Results

Results obtained from PETS 2025 proceedings.

Title Artifact URL
Tracker Installations Are Not Created Equal: Understanding Tracker Configuration of Form Data Collection Artifact: Available
Understanding Regional Filter Lists: Efficacy and Impact Artifact: Available, Functional
Sheep's clothing, wolfish impact: Automated detection and evaluation of problematic 'allowed' advertisements Artifact: Available, Functional
Automating Governing Knowledge Commons and Contextual Integrity (GKC-CI) Privacy Policy Annotations with Large Language Models Artifact: Available, Functional
RPKI-based Location-Unaware Tor Guard Relay Selection Algorithms Artifact: Available, Functional
The Last Hop Attack: Why Loop Cover Traffic over Fixed Cascades Threatens Anonymity Artifact: Available, Functional, Reproduced
Time-Efficient Locally Relevant Geo-Location Privacy Protection Artifact: Available, Functional
SoK: Descriptive Statistics Under Local Differential Privacy Artifact: Available, Functional, Reproduced
Efficient Verifiable Differential Privacy with Input Authenticity in the Local and Shuffle Model Artifact: Available, Functional, Reproduced
Optimal Piecewise-based Mechanism for Collecting Bounded Numerical Data under Local Differential Privacy Artifact: Available, Functional, Reproduced
SoK: (Un)usable Privacy: the Lack of Overlap between Privacy-Aware Sensing and Usable Privacy Research Artifact: Available, Functional, Reproduced
Identifying Privacy Personas Artifact: Available
Echoes of Privacy: Uncovering the Profiling Practices of Voice Assistants Artifact: Available, Functional
Improved Open-World Fingerprinting Increases Threat to Streaming Video Privacy but Realistic Scenarios Remain Difficult Artifact: Available
Buy it Now, Track Me Later: Attacking User Privacy via Wi-Fi AP Online Auctions Artifact: Available
Towards Privacy-preserving and Fairness-aware Federated Learning Framework Artifact: Available
Unveiling Client Privacy Leakage from Public Dataset Usage in Federated Distillation Artifact: Available, Functional, Reproduced
Low-Cost Privacy-Preserving Decentralized Learning Artifact: Available
AnoFel: Supporting Anonymity for Privacy-Preserving Federated Learning Artifact: Available
Panopticon: The Design and Evaluation of a Game that Teaches Data Science Students Designing Privacy Artifact: Available
Defining Privacy Engineering as a Profession Artifact: Available
"Do It to Know It": Reshaping the Privacy Mindset of Computer Science Undergraduates Artifact: Available, Functional
DB-PAISA: Discovery-Based Privacy-Agile IoT Sensing+Actuation Artifact: Available, Functional
PrivacyGuard: Exploring Hidden Cross-App Privacy Leakage Threats In IoT Apps Artifact: Available, Functional, Reproduced
WatchWitch: Interoperability, Privacy, and Autonomy for the Apple Watch Artifact: Available, Functional
Janus: Fast Privacy-Preserving Data Provenance For TLS Artifact: Available, Functional, Reproduced
Path to Encrypted DNS with DDR: Adoption, Configuration Patterns, and Privacy Implications Artifact: Available
Akeso: Bringing Post-Compromise Security to Cloud Storage Artifact: Available
TEEMS: A Trusted Execution Environment based Metadata-protected Messaging System Artifact: Available, Functional, Reproduced
Message Authentication Code with Fast Verification over Encrypted Data and Applications Artifact: Available, Functional
Teaching an Old Dog New Tricks: Verifiable FHE Using Commodity Hardware Artifact: Available
BehaVR: User Identification Based on VR Sensor Data Artifact: Available
How Unique is Whose Web Browser? The role of demographics in browser fingerprinting among US users Artifact: Available
Intractable Cookie Crumbs: Unveiling the Nexus of Stateful Banner Interaction and Tracking Cookies Artifact: Available, Functional
Onion-Location Measurements and Fingerprinting Artifact: Available, Functional, Reproduced
Beyond the Request: Harnessing HTTP Response Headers for Cross-Browser Web Tracker Classification in an Imbalanced Setting Artifact: Available
Unmasking the Shadows: A Cross-Country Study of Online Tracking in Illegal Movie Streaming Services Artifact: Available, Functional, Reproduced
SoK: Truncation Untangled: Scaling Fixed-Point Arithmetic for Privacy-Preserving Machine Learning to Large Models and Datasets Artifact: Available, Functional, Reproduced
SpinML: Customized Synthetic Data Generation for Private Training of Specialized ML Models Artifact: Available, Functional
Achieving Data Reconstruction Hardness and Efficient Computation in Multiparty Minimax Training Artifact: Available
PIGEON: A High Throughput Framework for Private Inference of Neural Networks using Secure Multiparty Computation Artifact: Available, Functional, Reproduced
Differentially Private Release of Hierarchical Origin/Destination Data with a TopDown Approach Artifact: Available, Functional, Reproduced
Locally Differentially Private Frequency Estimation via Joint Randomized Response Artifact: Available, Functional, Reproduced
Estimating Group Means Under Local Differential Privacy Artifact: Available, Functional, Reproduced
Understanding Privacy Norms through Web Forms Artifact: Available, Functional, Reproduced
Learning Privacy from Visual Entities Artifact: Available, Functional
Surveillance Disguised as Protection: A Comparative Analysis of Sideloaded and In-Store Parental Control Apps Artifact: Available
What WeChat Knows: Pervasive First-Party Tracking in a Billion-User Super-App Ecosystem Artifact: Available
