skip to main content
10.1145/3338498acmconferencesBook PagePublication PagesccsConference Proceedingsconference-collections
WPES'19: Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society
ACM2019 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security London United Kingdom 11 November 2019
ISBN:
978-1-4503-6830-8
Published:
11 November 2019
Sponsors:
Next Conference
October 14 - 18, 2024
Salt Lake City , UT , USA
Bibliometrics
Skip Abstract Section
Abstract

These proceedings contain the papers selected for inclusion in the program for the eighteenth ACM Workshop on Privacy in the Electronic Society (WPES 2019), held in conjunction with the 26th ACM Conference on Computer and Communications Security (CCS 2019) on November 11, 2019 in London, United Kingdom.

In response to the workshop's call for papers, 67 submissions were received. These papers were evaluated by a Program Committee comprised of 58 researchers whose backgrounds include a diverse array of topics related to privacy. As a rule, each paper was reviewed by three members of the Program Committee, with an average of 2.9 reviews per paper. Each paper was assessed in terms of importance, novelty, technical quality, and potential to stimulate discussion at the workshop. After a period of online discussion, the Program Committee selected 14 full papers and 5 short papers for presentation at WPES, leading to a full paper acceptance rate of 21% and an overall acceptance rate of 28%.

Skip Table Of Content Section
SESSION: Session 1: Secure Computation
research-article
Privacy-Preserving Multi-Party Access Control

Multi-party access control has been proposed to enable collaborative decision making for the protection of co-owned resources. In particular, multi-party access control aims to reconcile conflicts arising from the evaluation of policies authored by ...

research-article
Public Access
Private Set Intersection with Linear Communication from General Assumptions

This work presents a hashing-based algorithm for Private Set Intersection (PSI) in the honest-but-curious setting. The protocol is generic, modular and provides both asymptotic and concrete efficiency improvements over existing PSI protocols. If each ...

research-article
Public Access
DURASIFT: A Robust, Decentralized, Encrypted Database Supporting Private Searches with Complex Policy Controls

Several important lines of research have been geared toward the ability to search on encrypted data. Techniques such as Symmetric Searchable Encryption (SSE), Private Information Retrieval (PIR), Oblivious RAM (ORAM) and more have been introduced to ...

research-article
Public Access
There Are 10 Types of Vectors (and Polynomials): Efficient Zero-Knowledge Proofs of "One-Hotness" via Polynomials with One Zero

We present a new 4-move special honest-verifier zero-knowledge proof of knowledge system for proving that a vector of Pedersen commitments opens to a so-called "one-hot'' vector (i.e., to a vector from the standard orthonormal basis) from Zpn. The need ...

short-paper
zksk: A Library for Composable Zero-Knowledge Proofs

Zero-knowledge proofs are an essential building block in many privacy-preserving systems. However, implementing these proofs is tedious and error-prone. In this paper, we present zksk, a well-documented Python library for defining and computing sigma ...

SESSION: Session 2: Secure Communication
research-article
Public Access
End-to-End Secure Mobile Group Messaging with Conversation Integrity and Deniability

In this paper, we describe Mobile CoWPI, a deployable, end-to-end secure mobile group messaging application with proofs of security. Mobile CoWPI allows dynamic groups of users to participate in, join, and leave private, authenticated conversations ...

research-article
Anatomy of Commercial IMSI Catchers and Detectors

IMSI catchers threaten the privacy of mobile phone users by identifying and tracking them. Commercial IMSI catcher products exploit vulnerabilities in cellular network security standards to lure nearby mobile devices. Commercial IMSI catcher's technical ...

short-paper
Public Access
When Certificate Transparency Is Too Transparent: Analyzing Information Leakage in HTTPS Domain Names

Certificate Transparency (CT) is a recent initiative to log all publicly available certificates, thereby adding an extra layer of accountability and auditability to certificate authorities. Unbeknownst to most users and website administrators, CT logs ...

SESSION: Session 3: Genomic Data Privacy
research-article
How Much Does GenoGuard Really "Guard"?: An Empirical Analysis of Long-Term Security for Genomic Data

Due to its hereditary nature, genomic data is not only linked to its owner but to that of close relatives as well. As a result, its sensitivity does not really degrade over time; in fact, the relevance of a genomic sequence is likely to be longer than ...

short-paper
Open Access
Balancing Security and Privacy in Genomic Range Queries

Recent spectacular advances in genome sequencing coupled with greatly reduced storage and computation costs, make genomic testing increasingly accessible to individuals. Today one can easily get his/her DNA digitized by a sequencing lab and store the ...

SESSION: Session 4: Privacy-enhancing Techniques
research-article
Public Access
Ancile: Enhancing Privacy for Ubiquitous Computing with Use-Based Privacy

Widespread deployment of Intelligent Infrastructure and the Internet of Things creates vast troves of passively-generated data. These data enable new ubiquitous computing applications---such as location-based services---while posing new privacy threats. ...

short-paper
Privacy Protection in Distributed Fingerprint-based Authentication

To avoid identity theft or impersonation in biometric authentication schemes, fingerprint data is typically stored locally, e.g., in a trusted hardware module, in a single device that is used for user enrollment and authentication. Local storage, ...

short-paper
Parking Tickets for Privacy-Preserving Pay-by-Phone Parking

Traditionally, the payment required for parking in regulated areas has been made through parking meters. In the last years, several applications which allow to perform these payments using a mobile device have appeared.

In this paper we propose a ...

SESSION: Session 5: Cybersecurity
research-article
MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting

Recent studies have shown that aggregate CPU usage and power consumption traces on smartphones can leak information about applications running on the system or websites visited. In response, access to such data has been blocked for mobile applications ...

research-article
State of the Sandbox: Investigating macOS Application Security

Sandboxing is a way to deliberately restrict applications accessing resources that they do not need to function properly. Sandboxing is intended to limit the effect of potential exploits and to mitigate overreach to personal data. Since June 1, 2012, ...

SESSION: Session 6: Social Aspects and Other Privacy Issues
research-article
Digital-PASS: A Simulation-based Approach to Privacy Education

With the increased proliferation of social media in the modern age, education on the potential dangers facing consumers in social media has not kept commensurate pace. Conventional education methods and standards have not proved to be effective in ...

research-article
Open Access
Can Privacy Nudges be Tailored to Individuals' Decision Making and Personality Traits?

While the effectiveness of nudges in influencing user behavior has been documented within the literature, most prior work in the privacy field has focused on 'one-size-fits-all' interventions. Recent behavioral research has identified the potential of ...

research-article
Efficiently Stealing your Machine Learning Models

Machine Learning as a Service (MLaaS) is a growing paradigm in the Machine Learning (ML) landscape. More and more ML models are being uploaded to the cloud and made accessible from all over the world. Creating good ML models, however, can be expensive ...

research-article
Anonymity and Privacy in Bitcoin Escrow Trades

As a decentralized cryptocurrency, Bitcoin has been in market for around a decade. Bitcoin transactions are thought to be pseudo-anonymous, however, there were many attempts to deanonymize these transactions making use of public data. Escrow services ...

Contributors
  • University College London
  • Rovira i Virgili University

Index Terms

  1. Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society

    Recommendations

    Acceptance Rates

    Overall Acceptance Rate106of355submissions,30%
    YearSubmittedAcceptedRate
    WPES'18251144%
    WPES '17561425%
    WPES '16721419%
    WPES '15321134%
    WPES '14672639%
    WPES '131033029%
    Overall35510630%