Abstract is missing.
- ZXAD: High-volume Attack Mitigation for TorAkshaya Mani, Ian Goldberg. 1-16 [doi]
- Plausible Deniability for Anonymous CommunicationChristiane Kuhn, Maximilian Noppel, Christian Wressnegger, Thorsten Strufe. 17-32 [doi]
- MiXiM: Mixnet Design Decisions and Empirical EvaluationIness Ben Guirat, Devashish Gosain, Claudia Diaz. 33-37 [doi]
- Studying the Anonymity Trilemma with a Discrete-event Mix Network SimulatorAnia M. Piotrowska. 39-44 [doi]
- Attacks on Onion Discovery and Remedies via Self-Authenticating Traditional AddressesPaul Syverson, Matthew Finkel, Saba Eskandarian, Dan Boneh. 45-52 [doi]
- Do You Feel a Chill?: Using PIR against Chilling Effects for Censorship-resistant PublishingMiti Mazmudar, Stan Gurtler, Ian Goldberg. 53-57 [doi]
- (Un)clear and (In)conspicuous: The Right to Opt-out of Sale under CCPASean O'Connor, Ryan Nurwono, Aden Siebel, Eleanor Birrell. 59-72 [doi]
- Fighting the Fog: Evaluating the Clarity of Privacy Disclosures in the Age of CCPARex Chen, Fei Fang, Thomas B. Norton, Aleecia M. McDonald, Norman M. Sadeh. 73-102 [doi]
- TLDR: Deep Learning-Based Automated Privacy Policy Annotation with Key Policy HighlightsAbdulrahman Alabduljabbar, Ahmed Abusnaina, Ülkü Meteriz-Yildiran, David Mohaisen. 103-118 [doi]
- From Secure to Military-Grade: Exploring the Effect of App Descriptions on User Perceptions of Secure MessagingOmer Akgul, Ruba Abu-Salma, Wei Bai 0004, Elissa M. Redmiles, Michelle L. Mazurek, Blase Ur. 119-135 [doi]
- OUStralopithecus: Overt User Simulation for Censorship CircumventionAnna Harbluk Lorimer, Lindsey Tulloch, Cecylia Bocovich, Ian Goldberg. 137-150 [doi]
- In-Depth Technical and Legal Analysis of Tracking on Health Related Websites with ERNIE ExtensionVera Wesselkamp, Imane Fouad, Cristiana Santos, Yanis Boussad, Nataliia Bielova, Arnaud Legout. 151-166 [doi]
- The Elephant in the Background: A Quantitative Approachto Empower Users Against Web Browser FingerprintingJulian Fietkau 0002, Kashyap Thimmaraju, Felix Kybranz, Sebastian Neef, Jean-Pierre Seifert. 167-180 [doi]
- Who Tracks the Trackers?: Circumventing Apple's Anti-Tracking Alerts in the Find My NetworkTravis Mayberry, Ellis Fenske, Dane Brown, Jeremy Martin, Christine Fossaceca, Erik C. Rye, Sam Teplov, Lucas Foppe. 181-186 [doi]
- Cookie Banners, What's the Purpose?: Analyzing Cookie Banner Text Through a Legal LensCristiana Santos, Arianna Rossi, Lorena Sánchez Chamorro, Kerstin Bongard-Blanchy, Ruba Abu-Salma. 187-194 [doi]
- Empirical Analysis and Privacy Implications in OAuth-based Single Sign-On SystemsSrivathsan G. Morkonda, Sonia Chiasson, Paul C. van Oorschot. 195-208 [doi]
- SIA: Smartwatch-Enabled Inference Attacks on Physical Keyboards Using Acoustic SignalsÜlkü Meteriz-Yildiran, Necip Fazil Yildiran, David Mohaisen. 209-221 [doi]
- Private Data Exfiltration from Cyber-Physical Systems Using Channel State InformationThomas Burton, Kasper Rasmussen. 223-235 [doi]
- What a SHAME: Smart Assistant Voice Command Fingerprinting Utilizing Deep LearningJack Hyland, Conrad Schneggenburger, Nick Lim, Jake Ruud, Nate Mathews, Matthew Wright 0001. 237-243 [doi]
- Who's Most Targeted and Does My New Adblocker Really Help: A Profile-based Evaluation of Personalized AdvertisingSofia Bertmar, Johanna Gerhardsen, Alice Ekblad, Anna Höglund, Julia Mineur, Isabell Öknegård Enavall, Minh Ha Le, Niklas Carlsson. 245-249 [doi]