SoK Papers in Privacy Enhancing Technologies Symposium

SoK Authors · Frequently Asked Questions · Other Conferences with SoK

Other Venues: All · Oakland · Euro S&P · USENIX

2026
SoK: Can Fully Homomorphic Encryption Support General AI Computation? A Functional and Cost AnalysisJiaqi Xue, Xin Xin, Wei Zhang, Mengxin Zheng, Qianqian Song, Minxuan Zhou, Yushun Dong, Dongjie Wang, Xun Chen, Jiafeng Xie, Liqiang Wang, David Mohaisen, Hongyi Wu, Qian Lou
2025
SoK: (Un)usable Privacy: the Lack of Overlap between Privacy-Aware Sensing and Usable Privacy ResearchYasha Iravantchi, Pardis Emami-Naeini, Alanson Sample
SoK: Computational and Distributed Differential Privacy for MPCFredrik Meisingseth
SoK: Descriptive Statistics Under Local Differential PrivacyRené Raab, Pascal Berrang, Paul Gerhart, Dominique Schröder
SoK: The Spectre of Surveillance and Censorship in Future Internet ArchitecturesMichael Wrana, Diogo Barradas, N. Asokan
SoK: Usability Studies in Differential PrivacyOnyinye Dibia, Prianka Bhattacharjee, Brad Stenger, Steven Baldasty, Mako Bates, Ivoline Ngong, Yuanyuan Feng, Joseph P. Near
SoK: Web Authentication and Recovery in the Age of End-to-End EncryptionJenny Blessing, Daniel Hugenroth, Ross J. Anderson, Alastair R. Beresford
2024
SoK: Can Trajectory Generation Combine Privacy and Utility?Erik Buchholz, Sharif Abuadbba, Shuo Wang, Surya Nepal, Salil S. Kanhere
SoK: Data Privacy in Virtual RealityGonzalo Munilla Garrido, Vivek Nair, Dawn Song
SoK: Metadata-Protecting Communication SystemsSajin Sasy, Ian Goldberg
SoK: Provably Secure Onion Routing against a Global AdversaryPhilip Scherer, Christiane Weis, Thorsten Strufe
SoK: Secure Human-centered Wireless SensingWei Sun, Tingjun Chen, Neil Gong
SoK: Trusting Self-Sovereign IdentityEvan Krul, Hye-young Paik, Sushmita Ruj, Salil S. Kanhere
SoK: Wildest Dreams: Reproducible Research in Privacy-preserving Neural Network TrainingTanveer Khan, Mindaugas Budzys, Khoa Nguyen, Antonis Michalas
2023
SoK: Content Moderation for End-to-End EncryptionSarah Scheffler, Jonathan Mayer
SoK: Differentially Private Publication of Trajectory DataÀlex Miranda-Pascual, Patricia Guerra-Balboa, Javier Parra-Arnau, Jordi Forné, Thorsten Strufe
SoK: Managing risks of linkage attacks on data privacyJovan Powar, Alastair R. Beresford
SoK: Secure Aggregation based on cryptographic schemes for Federated LearningMohamad Mansouri, Melek Onen, Wafa Ben Jaballah, Mauro Conti
SoK: Secure E-Voting with Everlasting PrivacyThomas Haines, Rafieh Mosaheb, Johannes Mueller, Ivan Pryvalov
2022
SoK: Assumptions underlying Cryptocurrency Deanonymizations - A Taxonomy for Scientific Experts and Legal PractitionersDominic Deuber, Viktoria Ronge, Christian Rückert
SoK: Cryptographic Confidentiality of Data on Mobile DevicesMaximilian Zinkus, Tushar M. Jois, Matthew Green
SoK: Plausibly Deniable StorageChen Chen, Xiao Liang, Bogdan Carbunar, Radu Sion
SoK: Privacy-enhancing Smart Home HubsIgor Zavalyshyn, Axel Legay, Annanda Rath, Etienne Riviere
SoK: SCT Auditing in Certificate TransparencySarah Meiklejohn, Joe DeBlasio, Devon O'Brien, Chris Thompson, Kevin Yeo, Emily Stark
SoK: TEE-assisted Confidential Smart ContractRujia Li, Qin Wang, Qi Wang, David Galindo, Mark Ryan
2021
SoK: Efficient Privacy-preserving ClusteringAditya Hegde, Helen Möllering, Thomas Schneider, Hossein Yalame
SoK: Managing Longitudinal Privacy of Publicly Shared Personal Online DataTheodor Schnitzler, Shujaat Mirza, Markus Dürmuth, Christina Pöpper
SoK: Privacy-Preserving Collaborative Tree-based Model LearningSylvain Chatel, Apostolos Pyrgelis, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux
SoK: Privacy-Preserving Computation Techniques for Deep LearningJosé Cabrero-Holgueras, Sergio Pastrana
SoK: Privacy-Preserving Reputation SystemsStan Gurtler, Ian Goldberg
2020
SoK: Anatomy of Data BreachesHamza Saleem, Muhammad Naveed
SoK: Differential privaciesDamien Desfontaines, Balázs Pejó
2019
SoK: Modular and Efficient Private Decision Tree EvaluationÁgnes Kiss, Masoud Naderpour, Jian Liu, N. Asokan, Thomas Schneider