PETS 2021 论文录用列表
2021-07-08 23:29:42 Author: mp.weixin.qq.com(查看原文) 阅读量:71 收藏

    PETS全称Privacy Enhancing Technologies Symposium,信息安全及密码学 CCF分类C类,每年有4轮论文提交,接收的论文出版在期刊Proceedings on Privacy Enhancing Technologies (PoPETs)。PETS 2021将于2021年7月12日-16日在线上举行。2021年度的4个论文提交截止日期分别在2020年5月,2020年8月,2020年10月和2021年2月,共录取81篇论文。

录用论文清单

Issue1 (12篇)

SGX-MR: Regulating Dataflows for Protecting Access Patterns of Data-Intensive SGX Applications

A K M Mubashwir Alam (Marquette University), Sagar Sharma (HP Inc), and Keke Chen (Marquette University)

Controlled Functional Encryption Revisited: Multi-Authority Extensions and Efficient Schemes for Quadratic Functions

Miguel Ambrona (NTT Secure Platform Laboratories), Dario Fiore (IMDEA Software Institute), and Claudio Soriente (NEC Laboratories Europe)

Unveiling Web Fingerprinting in the Wild Via Code Mining and Machine Learning

Valentino Rizzo (Ermes Cyber Security SRL), Stefano Traverso (Ermes Cyber Security SRL), and Marco Mellia (Politecnico di Torino)

Differential Privacy at Risk: Bridging Randomness and Privacy Budget

Ashish Dandekar (École Normale Supériure, Paris, France), Debabrota Basu (Chalmers University of Technology, Gothenberg, Sweden), Stéphane Bressan (National University of Singapore, Singapore), and Ashish Dandekar (École Normale Supérieure)

On the (Im)Practicality of Adversarial Perturbation for Image Privacy

Arezoo Rajabi (Oregon State University), Rakesh B. Bobba (Oregon State University), Mike Rosulek (Oregon State University), Charles V. Wright (Portland State University), and Wu-chi Feng (Portland State University)

SoK: Privacy-Preserving Reputation Systems

Stan Gurtler (University of Waterloo) and Ian Goldberg (University of Waterloo)

Scaling up Differentially Private Deep Learning with Fast Per-Example Gradient Clipping

Jaewoo Lee (University of Georgia) and Daniel Kifer (Penn State University)

Real-time Analysis of Privacy-(un)aware IoT Applications

Leonardo Babun (Florida International University), Z. Berkay Celik (Purdue University), Patrick McDaniel (Pennsylvania Sate University), and A. Selcuk Uluagac (Florida International University)

Secure Training of Decision Trees with Continuous Attributes

Mark Abspoel (CWI, The Netherlands), Daniel Escudero (Aarhus University, Denmark), and Nikolaj Volgushev (Pleo Technologies ApS)

Falcon: Honest-Majority Maliciously Secure Framework for Private Deep Learning

Sameer Wagh (Princeton University), Shruti Tople (Microsoft Research), Fabrice Benhamouda (Algorand Foundation), Eyal Kushilevitz (Technion), Prateek Mittal (Princeton University), and Tal Rabin (Algorand Foundation)

The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services

Yuantian Miao (Swinburne University of Technology), Minhui Xue (The University of Adelaide), Chao Chen (Swinburne University of Technology), Lei Pan (Deakin University), Jun Zhang (Swinburne University of Technology), Benjamin Zi Hao Zhao (The University of New South Wales and CSIRO-Data61), Dali Kaafar (Macquarie University and CSIRO-Data61), and Yang Xiang (Swinburne University of Technology)

SoK: Managing Longitudinal Privacy of Publicly Shared Personal Online Data

Theodor Schnitzler (Ruhr-Universität Bochum), Shujaat Mirza (Courant Institute of Mathematical Sciences, New York University), Markus Dürmuth (Ruhr-Universität Bochum), and Christina Pöpper (New York University Abu Dhabi)

Issue2 (19篇)

Automated Extraction and Presentation of Data Practices in Privacy Policies

Duc Bui (University of Michigan), Kang G. Shin (University of Michigan), Jongmin Choi (Samsung Research), and Jun Bum Shin (Samsung Research)

