Program
Presentations are to be, at the most, 20 minutes in length for full papers and 10 minutes for short papers, without including Q&A.
- 08:25 – 08:30 Opening
- 08:30 – 10:15 Session 1: Secure Computation (Session Chair: Josep Domingo-Ferrer)
- Privacy-Preserving Multi-Party Access Control
Mina Sheikhalishahi (Eindhoven University of Technology), Gamze Tillem (Delft University of Technology), Zekeriya Erkin (Delft University of Technology) and Nicola Zannone (Eindhoven University of Technology) - Private Set Intersection with Linear Communication from General Assumptions
Daniel Noble (University of Pennsylvania); Brett Hemenway Falk (University of Pennsylvania); Rafail Ostrovsky (University of California) - DURASIFT A robust, decentralized, encrypted database supporting private searches with complex policy-controls
Brett Hemenway (University of Pennsylvania); Rafail Ostrovsky (University of California); Steve Lu (Stealth Software) - There Are 10 Types of Vectors (and Polynomials): Efficient Zero-Knowledge Proofs of “One-Hotness” via Polynomials with One Zero
Ryan Henry (University of Calgary); William Black (University of Calgary) - zksk: A Library for Composable Zero-Knowledge Proofs [short]
Wouter Lueks (Ecole Polytechnique Fédérale de Lausanne); Bogdan Kulynych (Ecole Polytechnique Fédérale de Lausanne); Jules Fasquelle (Ecole Polytechnique Fédérale de Lausanne); Simon Le Bail-Collet (Ecole Polytechnique Fédérale de Lausanne)
- Privacy-Preserving Multi-Party Access Control
- 10:15 – 10:45 Break
- 10:45 – 11:45 Session 2: Secure Communication (Session Chair: Rolando Trujillo)
- End-to-End Secure Mobile Group Messaging with Conversation Integrity and Deniability
Michael Schliep (University of Minnesota); Nicholas Hopper (University of Minnesota) - Anatomy of Commercial IMSI Catchers and Detectors
Shinjo Park (TU Berlin); Altaf Shaik (TU Berlin); Ravishankar Borgaonkar (SINTEF Digital); Jean-Pierre Seifert (TU Berlin) - When Certificate Transparency Is Too Transparent: Analyzing Information Leakage in HTTPS Domain Names [short]
Richard Roberts (University of Maryland); Dave Levin (University of Maryland)
- End-to-End Secure Mobile Group Messaging with Conversation Integrity and Deniability
- 11:45 – 12:20 Session 3: Genomic Data Privacy (Session Chair: Francesc Sebé)
- How Much Does GenoGuard Really Guard? An Empirical Analysis of Long-Term Security for Genomic Data
Bristena Oprisanu (University College London); Christophe Dessimoz (UNIL); Emiliano De Cristofaro (University College London) - Balancing Security and Privacy in Genomic Range Queries [short]
Ercan Ozturk (University of California); Xuhua Ding (SMU); Gene Tsudik (University of California)
- How Much Does GenoGuard Really Guard? An Empirical Analysis of Long-Term Security for Genomic Data
- 12:20 – 13:45 Lunch
- 13:45 – 14:30 Session 4: Privacy-enhancing techniques (Session Chair: Moti Yung)
- Ancile: Enhancing Privacy for Ubiquitous Computing with Use-Based Privacy
Eugene Bagdasaryan (Cornell University); Griffin Berlstein (Vassar College); Jason Waterman (Vassar College); Eleanor Birrell (Pomona College); Nate Foster (Cornell University); Fred B. Schneider (Cornell University); Deborah Estrin (Cornell University) - Privacy Protection in Distributed Fingerprint-based Authentication [short]
Swe Geng (ETH Zurich); Georgia Giannopoulou (ABB Switzerland Ltd); Maëlle Kabir-Querrec (ABB Switzerland Ltd) - Parking tickets for privacy-preserving pay-by-phone parking [short]
Ricard Borges (Universitat de Lleida); Francesc Sebé (Universitat de Lleida)
- Ancile: Enhancing Privacy for Ubiquitous Computing with Use-Based Privacy
- 14:30 – 15:15 Session 5: Cybersecurity (Session Chair: Aaron Gordon)
- MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting
Nikolay Matyunin (TU Darmstadt); Yujue Wang (TU Darmstadt); Tolga Arul (TU Darmstadt); Kristian Kullmann (TU Darmstadt); Jakub Szefer (Yale University); Stefan Katzenbeisser (University of Passau) - State of the Sandbox: Investigating macOS Application Security
Maximilian Blochberger (University of Hamburg); Jakob Rieck (University of Hamburg); Christian Burkert (University of Hamburg); Tobias Mueller (University of Hamburg); Hannes Federrath (University of Hamburg)
- MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting
- 15:15 – 15:45 Break
- 15:45 – 17:15 Session 6: Social aspects and other privacy issues (Session Chair: Josep Domingo-Ferrer)
- A Simulation-based Approach to Privacy Education
Kambiz Ghazinour (Kent State University); Ken Messner (Kent State University); Sean Scarnecchia (Kent State University); David Selinger (Kent State University) - Can Privacy Nudges be Tailored to Individuals' Decision Making and Personality Traits?
Logan Warberg (Carnegie Mellon University); Alessandro Acquisti (Carnegie Mellon University); Douglas Sicker (Carnegie Mellon University) - Efficiently Stealing your Machine Learning Models
Robert Nikolai Reith (TU Darmstadt); Oleksandr Tkachenko (TU Darmstadt); Thomas Schneider (TU Darmstadt) - Anonymity and Privacy in Bitcoin Escrow Trades
Farida Sabry (Qatar University); Wadha Labda (Qatar University); Aiman Erbad (Qatar University); Qutaibah Malluhi (Qatar University)
- A Simulation-based Approach to Privacy Education