"The official inofficial organization pad for the reading group of the PETS Lecture (KIT) during summer 26. Every paper-slot can be claimed by one student (every paper is read on Tue once, and on Thu once). If you don't manage to get access to one of the manuscripts (using google scholar, for instance), you can email the authors or your professor, who has a pdf of each of the papers (as a last resort)... Thanks! We'll collect all interested students and your availabilities ref weekdays first, and assign reading groups per person, after. The reading groups will be: RG 1 Tue Tue 9.6. 1) Herley, Cormac, and Paul C. Van Oorschot. "Sok: Science, security and the elusive goal of security as a scientific pursuit." 2017 IEEE Symposium on Security and Privacy (SP). IEEE, 2017. -> Mona Bräunig 2) Anonymization: The imperfect science of using data while preserving privacy Andrea Gadotti, Luc Rocher, Florimond Houssiau, Ana- Maria Creu, Yves-Alexandre de Montjoye https://www.science.org/doi/epdf/10.1126/sciadv.adn7053 - >Katharina Zevakov RG 1 Thu Thu 11.6. 1) Herley, Cormac, and Paul C. Van Oorschot. "Sok: Science, security and the elusive goal of security as a scientific pursuit." 2017 IEEE Symposium on Security and Privacy (SP). IEEE, 2017. 2) Anonymization: The imperfect science of using data while preserving privacy Andrea Gadotti, Luc Rocher, Florimond Houssiau, Ana- Maria Creu, Yves-Alexandre de Montjoye https://www.science.org/doi/epdf/10.1126/sciadv.adn7053 Huber RG 2 Tue Tue Jun 16th 3) Latanya Sweeney. Simple demographics often identify people uniquely. Health, 2000 -> David Kowal 4) YA de Montjoye, CA Hidalgo, M Verleysen, VD Blondel. Unique in the Crowd: The privacy bounds of human mobility. Nature srep. 3 -> Alan Kniep RG 2 Thu Thu Jun 18th 3) Latanya Sweeney. Simple demographics often identify people uniquely. Health, 2000 Jeremy Ködding (3 on Thursday) 4) YA de Montjoye, CA Hidalgo, M Verleysen, VD Blondel. Unique in the Crowd: The privacy bounds of human mobility. Nature srep. 3 Kraft RG 3 Tue Tue Jun 23th 5) A. Narayanan and V. Shmatikov, "Robust de-anonymization of large sparse datasets", in Proc. IEEE Symp. Secur., Priv. (SP). IEEE Comput. Soc., May 2008, pp. 111-125. -> Gregor Czubayko 6) The Double-edged Sword of LLM-based Data Reconstruction: Understanding and Mitigating Contextual Vulnerability in Word-level Differential Privacy Text Sanitization Stephen Meisenbacher, Alexandra Klymenko, Andreea-Elena Bodea, Florian Matthes WPES 2025 -> Julian Förstel RG 3 Thu Thu Jun 25th 5) A. Narayanan and V. Shmatikov, "Robust de-anonymization of large sparse datasets", in Proc. IEEE Symp. Secur., Priv. (SP). IEEE Comput. Soc., May 2008, pp. 111-125. -> Leue 6) The Double-edged Sword of LLM-based Data Reconstruction: Understanding and Mitigating Contextual Vulnerability in Word-level Differential Privacy Text Sanitization Stephen Meisenbacher, Alexandra Klymenko, Andreea-Elena Bodea, Florian Matthes WPES 2025 --> Niklas Waibel RG 4 Tue Tue Jun 30th 7) Georgi Ganev, Emiliano De Cristofaro The Inadequacy of Similarity-based Privacy Metrics: Privacy Attacks against “Truly Anonymous” Synthetic Datasets 46th IEEE Symposium on Security & Privacy (IEEE S&P 2025): Jens Greiner 8) Dantcheva, Antitza, Petros Elia, and Arun Ross. "What else does your biometric data reveal? A survey on soft biometrics." IEEE Transactions on Information Forensics and Security 11.3 (2015): 441-467. Elena Häußler Yili Ren and others, "Person Re-identification in 3D Space: A WiFi Vision-based Approach", USENIX Security, 2023: RG 4 Thu Thu Jul 2nd 7) Georgi Ganev, Emiliano De Cristofaro The Inadequacy of Similarity-based Privacy Metrics: Privacy Attacks against “Truly