Monday July 15
11:00 Registration opens (outside Q1)
13:00 – 18:00 Open Day for Privacy, Usability, and Transparency (PUT 2019) Room Q1.
Tuesday, July 16
8:00 Registration (outside Q1)
- On Privacy Notions in Anonymous Communication
Christiane Kuhn (TU Dresden), Martin Beck (TU Dresden), Stefan Schiffner (Université du Luxembourg), Eduard Jorswieck (TU Dresden), and Thorsten Strufe (TU Dresden)
- DPSelect: A Differential Privacy Based Guard Relay Selection Algorithm for Tor
Hans Hanley (Princeton University), Yixin Sun (Princeton University), Sameer Wagh (Princeton University), and Prateek Mittal (Princeton University)
- ConsenSGX: Scaling Anonymous Communications Networks with Trusted Execution Environments
Sajin Sasy (University of Waterloo) and Ian Goldberg (University of Waterloo)
- Guard Placement Attacks on Path Selection Algorithms for Tor
Gerry Wan (Princeton University), Aaron Johnson (U.S. Naval Research Laboratory), Ryan Wails (U.S. Naval Research Laboratory), Sameer Wagh (Princeton University), and Prateek Mittal (Princeton University)
Title: Deploying Differential Privacy for the 2020 Census of Population and Housing
When differential privacy was created more than a decade ago, the motivating example was statistics published by an official statistics agency. In theory there is no difference between theory and practice, but in practice there is.
In attempting to transition differential privacy from the theory to practice, and in particular for the 2020 Census of Population and Housing, the U.S. Census Bureau has encountered many challenges unanticipated by differential privacy's creators. Many of these challenges had less to do with the mathematics of differential privacy and more to do with operational requirements that differential privacy’s creators had not discussed in their writings. These challenges included obtaining qualified personnel and a suitable computing environment, the difficulty of accounting for all uses of the confidential data, the lack of release mechanisms that align with the needs of data users, the expectation on the part of data users that they will have access to micro-data, the difficulty in setting the value of the privacy-loss parameter, ε (epsilon), and the lack of tools and trained individuals to verify the correctness of differential privacy, and push-back from same members of the data user community.
Addressing these concerns required developing a novel hierarchical algorithm that makes extensive use of a high-performance commercial optimizer; transitioning the computing environment to the cloud; educating insiders about differential privacy; engaging with academics, data users, and the general public; and redesigning both data flows inside the Census Bureau and some of the final data publications to be in line with the demands of formal privacy.
Simson Garfinkel is the Senior Computer Scientist for Confidentiality and Data Access at the US Census Bureau. He holds seven US patents and has published more than 50 research articles in computer security and digital forensics. He is a fellow of the Association for Computing Machinery (ACM) and the Institute of Electrical and Electronics Engineers (IEEE), and a member of the National Association of Science Writers. His most recent book is The Computer Book, which features 250 chronologically arranged milestones in the history of computing. As a journalist, he has written about science, technology, and technology policy in the popular press since 1983, and has won several national journalism awards.
Garfinkel received three Bachelor of Science degrees from MIT in 1987, a Master's of Science in Journalism from Columbia University in 1988, and a Ph.D. in Computer Science from MIT in 2005.
18:20 End of sessions
Wednesday, July 17
8:30 Registration (outside Q1)
- Tracking Anonymized Bluetooth Devices
Johannes K Becker (Boston University), David Li (Boston University), and David Starobinski (Boston University)
- A QUIC Look at Web Tracking
Erik Sy (University of Hamburg), Christian Burkert (University of Hamburg), Hannes Federrath (University of Hamburg), and Mathias Fischer (University of Hamburg)
- Investigating sources of PII used in Facebook’s targeted advertising
Giridhari Venkatadri (Northeastern University), Elena Lucherini (Northeastern University), Piotr Sapiezynski (Northeastern University), and Alan Mislove (Northeastern University)
- 4 Years of EU Cookie Law: Results and Lessons Learned
Martino Trevisan (Politecnico di Torino), Stefano Traverso (Politecnico di Torino), Eleonora Bassi (Politecnico di Torino), and Marco Mellia (Politecnico di Torino)
18:00 End of sessions
From 18:30 Visit of the Moderna Museet – 20:00 PETS Banquet at Moderna Museet on Skeppsholmen, Exercisplan 4 (directions)
We will visit the Moderna Museet, one of Europe's leading museums of modern and contemporary art. The banquet will be in the museum's restaurant at 20:00 and will begin with a welcome drink at 19:45. The Museum will exclusively open for us at 18:30, so you have a chance to drop in anytime between 18:30 and 20:00 to have a look at the exhibitions. There will also be three guides around for guiding through the exhibitions.
