Results

The results can also be found on the PETS 2026 proceedings.

2026.1

Title Artifact URL
Gaze3P: Gaze-Based Prediction of Perceived Privacy Artifact: Available
Ad Personalization and Transparency in Mobile Ecosystems: A Comparative Analysis of Google’s and Apple’s EU App Stores Artifact: Available, Functional, Reproduced
dX-Privacy for Text and the Curse of Dimensionality Artifact: Available, Functional
Location-Enhanced Information Flow for Home Automations Artifact: Available, Functional, Reproduced
PriVA-C: Defending Voice Assistants from Fingerprinting Attacks Artifact: Available
Bot Among Us: Exploring User Awareness and Privacy Concerns About Chatbots in Group Chats Artifact: Available, Functional, Reproduced
SPRINT: Scalable Secure & Differentially Private Inference for Transformers Artifact: Available, Functional
Ephemeral Network-Layer Fingerprinting Defenses Artifact: Available, Functional, Reproduced
Evaluating connection migration based QUIC censorship circumvention Artifact: Available, Functional, Reproduced
Privacy Attacks on Matrix Profiles based on Reconstruction Techniques Artifact: Available, Functional, Reproduced
Making Sense of Private Advertising: A Principled Approach to a Complex Ecosystem Artifact: Available, Functional, Reproduced
Personal Data Flows and Privacy Policy Traceability in Third-party LLM Apps in the GPT Ecosystem Artifact: Available, Functional, Reproduced
Sanitization or Deception? Rethinking Privacy Protection in Large Language Models Artifact: Available
Word-level Annotation of GDPR Transparency Compliance in Privacy Policies using Large Language Models Artifact: Available
ReporTor: Facilitating User Reporting of Issues Encountered in Naturalistic Web Browsing via Tor Browser Artifact: Available, Functional
Securing Private Federated Learning in a Malicious Setting: A Scalable TEE-Based Approach with Client Auditing Artifact: Available
How Experts Personalize Privacy & Security Advice for At-Risk Users Artifact: Available

2026.2

Title Artifact URL
Breaking BAD? Better Call SAUL! -- Breaking and Fixing Bloom Filters with Added Diffusion Artifact: Available
Frequency Estimation of Correlated Multi-attribute Data under Local Differential Privacy Artifact: Available, Functional, Reproduced
Preserving Target Distributions With Differentially Private Count Mechanisms Artifact: Available, Functional, Reproduced
Analyzing Societal Awareness and Perception of Digital Fingerprinting and Fingerprinting Countermeasures Artifact: Available, Functional
Privacy Bias in LLMs: A Contextual Integrity-based Auditing Metric Artifact: Available, Functional, Reproduced
Clicking into Exposure: Uncovering Privacy Risks of Google Click Identifier in YouTube Ads Artifact: Available, Functional, Reproduced
CoinJoin ecosystem insights for Wasabi 1.x, Wasabi 2.x and Whirlpool coordinator-based privacy mixers Artifact: Available, Functional, Reproduced
Secure Change-Point Detection for Time Series under Homomorphic Encryption Artifact: Available, Functional, Reproduced
Exercising the CCPA Opt-out Right on Android: Legally Mandated but Practically Challenging Artifact: Available, Functional
AI-in-the-Loop: Privacy Preserving Real-Time Scam Detection and Conversational Scambaiting by Leveraging LLMs and Federated Learning Artifact: Available
Cryptographically-Secured Domain Validation Artifact: Available, Functional, Reproduced
Obscura: Enabling Ephemeral Proxies for Traffic Encapsulation in WebRTC Media Streams Against Cost-Effective Censors Artifact: Available, Functional
Are we collaborative yet? A Usability Perspective on Mixnet Latency for Real-Time Applications Artifact: Available, Functional
What-App? App usage detection using encrypted LTE/5G traffic Artifact: Available, Functional
CURE: Privacy-Preserving Split Learning Done Right Artifact: Available, Functional
Analysis and Attacks on the Reputation System of Nym Artifact: Available, Functional, Reproduced
SentinelTouch: A Lightweight Privacy-Preserving Biometric-Fingerprinting Authentication and Identification System Based on Neural Networks and Homomorphic Encryption Artifact: Available, Functional, Reproduced
Humanitarian Aid Distribution with Privacy-Preserving Assessment Capabilities Artifact: Available, Functional, Reproduced
Gryphes: Hybrid Proofs for Modular SNARKs with Applications to zkRollups Artifact: Available, Functional, Reproduced
Pantomime: Motion Data Anonymization Using Foundation Motion Models Artifact: Available
Privacy by Voice: Designing Usable Privacy Notices for the Voice Interface Artifact: Available
tigro: Trust Infrastructure for Grassroots Organizing via Grounded Digital Annotations Artifact: Available
Multi-Party Private Join Artifact: Available, Functional, Reproduced
Privacy vs. Profit: The Impact of Google's Manifest Version 3 (MV3) Update on Ad Blocker Effectiveness Artifact: Available, Functional, Reproduced
“I Just Press Allow”: Understanding Privacy Practices of New Internet Users in Urban India Artifact: Available
Website fingerprinting on Nym: Attacks and Defenses Artifact: Available, Functional, Reproduced
HyperVerITAS: Verifying Image Transformations at Scale on Boolean Hypercubes Artifact: Available, Functional
SoK: Can Fully Homomorphic Encryption Support General AI Computation? A Functional and Cost Analysis Artifact: Available, Functional