Visible to the public PETS 2023Conflict Detection Enabled

The 23rd Privacy Enhancing Technologies Symposium

The annual Privacy Enhancing Technologies Symposium (PETS) brings together experts from around the world to present and discuss recent advances and new perspectives on research in privacy technologies. The 23rd PETS will be a hybrid event with a physical gathering held in Lausanne, Switzerland and a concurrent virtual event. Papers undergo a journal-style reviewing process, and accepted papers are published in the journal Proceedings on Privacy Enhancing Technologies (PoPETs). Authors of accepted papers are encouraged to attend and present at the physical event, where their presentations can be recorded for the virtual event and where they can participate directly in in-person research, technical, and social activities. However, in-person attendance is not required for publication in the proceedings. We will carefully monitor the COVID-19 situation, and may change the organization of the event as necessary.

Scope

  • Anonymous communication and censorship resistance
  • Blockchain privacy
  • Building and deploying privacy-enhancing systems
  • Cloud computing and privacy
  • Cryptographic tools for privacy
  • Data protection technologies
  • Defining and quantifying privacy
  • Differential privacy and private data analysis
  • Economics and game-theoretical approaches to privacy
  • Forensics and privacy
  • Genomic and medical privacy
  • Human factors, usability, and user-centered design of privacy technologies
  • Information leakage, data correlation, and abstract attacks on privacy
  • Interdisciplinary research connecting privacy to economics, law, psychology, etc.
  • Internet of Things privacy
  • Location privacy
  • Machine learning and privacy
  • Measurement of privacy in real-world systems
  • Mobile devices and privacy
  • Policy languages and tools for privacy
  • Profiling and data mining
  • Social network privacy
  • Surveillance
  • Traffic analysis
  • Transparency, robustness, and abuse in privacy systems
  • Web privacy

We also solicit Systematization of Knowledge (SoK) papers on any of these topics: papers putting together existing knowledge under some common light (adversary model, requirements, functionality offered, etc.), providing novel insights, identifying research gaps or challenges to commonly held assumptions, etc. Survey papers, without such contributions, are not suitable. SoK submissions should include "SoK:" in their title and check the corresponding option in the submission form.

General Chair (gc23@petsymposium.org)

  • Kevin Huguenin, University of Lausanne
  • Carmela Troncoso, EPFL

Program Chairs/Co-Editors-in-Chief (pets23-chairs@petsymposium.org)

  • Michelle Mazurek, University of Maryland
  • Micah Sherr, Georgetown University
  • Senior Program Committee/Editorial Board:
  • Adam Aviv, George Washington University
  • Lujo Bauer, Carnegie Mellon University
  • Kevin Butler, University of Florida
  • Sherman Chow, Chinese University of Hong Kong
  • Nicolas Christin, Carnegie Mellon University
  • Chris Clifton, Purdue University
  • Serge Egelman, International Computer Science Institute
  • Christina Garman, Purdue University
  • Carrie Gates, Bank of America
  • Ian Goldberg, University of Waterloo
  • Nick Hopper, University of Minnesota
  • Aaron Johnson, U.S. Naval Research Laboratory
  • Stefan Katzenbeisser, University of Passau, Germany
  • Damon McCoy, New York University
  • Bryan Parno, Carnegie Mellon University
  • Florian Schaub, University of Michigan
  • Paul Syverson, U.S. Naval Research Laboratory
  • Nina Taft, Google
  • Blase Ur, University of Chicago
  • Christo Wilson, Northeastern University
  • Matthew Wright, Rochester Institute of Technology

Program Committee/Editorial Board:

