PETS 2025 Posters

These posters did not undergo peer review and were selected on a first-come, first-served basis. They were reviewed only for relevance to PETS. Posters will be presented Wednesday at 17:00.

  • WebLLM : Adapting Large Language Models for Anti-tracking
    Muhammad Jazlan (University of California, Davis), Shaoor Munir (University of California, Davis), Sandra Siby (New York University, Abu Dhabi), Umar Iqbal (University of Washington, St Louis), Zubair Shafiq (University of California, Davis)
  • Guidance in anonymization: When Ambiguity Meets Privacy-Washing
    Szilvia Lestyán (Inria), Ludovica Robustelli (CNRS), William Letrone (CNRS)
  • PrivaComply: An Privacy Automated Tool for Detecting GDPR and PDPA Violations in Website Policies and Cookie Banners
    Syed Muhammad Naqi Raza (Ghulam Ishaq Khan Institute of Engineering Sciences and Technology), Bilal Shah (Ghulam Ishaq Khan Institute of Engineering Sciences and Technology), Haya Khan (Ghulam Ishaq Khan Institute of Engineering Sciences and Technology), Javeria Sahar (Ghulam Ishaq Khan Institute of Engineering Sciences and Technology)
  • Eavesdropping on the Wrist: Inferring User Behavior from Smartwatch EM Emissions
    Haowen Xu (Worcester Polytechnic Institute), Tianya Zhao (Florida International University), Xuyu Wang (Florida International University), Jun Dai (Worcester Polytechnic Institute), Xiaoyan Sun (Worcester Polytechnic Institute)
  • Towards Understanding Server-Side Tracking Ecosystems
    Christian Böttger (Westphalian University of Applied Sciences, Institute for Internet-Security), Tareq Khouja (Westphalian University of Applied Sciences, Institute for Internet-Security)
  • HotspotCheck: Investigating Privacy Risks and Practices of Public Wi-Fi Hotspots with the assistance of LLMs
    Henry Hosseini (Westphalian University of Applied Sciences, Institute for Internet Security; Department of Information Systems, University of Münster), Christian Böttger (Westphalian University of Applied Sciences, Institute for Internet Security)
  • Revolutionizing personal data management in documents: Integrating Digital Identity Wallets and ODRL to build a new mechanism for personal data governance
    Louis Raffin (I3S (CNRS)), Karima Boudaoud (I3S (CNRS)), Yves Roudier (I3S (CNRS))
  • Improving Phishing Risk Perception with Transparent Suspicion Scores
    Peifeng He (Duke University), Kejia Liu (Duke University), Ethan Huang (Duke University), Pardis Emami-Naeini (Duke University)
  • Understanding User Privacy Perceptions in Video Conferencing: Insights from a Feature-Specific User Study
    Hobin Kim (KAIST), Wonho Song (KAIST), Joseph Seering (KAIST), Min Suk Kang (KAIST)
  • The Locknet: China’s Multi-layer System of Online Censorship
    Jessica Batke (Asia Society), Laura Edelson (Northeastern University)
  • How Students Evaluate the Security of AI-Generated Code
    Matthew (Galej), Mary Anne Smart (Purdue University)
  • Layered, Overlapping, and Inconsistent: A Large-Scale Analysis of the Multiple Privacy Policies and Controls of U.S. Banks
    Lu Xian (University of Michigan), Van Tran (University of Chicago), Lauren Lee (University of Michigan), Meera Kumar (University of Michigan), Yichen Zhang (University of Michigan), Florian Schaub (University of Michigan)
  • Design and Evaluation of a Privacy Preserving Propaganda Detection Tool with a Three Tier Architecture for Robust Inference and Data Protection - TRIDENT
    Al Nahian Bin Emran (George Mason University), Dhiman Goswami (George Mason University), Md Hasan Ullah Sadi (George Mason University), Sanchari Das (George Mason University)