Scalable Privacy-Preserving Distributed Learning

David Froelicher (EPFL), Juan R. Troncoso-pastoriza (EPFL), Apostolos Pyrgelis (EPFL), Sinem Sav (EPFL), Joao Sa Sousa (EPFL), Jean-Philippe Bossuat (EPFL), and Jean-Pierre Hubaux (EPFL)

Face-Off: Adversarial Face Obfuscation

Varun Chandrasekaran (University of Wisconsin-Madison), Chuhan Gao (Microsoft), Brian Tang (University of Wisconsin-Madison), Kassem Fawaz (University of Wisconsin-Madison), Somesh Jha (University of Wisconsin-Madison), and Suman Banerjee (University of Wisconsin-Madison)

Privacy-Preserving Multiple Tensor Factorization for Synthesizing Large-Scale Location Traces with Cluster-Specific Features

Takao Murakami (AIST), Koki Hamada (NTT), Yusuke Kawamoto (AIST), and Takuma Hatano (NSSOL)

"Warn Them" or "Just Block Them"?: Comparing Privacy Concerns of Older and Working Age Adults

Hirak Ray (University of Maryland, Baltimore County), Flynn Wolf (University of Maryland, Baltimore County), Ravi Kuber (University of Maryland, Baltimore County), and Adam J. Aviv (The George Washington University)

Website Fingerprinting in the Age of QUIC

Jean-Pierre Smith (ETH Zurich), Adrian Perrig (ETH Zurich), and Prateek Mittal (Princeton)

EL PASSO: Efficient and Lightweight Privacy-preserving Single Sign On

Zhiyi Zhang (UCLA), Michał Król (City, University of London), Alberto Sonnino (UCL), Lixia Zhang (UCLA), and Etienne Riviere (UCLouvain)

Efficient homomorphic evaluation of k-NN classifiers

Martin Zuber (CEA, LIST) and Renaud Sirdey (CEA, LIST)

Defending Against Microphone-Based Attacks with Personalized Noise

Yuchen Liu (Indiana University Bloomington), Ziyu Xiang (Indiana University Bloomington), EJ Seong (Indiana University Bloomington), Apu Kapadia (Indiana University Bloomington), and Donald Williamson (Indiana University Bloomington))

Holes in the Geofence: Privacy Vulnerabilities in "Smart" DNS Services

Rahel A. Fainchtein (Georgetown University), Adam A. Aviv (The George Washington University), Micah Sherr (Georgetown University), Stephen Ribaudo (Georgetown University), and Armaan Khullar (Georgetown University)

Too Close for Comfort: Morasses of (Anti-) Censorship in the Era of CDNs

Devashish Gosain (IIIT Delhi), Mayank Mohindra (IIIT Delhi), and Sambuddho Chakravarty (IIIT Delhi)

Privacy-Preserving & Incrementally-Deployable Support for Certificate Transparency in Tor

Rasmus Dahlberg (Karlstad University), Tobias Pulls (Karlstad University), Tom Ritter (Mozilla), and Paul Syverson (U.S. Naval Research Laboratory)

DyPS: Dynamic, Private and Secure GWAS

Túlio Pascoal (SnT, University of Luxembourg), Jérémie Decouchant (SnT, University of Luxembourg), Antoine Boutet (Insa-Lyon, CITI, Inria), and Paulo Esteves-Verissimo (SnT, University of Luxembourg)

Validity and Reliability of the Scale Internet Users’ Information Privacy Concerns (IUIPC)

Thomas Gross (Newcastle University)

A calculus of tracking: theory and practice

Giorgio Di Tizio (University of Trento) and Fabio Massacci (University of Trento)

"Did you know this camera tracks your mood?": Modeling People's Privacy Expectations and Preferences in the Age of Video Analytics

Shikun Zhang (Carnegie Mellon University), Yuanyuan Feng (Carnegie Mellon University), Lujo Bauer (Carnegie Mellon University), Lorrie Cranor (Carnegie Mellon University), Anupam Das (North Carolina State University), and Norman Sadeh (Carnegie Mellon University)

