Carmela Troncoso

Orcid: 0000-0002-2374-2248

Affiliations:
  • EPFL, Lausanne, Switzerland


According to our database1, Carmela Troncoso authored at least 115 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Bugs in our pockets: the risks of client-side scanning.
J. Cybersecur., January, 2024

Helium: Scalable MPC among Lightweight Participants and under Churn.
IACR Cryptol. ePrint Arch., 2024

Neural Exec: Learning (and Learning from) Execution Triggers for Prompt Injection Attacks.
CoRR, 2024

On the Conflict of Robustness and Learning in Collaborative Machine Learning.
CoRR, 2024

The Fundamental Limits of Least-Privilege Learning.
CoRR, 2024

2023
Evaluating practical QUIC website fingerprinting defenses for the masses.
Proc. Priv. Enhancing Technol., October, 2023

Private Collection Matching Protocols.
Proc. Priv. Enhancing Technol., July, 2023

PELTA - Shielding Multiparty-FHE against Malicious Adversaries.
IACR Cryptol. ePrint Arch., 2023

Janus: Safe Biometric Deduplication for Humanitarian Aid Distribution.
CoRR, 2023

Can Decentralized Learning be more robust than Federated Learning?
CoRR, 2023

Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data.
CoRR, 2023

Not Yet Another Digital ID: Privacy-Preserving Humanitarian Aid Distribution.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

On the (In)security of Peer-to-Peer Decentralized Machine Learning.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Transferable Adversarial Robustness for Categorical Data via Universal Robust Embeddings.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Adversarial Robustness for Tabular Data through Cost and Utility Awareness.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Arbitrary Decisions Are a Hidden Cost of Differentially Private Training.
Proceedings of the 2nd European Workshop on Algorithmic Fairness, 2023

Bayes Security: A Not So Average Metric.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023

CookieGraph: Understanding and Detecting First-Party Tracking Cookies.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Poster: Verifiable Encodings for Maliciously-Secure Homomorphic Encryption Evaluation.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Disparate Vulnerability to Membership Inference Attacks.
Proc. Priv. Enhancing Technol., 2022

Why the search for a privacy-preserving data sharing mechanism is failing.
Nat. Comput. Sci., 2022

COOKIEGRAPH: Measuring and Countering First-Party Tracking Cookies.
CoRR, 2022

Private Set Matching Protocols.
CoRR, 2022

On the Privacy of Decentralized Machine Learning.
CoRR, 2022

This is not the padding you are looking for! On the ineffectiveness of QUIC PADDING against website fingerprinting.
CoRR, 2022

Deploying decentralized, privacy-preserving proximity tracing.
Commun. ACM, 2022

Synthetic Data - Anonymisation Groundhog Day.
Proceedings of the 31st USENIX Security Symposium, 2022

WebGraph: Capturing Advertising and Tracking Information Flows for Robust Blocking.
Proceedings of the 31st USENIX Security Symposium, 2022

Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
CrowdNotifier: Decentralized Privacy-Preserving Presence Tracing.
Proc. Priv. Enhancing Technol., 2021

Toward a Common Performance and Effectiveness Terminology for Digital Proximity Tracing Applications.
Frontiers Digit. Health, 2021

Preliminary Analysis of Potential Harms in the Luca Tracing System.
CoRR, 2021

2020
Tandem: Securing Keys by Using a Central Server While Preserving Privacy.
Proc. Priv. Enhancing Technol., 2020

Angel or Devil? A Privacy Study of Mobile Parental Control Apps.
Proc. Priv. Enhancing Technol., 2020

Measuring Membership Privacy on Aggregate Location Time-Series.
Proc. ACM Meas. Anal. Comput. Syst., 2020

Decentralized Privacy-Preserving Proximity Tracing.
IEEE Data Eng. Bull., 2020

Towards a common performance and effectiveness terminology for digital proximity tracing applications.
CoRR, 2020

Synthetic Data - A Privacy Mirage.
CoRR, 2020

The Bayes Security Measure.
CoRR, 2020

Privacy Engineering Meets Software Engineering. On the Challenges of Engineering Privacy ByDesign.
CoRR, 2020

Datashare: A Decentralized Privacy-Preserving Search Engine for Investigative Journalists.
CoRR, 2020

Decentralized Privacy-Preserving Proximity Tracing.
CoRR, 2020

VoteAgain: A scalable coercion-resistant voting system.
Proceedings of the 29th USENIX Security Symposium, 2020

DatashareNetwork: A Decentralized Privacy-Preserving Search Engine for Investigative Journalists.
Proceedings of the 29th USENIX Security Symposium, 2020

Encrypted DNS -> Privacy? A Traffic Analysis Perspective.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

GenoShare: Supporting Privacy-Informed Decisions for Sharing Individual-Level Genetic Data.
Proceedings of the Digital Personalized Health and Medicine - Proceedings of MIE 2020, Medical Informatics Europe, Geneva, Switzerland, April 28, 2020

POTs: protective optimization technologies.
Proceedings of the FAT* '20: Conference on Fairness, 2020

2019
Editors' Introduction.
Proc. Priv. Enhancing Technol., 2019

Disparate Vulnerability: on the Unfairness of Privacy Attacks Against Machine Learning.
CoRR, 2019

Under the Hood of Membership Inference Attacks on Aggregate Location Time-Series.
CoRR, 2019

