Accepted papers for PETS 2022

Issue 1

  • Personal Information Inference from Voice Recordings: User Awareness and Privacy Concerns
    Jacob Leon Kröger (Technische Universität Berlin, Germany), Leon Konstantin Gellrich (Universität Potsdam, Germany), Sebastian Pape (Goethe Universität, Frankfurt, Germany), Saba Rebecca Brause (Technische Universität Berlin, Germany), Stefan Ullrich (Technische Universität Berlin, Germany)
  • MLEFlow: Learning from History to Improve Load Balancing in Tor
    Hussein Darir (University of Illinois at Urbana-Champaign), Hussein Sibai (University of Illinois at Urbana-Champaign), Chin-Yu Cheng (University of Illinois at Urbana-Champaign), Nikita Borisov (University of Illinois at Urbana-Champaign), Geir Dullerud (University of Illinois at Urbana-Champaign), and Sayan Mitra (University of Illinois at Urbana-Champaign)
  • How Can and Would People Protect from Online Tracking?
    Maryam Mehrnezhad (Newcastle University), Kovila Coopamootoo (Newcastle University), and Ehsan Toreini (Durham University)
  • Towards Improving Code Stylometry Analysis in Underground Forums
    Michal Tereszkowski-Kaminski (King's College London), Sergio Pastrana (Universidad Carlos III de Madrid), Jorge Blasco (Royal Holloway, University of London), and Guillermo Suarez-Tangil (IMDEA Networks Institute and King's College London)
  • Ulixes: Facial Recognition Privacy with Adversarial Machine Learning
    Thomas Cilloni (University of Mississippi), Wei Wang (Xi'an Jiaotong-Liverpool University), Charles Walter (University of Mississippi), and Charles Fleming (University of Mississippi)
  • If This Context Then That Concern: Exploring users' concerns with IFTTT applets
    Mahsa Saeidi (Oregon State University), McKenzie Calvert (Oregon State University), Audrey W. Au (Oregon State University), Anita Sarma (Oregon State University), and Rakesh B. Bobba (Oregon State University)
  • User Perceptions of Gmail’s Confidential Mode
    Elham Al Qahtani (University of North Carolina at Charlotte), Yousra Javed (National University of Sciences and Technology), and Mohamed Shehab (University of North Carolina at Charlotte)
  • Toward Uncensorable, Anonymous and Private Access Over Satoshi Blockchains
    Ruben Recabarren (Facebook) and Bogdan Carbunar (Florida International University)
  • OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers
    Darion Cassel (Carnegie Mellon University), Su-Chin Lin (National Taiwan University), Alessio Buraggina (University of Miami), William Wang (University of Chicago), Andrew Zhang (University of Illinos Urbana-Champaign), Lujo Bauer (Carnegie Mellon University), Hsu-Chun Hsiao (National Taiwan University), Limin Jia (Carnegie Mellon University), and Timothy Libert (Google)
  • Making the Most of Parallel Composition in Differential Privacy
    Josh Smith (Data61, CSIRO), Hassan Jameel Asghar (Macquarie University and Data61, CSIRO), Gianpaolo Gioiosa (Data61, CSIRO), Sirine Mrabet (Data61, CSIRO), Serge Gaspers (University of New South Wales), and Paul Tyler (Data61, CSIRO)
  • Zen and the art of model adaptation: Low-utility-cost attack mitigations in collaborative machine learning
    Dmitrii Usynin (Imperial College, TU Munich), Jonathan Passerat-Palmbach (Imperial College, ConsenSys Health), Georgios Kaissis (TU Munich, Imperial College), and Daniel Rueckert (TU Munich, Imperial College)
  • AriaNN: Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing
    Théo Ryffel (INRIA, DI ENS, ENS, CNRS, PSL University, Paris, France), Pierre Tholoniat (Columbia University, New York, USA), David Pointcheval (DI ENS, ENS, CNRS, PSL University, INRIA, Paris, France), and Francis Bach (INRIA, DI ENS, ENS, CNRS, PSL University, Paris, France)