  • LANShield: Analysing and Protecting Local Network Access on Mobile Devices
    Angelos Beitis (DistriNet, KU Leuven), Jeroen Robben (DistriNet, KU Leuven), Alexander Heinrich (SEEMOO, TU Darmstadt), Vik Vanderlinden (DistriNet, KU Leuven), Mathy Vanhoef (DistriNet, KU Leuven)
  • Hardening Federated Learning: IP Protection with NVIDIA FLARE and Confidential Computing
    Holger Roth (NVIDIA), Isaac (Te-Chung) Yang (NVIDIA)
  • Understanding the Perils of YouTube's Ad Privacy Settings on Safety
    Cat Mai (New York University), Lexie Barthelemess (New York University), Bruno Coelho (New York University), Julia Kieserman (State University of New York at Buffalo), Kyle Spinelli (New York University), Eric Yang (New York University), Anthanasios Andreou (New York University), Rachel Greenstadt (New York University), Tobias Lauinger (New York University), Damon McCoy (New York University)
  • Minimizing Smart Contract Data Exposure with Cryptographic Protocols
    Diego Castejon-Molina (IMDEA Software Institute / Universidad Politécnica de Madrid), Varun Madathil (Yale University), Dimitrios Vasilopoulos (Insight RI Centre for Data Analytics, University College Cork), Sri AravindaKrishnan Thyagarajan (University of Sydney), Pedro Moreno-Sanchez (IMDEA Software Institute / MPI-SP / VISA Research)
  • SoK: Multimodal AI Threats to Identity Workflows
    Shriphani Palakodety (Onai Inc.)
  • Investigating the Security & Privacy Risks from Unsanctioned Technology Use by Educators
    Easton Kelso (Arizona State University), Ananta Soneji (Arizona State University), Syed Zami-Ul-Haque Navid (Arizona State University), Yan Shoshitaishvili (Arizona State University), Sazzadur Rahaman (University of Arizona), Rakibul Hasan (Arizona State University)
  • Hide and SST: Detecting and Analyzing Server-Side Tracking Across the Web
    Shambhavi Mittal (University of California, San Diego), Alisha Ukani (University of California, San Diego), Alex C. Snoeren (University of California, San Diego)
  • Practical Support for Integrity Validation of Criminal Legal Process
    Alisha Ukani (UC San Diego), Katherine Izhikevich (UC San Diego), Ross Greer (UC Merced), Earlence Fernandes (UC San Diego), Alex C. Snoeren (UC San Diego), Stefan Savage (UC San Diego)
  • Robust Federated Learning via Byzantine Filtering over Encrypted Updates
    Adda Akram Bendoukha (Samovar, Télécom SudParis, Institut Polytechnique de Paris), Aymen Boudguiga (CEA-List, Université Paris-Saclay), Nesrine Kaaniche (Samovar, Télécom SudParis, Institut Polytechnique de Paris), Renaud Sirdey (CEA-List, Université Paris-Saclay), Didem Demirag (Université du Québec à Montréal), Sébastien Gambs (Université du Québec à Montréal)
  • GRAND : Graph Reconstruction from Potential Partial Adjacency and Neighborhood Data
    Zelma Aubin Birba (UQAM), Sofiane Azogagh (UQAM), Josée Desharnais (Université Laval), Sébastien Gambs (UQAM), Marc-Olivier Killijian (UQAM), Nadia Tawbi (Université Laval)
  • The Sims: Simulating User Interaction with Personalized LLMs
    Stuart Aldrich (Washington University in St. Louis), Hussam Habib (New York University), Umar Iqbal (Washington University in St. Louis)
  • The Invisible Hijack: Quantifying Cookie Stuffing and User Perceptions of Coupon Plugins
    Kartiki Hanumant Pande (San Diego State University), Joann Chen (San Diego State University)
  • Efficient Long-Label Support for FHE based PSI via In-Protocol PRFs and XOR
    Sungkwang Ji (Korea Advanced Institute of Science and Technology), Brent Byunghoon Kang (Korea Advanced Institute of Science and Technology)