- Sponsor:
- sigsac
This volume contains the papers selected for presentation at the 14th Workshop on Privacy in the Electronic Society (WPES 2015), held in Denver, Colorado, USA, on October 12, 2015, in conjunction with the ACM Conference on Computer and Communications Security (CCS). The goal of the workshop is to discuss the new problems of privacy resulting from the ease by which large amounts of information can be collected, exchanged, accessed, processed and linked in the increasingly globally interconnected society. The workshop aims to address both theoretical and practical aspects of these problems and their solutions by bringing together researchers from both academia and industry.
In response to the workshop's call for papers, 32 papers were submitted to the program committee by authors from 14 countries. Each paper was reviewed by at least three members of the program committee, who considered the significance, novelty, technical quality, and potential to spark interesting discussions among attendees from the academic and industry privacy research communities while evaluating the papers. After intensive electronic discussions, the program committee selected 11 full papers and 3 short papers for presentation at the workshop, for a full paper acceptance rate of 34%.
Proceeding Downloads
On the Privacy Practices of Just Plain Sites
In addition to visiting popular sites such as Facebook and Google, web users often visit more modest sites, such as those operated by bloggers, or by local organizations such as schools. Such sites, which we call "Just Plain Sites" (JPSs), are likely to ...
Known Unknowns: An Analysis of Twitter Censorship in Turkey
Twitter, widely used around the world, has a standard interface for government agencies to request that individual tweets or even whole accounts be censored. Twitter, in turn, discloses country-by-country statistics about this censorship in its ...
Inferring Unknown Privacy Control Policies in a Social Networking System
Social networking systems (SNSs) such as Facebook allow users to control accesses to certain information belonging to them via a set of privacy settings. However, due to various potential system design considerations and usability restrictions such ...
On the Unicity of Smartphone Applications
Prior works have shown that the list of apps installed by a user reveal a lot about user interests and behavior. These works rely on the semantics of the installed apps and show that various user traits could be learnt automatically using off-the-shelf ...
Strengthening Authentication with Privacy-Preserving Location Verification of Mobile Phones
Mobile devices are increasingly used in security-sensitive contexts such as physical access control and authorization of payment transactions. In this paper we contribute a mechanism to verify whether a mobile device currently resides within a ...
The Same-Origin Attack against Location Privacy
A plethora of applications benefit from location context, but a person's whereabouts can be linked to her personal sensitive information. Hence, protection mechanisms have been proposed that add systematic noise to a user's location before sending it ...
Notions of Deniable Message Authentication
Deniable message authentication has drawn significant attention since it was first formalized by Dwork, Naor, and Sahai (STOC 1998). Since then, multiple notions of deniability have been introduced that vary in the considered adversary model and the ...
Sybil-Resistant Pseudonymization and Pseudonym Change without Trusted Third Parties
The issuing of pseudonyms is an established approach for protecting the privacy of users while limiting access and preventing sybil attacks. To prevent pseudonym deanonymization through continuous observation and correlation, frequent and unlinkable ...
Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform
Censorship and surveillance is increasing in scale, sophistication, and prevalence across the globe. While most censorship circumvention systems still focus on escaping a given censored region to access Internet content outside of its control, we ...
Privately (and Unlinkably) Exchanging Messages Using a Public Bulletin Board
We implement a secure and privacy friendly asynchronous unidirectional message transmission protocol using a public bulletin board that makes individual send or receive events unlinkable to one another. While the clients must securely run in the user's ...
Towards Measuring Resilience in Anonymous Communication Networks
Prior research on anonymous communication networks has focused, to a large extent, on achieving, measuring, and evaluating anonymity properties. In this work we address another important security property that has so far received much less attention, ...
A High-Throughput Method to Detect Privacy-Sensitive Human Genomic Data
Finding the balance between privacy protection and data sharing is one of the main challenges in managing human genomic data nowadays. Novel privacy-enhancing technologies are required to address the known disclosure threats to personal sensitive ...
Privacy-preserving User Matching
Matching two or more users with related interests is an important and general primitive, applicable to a wide range of scenarios including job hunting, friend finding, and dating services. Existing on-line matching services requires participants to ...
UnLinked: Private Proximity-based Off-line OSN Interaction
The recent decade has witnessed a rapid increase in popularity of mobile personal devices (notably, smartphones) t hat function as all-purpose personal communication portals. Concurrently, On-line Social Networks (OSNs) have continued their impressive ...
Index Terms
- Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society