All Times EDT (UTC-4)

Monday, July 13

Opening remarks 9:40–9:50

Session 1 9:50–11:30 (Track B goes to 11:55)

Track A: Anonymous communication

Track B: Differential privacy

Track C: Privacy-preserving machine learning

Break: 11:30 (or 11:55) to 12:30

Session 2 12:30–14:10

Track A: Deanonymization

Track B: Differential privacy applications

Track C: Mobile

Tuesday, July 14

Keynote 10:00–11:30 Michael Kearns

Title: The Ethical Algorithm

Abstract: Many recent mainstream media articles and popular books have raised alarms over anti-social algorithmic behavior, especially regarding machine learning and artificial intelligence. The concerns include leaks of sensitive personal data by predictive models, algorithmic discrimination as a side-effect of machine learning, and inscrutable decisions made by complex models. While standard and legitimate responses to these phenomena include calls for stronger and better laws and regulations, researchers in machine learning, statistics and related areas are also working on designing better-behaved algorithms. An explosion of recent research in areas such as differential privacy, algorithmic fairness and algorithmic game theory is forging a new science of socially aware algorithm design. I will survey these developments and attempt to place them in a broader societal context. This talk is based on the book The Ethical Algorithm, co-authored with Aaron Roth (Oxford University Press).

Bio: Michael Kearns is a professor in the Computer and Information Science department at the University of Pennsylvania, where he holds the National Center Chair and has joint appointments in the Wharton School.He is founder of Penn’s Networked and Social Systems Engineering (NETS) program, and director of Penn’s Warren Center for Network and Data Sciences. His research interests include topics in machine learning, algorithmic game theory, social networks, and computational finance. He has worked and consulted extensively in the technology and finance industries. He is a fellow of the American Academy of Arts and Sciences, the Association for Computing Machinery, and the Association for the Advancement of Artificial Intelligence. Kearns has consulted widely in the finance and technology industries, including a current role as an Amazon Scholar.

Break: 11:30 to 12:30

Session 3 12:30–14:10

Track A: Cryptography

Track B: Privacy attacks

Track C: Tracking

Wednesday, July 15

Session 4 9:30–10:45

Track A: Differential privacy and secure multi-party computation

Track B: Smart devices

Track C: Systems

Town hall 10:45–11:45

Break: 11:45 to 12:45

Session 5 12:45–14:25

Track A: Secure computation

Track B: Tor

Track C: Social networks

Thursday, July 16

Session 6 9:30–11:10

Track A: Payments

Track B: Users

Track C: Web privacy

  • Long-Term Observation on Browser Fingerprinting: Users’ Trackability and Perspective
    Gaston Pugliese (Friedrich-Alexander University Erlangen-Nürnberg (FAU)), Christian Riess (Friedrich-Alexander University Erlangen-Nürnberg (FAU)), Freya Gassmann (Saarland University), and Zinaida Benenson (Friedrich-Alexander University Erlangen-Nürnberg (FAU))

  • No boundaries: data exfiltration by third parties embedded on web pages
    Günes Acar (KU Leuven), Steve Englehardt (Mozilla), and Arvind Narayanan (Princeton University)

  • A Comparative Measurement Study of Web Tracking on Mobile and Desktop Environments
    Zhiju Yang (Colorado School of Mines) and Chuan Yue (Colorado School of Mines)

  • In Depth Evaluation of Redirect Tracking and Link Usage
    Martin Stopczynski (None), Erik Tews (University of Twente), and Stefan Katzenbeisser (Universität Passau)
  • Award session 11:10–11:40

    Break: 11:40 to 12:40

    Session 7 12:40–13:55

    Track A: Censorship

    • Running Refraction Networking for Real
      Benjamin VanderSloot (University of Michigan), Sergey Frolov (University of Colorado Boulder), Jack Wampler (University of Colorado Boulder), Sze Chuen Tan (University of Illinois, Urbana-Champaign), Irv Simpson (Psiphon), Michalis Kallitsis (Merit), J. Alex Halderman (University of Michigan), Nikita Borisov (University of Illinois, Urbana-Champaign), and Eric Wustrow (University of Colorado Boulder)

    • SiegeBreaker: An SDN Based Practical Decoy Routing System
      Piyush Sharma (IIIT Delhi), Devashish Gosain (IIIT Delhi), Himanshu Sagar (IIIT Delhi), Chaitanya Kumar (IBM research Labs, Singapore), Aneesh Dogra (IIIT Delhi), Vinayak Naik (BITS Pilani, Goa), H.B. Acharya (RIT, New York USA), and Sambuddho Chakravarty (IIIT Delhi)

    • MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies
      Mohsen Minaei (Purdue University), Pedro Moreno-Sanchez (TU Wien), and Aniket Kate (Purdue University)

    Track B: Usability

    Track C: Data protection

    Rump session 14:05–15:05

    Closing remarks 15:05–15:10