{"id":851,"date":"2020-07-22T23:05:06","date_gmt":"2020-07-22T21:05:06","guid":{"rendered":"http:\/\/wp.unil.ch\/persuasivelab\/?p=851"},"modified":"2020-11-30T09:46:40","modified_gmt":"2020-11-30T08:46:40","slug":"research-update-1","status":"publish","type":"post","link":"https:\/\/wp.unil.ch\/persuasivelab\/2020\/07\/research-update-1\/","title":{"rendered":"Summary of PETS 2020"},"content":{"rendered":"<p><b>SUMMARY OF PETS 2020<\/b><\/p>\n<p><span style=\"font-weight: 400\">I\u2019ve recently attended the <\/span><a href=\"https:\/\/petsymposium.org\/2020\/index.php\"><span style=\"font-weight: 400\">Privacy Enhancing Technologies Symposium 2020<\/span><\/a><span style=\"font-weight: 400\"> or so-called PETS. PETS is one of the leading venues for privacy research (with around 23% acceptance rate). All accepted papers get published in the <\/span><a href=\"https:\/\/content.sciendo.com\/view\/journals\/popets\/popets-overview.xml\"><span style=\"font-weight: 400\">PoPETs journal<\/span><\/a><span style=\"font-weight: 400\"> (Proceedings on PETs).<\/span><\/p>\n<p><span style=\"font-weight: 400\">Given the Covid-19 situation, almost all research conferences were organized online, where researchers can present and attend virtually!\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Even though online venues are less engaging and provide fewer networking opportunities, they still have advantages, for example, if one misses a session (e.g., in case of parallel sessions) it is possible to watch offline streams on Youtube. Needless to say that the registration fees are much cheaper and this is wonderful for young students\/researchers to attend top-tier venues.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">My purpose in writing this blog is to provide a summary of the interesting research projects that I\u2019ve seen in PETS.<\/span><\/p>\n<p><b>Keynote: PRIVACY THREATS IN INTIMATE RELATIONSHIP<\/b><\/p>\n<p><span style=\"font-weight: 400\">I am working on the project of <\/span><a href=\"https:\/\/wp.unil.ch\/persuasivelab\/2020\/07\/multiparty-privacy-conflicts-mpc\/\"><span style=\"font-weight: 400\">Multiparty Privacy Conflict (MPC)<\/span><\/a><span style=\"font-weight: 400\"> that investigates how technological interventions can deter social media users from non-consensual multimedia sharing. Such privacy conflicts can mainly happen between users who have closer relationships such as close friends or ex-partners. I attended an excellent keynote by <\/span><a href=\"https:\/\/www.karen-levy.net\/\"><span style=\"font-weight: 400\">Karen Levy<\/span><\/a><span style=\"font-weight: 400\"> from Cornell University. The keynote shares a similar motivation with the MPC project on how people with intimate relationships (e.g., parents, close families, partners, friends) can threaten each others\u2019 privacy. Given that people with intimate relationships usually share much common information, disclosure of such data can cause serious privacy risks.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">The keynote speaker identified four features (motivations) on why privacy threats could happen in intimate relationships including:\u00a0<\/span><\/p>\n<ol>\n<li><span style=\"font-weight: 400\">Personal benefits or most of the time emotional reasons such as love might trigger peers to disclose private information.\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400\">Living in the same location or sometimes sharing the same electronic device might help for privacy breach.\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400\">Power differentials such as financial dependence might allow the peers to let themselves violate the privacy of the dependent peer.\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400\">Co-owning some resources from the peer such as photos, videos, diaries, or secrets makes it easier to violate privacy.\u00a0<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400\">The speaker provided several implications for design on how to avoid such issues. The most interesting implications were:\u00a0<\/span><\/p>\n<ol>\n<li><span style=\"font-weight: 400\">Intimate monitoring is not always bad in particular for parental control (even it is required).\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400\">The information that can be transmitted visually is riskier.\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400\">Notifications of \u2018changes\u2019 in the default setting are highly sensitive. Many people do not change the default setting, but in the intimate relationship changing the default setting for privacy can create suspicion. Then technology should not share setting changes among the mates.