overflow Mohammad Bristol) , Tianshi Edinburgh) Privacy tasks can be challenging for developers, resulting in privacy frameworks and guidelines from the ...
SoK: Plausibly Deniable Storage Chen University) , Xiao University) , Bogdan University) Data privacy is critical in instilling trust and empowering the societal pacts of modern technologydriven ...
Increasing Adoption of Tor Browser Using Informational and Planning Nudges Peter Science , Clark University) , Daniel Science , Carnegie Mellon University) , Rex Science , Yaxing Systems , University Of Maryland , Baltimore County) , Alessandro Policy , Lorrie Science , Norman Science , Florian Michigan) Browsing privacy tools can help people protect their digital privacy. However, tools which provide the ...
Differentially Private Simple Linear Regression Daniel Sciences) , Audra Sciences , Northeastern Science , Boston University) , Jayshree Sciences) , Adam Science , Boston Sciences) Economics and social science research often require analyzing datasets of sensitive personal information at fine ...
Privacy-preserving training of tree ensembles over continuous data Samuel Tacoma) , Chaitali Tacoma) , Martine Tacoma) , Rafael University) , David Tacoma) , Anderson Tacoma) , Davis Arizona) Most existing Secure Multi-Party Computation (MPC) protocols for privacy-preserving training of decision trees over distributed ...
User-Level Label Leakage from Gradients in Federated Learning Aidmar Lab , Technical Darmstadt) , Fabrizio Lab , Till Darmstadt) , Jens Darmstadt) , Carlos Lab , Ephraim Lab , Tim Lab , Kristian Lab , Max Darmstadt) Federated learning enables multiple users to build a joint model by sharing their model updates ...
Understanding Utility and Privacy of Demographic Data in Education Technology by Causal Analysis and Adversarial-Censoring Rakibul Security) Education technologies (EdTech) are becoming pervasive due to their cost-effectiveness, accessibility, and scalability. They also ...
Comprehensive Analysis of Privacy Leakage in Vertical Federated Learning During Prediction Xue Gmbh) , Xuebing Munich) Vertical federated learning (VFL), a variant of federated learning, has recently attracted increasing attention. An ...
Checking Websites’ GDPR Consent Compliance for Marketing Emails Karel Zurich) , Jakob Zurich) , Carlos Zurich) , Alexander Zurich) , Stefan Zurich) The sending of marketing emails is regulated to protect users from unsolicited emails. For instance, ...
Efficient Set Membership Proofs using MPC-in-the-Head Aarushi University) , Matthew University) , Mathias Univeristy) Set membership proofs are an invaluable part of privacy preserving systems. These proofs allow a ...
Privacy-Preserving Positioning in Wi-Fi Fine Timing Measurement Domien University) With the standardization of Wi-Fi Fine Timing Measurement (Wi-Fi FTM; IEEE 802.11mc), the IEEE introduced ...
RegulaTor: A Straightforward Website Fingerprinting Defense James Minnesota) Website Fingerprinting (WF) attacks are used by local passive attackers to determine the destination of ...
Knowledge Cross-Distillation for Membership Privacy Rishav Singapore) , Batnyam Corporation) , Kunihiro Corporation) , Junki Corporation) , Isamu Corporation) A membership inference attack (MIA) poses privacy risks for the training data of a machine ...
Updatable Private Set Intersection Saikrishna Research) , Peihan Chicago) , Tiancheng 2022 Private set intersection (PSI) allows two mutually distrusting parties each with a set as input, ...
d3p - A Python Package for Differentially-Private Probabilistic Programming Uk) , Lukas University , Finland.) , Niki Center , Finland) , Samuel University , Finland Manchester , Antti Https://github.com/dpbayes/d3p) We present d3p, a software package designed to help fielding runtime efficient widely-applicable Bayesian inference ...
Who Knows I Like Jelly Beans? An Investigation Into Search Privacy Daniel Group) , David Group) Internal site search is an integral part of how users navigate modern sites, from restaurant ...
PUBA: Privacy-Preserving User-Data Bookkeeping and Analytics Valerie Technology , Kastel) , Marcel Data61) , Sven Technology , Markus Technology , Andy Srl) , Rebecca Kastel) In this paper we propose Privacy-preserving User-data Bookkeeping & Analytics (PUBA), a building block destined ...
How to prove any NP statement jointly? Efficient Distributed-prover Zero-Knowledge Protocols Pankaj Research) , Arpita Bangalore) , Protik Bangalore) , Nitin Research) Traditional zero-knowledge protocols have been studied and optimized for the setting where a single prover ...