  • Proof-of-Vax: Studying User Preferences and Perception of Covid Vaccination Certificates
    Marvin Kowalewski (Ruhr University Bochum), Franziska Herbert (Ruhr University Bochum), Theodor Schnitzler (Ruhr University Bochum), and Markus Dürmuth (Ruhr University Bochum)
  • Differentially private partition selection
    Damien Desfontaines (Google / ETH Zürich), James Voss (Google), Bryant Gipson (Google), and Chinmoy Mandayam (Google)
  • Circuit-PSI with Linear Complexity via Relaxed Batch OPPRF
    Nishanth Chandran (Microsoft Research, India), Divya Gupta (Microsoft Research, India), and Akash Shah (Microsoft Research, India)
  • Multiparty Reach and Frequency Histogram: Private, Secure and Practical
    Badih Ghazi (Google), Ravi Kumar (Google), Ben Kreuter (Google), Pasin Manurangsi (Google), Jiayu Peng (Google), Evgeny Skvortsov (Google), Yao Wang (Google), and Craig Wright (Google)
  • Polymath: Low-Latency MPC via Secure Polynomial Evaluations and its Applications
    Donghang Lu (Purdue University), Albert Yu (Purdue University), Aniket Kate (Purdue University), and Hemanta Maji (Purdue University)
  • Privacy-preserving FairSwap: Fairness and Privacy Interplay
    Sepideh Avizheh (University of Calgary), Preston Haffey (University of Calgary), and Reihaneh Safavi-Naini (University of Calgary)
  • If You Like Me, Please Don’t "Like" Me: Inferring Vendor Bitcoin Addresses From Positive Reviews
    Jochen Schäfer (University of Mannheim), Christian Müller (University of Mannheim), and Frederik Armknecht (University of Mannheim)
  • Disparate Vulnerability to Membership Inference Attacks
    Bogdan Kulynych (EPFL), Mohammad Yaghini (University of Toronto), Giovanni Cherubin (Alan Turing Institute), Michael Veale (University College London), and Carmela Troncoso (EPFL)
  • Privacy-preserving High-dimensional Data Collection with Federated Generative Autoencoder
    Xue Jiang (Technical University of Munich), Xuebing Zhou (Huawei Technologies Duesseldorf GmbH), and Jens Grossklags (Technical University of Munich)
  • Masking Feedforward Neural Networks against Power Analysis Attacks
    Konstantinos Athanasiou (Northeastern University), Thomas Wahl (Northeastern University), A. Adam Ding (Northeastern University), and Yunsi Fei (Northeastern University)
  • From "Onion Not Found" to Guard Discovery
    Lennart Oldenburg (imec-COSIC KU Leuven), Gunes Acar (imec-COSIC KU Leuven), and Claudia Diaz (imec-COSIC KU Leuven)
  • Polaris: Transparent Succinct Zero-Knowledge Arguments for R1CS with Efficient Verifier
    Shihui Fu (University of Waterloo) and Guang Gong (University of Waterloo)
  • DataProVe: Fully Automated Conformance Verification Between Data Protection Policies and System Architectures
    Vinh Thong Ta (Edge Hill University) and Max Hashem Eiza (University of Central Lancashire)
  • SoK: Cryptographic Confidentiality of Data on Mobile Devices
    Maximilian Zinkus (Johns Hopkins University), Tushar M. Jois (Johns Hopkins University), and Matthew Green (Johns Hopkins University)
  • Setting the Bar Low: Are Websites Complying With the Minimum Requirements of the CCPA?
    Maggie Van Nortwick (Northeastern University) and Christo Wilson (Northeastern University)
  • The Effectiveness of Adaptation Methods in Improving User Engagement and Privacy Protection on Social Network Sites
    Moses Namara (Clemson University), Henry Sloan (Binghamton University), and Bart P. Knijnenburg (Clemson University)
  • Forward and Backward-Secure Range-Searchable Symmetric Encryption
    Jiafan Wang (Chinese University of Hong Kong) and Sherman S. M. Chow (Chinese University of Hong Kong)
  • (ε, δ)-Indistinguishable Mixing for Cryptocurrencies
    Foteini Baldimtzi (GMU), S. Dov Gordon (GMU), Ioanna Karantaidou (GMU), Mingyu Liang (GMU), and Mayank Varia (BU)