{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T12:55:24Z","timestamp":1776084924945,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":87,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2045861"],"award-info":[{"award-number":["2045861"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["HR0011-17- C0047"],"award-info":[{"award-number":["HR0011-17- C0047"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3560651","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"3223-3237","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Ibex"],"prefix":"10.1145","author":[{"given":"Ke","family":"Zhong","sequence":"first","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"given":"Yiping","family":"Ma","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"given":"Sebastian","family":"Angel","sequence":"additional","affiliation":[{"name":"University of Pennsylvania &amp; Microsoft Research, Philadelphia, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2010. Cookie Synching. https:\/\/www.admonsters.com\/cookie-synching\/. (2010).  2010. Cookie Synching. https:\/\/www.admonsters.com\/cookie-synching\/. (2010)."},{"key":"e_1_3_2_1_2_1","unstructured":"2017. Find Out How You Stack Up to New Industry Benchmarks for Mobile Page Speed. https:\/\/think.storage.googleapis.com\/docs\/mobile-page-speed-newindustry-benchmarks.pdf. (2017).  2017. Find Out How You Stack Up to New Industry Benchmarks for Mobile Page Speed. https:\/\/think.storage.googleapis.com\/docs\/mobile-page-speed-newindustry-benchmarks.pdf. (2017)."},{"key":"e_1_3_2_1_3_1","unstructured":"2019. Here's what we learned about page speed. https:\/\/backlinko.com\/page-speed-stats. (2019).  2019. Here's what we learned about page speed. https:\/\/backlinko.com\/page-speed-stats. (2019)."},{"key":"e_1_3_2_1_4_1","unstructured":"2019. wrk2: a HTTP benchmarking tool based mostly on wrk. https:\/\/github.com\/giltene\/wrk2. (2019).  2019. wrk2: a HTTP benchmarking tool based mostly on wrk. https:\/\/github.com\/giltene\/wrk2. (2019)."},{"key":"e_1_3_2_1_5_1","unstructured":"2020. Cookie Matching. https:\/\/developers.google.com\/authorized-buyers\/rtb\/cookie-guide. (2020).  2020. Cookie Matching. https:\/\/developers.google.com\/authorized-buyers\/rtb\/cookie-guide. (2020)."},{"key":"e_1_3_2_1_6_1","volume-title":"Number of active advertisers on Facebook from 1st quarter 2016 to 3rd quarter","year":"2020","unstructured":"2020. Number of active advertisers on Facebook from 1st quarter 2016 to 3rd quarter 2020 . https:\/\/www.statista.com\/statistics\/778191\/active-facebook-advertisers\/. (2020). 2020. Number of active advertisers on Facebook from 1st quarter 2016 to 3rd quarter 2020. https:\/\/www.statista.com\/statistics\/778191\/active-facebook-advertisers\/. (2020)."},{"key":"e_1_3_2_1_7_1","unstructured":"2020. The GNU Multiple Precision Arithmetic Library. https:\/\/gmplib.org\/gmp6.2. (2020).  2020. The GNU Multiple Precision Arithmetic Library. https:\/\/gmplib.org\/gmp6.2. (2020)."},{"key":"e_1_3_2_1_8_1","unstructured":"2021. Attribution Reporting API. https:\/\/github.com\/WICG\/conversion-measurement-api. (2021).  2021. Attribution Reporting API. https:\/\/github.com\/WICG\/conversion-measurement-api. (2021)."},{"key":"e_1_3_2_1_9_1","unstructured":"2021. Back to Basics: What is Header Bidding? https:\/\/www.lotame.com\/back-basics-header-bidding\/. (2021).  2021. Back to Basics: What is Header Bidding? https:\/\/www.lotame.com\/back-basics-header-bidding\/. (2021)."