FP-Radar: Longitudinal Measurement and Early Detection of Browser Fingerprinting Pouneh California , Davis) , Umar Washington) , Zubair 2022 Browser fingerprinting is a stateless tracking technique that aims to combine information exposed by multiple ...
Analyzing the Feasibility and Generalizability of Fingerprinting Internet of Things Devices Dilawer University) , Anupam (lums)) In recent years, we have seen rapid growth in the use and adoption of Internet ...
Visualizing Privacy-Utility Trade-Offs in Differentially Private Data Releases Priyanka University) , Johes University) , Xi Waterloo) , Jessica University) Organizations often collect private data and release aggregate statistics for the public’s benefit. If no ...
A Multi-Region Investigation of the Perceptions and Use of Smart Home Devices Patrick Munich) , Tom Munich) , Jens Munich) , Sameer Utah) Smart Home Devices are household objects and appliances that are augmented with network connectivity and ...
Charting App Developers’ Journey Through Privacy Regulation Features in Ad Networks Mohammad Bristol) , Kopo Bristol) , Tianshi University) , Jason Bristol) Mobile apps enable ad networks to collect and track users. App developers are given “configurations” ...
“All apps do this”: Comparing Privacy Concerns Towards Privacy Tools and Non-Privacy Tools for Social Media Content Vanessa Research , Inc.) , Sebastian Frankfurt) Users report that they have regretted accidentally sharing personal information on social media. There have ...
My Cookie is a phoenix: detection, measurement, and lawfulness of cookie respawning with browser fingerprinting Cnrs , Imane Lille , Inria) , Cristiana University) , Arnaud Legout (inria) , Nataliia Team , Cnil And France) Stateful and stateless web tracking gathered much attention in the last decade, however they were ...
Exploring the Privacy Concerns of Bystanders in Smart Homes from the Perspectives of Both Owners and Bystanders Ahmed Mines) , Joseph Mines) , Amiya Mines) Smart home IoT devices collect data not only from owners of the devices, but also ...
Adversarial Images Against Super-Resolution Convolutional Neural Networks for Free Rezoo Washington) , Mahdieh Laval) , Rakesh University) Super-Resolution Convolutional Neural Networks (SRCNNs) with their ability to generate highresolution images from low-resolution counterparts, ...
Integrating Privacy into the Electric Vehicle Charging Architecture Dustin Sciences) , Timm Sciences) The Electric Vehicle (EV) charging architecture consists of several actors which communicate with different protocols. ...
“It Feels Like Whack-a-mole”: User Experiences of Data Removal from People Search Websites Kejsi University) , Kevin Gallagher (dcentral/inesc-id , Instituto Superior Técnico , Universidade De Lisboa) , Andrea University) , Damon University) People Search Websites aggregate and publicize users’ Personal Identifiable Information (PII), previously sourced from data ...
Learning to Behave: Improving Covert Channel Security with Behavior-Based Designs Ryan Wails (georgetown , U.s. Laboratory) , Andrew Mellon) , Eliana Univ.) , Aylin Washington) , Roger Project) , Rob Univ.) Censorship-resistant communication systems generally use real-world cover protocols to establish a covert channel through which ...
I know what you did on Venmo: Discovering privacy leaks in mobile social payments Rajat Institute) , Pithayuth Institute) , Ishank Texas , Austin) , Dhiraj Texas , Austin) Institute) Venmo is a US-based mobile social payments platform. Each Venmo transaction requires a “payment note”, ...
Moby: A Blackout-Resistant Anonymity Network for Mobile Devices Ryan University) , Amogh Epfl) , Hira University) , Antoine Rault (epfl) , David University) , Stevens (epfl) nternet blackouts are challenging environments for anonymity and censorship resistance. Existing popular anonymity networks (e.g., ...
Athena: Probabilistic Verification of Machine Unlearning David (zühlke) , Liwei University) , Sameer University) The right to be forgotten, also known as the right to erasure, is the right ...
Fully Secure PSI via MPC-in-the-Head S. University) , Carmit University) We design several new protocols for private set intersection (PSI) with active security: one for ...
Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor Theodor Bochum) , Vera Rimmer (imec-distrinet , Ku Leuven) , Tom (imec-distrinet , Abel (imec-distrinet , Wouter Joosen (imec-distrinet , Ku University) Traffic analysis attacks against encrypted web traffic are a persisting problem. However, there is a ...
