skip to main content
10.1145/2808138acmconferencesBook PagePublication PagesccsConference Proceedingsconference-collections
WPES '15: Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society
ACM2015 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CCS'15: The 22nd ACM Conference on Computer and Communications Security Denver Colorado USA 12 October 2015
ISBN:
978-1-4503-3820-2
Published:
12 October 2015
Sponsors:
Next Conference
October 14 - 18, 2024
Salt Lake City , UT , USA
Bibliometrics
Skip Abstract Section
Abstract

This volume contains the papers selected for presentation at the 14th Workshop on Privacy in the Electronic Society (WPES 2015), held in Denver, Colorado, USA, on October 12, 2015, in conjunction with the ACM Conference on Computer and Communications Security (CCS). The goal of the workshop is to discuss the new problems of privacy resulting from the ease by which large amounts of information can be collected, exchanged, accessed, processed and linked in the increasingly globally interconnected society. The workshop aims to address both theoretical and practical aspects of these problems and their solutions by bringing together researchers from both academia and industry.

In response to the workshop's call for papers, 32 papers were submitted to the program committee by authors from 14 countries. Each paper was reviewed by at least three members of the program committee, who considered the significance, novelty, technical quality, and potential to spark interesting discussions among attendees from the academic and industry privacy research communities while evaluating the papers. After intensive electronic discussions, the program committee selected 11 full papers and 3 short papers for presentation at the workshop, for a full paper acceptance rate of 34%.

Skip Table Of Content Section
SESSION: Session 1: Web and Social Network Privacy
research-article
Open Access
On the Privacy Practices of Just Plain Sites

In addition to visiting popular sites such as Facebook and Google, web users often visit more modest sites, such as those operated by bloggers, or by local organizations such as schools. Such sites, which we call "Just Plain Sites" (JPSs), are likely to ...

research-article
Known Unknowns: An Analysis of Twitter Censorship in Turkey

Twitter, widely used around the world, has a standard interface for government agencies to request that individual tweets or even whole accounts be censored. Twitter, in turn, discloses country-by-country statistics about this censorship in its ...

short-paper
Inferring Unknown Privacy Control Policies in a Social Networking System

Social networking systems (SNSs) such as Facebook allow users to control accesses to certain information belonging to them via a set of privacy settings. However, due to various potential system design considerations and usability restrictions such ...

SESSION: Session 2: Mobile and Location Privacy
research-article
On the Unicity of Smartphone Applications

Prior works have shown that the list of apps installed by a user reveal a lot about user interests and behavior. These works rely on the semantics of the installed apps and show that various user traits could be learnt automatically using off-the-shelf ...

research-article
Strengthening Authentication with Privacy-Preserving Location Verification of Mobile Phones

Mobile devices are increasingly used in security-sensitive contexts such as physical access control and authorization of payment transactions. In this paper we contribute a mechanism to verify whether a mobile device currently resides within a ...

short-paper
The Same-Origin Attack against Location Privacy

A plethora of applications benefit from location context, but a person's whereabouts can be linked to her personal sensitive information. Hence, protection mechanisms have been proposed that add systematic noise to a user's location before sending it ...

SESSION: Session 3: Communications Privacy I
research-article
Notions of Deniable Message Authentication

Deniable message authentication has drawn significant attention since it was first formalized by Dwork, Naor, and Sahai (STOC 1998). Since then, multiple notions of deniability have been introduced that vary in the considered adversary model and the ...

research-article
Sybil-Resistant Pseudonymization and Pseudonym Change without Trusted Third Parties

The issuing of pseudonyms is an established approach for protecting the privacy of users while limiting access and preventing sybil attacks. To prevent pseudonym deanonymization through continuous observation and correlation, frequent and unlinkable ...

research-article
Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform

Censorship and surveillance is increasing in scale, sophistication, and prevalence across the globe. While most censorship circumvention systems still focus on escaping a given censored region to access Internet content outside of its control, we ...

SESSION: Session 4: Communications Privacy II
research-article
Privately (and Unlinkably) Exchanging Messages Using a Public Bulletin Board

We implement a secure and privacy friendly asynchronous unidirectional message transmission protocol using a public bulletin board that makes individual send or receive events unlinkable to one another. While the clients must securely run in the user's ...

short-paper
Towards Measuring Resilience in Anonymous Communication Networks

Prior research on anonymous communication networks has focused, to a large extent, on achieving, measuring, and evaluating anonymity properties. In this work we address another important security property that has so far received much less attention, ...

SESSION: Session 5: Privacy-Preserving Data Analysis
research-article
A High-Throughput Method to Detect Privacy-Sensitive Human Genomic Data

Finding the balance between privacy protection and data sharing is one of the main challenges in managing human genomic data nowadays. Novel privacy-enhancing technologies are required to address the known disclosure threats to personal sensitive ...

research-article
Privacy-preserving User Matching

Matching two or more users with related interests is an important and general primitive, applicable to a wide range of scenarios including job hunting, friend finding, and dating services. Existing on-line matching services requires participants to ...

research-article
UnLinked: Private Proximity-based Off-line OSN Interaction

The recent decade has witnessed a rapid increase in popularity of mobile personal devices (notably, smartphones) t hat function as all-purpose personal communication portals. Concurrently, On-line Social Networks (OSNs) have continued their impressive ...

Contributors
  • Colorado State University
  • University of Minnesota Twin Cities
  • U.S. Naval Research Laboratory
Index terms have been assigned to the content through auto-classification.

Recommendations

Acceptance Rates

WPES '15 Paper Acceptance Rate11of32submissions,34%Overall Acceptance Rate106of355submissions,30%
YearSubmittedAcceptedRate
WPES'18251144%
WPES '17561425%
WPES '16721419%
WPES '15321134%
WPES '14672639%
WPES '131033029%
Overall35510630%