\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400\">The relationship between mates can change over time, so the technology also should change accordingly. For example, if two people broke their relationship a social networking site such as Facebook should let those persons set their privacy settings regarding their ex-mate.<\/span><\/li>\n<li><span style=\"font-weight: 400\">IoT devices and in particular household technologies such as Smart TVs (e.g., Netflix) or smart speakers (e.g., Amazon echo) usually can be shared among people living in the same place. Such services should let users protect their privacy by having multiple accounts and having a password for each user.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400\">The content of the talk was published in the Journal of CYBERSECURITY. (<\/span><a href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/6\/1\/tyaa006\/5849222\"><span style=\"font-weight: 400\">for more details<\/span><\/a><span style=\"font-weight: 400\">)<\/span><\/p>\n<p>&#8212;-<\/p>\n<p><span style=\"font-weight: 400\">Besides the keynote talk I also noted several interesting studies:<\/span><\/p>\n<p><b>PRIVACY AT A GLANCE: The User-Centric Design of Data Exposure Visualizations for an Awareness-Raising Screensaver<\/b><\/p>\n<p><i><span style=\"font-weight: 400\">Daricia Wilkinson (Clemson University), Paritosh Bahirat (Clemson University), Moses Namara (Clemson University), Jing Lyu (Clemson University), Arwa Alsubhi (Clemson University), Jessica Qiu (Clemson University), Pamela J. Wisniewski (University of Central Florida), and Bart Knijnenburg (Clemson University)<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400\">This paper studies how visual granularity of the depicted information on smartphones will influence users&#8217; utility perception and how further obfuscating such data can help for privacy protection. Authors studied different levels of granularity (low, medium, high, very high) in the smartphone visual design.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">They found that moderate granularity offers better glanceability. It means that users can capture or perceive information in a quick way with a minimum cognitive effort. But on the other hand, they found high granularity is good for comprehension or a deeper understanding of data. As a takeaway message, less granular data can deliver more and easy to consume information. Thus, providing less information in smartphone visual design while supports utility, can be beneficial for privacy. For example, users can hide their information from adversaries who do shoulder surfing! (<\/span><a href=\"https:\/\/petsymposium.org\/2020\/files\/papers\/issue2\/popets-2020-0034.pdf\"><span style=\"font-weight: 400\">for more details<\/span><\/a><span style=\"font-weight: 400\">)<\/span><\/p>\n<p><b>WHEN SPEAKERS ARE ALL EARS: Characterizing Misactivations of IoT Smart Speakers<\/b><\/p>\n<p><i><span style=\"font-weight: 400\">Daniel J. Dubois (Northeastern University), Roman Kolcun (Imperial College London), Anna Maria Mandalari (Imperial College London), Muhammad Talha Paracha (Northeastern University), David Choffnes (Northeastern University), and Hamed Haddadi (Imperial College London)<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400\">Smart speakers such as Amazon Alexa can be miss activated due to miss-spelling or using similar keywords. For example, calling a friend called Alex might miss-activate the smart device (hearing it Alex\u2019a\u2019) and it should record part of a private conversation. This paper studied how often such incidences could happen and how it is different between different devices (e.g. Alexa vs. Siri) and different accents (e.g., UK vs. US English), and what are the keywords that can lead to miss activation.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">As a Human-Computer Interaction (HCI) researcher who always deals with human subjects to evaluate technology, it was interesting for me to see how such research questions could be addressed without involving users in the experiment.