GANDaLF: GAN for Data-Limited Fingerprinting

Se Eun Oh (University of Minnesota), Nate Mathews (Rochester Institute of Technology), Mohammad Saidur Rahman (Rochester Institute of Technology), Matthew Wright (Rochester Institute of Technology), and Nicholas Hopper (University of Minnesota)

Revisiting Membership Inference Under Realistic Assumptions

Bargav Jayaraman (University of Virginia), Lingxiao Wang (University of California Los Angeles), Katherine Knipmeyer (University of Virginia), Quanquan Gu (University of California Los Angeles), and David Evans (University of Virginia)

Déjà vu: Abusing Browser Cache Headers to Identify and Track Online Users

Vikas Mishra (Inria / Univ. Lille), Pierre Laperdrix (CNRS / Univ. Lille / Inria), Walter Rudametkin (Univ. Lille / Inria), and Romain Rouvoy (Univ. Lille / Inria)

Issue3(22篇)

Exploring Mental Models of the Right to Informational Self-Determination of Office Workers in Germany

Jan Tolsdorf (Hochschule Bonn-Rhein-Sieg University of Applied Sciences), Florian Dehling (Hochschule Bonn-Rhein-Sieg University of Applied Sciences), Delphine Reinhardt (University of Göttingen), and Luigi Lo Iacono (Hochschule Bonn-Rhein-Sieg University of Applied Sciences)

Genome Reconstruction Attacks Against Genomic Data-Sharing Beacons

Kerem Ayoz (Bilkent University), Erman Ayday (Case Western Reserve University), and Ercument Cicek (Bilkent University)

The Motivated Can Encrypt (Even with PGP)

Glencora Borradaile (Oregon State University), Kelsy Kretschmer (Oregon State University), Michele Gretes (Stand), and Alexandria LeClerc (Oregon State University)

Ahree Years Later: A Study of MAC Address Randomization In Mobile Devices And When It Succeeds

Ellis Fenske (US Naval Academy), Dane Brown (US Naval Academy), Jeremy Martin (MITRE), Travis Mayberry (US Naval Academy), Peter Ryan, Jr. (MITRE), and Erik Rye (CMAND)

SoK: Privacy-Preserving Collaborative Tree-based Model Learning

Sylvain Chatel (EPFL), Apostolos Pyrgelis (EPFL), Juan Ramón Troncoso-Pastoriza (EPFL), and Jean-Pierre Hubaux (EPFL)

FoggySight: A Scheme for Facial Lookup Privacy

Ivan Evtimov (University of Washington), Pascal Sturmfels (University of Washington), and Tadayoshi Kohno (University of Washington)

Who Can Find My Devices? Security and Privacy of Apple's Crowd-Sourced Bluetooth Location Tracking System

Milan Stute (Technical University of Darmstadt), Alexander Heinrich (Technical University of Darmstadt), Tim Kornhuber (Technical University of Darmstadt), and Matthias Hollick (Technical University of Darmstadt)

Faster homomorphic comparison operations for BGV and BFV

Ilia Iliashenko (imec-COSIC, KU Leuven, Belgium) and Vincent Zucca (Équipe DALI, Université de Perpignan via Domitia, France; LIRMM, UMR 5506, Université de Montpellier, CNRS, France)

Foundations of Ring Sampling

Viktoria Ronge (Friedrich-Alexander University Erlangen-Nuremberg), Christoph Egger (Friedrich-Alexander University Erlangen-Nuremberg), Russell W. F. Lai (Friedrich-Alexander University Erlangen-Nuremberg), Dominique Schröder (Friedrich-Alexander University Erlangen-Nuremberg), and Hoover H. F. Yin (The Chinese University of Hong Kong)

Fast Privacy-Preserving Punch Cards

Saba Eskandarian (Stanford University)

Awareness, Adoption, and Misconceptions of Web Privacy Tools

Peter Story (Carnegie Mellon University), Daniel Smullen (Carnegie Mellon University), Yaxing Yao (Carnegie Mellon University), Alessandro Acquisti (Carnegie Mellon University), Lorrie Faith Cranor (Carnegie Mellon University), Norman Sadeh (Carnegie Mellon University), and Florian Schaub (University of Michigan)

