ChaosPad V1.1
Full screen

Server Notice:

hide

Public Pad Latest text of pad QQS6CCpTDl Saved April 20, 2026

 
"The official inofficial organization pad for the reading group of the PETS Lecture (KIT) during summer 26. 
Every  paper-slot can be claimed by one student (every paper is read on  Tue once, and on Thu once). 
 
If  you don't manage to get access to one of the manuscripts (using  google scholar, for instance), you can email the authors or your  professor, who has a 
pdf of each of the papers (as a last resort)... 
 
Thanks! 
 
We'll collect all interested students and your availabilities ref weekdays first, and assign reading groups per person, after.
 
 
The reading groups will be:
 
RG 1 Tue
Tue 9.6.
1)   Herley, Cormac, and Paul  C.  Van  Oorschot. "Sok: Science, security  and  the elusive goal of   security as a  scientific pursuit." 2017  IEEE  Symposium on Security  and  Privacy (SP).  IEEE, 2017.
 
2)  Anonymization: The imperfect science of using data while preserving privacy
Andrea Gadotti, Luc Rocher, Florimond Houssiau, Ana- Maria Creu, Yves-Alexandre de Montjoye
 
 
RG 1 Thu
Thu 11.6.
1)    Herley, Cormac, and Paul  C.  Van  Oorschot. "Sok: Science, security   and  the elusive goal of   security as a  scientific pursuit." 2017   IEEE  Symposium on Security  and  Privacy (SP).  IEEE, 2017. 
 
2)  Anonymization: The imperfect science of using data while preserving privacy
Andrea Gadotti, Luc Rocher, Florimond Houssiau, Ana- Maria Creu, Yves-Alexandre de Montjoye
 
 
 
RG 2 Tue
Tue Jun 16th
3) Latanya Sweeney. Simple demographics often identify people uniquely. Health, 2000   
               
4)  YA  de Montjoye, CA Hidalgo, M  Verleysen, VD Blondel. Unique in the  Crowd:  The privacy bounds of human  mobility. Nature srep. 3    
 
 
RG 2 Thu
Thu Jun 18th
3) Latanya Sweeney. Simple demographics often identify people uniquely. Health, 2000   
               
4)  YA  de Montjoye, CA Hidalgo, M  Verleysen, VD Blondel. Unique in the  Crowd:  The privacy bounds of human  mobility. Nature srep. 3  
  
 
 
 
RG 3 Tue
Tue Jun 23th
5)   A. Narayanan and V.  Shmatikov, "Robust de-anonymization of large  sparse datasets", in  Proc. IEEE Symp. Secur., Priv. (SP). IEEE  Comput.  Soc.,    May 2008,   pp.  111-125. 
               
6) The  Double-edged Sword of LLM-based Data Reconstruction:  Understanding and  Mitigating Contextual Vulnerability in Word-level  Differential Privacy  Text Sanitization
Stephen Meisenbacher, Alexandra Klymenko, Andreea-Elena Bodea, Florian Matthes
WPES 2025
 
RG 3 Thu
Thu Jun 25th
5)   A. Narayanan and V.  Shmatikov, "Robust de-anonymization of large  sparse datasets", in  Proc. IEEE Symp. Secur., Priv. (SP). IEEE  Comput.  Soc.,    May 2008,   pp.  111-125.
               
6) The  Double-edged Sword of LLM-based Data Reconstruction:  Understanding and  Mitigating Contextual Vulnerability in Word-level  Differential Privacy  Text Sanitization
Stephen Meisenbacher, Alexandra Klymenko, Andreea-Elena Bodea, Florian Matthes
WPES 2025
 
 
 
 
RG 4 Tue
Tue Jun 30th
7) Georgi Ganev, Emiliano De Cristofaro
 The Inadequacy of Similarity-based Privacy Metrics: Privacy Attacks against “Truly Anonymous” Synthetic Datasets
46th IEEE Symposium on Security & Privacy (IEEE S&P 2025):
Jens Greiner 
 
8) Dantcheva, Antitza, Petros Elia,  and Arun Ross. "What else does your    biometric data reveal? A survey on  soft biometrics." IEEE  Transactions   on Information Forensics   and  Security 11.3 (2015):  441-467. 
 
