8.30–8.35 Opening
8.35–10.15 Session 1: Social Systems and Notifications

Blind De-anonymization Attacks using Social Networks [Short]
Wei-Han Lee (Princeton University), Changchang Liu (Princeton University), Shouling Ji (Zhejiang University and Georgia Tech), Prateek Mittal (Princeton University), and Ruby Lee (Princeton University)
AnNotify: A Private Notification Service
Ania Piotrowska (University College London), Jamie Hayes (University College London), Nethanel Gelernter(College of Management, Academic Studies), George Danezis (University College London), and Amir Herzberg (Bar Ilan University)
Notify Assist: Balancing Privacy and Convenience in Delivery of Notifications on Android Smartphones [Short]
Raj Vardhan (McAfee), Ameya Sanzgiri (University at Buffalo), Dattatraya Kulkarni (McAfee), and Piyush Joshi (McAfee)
SOMAR: Privacy-Preserving SOcial Media Advertising ARchitecture - Or: How Not To Leave Your Personal Data Around
Daniela Becker (Robert Bosch LLC, RTC, USA), Jorge Guajardo Merchan (Robert Bosch LLC, RTC, USA), and Karl-Heinz Zimmermann (Hamburg University of Technology)
Is Bob Sending Mixed Signals?
Michael Schliep (University of Minnesota), Ian Kariniemi (University of Minnesota), and Nicholas Hopper (University of Minnesota)
10.15–10.45 Coffee Break
10.45–12.15 Session 2: Privacy Preservation

BIOS ORAM: Improved Privacy-Preserving Data Access for Parameterized Outsourced Storage
Michael Goodrich (Univ. of California, Irvine)
Mix-ORAM : Using delegated shuffles
Raphael Toledo (University College London), George Danezis (University College London), and Isao Echizen (National Institute of Informatics)
Adaptive Statistical Learning with Bayesian Differential Privacy
Jun Zhao (Carnegie Mellon University)
SweetDroid: Toward a Context-Sensitive Privacy Policy Enforcement Framework for Android OS
Xin Chen (Didi Labs), Heqing Huang (IBM TJ Watson), Sencun Zhu (Penn State Univ.), Qing Li (Symantec Inc.), and Quanlong Guan (Jinan University)
12.15–13.45 Lunch
13.45–15.15 Session 3: Privacy-preserving Computation

Private Set Projections & Variants
Xavier Carpent (UC Irvine), Sky Faber (UC Irvine), Tomas Sander (HPL Princeton), and Gene Tsudik (UC Irvine)
Public Accountability vs. Secret Laws: Can They Coexist? (A Cryptographic Proposal)
Shafi Goldwasser (MIT and Weizmann) and Sunoo Park (MIT)
A Framework of Privacy Preserving Anomaly Detection: Providing Traceability without Big Brother
Hiromi Arai (NICT), Keita Emura(NICT), and Takuya Hayashi (Kobe University)
Using Secure Graph Algorithms for the Privacy-Preserving Identification of Optimal Bartering Opportunities
Stefan Wueller (RWTH Aachen University), Michael Vu (RWTH Aachen University), Ulrike Meyer (RWTH Aachen University), and Susanne Wetzel (Stevens Institute of Technology)
15.15–15.45 Coffee Break
15.45–17.25 Session 4: Probing, Fingerprinting, and other Deanonymization

Using EEG-Based BCI Devices to Subliminally Probe for Private Information [Short]
Mario Frank ( UC Berkeley, Department of Electrical Engineering and Computer Science), Tiffany Hwu (UC Irvine, School of Cognitive Sciences), Sakshi Jain ( LinkedIn Corporation), Robert T Knight ( UC Berkeley, Department of Psychology), Ivan Martinovic (University of Oxford, Department of Computer Science), Prateek Mittal (Princeton University), Daniele Perito ( UC Berkeley, Department of Electrical Engineering and Computer Science), Ivo Sluganovic (University of Oxford), and Dawn Song ( UC Berkeley, Department of Electrical Engineering and Computer Science)
Is Geo-Indistinguishability what you are looking for? [Short]
Simon Oya (University of Vigo), Carmela Troncoso (IMDEA Software Institute), and Fernando Perez-Gonzalez (University of Vigo)
Onions in the Crosshairs: When The Man really is out to get you
Aaron D. Jaggard (NRL) and Paul Syverson (NRL)
Third-party Risks with Online Advertising - or - How Alice Can Buy Ads to Track Bob on a Budget
Paul Vines (University of Washington), Franziska Roesner (University of Washington), and Tadayoshi Kohno (University of Washington)
Analysis of Fingerprinting Techniques for Tor Hidden Services
Andriy Panchenko (University of Luxembourg), Asya Mitseva (University of Luxembourg), Martin Henze (RWTH Aachen University), Fabian Lanze (Huf Secure Mobile GmbH), Klaus Wehrle (RWTH Aachen University), and Thomas Engel (University of Luxembourg)