14:39 Hoda Aghaei Khouzani ErasuCrypto A Light weight Secure Data Deletion Scheme for Solid State SSDs All Hacking Cons
17:00 Diogo Barradas DeltaShaper Censorship resistant TCP Tunneling over Videoconferencing All Hacking Cons
15:51 Alexandra Dmitrienko Phonion Practical Protection of Metadata in Telephony Networks All Hacking Cons
15:14 Adria Gascon Privacy Preserving Distributed Linear Regression on High Dimensional Data All Hacking Cons
14:53 Alisa Pankova Preprocessing Based Verification of Multiparty Protocols with Honest Majority All Hacking Cons
15:28 Giovanni Cherubin Bayes, not Naïve Security Bounds on Website Fingerprinting Defenses All Hacking Cons
14:29 Wendi Diao Vulnerable GPU Memory Management Towards Recovering Raw Data from GPU All Hacking Cons
15:46 Agnes Kiss Private Set Intersection for Unequal Set Sizes with Mobile Applications All Hacking Cons
13:15 Florentin Rochet Waterfilling Balancing the Tor network with maximum diversity All Hacking Cons
15:07 Jeremy Martin A Study of MAC Address Randomization in Mobile Devices and When it Fails All Hacking Cons
13:35 Mojtaba Eskandari Analyzing Remote Server Locations for Personal Data Transfers in Mobile Apps All Hacking Cons
16:21 Konstantinos Chatzikokolakis Efficient utility improvement for location privacy All Hacking Cons
16:15 Jesse Victors The Onion Name System Tor powered Decentralized DNS for Tor Onion Services All Hacking Cons
13:29 Hung Dang Privacy preserving computation with trusted computing via Scramble then Compute All Hacking Cons
15:32 Dominik Schürmann Wiretapping End to End Encrypted VoIP Calls Real World Attacks on ZRTP All Hacking Cons
12:53 Steven Englehardt Battery Status Not Included Assessing Privacy in Web Standards All Hacking Cons
13:39 Spyros Boukoros Two Is Not Enough Privacy Assessment of Aggregation Schemes in Smart Metering All Hacking Cons
15:06 David Froelicher Unlynx A Decentralized System for Privacy Conscious Data Sharing All Hacking Cons
15:17 Zachary Weinberg Topics of Controversy An Empirical Analysis of Web Censorship Lists All Hacking Cons
15:44 Pedro Moreno Sanchez PathShuffle Credit Mixing and Anonymous Payments for Ripple All Hacking Cons
16:17 Takao Murakami Expectation Maximization Tensor Factorization for Location Privacy Attacks All Hacking Cons
14:27 Wouter Lueks IRMA decentralized and privacy friendly identity management using smartphones All Hacking Cons
14:25 Cédric Van Rompay A Leakage Abuse Attack Against Multi User Searchable Encryption All Hacking Cons
1:13:25 Jonathan Albright PETS Keynote Emotional Targeting and the Shaping of Social Discourse All Hacking Cons
16:00 Muhammad Ikram Towards Seamless Tracking Free Web Improved Detection of Trackers All Hacking Cons