Privacy Settings of Third-Party Libraries in Android Apps: A Study of Facebook SDKs Artifact: Available
The Impact of Default Mobile SDK Usage on Privacy and Data Protection Artifact: Available
Improving the Performance and Security of Tor’s Onion Services Artifact: Available, Functional
Are Neuromorphic Architectures Inherently Privacy-preserving? An Exploratory Study Artifact: Available, Functional
High-Throughput Secure Multiparty Computation with an Honest Majority in Various Network Settings Artifact: Available, Functional
Private Shared Random Minimum Spanning Forests Artifact: Available, Functional, Reproduced
Mastic: Private Weighted Heavy-Hitters and Attribute-Based Metrics Artifact: Available, Functional, Reproduced
Practical, Private Assurance of the Value of Collaboration via Fully Homomorphic Encryption Artifact: Available, Functional
MProve-Nova: A Privacy-Preserving Proof of Reserves Protocol for Monero Artifact: Available, Functional, Reproduced
Silent Splitter: Privacy for Payment Splitting via New Protocols for Distributed Point Functions Artifact: Available
GNNBleed: Inference Attacks to Unveil Private Edges in Graphs with Realistic Access to GNN Models Artifact: Available, Functional
A non-comparison oblivious sort and its application to private k-NN Artifact: Available, Functional, Reproduced
MultiCent: Secure and Scalable Computation of Centrality Measures on Multilayer Graphs Artifact: Available, Functional, Reproduced
WaKA: Data Attribution using K-Nearest Neighbors and Membership Privacy Principles Artifact: Available
Aimless Onions: Mixing without Topology Information Artifact: Available, Functional, Reproduced
Real-world Deniability in Messaging Artifact: Available, Functional, Reproduced
Enhancing Metric Privacy With a Shuffler Artifact: Available, Functional, Reproduced
Non-Interactive Verifiable Aggregation Artifact: Available
Stochastic Models for Remote Timing Attacks Artifact: Available, Functional, Reproduced
Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy Artifact: Available, Functional, Reproduced
More and Scammier Ads: The Perils of YouTube's Ad Privacy Settings Artifact: Available
Navigating Social Media Privacy: Awareness, Preferences, and Discoverability Artifact: Available, Functional, Reproduced
Making Web Applications GDPR Compliant: A Comparative Evaluation of GDPR-Enforcement Frameworks Artifact: Available
Johnny Can't Revoke Consent Either: Measuring Compliance of Consent Revocation on the Web Artifact: Available, Functional
Meta-Learn to Unlearn: Enhanced Exact Machine Unlearning in Recommendation Systems with Meta-Learning Artifact: Available
Vote&Check: Secure Postal Voting with Reduced Trust Assumptions Artifact: Available, Functional, Reproduced
Does Coding Style Really Survive Compilation? Stylometry of Executable Code Revisited Artifact: Available, Functional
PrePaMS: Privacy-Preserving Participant Management System for Studies with Rewards and Prerequisites Artifact: Available, Functional, Reproduced
Wave Hello to Privacy - Efficient Mixed-Mode MPC using Wavelet Transforms Artifact: Available
Okay Google, Where’s My Tracker? Security, Privacy, and Performance Evaluation of Google’s Find My Device Network Artifact: Available, Functional, Reproduced
An Analysis of Censorship Bias in LLMs Artifact: Available
DiDOTS: Knowledge Distillation from Large-Language-Models for Dementia Obfuscation in Transcribed Speech Artifact: Available, Functional
Robust and Efficient Watermarking of Large Language Models Using Error Correction Codes Artifact: Available, Functional
HyDia: FHE-based Facial Matching with Hybrid Approximations and Diagonalization Artifact: Available, Functional, Reproduced
EpiOracle: Privacy-Preserving Cross-Facility EarlyWarning for Unknown Epidemics Artifact: Available, Functional, Reproduced
TimberStrike: Dataset Reconstruction Attack Revealing Privacy Leakage in Federated Tree-Based Systems Artifact: Available
AlphaFL: Secure Aggregation with Malicious² Security for Federated Learning against Dishonest Majority Artifact: Available, Functional, Reproduced
Noiseless Privacy-Preserving Decentralized Learning Artifact: Available, Functional
Topology-Based Reconstruction Prevention for Decentralised Learning Artifact: Available, Functional, Reproduced
OPPID: Single Sign-On with Oblivious Pairwise Pseudonyms Artifact: Available, Functional, Reproduced
VIMz: Private Proofs of Image Manipulation using Folding-based zkSNARKs Artifact: Available, Functional, Reproduced
Client-Efficient Online-Offline Private Information Retrieval Artifact: Available, Functional, Reproduced
Re-visiting Authorized Private Set Intersection: A New Privacy-Preserving Variant and Two Protocols Artifact: Available
PrivDiffuser: Privacy-Guided Diffusion Model for Data Obfuscation in Sensor Networks Artifact: Available, Functional, Reproduced
Sybil-Resistant Parallel Mixnets Artifact: Available, Functional, Reproduced
Estimating Group Means Under Local Differential Privacy Artifact: Available, Functional, Reproduced
Who’s Watching You Zoom? Investigating Privacy of Third-Party Zoom Apps Artifact: Available
PGUP: Pretty Good User Privacy for 5G-enabled Secure Mobile Communication Protocols Artifact: Available, Functional, Reproduced
DiffPrivate: Facial Privacy Protection with Diffusion Models Artifact: Available, Functional
Hypersphere Secure Sketch Revisited: Probabilistic Linear Regression Attack on IronMask in Multiple Usage Artifact: Available, Functional
Maliciously Secure Circuit Private Set Intersection via SPDZ-Compatible Oblivious PRF Artifact: Available, Functional