Anonymous” Synthetic Datasets 46th IEEE Symposium on Security & Privacy (IEEE S&P 2025): -> Moritz Bolz 8) Dantcheva, Antitza, Petros Elia, and Arun Ross. "What else does your biometric data reveal? A survey on soft biometrics." IEEE Transactions on Information Forensics and Security 11.3 (2015): 441-467. -> Alina Griesel RG 5 Tue Tue July 14th 9) Yili Ren and others, "Person Re-identification in 3D Space: A WiFi Vision-based Approach", USENIX Security, 2023 Yashowardhan Samdhani 10) Measuring the Accuracy and Effectiveness of PII Removal Services Authors: Jiahui He (The Hong Kong University of Science and Technology (Guangzhou)), Peter Snyder (Brave Software Inc), Hamed Haddadi (Imperial College London & Brave Software Inc), Fabián E. Bustamante (Northwestern University), Gareth Tyson (The Hong Kong University of Science and Technology (Guangzhou)) Volume: 2025 Issue: 4 Pages: 166–182 DOI: https://doi.org/10.56553/popets-2025-0125 Conrad Teichmann RG 5 Thu Thu July 16th 9) Yili Ren and others, "Person Re-identification in 3D Space: A WiFi Vision-based Approach", USENIX Security, 2023 -> Ettner 10) Measuring the Accuracy and Effectiveness of PII Removal Services Authors: Jiahui He (The Hong Kong University of Science and Technology (Guangzhou)), Peter Snyder (Brave Software Inc), Hamed Haddadi (Imperial College London & Brave Software Inc), Fabián E. Bustamante (Northwestern University), Gareth Tyson (The Hong Kong University of Science and Technology (Guangzhou)) Volume: 2025 Issue: 4 Pages: 166–182 DOI: https://doi.org/10.56553/popets-2025-0125 Leonhard Papers 2026: 1) Herley, Cormac, and Paul C. Van Oorschot. "t" 2017 IEEE Symposium on Security and Privacy (SP). IEEE, 2017. 2) Anonymization: The imperfect science of using data while preserving privacy Andrea Gadotti, Luc Rocher, Florimond Houssiau, Ana- Maria Creu, Yves-Alexandre de Montjoye https://www.science.org/doi/epdf/10.1126/sciadv.adn7053 3) Latanya Sweeney. Simple demographics often identify people uniquely. Health, 2000 4) YA de Montjoye, CA Hidalgo, M Verleysen, VD Blondel. Unique in the Crowd: The privacy bounds of human mobility. Nature srep. 3 5) A. Narayanan and V. Shmatikov, "Robust de-anonymization of large sparse datasets", in Proc. IEEE Symp. Secur., Priv. (SP). IEEE Comput. Soc., May 2008, pp. 111-125. 6) The Double-edged Sword of LLM-based Data Reconstruction: Understanding and Mitigating Contextual Vulnerability in Word-level Differential Privacy Text Sanitization Stephen Meisenbacher, Alexandra Klymenko, Andreea-Elena Bodea, Florian Matthes WPES 2025 7) Georgi Ganev, Emiliano De Cristofaro The Inadequacy of Similarity-based Privacy Metrics: Privacy Attacks against “Truly Anonymous” Synthetic Datasets 46th IEEE Symposium on Security & Privacy (IEEE S&P 2025) 8) Dantcheva, Antitza, Petros Elia, and Arun Ross. "What else does your biometric data reveal? A survey on soft biometrics." IEEE Transactions on Information Forensics and Security 11.3 (2015): 441-467. 9) Yili Ren and others, "Person Re-identification in 3D Space: A WiFi Vision-based Approach", USENIX Security, 2023 10) Measuring the Accuracy and Effectiveness of PII Removal Services DOI: https://doi.org/10.56553/popets-2025-0125 Reading Groups: Tue: 1 Greiner 2 Teichmann 3 Häußler 4 Czubayko 5 Kowal 6 Bräunig 7 Samdhani 8 Kniep 9 Zevakov 10 Förstel Thu 1 Ködding 2 Mannke 3 Waibel 4 Huber 5 Leue 6 Griesel 7 Ettner 8 Bolz 9 Kraft 10 Cuhadar Discussion participation: Jan Weber Lea Kaiser ######################################################################################## ######################################################################################## Everything below is old, to be ignored Georgi Ganev, Emiliano