<\/span><\/p>\n<p><span style=\"font-weight: 400\">The authors located different smart speakers inside a small room and then played famous TV shows for several hours. They observed internet traffic (by network and cloud analysis) and miss activations (by camera observance). To sum, authors found such miss activations could happen frequently and may last longer. But they could not find deliberate or malicious miss activations. (<\/span><a href=\"https:\/\/petsymposium.org\/2020\/files\/papers\/issue4\/popets-2020-0070.pdf\"><span style=\"font-weight: 400\">for more details<\/span><\/a><span style=\"font-weight: 400\">)<\/span><\/p>\n<p><b>THE PRICE IS (NOT) RIGHT: Comparing Privacy in Free and Paid Apps<\/b><\/p>\n<p><i><span style=\"font-weight: 400\">Catherine Han (University of California, Berkeley), Irwin Reyes (Two Six Labs \/ International Computer Science Institute), \u00c1lvaro Feal (IMDEA Networks Institute \/ Universidad Carlos III de Madrid), Joel Reardon (University of Calgary \/ AppCensus, Inc.), Primal Wijesekera (International Computer Science Institute \/ University of California, Berkeley), Narseo Vallina-Rodriguez (IMDEA Networks Institute \/ International Computer Science Institute \/ AppCensus, Inc.), Amit Elazari (University of California, Berkeley), Kenneth A. Bamberger (University of California, Berkeley), and Serge Egelman (International Computer Science Institute \/ University of California, Berkeley \/ AppCensus, Inc.)<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400\">What do you expect from a service provider if you pay for a mobile app? The answer could be \u201cif I pay for an app I would not see any advertisement and I expect that my privacy will be better preserved by the service provider\u201d.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">The paper used a survey with 1000 respondents asking respondents to click which app (e.g., Facebook) they want to install? A free Facebook app included advertisements or a 0.99 USD paid Facebook app without advertisements. 40% of respondents preferred to download the paid version. The main reason (as expected) was removing the advertisement and then to utilize better features. 30% of respondents believed their data will be treated differently for example for tracking. In sum, they think the paid version will better protect their data and privacy.<\/span><\/p>\n<p><span style=\"font-weight: 400\">But how about the real situation? The study collected over 5000 apps on Google Play which has both free and paid versions and then scrutinized their features and privacy policies. Surprisingly in most of the cases paid versions and free versions treat similarly to user privacy and even for 4% of the apps the paid version contains more advertisement libraries that do not exist in the free version. Thus, \u201cpaying for privacy\u201d indeed is a misconception among the users (<\/span><a href=\"https:\/\/petsymposium.org\/2020\/files\/papers\/issue3\/popets-2020-0050.pdf\"><span style=\"font-weight: 400\">for more details<\/span><\/a><span style=\"font-weight: 400\">).<\/span><\/p>\n<p><span style=\"text-decoration: underline\"><span style=\"font-weight: 400\">Author: <\/span><a href=\"https:\/\/wp.unil.ch\/persuasivelab\/2020\/07\/kavous-salehzadeh-niksirat\/\"><span style=\"font-weight: 400\">Kavous SALEHZADEH NIKSIRAT<\/span><\/a><\/span><\/p>\n<pre>\u00a9 Thumbnail photo by <a href=\"https:\/\/unsplash.com\/@dtopkin1?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Dayne Topkin<\/a> on <a href=\"https:\/\/unsplash.com\/s\/photos\/privacy?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash<\/a><\/pre>\n<div id=\"gtx-trans\">\n<div class=\"gtx-trans-icon\"><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>SUMMARY OF PETS 2020 I\u2019ve recently attended the Privacy Enhancing Technologies Symposium 2020 or so-called PETS. PETS is one of the leading venues for privacy research (with around 23% acceptance &hellip; <\/p>\n","protected":false},"author":1002070,"featured_media":1053,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[22],"tags":[],"class_list":{"0":"post-851","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-research-update"},"_links":{"self":[{"href":"https:\/\/wp.unil.ch\/persuasivelab\/wp-json\/wp\/v2\/posts\/851","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wp.unil.ch\/persuasivelab\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wp.unil.ch\/persuasivelab\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wp.unil.ch\/persuasivelab\/wp-json\/wp\/v2\/users\/1002070"}],"replies":[{"embeddable":true,"href":"https:\/\/wp.unil.ch\/persuasivelab\/wp-json\/wp\/v2\/comments?post=851"}],"version-history":[{"count":0,"href":"https:\/\/wp.unil.ch\/persuasivelab\/wp-json\/wp\/v2\/posts\/851\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wp.unil.ch\/persuasivelab\/wp-json\/wp\/v2\/media\/1053"}],"wp:attachment":[{"href":"https:\/\/wp.unil.ch\/persuasivelab\/wp-json\/wp\/v2\/media?parent=851"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wp.unil.ch\/persuasivelab\/wp-json\/wp\/v2\/categories?post=851"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wp.unil.ch\/persuasivelab\/wp-json\/wp\/v2\/tags?post=851"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}