Tags | Paper | Authors | Conference |
2020, pre-print | Early Evidence of Effectiveness of Digital Contact Tracing for SARS-CoV-2 in Switzerland | Marcel Salathé, Christian L. Althaus, Nanina Anderegg, Daniele Antonioli, Tala Ballouz, Edouard Bugnion, Srdjan Capkun, Dennis Jackson, Sang-Il Kim, James R. Larus, Nicola Low, Wouter Lueks, Dominik Menges, Cédric Moullet, Mathias Payer, Julien Riou, Theresa Stadler, Carmela Troncoso, Effy Vayena, Viktor von Wyl | |
2020, pre-print | Decentralized Privacy-Preserving Proximity Tracing | Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James Larus, Edouard Bugnion, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth Paterson, Srdjan Capkun, David Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel Smart, Aysajan Abidin, Seda Gürses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa, Rui Oliveira, José Pereira | |
2019, pre-print | Disparate Vulnerability: on the Unfairness of Privacy Attacks Against Machine Learning | Mohammad Yaghini, Bogdan Kulynych, Giovanni Cherubin, Carmela Troncoso | |
2019, epfl, pre-print | Evading classifiers in discrete domains with provable optimality guarantees (long version) | Bogdan Kulynych, Jamie Hayes, Nikita Samarin, Carmela Troncoso | |
2020, epfl, icij, usenix | Datashare Network: A Decentralized Privacy-Preserving Search Engine for Investigative Journalists | Kasra EdalatNejad, Wouter Lueks, Julien Pierre Martin, Soline Ledésert, Anne L’Hôte, Bruno Thomas, Laurent Girod, Carmela Troncoso | Usenix Security 2020 |
2020, epfl, usenix | VoteAgain: A scalable coercion-resistant voting system | Wouter Lueks, Iñigo Querejeta-Azurmendi, Carmela Troncoso | Usenix Security 2020 |
2020, epfl, popets | Tandem: Securing Keys by Using a Central Server While Preserving Privacy | Wouter Lueks, Brinda Hampiholi, Greg Alpár, Carmela Troncoso | PoPETs 2020 |
2020, epfl, popets, privacy | Angel or Devil? A Privacy Study of Mobile Parental Control Apps | Álvaro Feal, Paolo Calciati, Narseo Vallina-Rodriguez, Carmela Troncoso, Alessandra Gorla. | PoPETs 2020 |
2020, epfl,ndss, privacy, traffic-analysis | Encrypted DNS –> Privacy? A Traffic Analysis Perspective | Sandra Siby, Marc Juarez, Claudia Diaz, Narseo Vallina-Rodriguez, Carmela Troncoso | NDSS 2020 |
2020, epfl, fat | POTs: Protective Optimization Technologies | Rebekah Overdorf, Bogdan Kulynych, Ero Balsa, Carmela Troncoso, Seda Gurses | FAT* 2020 |
2019, epfl, metadata, leakage, padding, popets, traffic analysis | Reducing Metadata Leakage from Encrypted Files and Communication with PURBs | Kirill Nikitin, Ludovic Barman, Wouter Lueks, Matthew Underwood, Jean-Pierre Hubaux, Bryan Ford | PoPETs 2019 |
2019, code, epfl, zero-knowledge proof, zksk | zksk: A Library for Composable Zero-Knowledge Proofs [code] | Wouter Lueks, Bogdan Kulynych, Jules Fasquelle, Simon Le Bail-Collet, Carmela Troncoso | WPES 2019 |
2019, epfl, localization, privacy, usenix | On (The Lack Of) Location Privacy in Crowdsourcing Applications | Spyros Boukoros, Mathias Humbert, Stefan Katzenbeisser, Carmela Troncoso | Usenix Security 2019 |
2019, epfl, localization, privacy, s&p | Rethinking Location Privacy for Unknown Mobility Behaviors | Simon Oya, Carmela Troncoso, Fernando Pérez-González | EuroS&P 2019 |
2019, epfl, madweb | Lightnion: seamless anonymous communication from any web browser | Wouter Lueks, Matthieu Daumas, Carmela Troncoso | MADWeb 2019 |
2019, fbleau, ieee, s&p | F-BLEAU: Fast Black-box Leakage Estimation | Cherubin, Giovanni, Chatzikokolakis, Konstantinos, and Palamidessi, Catuscia | IEEE Symposium on Security and Privacy (S&P) 2019 |
