I still know it's you! On Challenges in Anonymizing Source Code
|
Artifact: Available
|
User-Controlled Privacy: Taint, Track, and Control
|
Artifact: Reproduced
|
Data Isotopes for Data Provenance in DNNs
|
Artifact: Available
|
PrivDNN: A Secure Multi-Party Computation Framework for Deep Learning using Partial DNN Encryption
|
Artifact: Reproduced
|
Why Privacy-Preserving Protocols Are Sometimes Not Enough: A Case Study of the Brisbane Toll Collection Infrastructure
|
Artifact: Reproduced
|
Attacking Connection Tracking Frameworks as used by Virtual Private Networks
|
Artifact: Reproduced
|
What Does It Mean to Be Creepy? Responses to Visualizations of Personal Browsing Activity, Online Tracking, and Targeted Ads
|
Artifact: Reproduced
|
Traceable mixnets
|
Artifact: Reproduced
|
MixMatch: Flow Matching for Mixnet Traffic
|
Artifact: Available
|
SGXonerated: Finding (and Partially Fixing) Privacy Flaws in TEE-based Smart Contract Platforms Without Breaking the TEE
|
Artifact: Reproduced
|
A Large-Scale Study of Cookie Banner Interaction Tools and their Impact on Users' Privacy
|
Artifact: Available
|
Supporting Informed Choices about Browser Cookies: The Impact of Personalised Cookie Banners
|
Artifact: Available
|
Block Cookies, Not Websites: Analysing Mental Models and Usability of the Privacy-Preserving Browser Extension CookieBlock
|
Artifact: Available
|
Generalizable Active Privacy Choice: Designing a Graphical User Interface for Global Privacy Control
|
Artifact: Available
|
A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses
|
Artifact: Reproduced
|
Computational Differential Privacy for Encrypted Databases Supporting Linear Queries
|
Artifact: Available
|
Connecting the Dots: Tracing Data Endpoints in IoT Devices
|
Artifact: Available
|
SocIoTy: Practical Cryptography in Smart Home Contexts
|
Artifact: Reproduced
|
CoStricTor: Collaborative HTTP Strict Transport Security in Tor Browser
|
Artifact: Reproduced
|
DeTorrent: An Adversarial Padding-only Traffic Analysis Defense
|
Artifact: Available
|
GenAIPABench: A Benchmark for Generative AI-based Privacy Assistants
|
Artifact: Available
|
Edge Private Graph Neural Networks with Singular Value Perturbation
|
Artifact: Reproduced
|
TMI! Finetuned Models Leak Private Information from their Pretraining Data
|
Artifact: Reproduced
|
Privacy Preserving Feature Selection for Sparse Linear Regression
|
Artifact: Available
|
Model-driven Privacy
|
Artifact: Reproduced
|
Defining and Controlling Information Leakage in US Equities Trading
|
Artifact: Reproduced
|
Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels Compared to Apps' Privacy Policies
|
Artifact: Reproduced
|
QUICKeR: Quicker Updates Involving Continuous Key Rotation
|
Artifact: Available
|
Anonify: Decentralized Dual-level Anonymity for Medical Data Donation
|
Artifact: Reproduced
|
Privacy Protection Behaviors from a New Angle: Exploratory Analysis on a Russian Sample
|
Artifact: Available
|
Efficiently Compiling Secure Computation Protocols From Passive to Active Security: Beyond Arithmetic Circuits
|
Artifact: Reproduced
|
Multipars: Reduced-Communication MPC over Z2k
|
Artifact: Reproduced
|
PRAC: Round-Efficient 3-Party MPC for Dynamic Data Structures
|
Artifact: Reproduced
|
PRIVIC: A privacy-preserving method for incremental collection of location data
|
Artifact: Available
|
Snail: Secure Single Iteration Localization
|
Artifact: Reproduced
|
SoK: Can Trajectory Generation Combine Privacy and Utility?
|
Artifact: Reproduced
|
Johnny Still Can't Opt-out: Assessing the IAB CCPA Compliance Framework
|
Artifact: Available
|
Evaluating Google's Protected Audience Protocol
|
Artifact: Reproduced
|
CheckOut: User-Controlled Anonymization for Customer Loyalty Programs
|
Artifact: Reproduced
|
SIGMA: Secure GPT Inference with Function Secret Sharing
|
Artifact: Available
|
PLASMA: Private, Lightweight Aggregated Statistics against Malicious Adversaries
|
Artifact: Reproduced
|
Constant-Round Private Decision Tree Evaluation for Secret Shared Data
|
Artifact: Available
|
DeVoS: Deniable Yet Verifiable Vote Updating
|
Artifact: Reproduced
|
Delegated Private Matching For Compute
|
Artifact: Reproduced
|
Interest-disclosing Mechanisms for Advertising are Privacy-Exposing (not Preserving)
|
Artifact: Reproduced
|
FP-tracer: Fine-grained Browser Fingerprinting Detection via Taint-tracking and Multi-level Entropy-based Thresholds
|
Artifact: Available
|
Post-quantum XML and SAML Single Sign-On
|
Artifact: Reproduced
|
On the Quality of Privacy Policy Documents of Virtual Personal Assistant Applications
|
Artifact: Reproduced
|
Investigating the Effect of Misalignment on Membership Privacy in the White-box Setting
|
Artifact: Reproduced
|
Anonymous Complaint Aggregation for Secure Messaging
|
Artifact: Reproduced
|
A Black-Box Privacy Analysis of Messaging Service Providers' Chat Message Processing
|
Artifact: Available
|
NOTRY: Deniable messaging with retroactive avowal
|
Artifact: Reproduced
|
Fantômas: Understanding Face Anonymization Reversibility
|
Artifact: Available
|
Website Data Transparency in the Browser
|
Artifact: Available
|
Raising the Bar: Improved Fingerprinting Attacks and Defenses for Video Streaming Traffic
|
Artifact: Available
|
StyleAdv: A Usable Privacy Framework Against Facial Recognition with Adversarial Image Editing
|
Artifact: Available
|
MAPLE: MArkov Process Leakage attacks on Encrypted Search
|
Artifact: Reproduced
|
PLAN: Variance-Aware Private Mean Estimation
|
Artifact: Available
|
SWiSSSE: System-Wide Security for Searchable Symmetric Encryption
|
Artifact: Reproduced
|
Sloth: Key Stretching and Deniable Encryption using Secure Elements on Smartphones
|
Artifact: Reproduced
|
https://petsymposium.org/popets/2024/popets-2024-0123.pdf
|
Artifact: Available
|
Decision-based Data Distribution (D³): Enabling Users to Minimize Data Propagation in Privacy-sensitive Scenarios
|
Artifact: Available
|
Efficient Privacy-Preserving Machine Learning with Lightweight Trusted Hardware
|
Artifact: Available
|
AUTOLYCUS: Exploiting Explainable Artificial Intelligence (XAI) for Model Extraction Attacks against Interpretable Models
|
Artifact: Reproduced
|
Differentially Private Functional Encryption
|
Artifact: Reproduced
|
Internet Users' Willingness to Disclose Biometric Data for Continuous Online Account Protection: An Empirical Investigation
|
Artifact: Available
|
Summation-based Private Segmented Membership Test from Threshold-Fully Homomorphic Encryption
|
Artifact: Available
|
Revealing the True Cost of Locally Differentially Private Protocols: An Auditing Perspective
|
Artifact: Reproduced
|