  • Ruba Abu-Salma, King's College London
  • Gunes Acar, Radboud University
  • Omer Akgul, University of Maryland
  • Mario Alvim, Universidade Federal de Minas Gerais
  • Abdelrahaman Aly, Centre of Cryptography, TII
  • Frederik Armknecht, Universitat Mannheim
  • Hassan Asghar, Macquarie University
  • Saikrishna Badrinarayanan, LinkedIn
  • Diogo Barradas, University of Waterloo
  • Zinaida Benenson, University of Erlangen-Nuremberg
  • Alastair Beresford, University of Cambridge
  • Pascal Berrang, University of Birmingham
  • Gergely Biczok, Budapest University of Technology and Economics
  • Igor Bilogrevic, Google
  • Eleanor Birrell, Pomona College
  • Erik-Oliver Blass, Airbus
  • Jonas Bohler, SAP SE
  • Glencora Borradaile, Oregon State University
  • Varun Chandrasekaran, University of Wisconsin-Madison
  • Melissa Chase, Microsoft Research
  • Rahul Chatterjee, University of Wisconsin-Madison
  • Sze Yiu Chau, Chinese University of Hong Kong
  • Omar Chowdhury, Stony Brook University
  • Shaanan Cohney, University of Melbourne
  • Jean-Francois Couchot, FEMTO-ST Institute
  • Scott Coull, Mandiant
  • Jed Crandall, Arizona State University
  • Robert Cunningham, University of Pittsburgh
  • Anupam Das, North Carolina State University
  • Martin Degeling, Ruhr University Bochum
  • Soteris Demetriou, Imperial College London
  • Damien Desfontaines, Tumult Labs
  • Roger Dingledine, The Tor Project
  • Nir Drucker, IBM Research - Haifa
  • Markus Durmuth, Leibniz University Hannover
  • Christoph Egger, IRIF, Universite Paris Cite
  • Tariq Elahi, University of Edinburgh
  • Pardis Emami-Naeini, Duke University
  • Zeki Erkin, TU Delft
  • Saba Eskandarian, UNC Chapel Hill
  • Alvaro Feal, IMDEA Networks Institute
  • Ellis Fenske, US Naval Academy
  • Matt Fredrikson, Carnegie Mellon University
  • Kevin Gallagher, Instituto Superior Tecnico, Universidade de Lisboa
  • Sebastien Gambs, Universite du Quebec a Montreal (UQAM)
  • Simson Garfinkel, George Washington University
  • Paolo Gasti, New York Institute of Technology
  • Gennie Gebhart, Electronic Frontier Foundation
  • Badih Ghazi, Google Research
  • Thomas Gross, Newcastle University, UK
  • Cheng Guo, Clemson University / Google
  • Mehmet Emre Gursoy, Koc University, Turkey
  • Andreas Haeberlen, University of Pennsylvania
  • Florian Hahn, University of Twente
  • Rakibul Hasan, Arizona State University
  • Weijia He, Dartmouth College
  • Urs Hengartner, University of Waterloo
  • Dominik Herrmann, University of Bamberg, Germany
  • Jens Hiller, Google
  • Thang Hoang, Virginia Tech
  • Yuan Hong, Illinois Institute of Technology
  • Amir Houmansadr, UMass Amherst
  • Roberto Hoyle, Oberlin College
  • Murtuza Jadliwala, The University of Texas at San Antonio
  • Rob Jansen, U.S. Naval Research Laboratory
  • Limin Jia, Carnegie Mellon University
  • Jinyuan Jia, Duke University
  • Marc Juarez, University of Southern California
  • Bailey Kacsmar, University of Waterloo
  • Ghassan Karame, Ruhr University Bochum
  • Marcel Keller, CSIRO's Data61
  • Steve Kremer, Inria Nancy
  • Christiane Kuhn, NEC Laboratories Europe
  • Piyush Kumar Sharma, KU Leuven
  • Alptekin Kupcu, Koc University
  • Peeter Laud, Cybernetica AS
  • Arnaud Legout, Inria
  • Brian Levine, University of Massachusetts Amherst
  • Ming Li, The University of Texas at Arlington
  • Saeed Mahloujifar, Princeton
  • Mohammad Malekzadeh, Imperial College London
  • Pasin Manurangsi, Google Research
  • Piotr Mardziel, Truera
  • Shrirang Mare, Western Washington University
  • Rahat Masood, The University of New South Wales (UNSW)
  • Fabio Massacci, University of Trento, Vrije Universiteit Amsterdam
  • Peter Mayer, Karlsruhe Institute of Technology
  • Shagufta Mehnaz, Dartmouth College
  • Ian Miers, University of Maryland
  • Veelasha Moonsamy, Ruhr University Bochum
  • Victor Morel, Sustainable Computing Lab
  • Pedro Moreno-Sanchez, IMDEA Software Institute
  • Sumit Mukherjee, insitro
  • Steven Murdoch, University College London
  • Adwait Nadkarni, William & Mary
  • Sashank Narain, University of Massachusetts Lowell
  • Milad Nasr, Google Brain
  • Chan Nam Ngo, Kyber Network, Vietnam
  • Benjamin Nguyen, INSA Centre Val de Loire
  • Shirin Nilizadeh, The University of Texas at Arlington
  • Rebekah Overdorf, University of Lausanne
  • Simon Oya, University of Waterloo
  • Nisha Panwar, Assistant Professor School of Computer and Cyber Sciences Augusta University
  • Stefano Paraboschi, Universita degli Studi di Bergamo
  • Paul Pearce, Georgia Tech
  • Balazs Pejo, CrySyS Lab, BME
  • Andreas Peter, University of Twente
  • Christina Popper, New York University Abu Dhabi
  • Tobias Pulls, Karlstad University, Sweden
  • Apostolos Pyrgelis, EPFL
  • Ananth Raghunathan, Facebook
  • Sazzadur Rahaman, University of Arizona
  • Abbas Razaghpanah, Cisco/ICSI
  • Joel Reardon, University of Calgary and AppCensus, Inc.
  • Alfredo Rial, Nym Technologies
  • Vera Rimmer, KU Leuven
  • Daniel Roche, U.S. Naval Academy
  • Stefanie Roos, TU Delft
  • Paul Rosler, New York University
  • Andy Rupp, University of Luxembourg
  • Reihaneh Safavi-Naini, University of Calgary
  • Wendy Seltzer, W3C/MIT
  • Shawn Shan, University of Chicago
  • Mahmood Sharif, Tel Aviv University
  • Sandra Siby, EPFL
  • Georgios Smaragdakis, TU Delft
  • David Marco Sommer, Zuehlke
  • Claudio Soriente, NEC Laboratories Europe
  • Theresa Stadler, EPFL
  • Guillermo Suarez-Tangil, IMDEA Networks Institute
  • Jose Such, King's College London
  • Ruoxi Sun, The University of Adelaide
  • Iraklis Symeonidis, KTH Royal Institute of Technology
  • Daniel Takabi, Georgia State University
  • Sai Teja Peddinti, Google
  • Michael Toth, Inria
  • Ni Trieu, Arizona State University
  • Anselme Tueno, SAP
  • Nirvan Tyagi, Cornell University
  • Ben Ujcich, Georgetown University
  • Tobias Urban, Institute for Internet Security & secunet Security Networks AG
  • Tavish Vaidya, Google
  • Eugene Vasserman, Kansas State University
  • Ryan Wails, Georgetown University, U.S. Naval Research Laboratory
  • Tianhao Wang, University of Virginia
  • Ding Wang, Nankai University
  • Liang Wang, Princeton University
  • Shuai Wang, Hong Kong University of Science and Technology
  • Attila Yavuz, University of South Florida
  • Zhikun Zhang, CISPA Helmholtz Center for Information Security
  • Yongjun Zhao, Nanyang Technological University
  • Yixin Zou, University of Michigan / Max Planck Institute for Security and Privacy