The Role of Privacy in Digitalization – Analyzing Perspectives of German Farmers

Sebastian Linsner (Technical University of Darmstadt), Franz Kuntke (Technical University of Darmstadt), Enno Steinbrink (Technical University of Darmstadt), Jonas Franken (Technical University of Darmstadt), Christian Reuter (Technical University of Darmstadt), and Sebastian Linsner (Technical University of Darmstadt)

Data Portability between Online Services: An Empirical Analysis on the Effectiveness of GDPR Art. 20

Emmanuel Syrmoudis (Technical University of Munich), Stefan Mager (Ludwig-Maximilians-University of Munich), Sophie Kuebler-Wachendorff (Ludwig-Maximilians-University of Munich), Paul Pizzinini (Ludwig-Maximilians-University of Munich), Jens Grossklags (Technical University of Munich), and Johann Kranz (Ludwig-Maximilians-University of Munich)

Digital inequality through the lens of self-disclosure

Jooyoung Lee (The Pennsylvania State University), Sarah Rajtmajer (The Pennsylvania State University), Eesha Srivatsavaya (The Pennsylvania State University), and Shomir Wilson (The Pennsylvania State University)

The CNAME of the Game: Large-scale Analysis of DNS-based Tracking Evasion

Yana Dimova (imec-DistriNet, KU Leuven), Gunes Acar (imec-COSIC, KU Leuven), Lukasz Olejnik (European Data Protection Supervisor), Wouter Joosen (imec-DistriNet, KU Leuven), and Tom Van Goethem (imec-DistriNet, KU Leuven)

DNA Sequencing Flow Cells and the Security of the Molecular-Digital Interface

Peter Ney (University of Washington), Lee Organick (University of Washington), Jeff Nivala (University of Washington), Luis Ceze (University of Washington), and Tadayoshi Kohno (University of Washington)

A First Look at Private Communications in Video Games using Visual Features

Abdul Wajid (SEECS, NUST), Nasir Kamal (SEECS, NUST), Muhammad Sharjeel (SEECS, NUST), Raaez Muhammad Sheikh (SEECS, NUST), Huzaifah Bin Wasim (SEECS, NUST), Muhammad Hashir Ali (SEECS, NUST), Wajahat Hussain (SEECS, NUST), Syed Taha Ali (SEECS, NUST), and Latif Anjum (SEECS, NUST)

ML-CB: Machine Learning Canvas Block

Nathan Reitinger (UMD) and Michelle L. Mazurek (UMD)

Defining Privacy: How Users Interpret Technical Terms in Privacy Policies

Jenny Tang (Wellesley College), Hannah Shoemaker (Pomona College), Ada Lerner (Wellesley College), and Eleanor Birrell (Pomona College)

Unlinkable Updatable Hiding Databases and Privacy-Preserving Loyalty Programs

Aditya Damodaran (University of Luxembourg) and Alfredo Rial (University of Luxembourg)

privGAN: Protecting GANs from membership inference attacks at low cost to utility

Sumit Mukherjee (Microsoft), Yixi Xu (Microsoft), Anusua Trivedi (Microsoft), Nabajyoti Patowary (Microsoft), Juan Lavista Ferres (Microsoft)

Growing synthetic data through differentially-private vine copulas

Sébastien Gambs (UQAM), Frédéric Ladouceur (Ericsson), Antoine Laurent (UQAM), and Alexandre Roy-Gaumond (UQAM)

Issue(28篇)

SoK: Efficient Privacy-preserving Clustering

Aditya Hegde (International Institute of Information Technology Bangalore), Helen Möllering (Technical University of Darmstadt), Thomas Schneider (Technical University of Darmstadt), and Hossein Yalame (Technical University of Darmstadt)

Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules

Brandon Broadnax, Alexander Koch (Karlsruhe Institute of Technology), Jeremias Mechler (Karlsruhe Institute of Technology), Tobias Müller (FZI Research Center for Information Technology), Jörn Müller-Quade (Karlsruhe Institute of Technology), and Matthias Nagel