De Cristofaro The Inadequacy of Similarity-based Privacy Metrics: Privacy Attacks against “Truly Anonymous” Synthetic Datasets 46th IEEE Symposium on Security & Privacy (IEEE S&P 2025) Anonymization: The imperfect science of using data while preserving privacy Andrea Gadotti, Luc Rocher, Florimond Houssiau, Ana- Maria Creu, Yves-Alexandre de Montjoye https://www.science.org/doi/epdf/10.1126/sciadv.adn7053 1) Technical Privacy Metrics: A Systematic Survey, Isabel Wagner and David Eckhoff, ACM CSUR, 2018 C. Diaz, S. Seys, J. Claessens, B. Preneel, "Towards measuring anonymity", In Proc. 2nd International Conference on Privacy-Enhancing Technologies (PETs), LNCS, vol. 2482., pp. 54–68, 2002. It's all in your head(set): Side-channel attacks on AR/VR systems Authors: Yicheng Zhang, Carter Slocum, Jiasi Chen, and Nael Abu-Ghazaleh, University of California, Riverside https://www.usenix.org/conference/usenixsecurity23/presentation/zhang-yicheng Person Re-identification in 3D Space: A WiFi Vision-based Approach Authors: Yili Ren and Yichao Wang, Florida State University; Sheng Tan, Trinity University; Yingying Chen, Rutgers University; Jie Yang, Florida State University https://www.usenix.org/conference/usenixsecurity23/presentation/ren Kuhn, Christiane, et al. "On Privacy Notions in Anonymous Communication." Proceedings on Privacy Enhancing Technologies 2 (2019): 105-125. 6) G. Acs, C. Castelluccia and R. Chen, "Differentially Private Histogram Publishing through Lossy Compression," 2012 IEEE 12th International Conference on Data Mining, Brussels, 2012, pp. 1-10. 7) M. K. Reiter, A. D. Rubin, "Crowds: Anonymity for Web transactions", ACM Trans. Inform. Syst. Secur., vol. 1, no. 1, pp. 66-92, 1998. 9) Armknecht, Frederik, and Thorsten Strufe. "An efficient distributed privacy-preserving recommendation system." 2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop. IEEE, 2011. Sangwook Bae and others, "Watching the Watchers: Practical Video Identification Attack in LTE Networks", USENIX Security, 2022 Juhi Kulshrestha, Marcos Oliveira, Orkut Karac ̧alık, Denis Bonnay, Claudia Wagner. Web Routineness and Limits of Predictability:Investigating Demographic and Behavioral Differences Using Web Tracking Data The Double-edged Sword of LLM-based Data Reconstruction: Understanding and Mitigating Contextual Vulnerability in Word-level Differential Privacy Text Sanitization Stephen Meisenbacher, Alexandra Klymenko, Andreea-Elena Bodea, Florian Matthes (Technical University of Munich) WPES 2025 How Unique is Whose Web Browser? The role of demographics in browser fingerprinting among US users Authors: Alex Berke (MIT Media Lab), Badih Ghazi (Google), Enrico Bacis (Google), Pritish Kamath (Google), Ravi Kumar (Google), Robin Lassonde (Google), Pasin Manurangsi (Google), Umar Syed (Google) Volume: 2025 Issue: 1 Pages: 720–758 DOI: https://doi.org/10.56553/popets-2025-0038 Measuring the Accuracy and Effectiveness of PII Removal Services Authors: Jiahui He (The Hong Kong University of Science and Technology (Guangzhou)), Peter Snyder (Brave Software Inc), Hamed Haddadi (Imperial College London & Brave Software Inc), Fabián E. Bustamante (Northwestern University), Gareth Tyson (The Hong Kong University of Science and Technology (Guangzhou)) Volume: 2025 Issue: 4 Pages: 166–182 DOI: https://doi.org/10.56553/popets-2025-0125 Kim Wuyts, Riccardo Scandariato, Wouter Joosen, Empirical evaluation of a privacy-focused threat modeling methodology, Journal of Systems and Software, Volume 96, 2014, https://doi.org/10.1016/j.jss.2014.05.075. Fiore, Marco, et al. "Privacy in trajectory micro-data publishing: a survey." Transactions on Data Privacy 13 (2020): 91-149.