Results

Results obtained from PETS 2022 proceedings.

Title Artifact URL
On the Challenges of Developing a Concise Questionnaire to Identify Privacy Personas artifact
Mixnet optimization methods artifact
OrgAn: Organizational Anonymity with Low Latency artifact
Leveraging Strategic Connection Migration-Powered Traffic Splitting for Privacy artifact
Circuit-PSI with Linear Complexity via Relaxed Batch OPPRF artifact
Keeping Privacy Labels Honest artifact
User-friendly yet rarely read: A case study on the redesign of an online HIPAA authorization artifact
Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies artifact
Polymath: Low-Latency MPC via Secure Polynomial Evaluations and its Applications artifact
OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers artifact
Replay (Far) Away: Exploiting and Fixing Google/Apple Exposure Notification Contact Tracing artifact
Privately Connecting Mobility to Infectious Diseases via Applied Cryptography artifact
On the Feasibility of Linking Attack to Google/Apple Exposure Notification Framework artifact
Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps artifact
Privacy accounting εconomics: Improving differential privacy composition via a posteriori bounds artifact
Differentially private partition selection artifact
d3p - A Python Package for Differentially-Private Probabilistic Programming artifact
ATOM: Ad-network Tomography artifact
Setting the Bar Low: Are Websites Complying With the Minimum Requirements of the CCPA? artifact
A Multi-Region Investigation of Use and Perceptions of Smart Home Devices artifact
LLAMA: A Low Latency Math Library for Secure Inference artifact
Hidden Issuer Anonymous Credential artifact
DataProVe: Fully Automated Conformance Verification Between Data Protection Policies and System Architectures artifact
Integrating Privacy into the Electric Vehicle Charging Architecture artifact
Machine Learning with Differentially Private Labels: Mechanisms and Frameworks artifact
Masking Feedforward Neural Networks against Power Analysis Attacks artifact
A Global Survey of Android Dual-Use Applications Used in Intimate Partner Surveillance artifact
Are iPhones Really Better for Privacy? A Comparative Study of iOS and Android Apps artifact
Analyzing the Feasibility and Generalizability of Fingerprinting Internet of Things Devices artifact
Formalizing and Estimating Distribution Inference Risks artifact
Disparate Vulnerability to Membership Inference Attacks artifact
Athena: Probabilistic Verification of Machine Unlearning artifact
Deletion Inference, Reconstruction, and Compliance in Machine (Un)Learning artifact
On Defeating Graph Analysis of Anonymous Transactions artifact
FingerprinTV: Fingerprinting Smart TV Apps artifact
Watch Over Your TV: A Security and Privacy Analysis of the Android TV ecosystem artifact
Building a Privacy-Preserving Smart Camera System artifact
gOTzilla: Efficient Disjunctive Zero-Knowledge Proofs from MPC in the Head, with Application to Proofs of Assets in Cryptocurrencies artifact
Zswap: zk-SNARK Based Non-Interactive Multi-Asset Swaps artifact
Privacy-preserving FairSwap: Fairness and Privacy Interplay artifact
I know what you did on Venmo: Discovering privacy leaks in mobile social payments artifact
MLEFlow: Learning from History to Improve Load Balancing in Tor artifact
From "Onion Not Found" to Guard Discovery artifact
Increasing Adoption of Tor Browser Using Informational and Planning Nudges artifact
Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor artifact
If You Like Me, Please Don’t "Like" Me: Inferring Vendor Bitcoin Addresses From Positive Reviews artifact
Flexible and scalable privacy assessment for very large datasets, with an application to official governmental microdata artifact
Visualizing Privacy-Utility Trade-Offs in Differentially Private Data Releases artifact