SoK: SCT Auditing in Certificate Transparency Sarah Llc) , Joe Llc) , Devon Llc) , Chris Llc) , Kevin Llc) The Web public key infrastructure is essential to providing secure communication on the Internet today, ...
In Search of Lost Utility: Private Location Data Gergely Biczók , Szilvia Services , Crysys Lab , Budapest Economics) The unavailability of training data is a permanent source of much frustration in research, especially ...
Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps Yucheng Wisconsin-madison) , Jack Chicago) , George Chicago) , Neil Wisconsin-madison) Video conferencing apps (VCAs) make it possible for previously private spaces — bedrooms, living rooms, ...
“We may share the number of diaper changes”: A Privacy and Security Analysis of Mobile Child Care Applications Christian Gmbh) , Moritz Gmbh) , Maximilian Privacy) , Tobias If(is)) Mobile child care management applications can help child care facilities, preschools, and kindergartens to save ...
Deletion inference, reconstruction, and compliance in machine (un)learning Ji Virginia) , Sanjam California , Berkeley Research) , Mohammad Singapore) Privacy attacks on machine learning models aim to identify the data that is used to ...
Leave No Data Behind – Empirical Insights into Data Erasure from Online Services Eduard Munich) , Emmanuel Munich) Privacy regulations such as the General Data Protection Regulation (GDPR) of the European Union promise ...
Mixnet optimization methods Iness Sa) We propose a method to optimally select mix network parameters for a given deployment context ...
On dark patterns and manipulation of website publishers by CMPs Nataliia Bielova , Michael Grenoble-alpes) , Linc Team , Cnil , France) Grenoble-alpes) Web technologies and services widely rely on data collection via tracking users on websites. In ...
Leveraging strategic connection migration-powered traffic splitting for privacy Mona University) , Anunay University) , Liang University) Network-level adversaries have developed increasingly sophisticated techniques to surveil and control users’ network traffic. In ...
DALock: Password Distribution-Aware Throttling Eremiah University) Large-scale online password guessing attacks are widespread and pose a persistant privacy and security threat ...
On Defeating Graph Analysis of Anonymous Transactions Christoph Erlangen-nürnberg) , Russell Erlangen-nürnberg) , Viktoria Erlangen-nürnberg) , Ivy Kong) In a ring-signature-based anonymous cryptocurrency, signers of a transaction are hidden among a set of ...
User-friendly yet rarely read: A case study on the redesign of an online HIPAA authorization Sarah University) , Ellie University) In this paper we describe the iterative evaluation and refinement of a consent flow for ...
OrgAn: Organizational Anonymity with Low Latency Ku Leuven , Usa) , Debajyoti Das (imeccosic , Leuven , Belgium) , Easwar Science , Purdue University , West Lafayette , Aniket Science , West 2022 There is a growing demand for network-level anonymity for delegates at global organizations such as ...
FingerprinTV: Fingerprinting Smart TV Apps Janus California , Irvine) , Jad California , Rahmadi California , Athina Irvine) This paper proposes FingerprinTV, a fully automated methodology for extracting fingerprints from the network traffic ...
ZoomP3: Privacy-Preserving Publishing of Online Video Conference Recordings Yuanyi University) , Sencun University) , Yu Suny) The COVID-19 epidemic has made online video conferencing extremely popular throughout the world, with many ...
PrivacyScout: Assessing Vulnerability to Shoulder Surfing on Mobile Devices Germany) , Mihai Stuttgart , Alia Duisburg-essen , Mohamed Glasgow , United Kingdom) , Stefan Duisburg-essen , Andreas Germany) One approach to mitigate shoulder surfing attacks on mobile devices is to detect the presence ...
SoK: Assumptions Underlying Cryptocurrency Deanonymizations Dominic Erlangen-nürnberg) , Viktoria Mannheim) In recent years, cryptocurrencies have increasingly been used in cybercrime and have become the key ...
Watch Over Your TV: A Security and Privacy Analysis of the Android TV Ecosystem Marcos Holloway , University Of London) , Jorge London) he rapid adoption of Smart TVs has resulted in them becoming another app-based ecosystem. In ...
SoK: TEE-Assisted Confidential Smart Contract Rujia Birmingham) , Qin Data61) , Qi Technology) , David Birmingham) The blockchain-based smart contract lacks privacy, since the contract state and instruction code are exposed ...
Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies Anisa Dublin) , Leonard University) , Erman University) , Apostolos Pyrgelis (epfl) , Juan Insight) , Jean-pierre Hubaux (epfl) , Xiaoqian Texas , Health University) Providing provenance in scientific workflows is essential for reproducibility and auditability purposes. In this work, ...
Blocked or Broken? Automatically Detecting When Privacy Interventions Break Websites Michael California , San Diego) , Peter Software) , Moritz Software) , Benjamin London) , Deian California , San Software) A core problem in the development and maintenance of crowdsourced filter lists is that their ...
SoK: Privacy-enhancing Smart Home Hubs Igor Zavalyshyn (uclouvain) , Axel Legay (uclouvain) , Annanda (uclouvain) Smart homes are IoT systems enabling the automation of household operation. The unrestricted collection and ...
On the Cost of Suppressing Volume for Encrypted Multi-maps Megumi University) Structured encryption (STE) schemes allow a client to store sensitive data on a semi-trusted remote ...
XORBoost: Tree Boosting in the Multiparty Computation Setting Kevin Deforth (inpher , Switzerland) , Marc Desgroseilliers (inpher , Nicolas Gama (inpher , Mariya Georgieva (inpher , Dimitar Jetchev (inpher , Marius Switzerland) We present a novel protocol XORBoost for both training gradient boosted tree models and for ...
Neural Fuzzy Extractors: A Secure Way to Use Artificial Neural Networks for Biometric User Authentication Abhishek University) , Bipin University) , Md University) , Monireh University) , Pascal University) Powered by new advances in sensor development and artificial intelligence, the decreasing cost of computation, ...
Analyzing the Monetization Ecosystem of Stalkerware Vincent Florida) , Cassidy Florida) , Vanessa Florida) , Katie Florida) , Washington Florida) , Luis Florida) , Sara Florida) , Patrick Florida) Stalkerware is a form of malware that allows for the abusive monitoring of intimate partners. ...
A Global Survey of Android Dual-Use Applications Used in Intimate Partner Surveillance Andrea University) , Majed Wisconsin-madison) , Julio Maryland) , Adil Wisconsin-madison) ntimate partner violence (IPV) is a pervasive societal problem that affects millions of people around ...
On the Feasibility of Linking Attack to Google/Apple Exposure Notification Framework Azuki University) , Mitsuaki Akiyama (ntt) , Masashi (mic)) , Atsuo 2022 Digital contact-tracing (DCT) applications have been installed on more than 188 M smartphones worldwide as ...
3LegRace: Privacy-Preserving DNN Training over TEEs and GPUs University of California , Yue Department , University California) , Ramy Department , Reali) , Salman Department , University Reali) Leveraging parallel hardware (e.g. GPUs) for deep neural network (DNN) training brings high computing performance. ...
How Usable Are iOS App Privacy Labels? Baltimore County) , Shikun University) , Yuanyuan Vermont) , Yaxing Maryland , Lorrie University) Standardized privacy labels that succinctly summarize those data practices that people are most commonly concerned ...
gOTzilla: Efficient Disjunctive Zero-Knowledge Proofs from MPC in the Head, with Application to Proofs of Assets in Cryptocurrencies Foteini University) , S. University) , Panagiotis Research) , Phi University) We present gOTzilla, a protocol for interactive zero-knowledge proofs for very large disjunctive statements of ...
Developers Say the Darnedest Things: Privacy Compliance Processes Followed by Developers of Child-Directed Apps Noura California , Berkeley) , Serge Institute) We investigate the privacy compliance processes followed by developers of child-directed mobile apps. While children’s ...
LLAMA: A Low Latency Math Library for Secure Inference Kanav Research) , Deepak Research) , Nishanth Research) Secure machine learning (ML) inference can provide meaningful privacy guarantees to both the client (holding ...
ATOM: Ad-network Tomography Maaz Iowa) Data sharing between online trackers and advertisers is a key component in online behavioral advertising. ...
Investigating GDPR Fines in the Light of Data Flows Marlene Saemann (bosch) , Daniel Security) , Tobias Bochum) While GDPR related fines to big companies like Amazon or Google have seen widespread media ...
Machine Learning with Differentially Private Labels: Mechanisms and Frameworks Liwei University) , Xinyu University) , Milad Amherst) , Saeed University) , Virat Amherst) , Amir University) Label differential privacy is a relaxation of differential privacy for machine learning scenarios where the ...
Pika: Secure Computation using Function Secret Sharing over Rings Sameer Berkeley) Machine learning algorithms crucially depend on non-linear mathematical functions such as division (for normalization), exponentiation ...