Thursday, July 18
8:30 Registration (outside Q1)
- The (Co-)Location Sharing Game
Alexandra-Mihaela Olteanu (EPFL, UNIL - HEC Lausanne), Mathias Humbert (Swiss Data Science Center), Kévin Huguenin (UNIL - HEC Lausanne), and Jean-Pierre Hubaux (EPFL)
- Reducing Metadata Leakage from Encrypted Files and Communication with PURBs
Kirill Nikitin (EPFL), Ludovic Barman (EPFL), Wouter Lueks (EPFL), Matthew Underwood, Jean-Pierre Hubaux (EPFL), and Bryan Ford (EPFL)
- ScrambleDB: Oblivious (Chameleon) Pseudonymization-as-a-Service
Anja Lehmann (IBM Research - Zurich)
- Cryptography for #MeToo
Benjamin Kuykendall (Princeton University), Hugo Krawczyk (IBM Research), and Tal Rabin (IBM Research)
- Finding a Needle in a Haystack: The Traffic Analysis Version
Abdullah Qasem (Concordia University), Sami Zhioua (KFUPM), and Karima Makhlouf (Imam Abdulrahman Bin Faisal University)
- Keeping the Smart Home Private with Smart(er) Traffic Shaping
Noah Apthorpe (Princeton University), Danny Yuxing Huang (Princeton University), Dillon Reisman (Princeton University), Arvind Narayanan (Princeton University), and Nick Feamster (Princeton University)
- p1-FP: Extraction, Classification, and Prediction of Website Fingerprints with Deep Learning
Se Eun Oh (University of Minnesota), Saikrishna Sunkam (University of Minnesota), and Nicholas Hopper (University of Minnesota)
- Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning
Sanjit Bhat (MIT PRIMES), David Lu (MIT PRIMES), Albert Kwon (MIT), and Srinivas Devadas (MIT)
- Mitigating Location Privacy Attacks on Mobile Devices using Dynamic App Sandboxing
Sashank Narain (Northeastern University) and Guevara Noubir (Northeastern University)
- MAPS: Scaling Privacy Compliance Analysis to a Million Apps
Sebastian Zimmeck (Wesleyan University), Peter Story (Carnegie Mellon University), Daniel Smullen (Carnegie Mellon University), Abhilasha Ravichander (Carnegie Mellon University), Ziqi Wang (Carnegie Mellon University), Joel Reidenberg (Fordham University), N. Cameron Russell (Fordham University), and Norman Sadeh (Carnegie Mellon University)
- New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols
Ravi Borgaonkar (SINTEF Digital, Norway), Lucca Hirschi (Inria & LORIA, France), Shinjo Park (Technische Universität Berlin, Germany), and Altaf Shaik (Technische Universität Berlin, Germany)
- Handoff All Your Privacy - A Review of Apple's Bluetooth Low Energy Implementation
Jeremy Martin (MITRE), Douglas Alpuche (USNA), Kristina Bodeman (USNA), Lamont Brown (USNA), Ellis Fenske (USNA), Lucas Foppe (USNA), Travis Mayberry (USNA), Erik C. Rye (CMAND), Brandon Sipes (USNA), and Sam Teplov (USNA)
- AccessiLeaks: Investigating Privacy Leaks Exposed by the Android Accessibility Service
Mohammad Naseri (Saarland University), Nataniel P. Borges Jr. (CISPA Helmholtz Center i.G.), Andreas Zeller (CISPA Helmholtz Center i.G.), and Romain Rouvoy (University of Lille / Inria / IUF)
15:40 Video Session
- Lethe: Conceal Content Deletion from Persistent Observers
Mohsen Minaei (Purdue University), Mainack Mondal (University of Chicago), Patrick Loiseau (Univ. Grenoble Alpes, CNRS, Inria, Grenoble INP, LIG & MPI-SWS), Krishna Gummadi (MPI-SWS), and Aniket Kate (Purdue University)
16:00 Rump Session (Chair: Roger Dingledine)
Friday, July 19 — HotPETs
8:30 Registration (outside Q1)
9:15 Opening Remarks
9:25 Session A: "Thank you for sharing" – Assessing leaks and censorship (Chair: Cecylia Bocovich)
- Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning [slides]
Ahmed Salem, Apratim Bhattacharya, Michael Backes, Mario Fritz, and Yang Zhang
- A Curious Case of "Consent Button” [slides]
Nurul Momen, and Lothar Fritsch
- Subtle Censorship via Adversarial Fakeness in Kyrgyzstan
Christopher Schwartz and Rebekah Overdorf
11:15 HotPETs Keynote — Lina Dencik (Chair: Carmela Troncoso)