 
 Yili Ren and others, "Person Re-identification in 3D Space: A WiFi Vision-based Approach", USENIX Security, 2023
 
RG 4 Thu
Thu Jul 2nd
7) Georgi Ganev, Emiliano De Cristofaro
 The Inadequacy of Similarity-based Privacy Metrics: Privacy Attacks against “Truly Anonymous” Synthetic Datasets
46th IEEE Symposium on Security & Privacy (IEEE S&P 2025)
 
8) Dantcheva, Antitza, Petros Elia,  and Arun Ross. "What else does  your    biometric data reveal? A survey on  soft biometrics." IEEE   Transactions   on Information Forensics   and  Security 11.3 (2015):   441-467. 
 
 
RG 5 Tue
Tue July 14th
9) Yili Ren and others, "Person Re-identification in 3D Space: A WiFi Vision-based Approach", USENIX Security, 2023 
 
10) Measuring the Accuracy and Effectiveness of PII Removal Services
Authors:  Jiahui He (The Hong Kong University of Science and  Technology  (Guangzhou)), Peter Snyder (Brave Software Inc), Hamed  Haddadi  (Imperial College London & Brave Software Inc), Fabián E.   Bustamante (Northwestern University), Gareth Tyson (The Hong Kong   University of Science and Technology (Guangzhou))
Volume: 2025
Issue: 4
Pages: 166–182
 
 
RG 5 Thu
Thu July 16th
9) Yili Ren and others, "Person Re-identification in 3D Space: A WiFi Vision-based Approach", USENIX Security, 2023 
 
10) Measuring the Accuracy and Effectiveness of PII Removal Services
Authors:  Jiahui He (The Hong Kong University of Science and  Technology  (Guangzhou)), Peter Snyder (Brave Software Inc), Hamed  Haddadi  (Imperial College London & Brave Software Inc), Fabián E.   Bustamante (Northwestern University), Gareth Tyson (The Hong Kong   University of Science and Technology (Guangzhou))
Volume: 2025
Issue: 4
Pages: 166–182
 
 
 
 
Papers 2026:
1)  Herley, Cormac, and Paul  C.  Van  Oorschot. "t" 2017 IEEE  Symposium on Security  and  Privacy (SP).  IEEE, 2017.
 
2)  Anonymization: The imperfect science of using data while preserving privacy
Andrea Gadotti, Luc Rocher, Florimond Houssiau, Ana- Maria Creu, Yves-Alexandre de Montjoye
               
3) Latanya Sweeney. Simple demographics often identify people uniquely. Health, 2000   
               
4) YA  de Montjoye, CA Hidalgo, M  Verleysen, VD Blondel. Unique in the Crowd:  The privacy bounds of human  mobility. Nature srep. 3    
               
5)  A. Narayanan and V.  Shmatikov, "Robust de-anonymization of large sparse datasets", in  Proc. IEEE Symp. Secur., Priv. (SP). IEEE  Comput. Soc.,    May 2008,   pp.  111-125.
               
6) The   Double-edged Sword of LLM-based Data Reconstruction:  Understanding  and  Mitigating Contextual Vulnerability in Word-level  Differential  Privacy  Text Sanitization
Stephen Meisenbacher, Alexandra Klymenko, Andreea-Elena Bodea, Florian Matthes
WPES 2025
 
7) Georgi Ganev, Emiliano De Cristofaro
 The Inadequacy of Similarity-based Privacy Metrics: Privacy Attacks against “Truly Anonymous” Synthetic Datasets
46th IEEE Symposium on Security & Privacy (IEEE S&P 2025)
 
8)  Dantcheva, Antitza, Petros Elia,  and Arun Ross. "What else does your   biometric data reveal? A survey on  soft biometrics." IEEE Transactions   on Information Forensics   and  Security 11.3 (2015): 441-467.
 