Flexible and scalable privacy assessment for very large datasets, with an application to official governmental microdata Australia) , Mário (ufmg , Brazil) , Natasha University , Annabelle University , Carroll Systems , Gabriel Brazil) We present a systematic refactoring of the conventional treatment of privacy analyses, basing it on ...
“You offer privacy like you offer tea”: Investigating Mechanisms for Improving Guest Privacy in IoT-Equipped Households Karola Glasgow) , Nina Darmstadt) , Michelle Darmstadt) , Mohamed Darmstadt) IoT devices are becoming more common and prevalent in private households. Since guests can be ...
Effects of Privacy Permissions on User Choices in Voice Assistant App Stores Berkeley) , Gary California , Nathan Berkeley) Intelligent voice assistants, and the thirdparty apps (aka “skills” or “actions”) that power them, are ...
Collection, usage and privacy of mobility data in the enterprise and public administrations Alexandra Sciences) Human mobility data is a crucial resource for urban mobility management, but it does not ...
Ctrl-Shift: How Privacy Sentiment Changed from 2019 to 2021 Angelica Systems) , Samuel Systems) People’s privacy sentiments influence changes in legislation as well as technology design and use. While ...
Keeping Privacy Labels Honest Simon Braunschweig , Institute Security) , Malte Braunschweig , Benjamin V.) , Madita Braunschweig , Industrial/organizational Psychology) , Martin Security) At the end of 2020, Apple introduced privacy nutritional labels, requiring app developers to state ...
Formalizing and Estimating Distribution Inference Risks Anshuman Virginia) Distribution inference, sometimes called property inference, infers statistical properties about a training set from access ...
Connect the Dots: Tighter Discrete Approximations of Privacy Loss Distributions Badih Research) , Vadym Doroshenko (google) , Pritish Research) , Ravi 2022 The privacy loss distribution (PLD) provides a tight characterization of the privacy loss of a ...
Hidden Issuer Anonymous Credential Cnrs , Inria , Daniel Bosk (kth) , Davide Rennes , Irisa) , Mathieu Rennes , Guillaume Piolle (centralesupélec , Univ Rennes , Cnrs And Irisa) Identity Management Systems (IMS) allow users to prove characteristics about themselves to multiple service providers. ...
A novel reconstruction attack on foreign-trade official statistics, with a Brazilian case study Brazil) , Danilo Gerais , Gabriel Gerais , Mário Gerais , Natasha Australia) In this paper we describe, formalize, implement, and experimentally evaluate a novel transaction re-identification attack ...
Private Aggregation of Trajectories Badih Research) , Ravi Research) , Neel Kamal (google) , Pasin (google) In this paper, we study the task of aggregating user-generated trajectories in a differentially private ...
On the Challenges of Developing a Concise Questionnaire to Identify Privacy Personas Tom Darmstadt) , Enno Darmstadt) , Franziska Darmstadt) , Gina Darmstadt) Concise instruments to determine privacy personas – typical privacy-related user groups – are not available ...
Homomorphically counting elements with the same property Ilia Labs) , Malika Izabachène (cosmian) , Axel Leuven) We propose homomorphic algorithms for privacy-preserving applications where we are given an encrypted dataset and ...
Time- and Space-Efficient Aggregate Range Queries over Encrypted Databases Zachary University) , Evangelia University) We present ARQ, a systematic framework for creating cryptographic schemes that handle range aggregate queries ...
How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy Michal University) , Lucjan Security) , Ian University) This paper presents a timing attack on the FIDO2 (Fast IDentity Online) authentication protocol that ...
Replay (Far) Away: Exploiting and Fixing Google/Apple Exposure Notification Contact Tracing Christopher University) , Haohuang University) , Zhiqiang University) Digital contact tracing offers significant promise to help reduce the spread of SARS-CoV-2 and other ...
Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation Nuttapong Attrapadung (aist) , Koki Hamada (ntt) , Dai Ikarashi (ntt) , Ryo Kikuchi (ntt) , Takahiro Matsuda (aist) , Ibuki Mishina (ntt) , Hiraku (aist) Machine Learning (ML) algorithms, especially deep neural networks (DNN), have proven themselves to be extremely ...
Privately Connecting Mobility to Infectious Diseases via Applied Cryptography Daniel Technology , Belgium) , Alexandros Science , Rsa Fg , Vienna , Austria) , Alessandro Leuven , Lukas Gmbh , Christian Technology , Roman Austria) Recent work has shown that cell phone mobility data has the unique potential to create ...