The politics of data-driven governance [slides]
Abstract: The use of data and algorithmic processes for decision-making is now a growing part of social life. Digitally monitoring, tracking, profiling and predicting human behaviour and social activities is what underpins the information order now frequently described as surveillance capitalism. Increasingly, it is also what helps determine decisions that are central to our ability to participate in society, such as welfare, education, crime, work, and if we can cross borders. How should we understand what is at stake with such developments? Often, we are dealt a simple binary that suggests that the issue is one of increased (state-)security and efficiency on the one hand and concerns with privacy and protection of personal data on the other. Recently, we have also seen a growing focus on questions of bias, discrimination and ‘fairness’ enter this debate. In this presentation, I take stock of these concerns and present on-going research from the ERC-funded project DATAJUSTICE drawing on pertinent developments across work, law enforcement and border control that highlight the implementation of data processes in practice. I will make the case that we need to understand data systems as part of broader societal transformations, placing much greater emphasis on why these technologies are developed and implemented in the first place and how data practices relate to other social practices, rather than only focusing on the data system itself. In so doing, I will outline a more comprehensive engagement with data politics that considers how algorithmic processes relate to wider interests, power relations, and particular agendas. I will end by considering what this means for addressing challenges and advancing social justice in an age of datafication.
Dr Lina Dencik is Reader at the School of Journalism, Media and Culture at Cardiff University, UK and is Co-Founder of the Data Justice Lab. She has published widely on digital media, resistance and the politics of data and is currently Principal Investigator of the DATAJUSTICE project funded by an ERC Starting Grant. Her publications include Critical Perspectives on Social Media and Protest (Rowman & Littlefield International, 2015), Worker Resistance and Media (Peter Lang, 2015), and Digital Citizenship in a Datafied Society (Polity, 2018).
13:40 Session B: Anonymity is better together (Chair: Pedro Moreno-Sanchez)
- Yodel: Strong Metadata Security for Real-Time Voice Calls [slides]
David Lazar, Yossi Gilad, and Nickolai Zeldovich
- Not all is lost for anonymity – but quite a lot is [slides]
Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, and Aniket Kate
14:30 Mini break
14:50 Session C: Choose your own enhancement (Chair: Tariq Elahi)
15:15 Ice Cream Break
16:15 Session D: Risk or reward? (Chair: Roger Dingledine)
- Does Pushing Security on Clients Make Them Safer? [slides]
Matthew Traudt, and Paul Syverson
- Ongoing developments in IEEE 802.11 WLAN standardization [slides]
17:05 Closing remarks and Best talk award
Saturday, July 20
This year, the PETS hike will be a tour to Stockholm's archipelago, more precisely to the nature reserve Gålö. The tour includes a transfer with a chartered bus, a hike along the shoreline, and a visit to the beach. There will be the option to swim if the weather is good. Food and refreshments (for a picnic during the hike) and lunch after the hike will be provided. For the hike, sport or hiking shoes are much recommended, as the path along the shoreline is partly rocky and uneven.
During the hike, luggage can be left in one of the buses.
The buses will return to Stockholm's central station by 17:30, which means that it will be possible to reach Stockholm Arlanda airport by around 18:00. The buses will then continue back to the KTH campus.
Note that you must register for the hike separately!