- Sponsor:
- sigsac
These proceedings contain the papers selected for inclusion in the program for the eighteenth ACM Workshop on Privacy in the Electronic Society (WPES 2019), held in conjunction with the 26th ACM Conference on Computer and Communications Security (CCS 2019) on November 11, 2019 in London, United Kingdom.
In response to the workshop's call for papers, 67 submissions were received. These papers were evaluated by a Program Committee comprised of 58 researchers whose backgrounds include a diverse array of topics related to privacy. As a rule, each paper was reviewed by three members of the Program Committee, with an average of 2.9 reviews per paper. Each paper was assessed in terms of importance, novelty, technical quality, and potential to stimulate discussion at the workshop. After a period of online discussion, the Program Committee selected 14 full papers and 5 short papers for presentation at WPES, leading to a full paper acceptance rate of 21% and an overall acceptance rate of 28%.
Proceeding Downloads
Privacy-Preserving Multi-Party Access Control
Multi-party access control has been proposed to enable collaborative decision making for the protection of co-owned resources. In particular, multi-party access control aims to reconcile conflicts arising from the evaluation of policies authored by ...
Private Set Intersection with Linear Communication from General Assumptions
This work presents a hashing-based algorithm for Private Set Intersection (PSI) in the honest-but-curious setting. The protocol is generic, modular and provides both asymptotic and concrete efficiency improvements over existing PSI protocols. If each ...
DURASIFT: A Robust, Decentralized, Encrypted Database Supporting Private Searches with Complex Policy Controls
Several important lines of research have been geared toward the ability to search on encrypted data. Techniques such as Symmetric Searchable Encryption (SSE), Private Information Retrieval (PIR), Oblivious RAM (ORAM) and more have been introduced to ...
There Are 10 Types of Vectors (and Polynomials): Efficient Zero-Knowledge Proofs of "One-Hotness" via Polynomials with One Zero
We present a new 4-move special honest-verifier zero-knowledge proof of knowledge system for proving that a vector of Pedersen commitments opens to a so-called "one-hot'' vector (i.e., to a vector from the standard orthonormal basis) from Zpn. The need ...
zksk: A Library for Composable Zero-Knowledge Proofs
Zero-knowledge proofs are an essential building block in many privacy-preserving systems. However, implementing these proofs is tedious and error-prone. In this paper, we present zksk, a well-documented Python library for defining and computing sigma ...
End-to-End Secure Mobile Group Messaging with Conversation Integrity and Deniability
In this paper, we describe Mobile CoWPI, a deployable, end-to-end secure mobile group messaging application with proofs of security. Mobile CoWPI allows dynamic groups of users to participate in, join, and leave private, authenticated conversations ...
Anatomy of Commercial IMSI Catchers and Detectors
IMSI catchers threaten the privacy of mobile phone users by identifying and tracking them. Commercial IMSI catcher products exploit vulnerabilities in cellular network security standards to lure nearby mobile devices. Commercial IMSI catcher's technical ...
When Certificate Transparency Is Too Transparent: Analyzing Information Leakage in HTTPS Domain Names
Certificate Transparency (CT) is a recent initiative to log all publicly available certificates, thereby adding an extra layer of accountability and auditability to certificate authorities. Unbeknownst to most users and website administrators, CT logs ...
How Much Does GenoGuard Really "Guard"?: An Empirical Analysis of Long-Term Security for Genomic Data
Due to its hereditary nature, genomic data is not only linked to its owner but to that of close relatives as well. As a result, its sensitivity does not really degrade over time; in fact, the relevance of a genomic sequence is likely to be longer than ...
Balancing Security and Privacy in Genomic Range Queries
Recent spectacular advances in genome sequencing coupled with greatly reduced storage and computation costs, make genomic testing increasingly accessible to individuals. Today one can easily get his/her DNA digitized by a sequencing lab and store the ...
Ancile: Enhancing Privacy for Ubiquitous Computing with Use-Based Privacy
- Eugene Bagdasaryan,
- Griffin Berlstein,
- Jason Waterman,
- Eleanor Birrell,
- Nate Foster,
- Fred B. Schneider,
- Deborah Estrin
Widespread deployment of Intelligent Infrastructure and the Internet of Things creates vast troves of passively-generated data. These data enable new ubiquitous computing applications---such as location-based services---while posing new privacy threats. ...
Privacy Protection in Distributed Fingerprint-based Authentication
To avoid identity theft or impersonation in biometric authentication schemes, fingerprint data is typically stored locally, e.g., in a trusted hardware module, in a single device that is used for user enrollment and authentication. Local storage, ...
Parking Tickets for Privacy-Preserving Pay-by-Phone Parking
Traditionally, the payment required for parking in regulated areas has been made through parking meters. In the last years, several applications which allow to perform these payments using a mobile device have appeared.
In this paper we propose a ...
MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting
Recent studies have shown that aggregate CPU usage and power consumption traces on smartphones can leak information about applications running on the system or websites visited. In response, access to such data has been blocked for mobile applications ...
State of the Sandbox: Investigating macOS Application Security
Sandboxing is a way to deliberately restrict applications accessing resources that they do not need to function properly. Sandboxing is intended to limit the effect of potential exploits and to mitigate overreach to personal data. Since June 1, 2012, ...
Digital-PASS: A Simulation-based Approach to Privacy Education
With the increased proliferation of social media in the modern age, education on the potential dangers facing consumers in social media has not kept commensurate pace. Conventional education methods and standards have not proved to be effective in ...
Can Privacy Nudges be Tailored to Individuals' Decision Making and Personality Traits?
While the effectiveness of nudges in influencing user behavior has been documented within the literature, most prior work in the privacy field has focused on 'one-size-fits-all' interventions. Recent behavioral research has identified the potential of ...
Efficiently Stealing your Machine Learning Models
Machine Learning as a Service (MLaaS) is a growing paradigm in the Machine Learning (ML) landscape. More and more ML models are being uploaded to the cloud and made accessible from all over the world. Creating good ML models, however, can be expensive ...
Anonymity and Privacy in Bitcoin Escrow Trades
As a decentralized cryptocurrency, Bitcoin has been in market for around a decade. Bitcoin transactions are thought to be pseudo-anonymous, however, there were many attempts to deanonymize these transactions making use of public data. Escrow services ...
Index Terms
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society