Secure integer division with a private divisor

Mark Abspoel (CWI) and Thijs Veugen (TNO)

CrowdNotifier: Decentralized Privacy-Preserving Presence Tracing

Wouter Lueks (EPFL), Seda Gürses (TU Delft), Michael Veale (UCL), Edouard Bugnion (EPFL), Marcel Salathé (EPFL), Kenneth G. Paterson (ETHZ), and Carmela Troncoso (EPFL)

Blocking Without Breaking: Identification and Mitigation of Non-Essential IoT Traffic

Anna Maria Mandalari (Imperial College London), Daniel J. Dubois (Northeastern University), Roman Kolcun (Imperial College London), Muhammad Talha Paracha (Northeastern University), Hamed Haddadi (Imperial College London), and David Choffnes (Northeastern University)

Residue-Free Computing

Logan Arkema (Georgetown University) and Micah Sherr (Georgetown University)

Differentially Private Naive Bayes Classifier using Smooth Sensitivity

Farzad Zafarani (Purdue University) and Chris Clifton (Purdue University)

Supervised Authorship Segmentation of Open Source Code Projects

Edwin Dauber (Drexel University), Robert Erbacher (U.S. Army Research Laboratory), Gregory Shearer (ICF International), Michael Weisman (U.S. Army Research Laboratory), Frederica Nelson (U.S. Army Research Laboratory), and Rachel Greenstadt (New York University)

Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC

Ghada Almashaqbeh (University of Connecticut), Fabrice Benhamouda (Algorand Foundation), Seungwook Han (Columbia University), Daniel Jaroslawicz (Columbia University), Tal Malkin (Columbia University), Alex Nicita (Columbia University), Tal Rabin (UPenn University and Algorand Foundation), Abhishek Shah (Columbia University), and Eran Tromer (Columbia University and Tel Aviv University)

Privacy-Preserving Approximate k-Nearest-Neighbors Search that Hides Access, Query and Volume Patterns

Alexandra Boldyreva (Georgia Institute of Technology) and Tianxin Tang (Georgia Institute of Technology)

DPlis: Boosting Utility of Differentially Private Deep Learning via Randomized Smoothing

Wenxiao Wang (Tsinghua university), Tianhao Wang (Harvard University), Lun Wang (University of California, Berkeley), Nanqing Luo (Huazhong University of Science and Technology), Pan Zhou (Huazhong University of Science and Technology), Dawn Song (University of California, Berkeley), and Ruoxi Jia (Virginia Tech)

LogPicker: Strengthening Certificate Transparency against covert adversaries

Alexandra Dirksen (TU Braunschweig), David Klein (TU Braunschweig), Robert Michael (TU Braunschweig), Tilman Stehr (), Konrad Rieck (TU Braunschweig), and Martin Johns (TU Braunschweig)

"We, three brothers have always known everything of each other": A Cross-cultural Study of Sharing Digital Devices and Online Accounts

Mahdi Nasrullah Al-Ameen (Utah State University), Huzeyfe Kocabas (Utah State University), Swapnil Nandy (Jadavpur University), and Tanjina Tamanna (University of Dhaka)

Privacy Preference Signals: Past, Present and Future

Maximilian Hils (University of Innsbruck), Daniel Woods (University of Innsbruck), Rainer Böhme (University of Innsbruck), and Maximilian Hils (University of Innsbruck)

SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges

Felix Engelmann (Aarhus University), Lukas Müller (Ulm University), Andreas Peter (University of Twente), Frank Kargl (Ulm University), and Christoph Bösch (Ulm University)

Multiparty Homomorphic Encryption from Ring-Learning-With-Errors

Christian Mouchet (EPFL), Juan Troncoso-Pastoriza (EPFL), Jean-Philippe Bossuat (EPFL), and Jean-Pierre Hubaux (EPFL)

Domain Name Encryption Is Not Enough: Privacy Leakage via IP-based Website Fingerprinting