Local Arrangements Chair(arrangements23@petsymposium.org)

  • Mathias Humbert, University of Lausanne

Publicity/Web Chairs (publicity23@petsymposium.org)

  • Kat Hanna, The Tor Project
  • Mathilde Raynal, EPFL

Publication Chairs (publication23@petsymposium.org)

  • Weijia He, Dartmouth College
  • Dhruv Kuchhal, Georgia Tech

Artifact Chairs (artifact23@petsymposium.org)

  • Bailey Kacsmar, University of Waterloo
  • Pasin Manurangsi, Google Research

HotPETs Chairs (hotpets23@petsymposium.org)

  • Rebekah Overdorf, EPFL
  • Luc Rocher, University of Oxford

PET Award Chairs (award-chairs22@petsymposium.org)

  • Emiliano De Cristofaro, University College London
  • Dali Kaafar, Macquarie University Sydney Australia

Sponsorship Chairs (sponsorship@petsymposium.org)

  • Steven Murdoch, University College London
  • Susan McGregor, Columbia University

Infrastructure Chairs

  • Roger Dingledine, The Tor Project
  • Ian Goldberg, University of Waterloo

Stipend Chairs (pets2023-stipend@petsymposium.org)

  • Tariq Elahi, University of Edinburgh
  • Murtuza Jadliwala, University of Texas at San Antonio
  • Susan E McGregor, Columbia University
  • Veelasha Moonsamy, Ruhr University Bochum
  • Awais Rashid, University of Bristol
Event Details
Location: 
Lausanne, Switzerland