2019, epfl, ieee, s&p | On the Security of Two-Round Multi-Signatures | Manu Drijvers, Kasra Edalatnejad, Bryan Ford, Eike Kiltz, Julian Loss, Gregory Neven, and Igors Stepanovs | IEEE Symposium on Security and Privacy (S&P) 2019 |
2018, epfl, machine learning, neurips | Questioning the assumptions behind fairness solutions. Critiquing and Correcting Trends in Machine Learning | Rebekah Overdorf, Bogdan Kulynych, Ero Balsa, Carmela Troncoso, Seda Gürses | NeurIPS 2018 Workshop, December 7, 2018, Montreal, Canada |
2018, epfl, neurips | Evading classifiers in discrete domains with provable optimality guarantees | Bogdan Kulynych, Jamie Hayes, Nikita Samarin, Carmela Troncoso | NeurIPS 2018 Workshop, December 7, 2018, Montreal, Canada |
2018, anonymity, epfl, ieee, networks, s&p, traffic analysis | TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer | Chen Chen , Daniele E. Asoni, Adrian Perrig, David Barrera, George Danezis, and Carmela Troncoso | IEEE EuroS&P 2018 |
2018, epfl, localization, ndss | Knock Knock, Who’s There? Membership Inference on Aggregate Location Data | Apostolos Pyrgelis, Carmela Troncoso, and Emiliano De Cristofaro | NDSS 2018 |
2017, 34c3, claimchain, code | Modern key distribution with ClaimChain [code] | Bogdan Kulynych, Marios Isaakidis, Carmela Troncoso, and George Danezis | 34c3: 34th Chaos Communication Congress 2017 |
2017, ccs, code, privacy | Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms [code] | Simon Oya, Carmela Troncoso, and Fernando Pérez-González | CCS 2017 |
2017, localization, wpes | Is Geo-Indistinguishability What You Are Looking for? | Simon Oya, Carmela Troncoso, and Fernando Pérez-González | WPES 2017 |
2017, localization, popets, privacy | What Does The Crowd Say About You? Evaluating Aggregation-based Location Privacy | Apostolos Pyrgelis, Carmela Troncoso, and Emiliano De Cristofaro | PoPETS 2017 |
2017, popets, privacy | Systematizing Decentralization and Privacy: Lessons from 15 years of research and deployments | Carmela Troncoso, Marios Isaakidis, George Danezis, and Harry Halpin | PoPETS 2017 |
2017, icde | Small Data | Oliver Kennedy, D. Richard Hipp, Stratos Idreos, Amelie Marian, Arnab Nandi, Carmela Troncoso, and Eugene Wu | ICDE 2017 |
2017, anonymity, ndss, privacy, tor | Dissecting Tor Bridges: a Security Evaluation of their Private and Public Infrastructures | Srdjan Matic, Carmela Troncoso, and Juan Caballero | NDSS 2017 |
2017, anonymity, icassp, networks | Filter design for delay-based anonymous communications | Simon Oya, Fernando Pérez-González, and Carmela Troncoso | ICASSP 2017 |
2016, anonymity, wpes | TASP: Towards Anonymity Sets that Persist | Jamie Hayes, Carmela Troncosom and George Danezis | WPES 2016 |
2016, localization, privacy, tops | Privacy Games Along Location Traces: A Game-Theoretic Framework for Optimizing Location Privacy | Reza Shokri, George Theodorakopoulos, and Carmela Troncoso | ACM Transactions on Privacy and Security (TOPS) 2016 |
2016, attack, ieee, privacy | Design of Pool Mixes Against Profiling Attacks in Real Conditions | Simon Oya, Fernando Pérez-González, and Carmela Troncoso | IEEE/ACM Transactions on Networking. 2016 |
2015, amsterdam privacy conference, award, cnil, inri, privacy | Engineering Privacy by Design Reloaded CNIL/INRIA Privacy Award | Seda Gurses, Carmela Troncoso, and Claudia Diaz | Amsterdam Privacy Conference 2015 |
