Results

Results obtained from PETS 2024 proceedings.

Title Artifact URL
I still know it's you! On Challenges in Anonymizing Source Code Artifact: Available
User-Controlled Privacy: Taint, Track, and Control Artifact: Reproduced
Data Isotopes for Data Provenance in DNNs Artifact: Available
PrivDNN: A Secure Multi-Party Computation Framework for Deep Learning using Partial DNN Encryption Artifact: Reproduced
Why Privacy-Preserving Protocols Are Sometimes Not Enough: A Case Study of the Brisbane Toll Collection Infrastructure Artifact: Reproduced
Attacking Connection Tracking Frameworks as used by Virtual Private Networks Artifact: Reproduced
What Does It Mean to Be Creepy? Responses to Visualizations of Personal Browsing Activity, Online Tracking, and Targeted Ads Artifact: Reproduced
Traceable mixnets Artifact: Reproduced
MixMatch: Flow Matching for Mixnet Traffic Artifact: Available
SGXonerated: Finding (and Partially Fixing) Privacy Flaws in TEE-based Smart Contract Platforms Without Breaking the TEE Artifact: Reproduced
A Large-Scale Study of Cookie Banner Interaction Tools and their Impact on Users' Privacy Artifact: Available
Supporting Informed Choices about Browser Cookies: The Impact of Personalised Cookie Banners Artifact: Available
Block Cookies, Not Websites: Analysing Mental Models and Usability of the Privacy-Preserving Browser Extension CookieBlock Artifact: Available
Generalizable Active Privacy Choice: Designing a Graphical User Interface for Global Privacy Control Artifact: Available
A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses Artifact: Reproduced
Computational Differential Privacy for Encrypted Databases Supporting Linear Queries Artifact: Available
Connecting the Dots: Tracing Data Endpoints in IoT Devices Artifact: Available
SocIoTy: Practical Cryptography in Smart Home Contexts Artifact: Reproduced
CoStricTor: Collaborative HTTP Strict Transport Security in Tor Browser Artifact: Reproduced
DeTorrent: An Adversarial Padding-only Traffic Analysis Defense Artifact: Available
GenAIPABench: A Benchmark for Generative AI-based Privacy Assistants Artifact: Available
Edge Private Graph Neural Networks with Singular Value Perturbation Artifact: Reproduced
TMI! Finetuned Models Leak Private Information from their Pretraining Data Artifact: Reproduced
Privacy Preserving Feature Selection for Sparse Linear Regression Artifact: Available
Model-driven Privacy Artifact: Reproduced
Defining and Controlling Information Leakage in US Equities Trading Artifact: Reproduced
Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels Compared to Apps' Privacy Policies Artifact: Reproduced
QUICKeR: Quicker Updates Involving Continuous Key Rotation Artifact: Available
Anonify: Decentralized Dual-level Anonymity for Medical Data Donation Artifact: Reproduced
Privacy Protection Behaviors from a New Angle: Exploratory Analysis on a Russian Sample Artifact: Available
Efficiently Compiling Secure Computation Protocols From Passive to Active Security: Beyond Arithmetic Circuits Artifact: Reproduced
Multipars: Reduced-Communication MPC over Z2k Artifact: Reproduced
PRAC: Round-Efficient 3-Party MPC for Dynamic Data Structures Artifact: Reproduced
PRIVIC: A privacy-preserving method for incremental collection of location data Artifact: Available
Snail: Secure Single Iteration Localization Artifact: Reproduced
SoK: Can Trajectory Generation Combine Privacy and Utility? Artifact: Reproduced
Johnny Still Can't Opt-out: Assessing the IAB CCPA Compliance Framework Artifact: Available
Evaluating Google's Protected Audience Protocol Artifact: Reproduced
CheckOut: User-Controlled Anonymization for Customer Loyalty Programs Artifact: Reproduced
SIGMA: Secure GPT Inference with Function Secret Sharing Artifact: Available
PLASMA: Private, Lightweight Aggregated Statistics against Malicious Adversaries Artifact: Reproduced
Constant-Round Private Decision Tree Evaluation for Secret Shared Data Artifact: Available
DeVoS: Deniable Yet Verifiable Vote Updating Artifact: Reproduced
Delegated Private Matching For Compute Artifact: Reproduced
Interest-disclosing Mechanisms for Advertising are Privacy-Exposing (not Preserving) Artifact: Reproduced
FP-tracer: Fine-grained Browser Fingerprinting Detection via Taint-tracking and Multi-level Entropy-based Thresholds Artifact: Available
Post-quantum XML and SAML Single Sign-On Artifact: Reproduced
On the Quality of Privacy Policy Documents of Virtual Personal Assistant Applications Artifact: Reproduced
Investigating the Effect of Misalignment on Membership Privacy in the White-box Setting Artifact: Reproduced
Anonymous Complaint Aggregation for Secure Messaging Artifact: Reproduced
A Black-Box Privacy Analysis of Messaging Service Providers' Chat Message Processing Artifact: Available
NOTRY: Deniable messaging with retroactive avowal Artifact: Reproduced
Fantômas: Understanding Face Anonymization Reversibility Artifact: Available
Website Data Transparency in the Browser Artifact: Available
Raising the Bar: Improved Fingerprinting Attacks and Defenses for Video Streaming Traffic Artifact: Available
StyleAdv: A Usable Privacy Framework Against Facial Recognition with Adversarial Image Editing Artifact: Available
MAPLE: MArkov Process Leakage attacks on Encrypted Search Artifact: Reproduced
PLAN: Variance-Aware Private Mean Estimation Artifact: Available
SWiSSSE: System-Wide Security for Searchable Symmetric Encryption Artifact: Reproduced
Sloth: Key Stretching and Deniable Encryption using Secure Elements on Smartphones Artifact: Reproduced
https://petsymposium.org/popets/2024/popets-2024-0123.pdf Artifact: Available
Decision-based Data Distribution (D³): Enabling Users to Minimize Data Propagation in Privacy-sensitive Scenarios Artifact: Available
Efficient Privacy-Preserving Machine Learning with Lightweight Trusted Hardware Artifact: Available
AUTOLYCUS: Exploiting Explainable Artificial Intelligence (XAI) for Model Extraction Attacks against Interpretable Models Artifact: Reproduced
Differentially Private Functional Encryption Artifact: Reproduced
Internet Users' Willingness to Disclose Biometric Data for Continuous Online Account Protection: An Empirical Investigation Artifact: Available
Summation-based Private Segmented Membership Test from Threshold-Fully Homomorphic Encryption Artifact: Available
Revealing the True Cost of Locally Differentially Private Protocols: An Auditing Perspective Artifact: Reproduced