Nguyen Phong Hoang (Stony Brook University), Arian Akhavan Niaki (University of Massachusetts, Amherst), Phillipa Gill (University of Massachusetts, Amherst), and Michalis Polychronakis (Stony Brook University)

Mercurial Signatures for Variable-Length Messages

Elizabeth C. Crites (University College London) and Anna Lysyanskaya (Brown University)

Unifying Privacy Policy Detection

Henry Hosseini (University of Münster), Martin Degeling (Ruhr University Bochum), Christine Utz (Ruhr University Bochum), and Thomas Hupperich (University of Münster)

Managing Potentially Intrusive Practices In The Browser: A User-Centered Perspective

Daniel Smullen (Carnegie Mellon University), Yaxing Yao (University of Maryland, Baltimore County), Yuanyuan Feng (Carnegie Mellon University), Norman Sadeh (Carnegie Mellon University), Arthur Edelstein (Mozilla), and Rebecca Weiss (Mozilla)

Oblivious DNS over HTTPS (ODoH): A Practical Privacy Enhancement to DNS

Sudheesh Singanamalla (University of Washington / Cloudflare Inc.), Suphanat Chunhapanya (Cloudflare Inc.), Jonathan Hoyland (Cloudflare Inc.), Marek Vavruša (Cloudflare Inc.), Tanya Verma (Cloudflare Inc.), Peter Wu (Cloudflare Inc.), Marwan Fayed (Cloudflare Inc.), Kurtis Heimerl (University of Washington), Nick Sullivan (Cloudflare Inc.), and Christopher Wood (Cloudflare Inc.)

zkSENSE: A Friction-less Privacy-Preserving HumanAttestation Mechanism for Mobile Devices

Iñigo Querejeta-Azurmendi (Universidad Carlos III Madrid / ITFI CSIC), Panagiotis Papadopoulos (Telefonica), Matteo Varvello (Nokia Bell Labs), Antonio Nappa (University of California, Berkeley), Jiexin Zhang (Cambridge University), and Benjamin Livshits (Brave Software / Imperial College London)

You May Also Like... Privacy: Recommendation Systems Meet PIR

Adithya Vadapalli (Indiana University), Fattaneh Bayatbabolghani (UC Berkeley), and Ryan Henry (University of Calgary)

"I would have to evaluate their objections": Privacy tensions between smart home device owners and incidental users

Camille Cobb (Carnegie Mellon University), Sruti Bhagavatula (Carnegie Mellon University), Kalil Anderson Garrett (Carnegie Mellon University), Alison Hoffman (Carnegie Mellon University), Varun Rao (Carnegie Mellon University), and Lujo Bauer (Carnegie Mellon University)

HashWires: Hyperefficient Credential-Based Range Proofs

Konstantinos Chalkias (Facebook / Novi), Shir Cohen (Technion), Kevin Lewi (Facebook / Novi), Fredric Moezinia (Facebook / Novi), and Yolan Romailler (Facebook / Novi)

Less is More: A privacy-respecting Android malware classifier using federated learning

Rafa Gálvez (imec-COSIC ESAT/KU Leuven), Veelasha Moonsamy (Ruhr University Bochum), and Claudia Diaz (imec-COSIC ESAT/KU Leuven)

Private Stream Aggregation with Labels in the Standard Model

Johannes Ernst (University St. Gallen) and Alexander Koch (Karlsruhe Institute of Technology)

SoK: Privacy-Preserving Computation Techniques for Deep Learning

José Cabrero-Holgueras (CERN) and Sergio Pastrana (Universidad Carlos III de Madrid)

拓展阅读

PETS 2019 论文录用列表

会议主页:

https://petsymposium.org/2021/index.php

安全学术圈招募队友-ing,有兴趣加入学术圈的请联系secdr#qq.com


文章来源: http://mp.weixin.qq.com/s?__biz=MzU5MTM5MTQ2MA==&mid=2247486146&idx=1&sn=c045acfa97780c8792adc0f734375843&chksm=fe2ef549c9597c5f2d18ab764969153b79732cd90b55b3734a51e3fd151acc77a32b2479d2bb#rd
如有侵权请联系:admin#unsafe.sh