2014, anonymity, ieee, traffic analysis | A Least Squares Approach to the Static Traffic Analysis of High-Latency Anonymous Communication Systems | Fernando Pérez-González, Carmela Troncoso, and Simon Oya | IEEE Transactions on Information Forensics and Security 9(9). 2014 |
2014, anonymity, networks, traffic analysis | Do Dummies Pay Off? Limits of Dummy Traffic Protection in Anonymous Communications | Simon Oya, Carmela Troncoso, and Fernando Pérez-González | Privacy Enhancing Technologies 2014 |
2014, attack, statistics, wifs | Understanding the effects of real-world behavior in statistical disclosure attacks | Simon Oya, Carmela Troncoso, and Fernando Pérez-González | WIFS 2014 |
2014, localization, privacy, wpes | Prolonging the Hide-and-Seek Game. Optimal Trajectory Privacy for Location-Based Services | George Theodorakopoulos, Reza Shokri, Carmela Troncoso, Jean-Pierre Hubaux, and Jean-Yves Le Boudec | WPES 2014 |
2013, attack, globalsip, statistics | Meet the family of statistical disclosure attacks | Simon Oya, Carmela Troncoso, and Fernando Pérez-González | GlobalSIP 2013 |
2013, ih&mmsec, keynote, statistics | Bayesian inference to evaluate information leakage in complex scenarios (Keynote talk) | Carmela Troncoso | IH&MMSec 2013 |
2013, forensics, wifs | The watchful forensic analyst. Multi-clue information fusion with background knowledge | Marco Fontani, Enrique Argones-Rua, Carmela Troncoso, and Mauro Barni | WIFS 2013 |
2013, anonymity, privacy, wpes | You cannot hide for long. de-anonymization of real-world dynamic behaviour | George Danezis and Carmela Troncoso | WPES 2013 |
2013, networks, privacy, wpes | Optimal sporadic location privacy preserving systems in presence of bandwidth constraints | Michael Herrmann, Carmela Troncoso, Claudia Diaz, and Bart Preneel | WPES 2013 |
2012, networks, obfuscation | A Metric to Evaluate Interaction Obfuscation in Online Social Networks | Ero Balsa, Carmela Troncoso, and Claudia Diaz | International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 20(6). 2012 |
2012, ccs, localization, privacy | Protecting location privacy. optimal strategy against localization attacks | Reza Shokri, George Theodorakopoulos, Carmela Troncoso, Jean-Pierre Hubaux, and Jean-Yves Le Boudec | CCS 2012 |
2012, pet, statistics | Understanding Statistical Disclosure. A Least Squares Approach | Fernando Pérez-González and Carmela Troncoso | Privacy Enhancing Technologies 2012 |
2012, ieee, obfuscation, privacy | OB-PWS. Obfuscation-Based Private Web Search | Ero Balsa, Carmela Troncoso, and Claudia Diaz | IEEE Symposium on Security and Privacy 2012 |
2012, anonymity, networks, wifs | A Least Squares approach to user profiling in pool mix-based anonymous communication systems | Fernando Pérez-González, Carmela Troncoso | WIFS 2012 |
2011, cpdp, privacy | Engineering Privacy by Design | Seda Gurses, Carmela Troncoso, and Claudia Diaz | Computers, Privacy & Data Protection (CPDP). 2011 |
2011, anonymity, computer networks 55, networks | On the difficulty of achieving anonymity for Vehicle-2-X communication | Carmela Troncoso, Enrique Costa-Montenegro, Claudia Díaz, and Stefan Schiffner | Computer Networks 55(14). 2011 |
2011, ieee, pripayd, privacy | PriPAYD. Privacy-Friendly Pay-As-You-Drive Insurance | Carmela Troncoso, George Danezis, Eleni Kosta, Josep Balasch, and Bart Preneel | IEEE Trans. Dependable Sec. Comput. 8(5). 2011 |
2011, anonymity, network, tor, usenix | PIR-Tor. Scalable Anonymous Communication Using Private Information Retrieval | Prateek Mittal, Femi G. Olumofin, Carmela Troncoso, Nikita Borisov, and Ian Goldberg | USENIX Security Symposium 2011 |
