WPES Workshop on Privacy in the Electronic Society
Raleigh, NC, USA
October 15, 2012

Main | Call for Papers | Submit a paper | Program


8:30 Chair's Welcome Remarks
Nikita Borisov (University of Illinois at Urbana-Champaign)
Session 1: Online Advertising
Session Chair: Aleecia McDonald (Mozilla)
8:45 An Approach for Identifying JavaScript-loaded Advertisements through Static Analysis
Caitlin R. Orr, Arun Chauhan, Minaxi Gupta, Christopher J. Frisz, and Christopher W. Dunn (Indiana University)
9:15 Understanding What They Do with What They Know (short paper)
Craig E. Wills and Can Tatar (Worcester Polytechnic Institute)
9:30 What Do Online Behavioral Advertising Privacy Disclosures Communicate to Users?
Pedro Giovanni Leon, Justin Cranshaw, Lorrie Faith Cranor, Jim Graves (Carnegie Mellon University), Manoj Hastak (American University), Blase Ur, and Guzi Xu (Carnegie Mellon University)
10:00 Coffee break
Session 2: Anonymous Communications
Session Chair: Prateek Mittal (University of California, Berkeley)
10:30 Torchestra: Reducing interactive traffic delays over Tor
Deepika Gopal and Nadia Heninger (UC San Diego)
11:00 Changing of the Guards: A Framework for Understanding and Improving Entry Guard Selection in Tor
Tariq Elahi, Kevin Bauer, Mashael AlSabah (University of Waterloo), Roger Dingledine (The Tor Project, Inc.), and Ian Goldberg (University of Waterloo)
11:30 Ace: An Efficient Key-Exchange Protocol for Onion Routing
Michael Backes (Saarland University and MPI-SWS), Aniket Kate (MPI-SWS), and Esfandiar Mohammadi (Saarland University)
12:00 Lunch
Session 3: Privacy Enhancing Technologies
Session Chair: Reza Shokri (École Polytechnique Fédérale de Lausanne)
1:30 Timed revocation of user data: Long expiration times from existing infrastructure
Sirke Reimann and Markus Duermuth (Ruhr-University Bochum)
2:00 Secure Communication over Diverse Transports (short paper)
Michael Rogers and Eleanor Saitta
2:15 Differentially Private Iterative Synchronous Consensus
Zhenqi Huang, Sayan Mitra, and Geir Dullerud (University of Illinois at Urbana-Champaign)
2:45 A Machine Learning Solution to Assess Privacy Policy Completeness (short paper)
Elisa Costante, Yuanhao Sun, Jerry den Hartog (Eindhoven University of Technology), and Milan Petkovic (Eindhoven University of Technology, Philips Research Laboratories)
3:00 GenoDroid: Are Privacy-Preserving Genomic Tests Ready for Prime Time?
Emiliano De Cristofaro (PARC), Sky Faber, Paolo Gasti, and Gene Tsudik (UC Irvine)
3:30 Coffee break
Session 4: Understanding Human Behavior
Session chair: Paul Syverson (Naval Research Laboratory)
4:00 How Many Eyes are Spying on Your Shared Folders?
Bingshuang Liu, Zhaoyang Liu, Jianyu Zhang (Beijing Key Laboratory of Internet Security Technology of Peking University), Tao Wei (Beijing Key Laboratory of Internet Security Technology of Peking University & EECS, UC Berkeley), and Wei Zou (Beijing Key Laboratory of Internet Security Technology of Peking University)
4:30 Understanding Sharing Preferences and Behavior for mHealth Devices
Aarathi Prasad, Jacob Sorber, Timothy Stablein, Denise Anthony, and David Kotz (Institute for Security, Technology and Society, Dartmouth College)
5:00 For Human Eyes Only: Security and Usability Evaluation
Andreas Pashalidis, Nikos Mavrogiannopoulos (KU Leuven), Xavier Ferrer (Universitat Autonoma de Barcelona), and Benat Bermejo Oloizola (Universidad del Pais Vasco)