This year we received 19 submissions, of which we have accepted 9 for presentation at the workshop. Proposals were judged primarily on their relevance, novelty, and potential to generate productive discussion. In particular, we did not evaluate the proposals primarily on technical merit or maturity, and some proposals describing high-quality work were not accepted.
8:15 – 9:15 Breakfast
9:15 Opening Remarks [Video]
9:30 Censorship and Anonymity (Chair: Meredith Whittaker)
- Censorship Arms Race: Research vs. Practice [Video]
Sadia Afroz, David Fifield, Michael C. Tschantz, Vern Paxson, J. D. Tygar
- Tor's Usability for Censorship Circumvention [Video]
David Fifield and Linda N. Lee, Serge Egelman, David Wagner
- Protecting the Tor Network from Sybil Attacks [Video]
Philipp Winter, Roya Ensafi, Karsten Loesing, Nick Feamster
10:45 Coffee Break
11:15 HotPETs Keynote Address (Chair: Susan Landau)
2:00 Data Privacy Tools (Chair: Tariq Elahi)
- Access My Info: An Application That Helps People Create Legal Requests for Their Personal Information [Video]
Andrew Hilts, Christopher Parsons
- Location Guard: Location Privacy for the Rest of Us [Video]
Konstantinos Chatzikokolakis, Catuscia Palamidessi, Marco Stronati
2:50 Coffee Break
3:10 Privacy and Secure Communication (Chair: Claudia Diaz)
- Vuvuzela: Scalable Private Messaging Resistant to Traffic Analysis
Jelle van den Hooff, David Lazar, Matei Zaharia, Nickolai Zeldovich
- Certificate Cothority: Towards Trustworthy Collective CAs [Video]
Ewa Syta, Iulia Tamas, Dylan Visher, David Isaac Wolinsky, Bryan Ford
4:00 Ice Cream Break
4:20 Privacy and Human Behavior (Chair: Kat Hanna)
- Human-Centered Design for Secure Communication: Opportunities to Close the Participation Gap [Video]
Ame Elliott, Sara Sinclair Brody
- Tensions and Frictions in Researching Activists' Digital Security and Privacy Practices
Maya Indira Ganesh
5:10 Closing Remarks [Video]
HotPETs Keynote Address
Matt Blaze (University of Pennsylvania): How dark are we going?
Bio: Matt Blaze directs the Distributed Systems Lab at the University of Pennsylvania, where he is an Associate Professor of Computer and Information Science. His research focuses on the design and analysis of secure systems, with a particular interest in security technology with bearing on public policy issues, including cryptography policy (key escrow), wiretapping and surveillance, and the security of electronic voting systems.Call for Talks: HotPETs 2015
8th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2015)
Held in conjunction with the 15th Privacy Enhancing Technologies Symposium
July 2, 2015
The ambition of the Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs) is to foster new ideas, spirited debates, as well as controversial perspectives on privacy (and lack thereof). We are calling for short, written proposals describing a 10-15 minute talk on hot topics in privacy enhancing technologies (PETs), to be followed by a 5-10 minute question period. The nature of HotPETs' discussion-oriented format is especially suited to work in progress, practical implementations of privacy enhancing technologies, and new ideas that have not yet been fully formed.
Topics of interest include, but are not limited to:
- Anonymous communications and publishing systems
- Censorship resistance
- Challenges in deploying PETs
- Cryptographic protocols with application to privacy
- Economics of PETs
- Hands-on experimentation with PETs
- Human computer interaction with PETs
- Impact of PETs in the wild
- Interdisciplinary privacy
- Legal issues surrounding PETs
- Location privacy
- Online surveillance
- Privacy and identity management
- Privacy in databases
- Privacy in social networks
- Privacy-enhanced access control and authentication
- Studies of users of PETs
- Usability of PETs
Who should submit:
We invite submissions from activists, artists, developers, journalists, lawyers, public servants, scholars, and any others who have a compelling, novel message about privacy and privacy-enhancing technologies. PETS and HotPETS attract world-renowned experts on the research, development, and practice of PETs. If you are excited to give a talk to such a group, and you think they would be excited to hear it, then you should submit. Some example talks:
- Researcher describing recent research results or a work-in-progress, especially on a novel or newly-important topic in privacy or security
- Experiences from an activist working with PETs "on the ground"
- Software developer describing the recent success or failure of a privacy-enhancing tool they built
- Government official discussing recent interactions between technology and the development of privacy or security-related policy
What to submit (*new this year!*):
Unlike previous years, this year we invite two-page talk proposals rather than papers. These talk proposals should give an overview of what you intend to present, including any results or conclusions you intend to share (if available). The newly shortened submission length is a carefully considered change. HotPETs strives for focused discussion on engaging topics, and the chairs hope that an author’s ability to convey the essence of their work in a short submission will be reflective of a valuable HotPETs submission. Additionally, the chairs hope the shortened submission length will broaden the diversity of the proposals.
We encourage you to link to additional sources of your work (e.g., software, videos, website, papers) within your proposal. The HotPETs chairs will strive to incorporate these additional sources into the review process, though full review of material beyond what is contained in the submission text is not guaranteed.
A proposal must include a title and a list of authors responsible for the work to be presented (one of whom must give the talk). It must be no more than two pages including references. It must be submitted as a Word or PDF document, and we recommend that proposals use either this Word template or this LaTeX template. For more information on using these templates, see the ACM SIG Proceedings templates.
The HotPETs Workshop has no official proceedings, but accepted submissions will be made available on the HotPETs website. Authors may have the option to include talk-related resources, such as slides or software, on the HotPETs website.
How to submit:
Please submit proposals via email to: firstname.lastname@example.org. Proposals must be submitted by 11:59 p.m. EDT on April 24th with "HotPETs 2015" as the subject line.
The HotPETs chairs will review the submissions and make the final decisions on acceptance. There will be no peer-review program committee as has been the case at past HotPETs. The chairs may request external input or advice to make fully informed decisions.
The chairs will seek to create a diverse program and will therefore accept a set of submissions that contribute to this goal and have the potential to create an engaging workshop for speakers and attendees. Accepted submissions may include those that provoke interesting discussion, provide unique insight or value to the PETs community, share new and emerging PETs-related research, and have the potential to expand engagement between the PETs community and PETs users.
The chairs seek submissions that are complete and concise. They should provide a full overview of the proposed talk, including — if available — any conclusions or findings that are to be presented.
Submission Deadline: April 24th
Submission Notification: May 1st
- Mike Brennan (SecondMuse)
- Kelly Caine (Clemson University)
- Aaron Johnson (U.S. Naval Research Laboratory)
Contact us with any questions at: email@example.comPage(); ?>