2011, award, fingerprinting, tor, wifs | Fingerprinting Tor’s hidden service log files using a timing channel Gold Award to Best Student Paper | Juan A. Elices, Fernando Pérez-González, and Carmela Troncoso | WIFS 2011 |
2010, anonymity, network, pet | Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks | Claudia Díaz, Steven J. Murdoch, and Carmela Troncoso | Privacy Enhancing Technologies 2010 |
2010, anonymity, network, pet | Drac. An Architecture for Anonymous Low-Volume Communications | George Danezis, Claudia Díaz, and Carmela Troncoso, Ben Laurie | Privacy Enhancing Technologies 2010 |
2010, privacy, usenix | PrETP. Privacy-Preserving Electronic Toll Pricing | Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, and Christophe Geuens | USENIX Security Symposium 2010 |
2010, anonimity, hostsec | Scalable Anonymous Communication with Provable Security | Prateek Mittal, Nikita Borisov, Carmela Troncoso, and Alfredo Rial | HotSec 2010 |
2010, anonymity, privacy, wpes | Unraveling an old cloak. k-anonymity for location privacy | Reza Shokri, Carmela Troncoso, Claudia Díaz, Julien Freudiger, and Jean-Pierre Hubaux | WPES 2010 |
2009, ccs, statistics, traffic analysis | The bayesian traffic analysis of mix networks | Carmela Troncoso and George Danezis | ACM Conference on Computer and Communications Security 2009 |
2009, attack, esorics | The Wisdom of Crowds. Attacks and Optimal Constructions | George Danezis, Claudia Diaz, Emilia Käsper, and Carmela Troncoso | ESORICS 2009 |
2009, pet, privacy, statistics | Vida. How to Use Bayesian Inference to De-anonymize Persistent Communications | George Danezis and Carmela Troncoso | Privacy Enhancing Technologies 2009 |
2008, esorics, steganography | A Framework for the Analysis of Mix-Based Steganographic File Systems | Claudia Diaz, Carmela Troncoso, and Bart Preneel | ESORICS 2008 |
2008, attack, pet | Perfect Matching Disclosure Attacks | Carmela Troncoso, Benedikt Gierlichs, Bart Preneel, and Ingrid Verbauwhede | Privacy Enhancing Technologies 2008 |
2008, anonymity, pet, privacy | On the Impact of Social Network Profiling on Anonymity | Claudia Diaz, Carmela Troncoso, and Andrei Serjantov | Privacy Enhancing Technologies 2008 |
2008, archive, storage, storagess | Improving secure long-term archival of digitally signed documents | Carmela Troncoso, Danny De Cock, and Bar Preneel | StorageSS 2008 |
2008, anonymity, privacy, wpes | Revisiting a combinatorial approach toward measuring anonymity | Benedikt Gierlichs, Carmela Troncoso, Claudia Diaz, Bart Preneel, and Ingrid Verbauwhede | WPES 2008 |
2007, information hiding, steganography, traffic analysis | Traffic Analysis Attacks on a Continuously-Observable Steganographic File System. | Carmela Troncoso, Claudia Diaz, Orr Dunkelman, and Bart Preneel. | Information Hiding 2007 |
2007, cryptography, database, hash, isc | Efficient Negative Databases from Cryptographic Hash Functions | George Danezis, Claudia Diaz, Sebastian Faust, Emilia Käsper, Carmela Troncoso, and Bart Preneel | ISC 2007 |
2007, attack, pet | Two-Sided Statistical Disclosure Attacks | George Danezis, Claudia Diaz, and Carmela Troncoso | Privacy Enhancing Technologies 2007 |
2007, anonymity, privacy, wpes | Does additional information always reduce anonymity? | Claudia Diaz, Carmela Troncoso, and George Danezis | WPES 2007 |
2007, privacy, wpes | PriPAYD. privacy friendly pay-as-you-drive insurance | Carmela Troncoso, George Danezis, Eleni Kosta, and Bart Preneel | WPES 2007 |