Επιστημονικά άρθρα

Η παρούσα σελίδα παρέχει τη δυνατότητα εύρεσης επιστημονικών άρθρων που αφορούν την προστασία της ιδιωτικότητας και των προσωπικών δεδομένων. Τα άρθρα αυτά έχουν δημοσιευτεί σε έγκριτα επιστημονικά περιοδικά ή συνέδρια και είναι ελεύθερης πρόσβασης. Σκοπός της σελίδας είναι η διάδοση χρήσιμων πληροφοριών προς επαγγελματίες και ερευνητές, με γνώμονα τις τρέχουσες επιστημονικές εξελίξεις.

Επισημαίνεται ότι η Αρχή δεν φέρει καμία ευθύνη για το περιεχόμενο των δημοσιευμένων άρθρων και δεν υιοθετεί τις απόψεις που ενδεχομένως εκφράζονται σε αυτά. Επίσης, η παρεχόμενη λίστα άρθρων δεν είναι εξαντλητική και δεν πρέπει να εκλαμβάνεται ως πλήρης καταγραφή της σχετικής επιστημονικής βιβλιογραφίας.

Κατάλογος με στοιχεία όλων των άρθρων, ανά έτος, είναι διαθέσιμος εδώ.

 

Echoes of Privacy: Uncovering the Profiling Practices of Voice Assistants

Επιστημονικές Δημοσιεύσεις
Mon, 10 Nov 2025 11:25:22 +0200

Many companies, including Google, Amazon, and Apple, offer voice assistants as a convenient solution for answering general voice queries and accessing their services. These voice assistants have gained popularity and can be easily accessed through various smart devices such as smartphones, smart speakers, smartwatches, and an increasing array of other devices. However, this convenience comes with potential privacy risks. For instance, while companies vaguely mention in their privacy policies that they may use voice interactions for user profiling, it remains unclear to what extent this profiling occurs and whether voice interactions pose greater privacy risks compared to other interaction modalities. In this paper, we conduct 1171 experiments involving 24530 queries with different personas and interaction modalities during 20 months to characterize how the three most popular voice assistants profile their users. We analyze factors such as labels assigned to users, their accuracy, the time taken to assign these labels, differences between voice and web interactions, and the effectiveness of profiling remediation tools offered by each voice assistant. Our findings reveal that profiling can happen without interaction, can be incorrect and inconsistent at times, may take several days or weeks to change, and is affected by the interaction modality.

 

Αρχείο στη βιβλιοθήκη

Σύνδεσμος στην εξωτερική πηγή:   https://doi.org/10.56553/popets-2025-0050 

 

A False Sense of Privacy: Towards a Reliable Evaluation Methodology for the Anonymization of Biometric Data

Επιστημονικές Δημοσιεύσεις
Tue, 03 Jun 2025 14:14:08 +0300

In this paper, we assess the state-of-the-art methods used to evaluate the performance of anonymization techniques for facial images and for gait patterns. We demonstrate that the state-of-the-art evaluation methods have serious and frequent shortcomings. In particular, we find that the underlying assumptions of the state-of-the-art are quite unwarranted. State-of-the-art methods generally assume a difficult recognition scenario and thus a weak adversary. However, that assumption causes state-of-the-art evaluations to grossly overestimate the performance of the anonymization. Therefore, we propose a strong adversary which is aware of the anonymization in place. This adversary model implements an appropriate measure of anonymization performance.

 

Αρχείο στη βιβλιοθήκη

Σύνδεσμος στην εξωτερική πηγή: https://doi.org/10.56553/popets-2024-0008   

SoK: Data Privacy in Virtual Reality

Επιστημονικές Δημοσιεύσεις
Tue, 03 Jun 2025 14:10:46 +0300

The adoption of virtual reality (VR) technologies has rapidly gained momentum in recent years as companies around the world begin to position the so-called Metaverse as the next major medium for accessing and interacting with the internet. While consumers have become accustomed to a degree of data harvesting on the web, the real-time nature of data sharing in the Metaverse indicates that privacy concerns are likely to be even more prevalent in the new Web 3.0. This paper aims to systematize knowledge on the landscape of VR privacy threats and countermeasures by proposing a comprehensive taxonomy of data attributes, protections, and adversaries based on the study of 74 collected publications. We complement our qualitative discussion with a statistical analysis of the risk associated with various data sources inherent to VR in consideration of the known attacks and defenses.

 

Αρχείο στη βιβλιοθήκη

Σύνδεσμος στην εξωτερική πηγή: https://doi.org/10.56553/popets-2024-0003 

A large-scale study of cookie banner interaction tools and their impact on users privacy

Επιστημονικές Δημοσιεύσεις
Tue, 03 Jun 2025 14:03:34 +0300

Cookie notices (or cookie banners) are a popular mechanism for websites to provide (European) Internet users a tool to choose which cookies the site may set. In this work, we perform a large-scale measurement study comparing the effectiveness of extensions for cookie banner interaction. We configured the extensions to express different privacy choices (e.g., accepting all cookies, accepting functional cookies, or rejecting all cookies) to understand their capabilities to execute a user's preferences. The results show statistically significant differences in which cookies are set, how many of them are set, and which types are set. Extensions for "cookie banner interaction" can effectively reduce the number of set cookies compared to no interaction with the banners. However, all extensions increase the tracking requests significantly except when rejecting all cookies. 

Αρχείο στη βιβλιοθήκη

Σύνδεσμος στην εξωτερική πηγή: https://doi.org/10.56553/popets-2024-0002 

Bugs in our pocket: The risks of client-side scanning

Επιστημονικές Δημοσιεύσεις
Wed, 28 May 2025 08:39:43 +0300

Our increasing reliance on digital technology for personal, economic, and government affairs has made it essential to secure the communications and devices of private citizens, businesses, and governments. This has led to pervasive use of cryptography across society. Despite its evident advantages, law enforcement and national security agencies have argued that the spread of cryptography has hindered access to evidence and intelligence. Some in industry and government now advocate a new technology to access targeted data: client-side scanning (CSS). Instead of weakening encryption or providing law enforcement with backdoor keys to decrypt communications, CSS would enable on-device analysis of data in the clear. If targeted information were detected, its existence and, potentially, its source would be revealed to the agencies; otherwise, little or no information would leave the client device. Its proponents claim that CSS is a solution to the encryption versus public safety debate: it offers privacy - in the sense of unimpeded end-to-end encryption - and the ability to successfully investigate serious crime. In this paper, we argue that CSS neither guarantees efficacious crime prevention nor prevents surveillance. Indeed, the effect is the opposite. CSS by its nature creates serious security and privacy risks for all society, while the assistance it can provide for law enforcement is at best problematic. There are multiple ways in which CSS can fail, can be evaded, and can be abused.

 

Αρχείο στη βιβλιοθήκη

Σύνδεσμος στην εξωτερική πηγή: https://doi.org/10.1093/cybsec/tyad020