Cilloni, Thomas Wang, Wei Walter, Charles Fleming, Charles
Published in
Proceedings on Privacy Enhancing Technologies
Facial recognition tools are becoming exceptionally accurate in identifying people from images. However, this comes at the cost of privacy for users of online services with photo management (e.g. social media platforms). Particularly troubling is the ability to leverage unsupervised learning to recognize faces even when the user has not labeled the...
Ta, Vinh Thong Eiza, Max Hashem
Published in
Proceedings on Privacy Enhancing Technologies
Privacy and data protection by design are relevant parts of the General Data Protection Regulation (GDPR), in which businesses and organisations are encouraged to implement measures at an early stage of the system design phase to fulfil data protection requirements. This paper addresses the policy and system architecture design and propose two vari...
Smith, Josh Asghar, Hassan Jameel Gioiosa, Gianpaolo Mrabet, Sirine Gaspers, Serge Tyler, Paul
Published in
Proceedings on Privacy Enhancing Technologies
We show that the ‘optimal’ use of the parallel composition theorem corresponds to finding the size of the largest subset of queries that ‘overlap’ on the data domain, a quantity we call the maximum overlap of the queries. It has previously been shown that a certain instance of this problem, formulated in terms of determining the sensitivity of the ...
Liang, Mingyu Karantaidou, Ioanna Baldimtsi, Foteini Gordon, S. Dov Varia, Mayank
Published in
Proceedings on Privacy Enhancing Technologies
We propose a new theoretical approach for building anonymous mixing mechanisms for cryptocurrencies. Rather than requiring a fully uniform permutation during mixing, we relax the requirement, insisting only that neighboring permutations are similarly likely. This is defined formally by borrowing from the definition of differential privacy. This rel...
Saeidi, Mahsa Calvert, McKenzie Au, Audrey W. Sarma, Anita Bobba, Rakesh B.
Published in
Proceedings on Privacy Enhancing Technologies
End users are increasingly using trigger-action platforms like If-This-Then-That (IFTTT) to create applets to connect smart-home devices and services. However, there are inherent implicit risks in using such applets—even non-malicious ones—as sensitive information may leak through their use in certain contexts (e.g., where the device is located, wh...
Kowalewski, Marvin Herbert, Franziska Schnitzler, Theodor Dürmuth, Markus
Published in
Proceedings on Privacy Enhancing Technologies
Digital tools play an important role in fighting the current global COVID-19 pandemic. We conducted a representative online study in Germany on a sample of 599 participants to evaluate the user perception of vaccination certificates. We investigated five different variants of vaccination certificates based on deployed and planned designs in a betwe...
Oldenburg, Lennart Acar, Gunes Diaz, Claudia
Published in
Proceedings on Privacy Enhancing Technologies
We present a novel web-based attack that identifies a Tor user’s guard in a matter of seconds. Our attack is low-cost, fast, and stealthy. It requires only a moderate amount of resources and can be deployed by website owners, third-party script providers, and malicious exits—if the website traffic is unencrypted. The attack works by injecting resou...
Van Nortwick, Maggie Wilson, Christo
Published in
Proceedings on Privacy Enhancing Technologies
On June 28, 2018, the California State Legislature passed the California Consumer Privacy Act (CCPA), arguably the most comprehensive piece of online privacy legislation in the United States. Online services covered by the CCPA are required to provide a hyperlink on their homepage with the text “Do Not Sell My Personal Information” (DNSMPI). The CC...
Usynin, Dmitrii Rueckert, Daniel Passerat-Palmbach, Jonathan Kaissis, Georgios
Published in
Proceedings on Privacy Enhancing Technologies
In this study, we aim to bridge the gap between the theoretical understanding of attacks against collaborative machine learning workflows and their practical ramifications by considering the effects of model architecture, learning setting and hyperparameters on the resilience against attacks. We refer to such mitigations as model adaptation. Throug...
Cassel, Darion Lin, Su-Chin Buraggina, Alessio Wang, William Zhang, Andrew Bauer, Lujo Hsiao, Hsu-Chun Jia, Limin Libert, Timothy
Published in
Proceedings on Privacy Enhancing Technologies
Over half of all visits to websites now take place in a mobile browser, yet the majority of web privacy studies take the vantage point of desktop browsers, use emulated mobile browsers, or focus on just a single mobile browser instead. In this paper, we present a comprehensive web-tracking measurement study on mobile browsers and privacy-focused mo...