Why Johnny Can't Develop Mobile Crowdsourcing Applications with Location Privacy.
CoRR, 2019

zksk: A Library for Composable Zero-Knowledge Proofs.
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 2019

On (The Lack Of) Location Privacy in Crowdsourcing Applications.
Proceedings of the 28th USENIX Security Symposium, 2019

Rethinking Location Privacy for Unknown Mobility Behaviors.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

Surveillance and privacy in the public and private sectors: panel.
Proceedings of the Symposium on Computer Science and Law, 2019

PPML '19: Privacy Preserving Machine Learning.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Editors' Introduction.
Proc. Priv. Enhancing Technol., 2018

Questioning the assumptions behind fairness solutions.
CoRR, 2018

Evading classifiers in discrete domains with provable optimality guarantees.
CoRR, 2018

A Tabula Rasa Approach to Sporadic Location Privacy.
CoRR, 2018

Under the Underground: Predicting Private Interactions in Underground Forums.
CoRR, 2018

ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging.
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018

Knock Knock, Who's There? Membership Inference on Aggregate Location Data.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

2017
Privacy Games Along Location Traces: A Game-Theoretic Framework for Optimizing Location Privacy.
ACM Trans. Priv. Secur., 2017

Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments.
Proc. Priv. Enhancing Technol., 2017

What Does The Crowd Say About You? Evaluating Aggregation-based Location Privacy.
Proc. Priv. Enhancing Technol., 2017

Feature importance scores and lossless feature pruning using Banzhaf power indices.
CoRR, 2017

On the the design of optimal location privacy-preserving mechanisms.
CoRR, 2017

ClaimChain: Decentralized Public Key Infrastructure.
CoRR, 2017

Is Geo-Indistinguishability What You Are Looking for?
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

Dissecting Tor Bridges: A Security Evaluation of their Private and Public Infrastructures.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Small Data.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

Filter design for delay-based anonymous communications.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Design of Pool Mixes Against Profiling Attacks in Real Conditions.
IEEE/ACM Trans. Netw., 2016

TASP: Towards Anonymity Sets that Persist.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

2014
A Least Squares Approach to the Static Traffic Analysis of High-Latency Anonymous Communication Systems.
IEEE Trans. Inf. Forensics Secur., 2014

Prolonging the Hide-and-Seek Game: Optimal Trajectory Privacy for Location-Based Services.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Understanding the effects of real-world behavior in statistical disclosure attacks.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

Do Dummies Pay Off? Limits of Dummy Traffic Protection in Anonymous Communications.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

PRIPARE: A New Vision on Engineering Privacy and Security by Design.
Proceedings of the Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, 2014

2013
Optimal sporadic location privacy preserving systems in presence of bandwidth constraints.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

You cannot hide for long: de-anonymization of real-world dynamic behaviour.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

The watchful forensic analyst: Multi-clue information fusion with background knowledge.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013

Bayesian inference to evaluate information leakage in complex scenarios.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

Meet the family of statistical disclosure attacks.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013

2012
A Metric to Evaluate Interaction Obfuscation in Online Social Networks.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2012

A Least Squares approach to user profiling in pool mix-based anonymous communication systems.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

OB-PWS: Obfuscation-Based Private Web Search.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Understanding Statistical Disclosure: A Least Squares Approach.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

Protecting location privacy: optimal strategy against localization attacks.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Design and Analysis Methods for Privacy Technologies (Ontwerp- en analysemethodes van privacytechnologieën).
PhD thesis, 2011

PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance.
IEEE Trans. Dependable Secur. Comput., 2011

On the difficulty of achieving anonymity for Vehicle-2-X communication.
Comput. Networks, 2011

Fingerprinting Tor's hidden service log files using a timing channel.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval.
Proceedings of the 20th USENIX Security Symposium, 2011

2010
Unraveling an old cloak: k-anonymity for location privacy.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

Scalable Anonymous Communication with Provable Security.
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010

PrETP: Privacy-Preserving Electronic Toll Pricing.
Proceedings of the 19th USENIX Security Symposium, 2010

Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010

Drac: An Architecture for Anonymous Low-Volume Communications.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010

2009
Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications.
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009

The Wisdom of Crowds: Attacks and Optimal Constructions.
Proceedings of the Computer Security, 2009

The bayesian traffic analysis of mix networks.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Revisiting a combinatorial approach toward measuring anonymity.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

Improving secure long-term archival of digitally signed documents.
Proceedings of the 2008 ACM Workshop On Storage Security And Survivability, 2008

Perfect Matching Disclosure Attacks.
Proceedings of the Privacy Enhancing Technologies, 2008

On the Impact of Social Network Profiling on Anonymity.
Proceedings of the Privacy Enhancing Technologies, 2008

A Framework for the Analysis of Mix-Based Steganographic File Systems.
Proceedings of the Computer Security, 2008

2007
Pripayd: privacy friendly pay-as-you-drive insurance.
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007

Does additional information always reduce anonymity?
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007

Two-Sided Statistical Disclosure Attack.
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007

Efficient Negative Databases from Cryptographic Hash Functions.
Proceedings of the Information Security, 10th International Conference, 2007

Traffic Analysis Attacks on a Continuously-Observable Steganographic File System.
Proceedings of the Information Hiding, 9th International Workshop, 2007


  Loading...