9) Yili Ren and others, "Person Re-identification in 3D Space: A WiFi Vision-based Approach", USENIX Security, 2023
 
10) Measuring the Accuracy and Effectiveness of PII Removal Services
 
 
 
 
     
Reading Groups:
Tue:
9
10
 
Thu
9
10
 
 
 
########################################################################################
########################################################################################
Everything below is old, to be ignored
 
 
 
 
Georgi Ganev, Emiliano De Cristofaro
 The Inadequacy of Similarity-based Privacy Metrics: Privacy Attacks against “Truly Anonymous” Synthetic Datasets
 46th IEEE Symposium on Security & Privacy (IEEE S&P 2025)
 
Anonymization: The imperfect science of using data while preserving privacy
Andrea Gadotti, Luc Rocher, Florimond Houssiau, Ana- Maria Creu, Yves-Alexandre de Montjoye
 
 
1) Technical Privacy Metrics: A Systematic Survey, Isabel Wagner and David Eckhoff, ACM CSUR, 2018
 
 
C.  Diaz, S. Seys, J. Claessens, B. Preneel, "Towards measuring     anonymity", In Proc. 2nd International Conference on  Privacy-Enhancing    Technologies (PETs), LNCS,   vol. 2482., pp. 54–68,  2002.
 
 
 
 
It's all in your head(set): Side-channel attacks on AR/VR systems
Authors: Yicheng Zhang, Carter Slocum, Jiasi Chen, and Nael Abu-Ghazaleh, University of California, Riverside
 
Person Re-identification in 3D Space: A WiFi Vision-based Approach
Authors: 
Yili Ren and Yichao Wang, Florida State University; Sheng Tan, Trinity University; Yingying Chen, Rutgers University; Jie Yang, Florida State University
 
Kuhn, Christiane, et al. "On Privacy Notions in Anonymous   Communication." Proceedings on Privacy Enhancing Technologies 2 (2019):   105-125.   
               
6) G.  Acs, C. Castelluccia and  R.  Chen, "Differentially Private Histogram  Publishing through Lossy   Compression," 2012 IEEE 12th International  Conference on   Data Mining,   Brussels, 2012, pp. 1-10.
               
7) M.    K. Reiter, A. D.  Rubin, "Crowds: Anonymity for Web transactions",  ACM   Trans. Inform.  Syst. Secur., vol. 1, no. 1, pp. 66-92, 1998.    
                
9) Armknecht, Frederik, and  Thorsten Strufe. "An efficient distributed privacy-preserving  recommendation system." 2011 The 10th IFIP Annual Mediterranean Ad Hoc    Networking Workshop. IEEE, 2011.
               
Sangwook Bae and others, "Watching the Watchers: Practical Video
Identification Attack in LTE Networks", USENIX Security, 2022
 
Juhi  Kulshrestha, Marcos  Oliveira, Orkut Karac ̧alık, Denis Bonnay, Claudia  Wagner. Web  Routineness and Limits of Predictability:Investigating  Demographic and  Behavioral   Differences Using Web Tracking Data 
 
The Double-edged Sword of LLM-based Data Reconstruction:  Understanding and Mitigating Contextual Vulnerability in Word-level  Differential Privacy Text Sanitization
Stephen Meisenbacher, Alexandra Klymenko, Andreea-Elena Bodea, Florian Matthes (Technical University of Munich)
WPES 2025
 
How Unique is Whose Web Browser? The role of demographics in browser fingerprinting among US users
Authors: Alex Berke (MIT Media Lab), Badih Ghazi (Google),  Enrico Bacis (Google), Pritish Kamath (Google), Ravi Kumar (Google),  Robin Lassonde (Google), Pasin Manurangsi (Google), Umar Syed (Google)
Volume: 2025
Issue: 1
Pages: 720–758
 
Measuring the Accuracy and Effectiveness of PII Removal Services
Authors: Jiahui He (The Hong Kong University of Science and  Technology (Guangzhou)), Peter Snyder (Brave Software Inc), Hamed  Haddadi (Imperial College London & Brave Software Inc), Fabián E.  Bustamante (Northwestern University), Gareth Tyson (The Hong Kong  University of Science and Technology (Guangzhou))
Volume: 2025
Issue: 4
Pages: 166–182
 
 
Kim Wuyts, Riccardo Scandariato, Wouter Joosen,
Empirical evaluation of a privacy-focused threat modeling methodology,
Journal of Systems and Software, Volume 96, 2014,
 
Fiore, Marco, et al. "Privacy in trajectory micro-data publishing: a survey." Transactions on Data Privacy 13 (2020): 91-149.