},{"key":"e_1_3_2_1_10_1","unstructured":"2021. FLoC Origin Trial & Clustering. https:\/\/www.chromium.org\/Home\/chromium-privacy\/privacy-sandbox\/floc. (2021).  2021. FLoC Origin Trial & Clustering. https:\/\/www.chromium.org\/Home\/chromium-privacy\/privacy-sandbox\/floc. (2021)."},{"key":"e_1_3_2_1_11_1","unstructured":"2021. iCloud Private Relay Overview. https: \/\/www.apple.com\/icloud\/docs\/iCloud_Private_Relay_Overview_Dec2021.pdf. (2021).  2021. iCloud Private Relay Overview. https: \/\/www.apple.com\/icloud\/docs\/iCloud_Private_Relay_Overview_Dec2021.pdf. (2021)."},{"key":"e_1_3_2_1_12_1","unstructured":"2021. Masked Learning Aggregation and Reporting worKflow (Masked LARK). https:\/\/github.com\/WICG\/privacy-preservingads\/blob\/main\/MaskedLARK.md. (2021).  2021. Masked Learning Aggregation and Reporting worKflow (Masked LARK). https:\/\/github.com\/WICG\/privacy-preservingads\/blob\/main\/MaskedLARK.md. (2021)."},{"key":"e_1_3_2_1_13_1","unstructured":"2021. Multi-party Computation of Ads on the Web (MaCAW). https:\/\/github.com\/WICG\/privacy-preserving-ads\/blob\/main\/MACAW.md. (2021).  2021. Multi-party Computation of Ads on the Web (MaCAW). https:\/\/github.com\/WICG\/privacy-preserving-ads\/blob\/main\/MACAW.md. (2021)."},{"key":"e_1_3_2_1_14_1","unstructured":"2021. PARAKEET. https:\/\/github.com\/WICG\/privacy-preserving-ads\/blob\/main\/Parakeet.md. (2021).  2021. PARAKEET. https:\/\/github.com\/WICG\/privacy-preserving-ads\/blob\/main\/Parakeet.md. (2021)."},{"key":"e_1_3_2_1_15_1","unstructured":"2021. Privacy analysis of FLoC. https:\/\/blog.mozilla.org\/en\/mozilla\/privacy-analysis-of-floc\/. (2021).  2021. Privacy analysis of FLoC. https:\/\/blog.mozilla.org\/en\/mozilla\/privacy-analysis-of-floc\/. (2021)."},{"key":"e_1_3_2_1_16_1","unstructured":"2021. Private aggregation. https:\/\/github.com\/WICG\/conversion-measurementapi\/blob\/main\/SERVICE.md. (2021).  2021. Private aggregation. https:\/\/github.com\/WICG\/conversion-measurementapi\/blob\/main\/SERVICE.md. (2021)."},{"key":"e_1_3_2_1_17_1","unstructured":"2022. About PageSpeed Insights. https:\/\/developers.google.com\/speed\/docs\/insights\/v5\/about. (2022).  2022. About PageSpeed Insights. https:\/\/developers.google.com\/speed\/docs\/insights\/v5\/about. (2022)."},{"key":"e_1_3_2_1_18_1","unstructured":"2022. Aggregation Service for the Attribution Reporting API. https:\/\/github.com\/WICG\/attribution-reportingapi\/blob\/main\/AGGREGATION_SERVICE_TEE.md. (2022).  2022. Aggregation Service for the Attribution Reporting API. https:\/\/github.com\/WICG\/attribution-reportingapi\/blob\/main\/AGGREGATION_SERVICE_TEE.md. (2022)."},{"key":"e_1_3_2_1_19_1","unstructured":"2022. Divvi Up: A privacy-respecting system for aggregate statistics. https:\/\/divviup.org\/. (2022).  2022. Divvi Up: A privacy-respecting system for aggregate statistics. https:\/\/divviup.org\/. (2022)."},{"key":"e_1_3_2_1_20_1","unstructured":"2022. EMP sh2pc. https:\/\/github.com\/emp-toolkit\/emp-sh2pc. (2022).  2022. EMP sh2pc. https:\/\/github.com\/emp-toolkit\/emp-sh2pc. (2022)."},{"key":"e_1_3_2_1_21_1","unstructured":"2022. FLEDGE API. https:\/\/developer.chrome.com\/docs\/privacy-sandbox\/fledge\/. (2022).  2022. FLEDGE API. https:\/\/developer.chrome.com\/docs\/privacy-sandbox\/fledge\/. (2022)."},{"key":"e_1_3_2_1_22_1","unstructured":"2022. Google Has a New Plan to Kill Cookies. People Are Still Mad. https:\/\/www.wired.co.uk\/article\/google-floc-cookies-chrome-topics. (2022).  2022. Google Has a New Plan to Kill Cookies. People Are Still Mad. https:\/\/www.wired.co.uk\/article\/google-floc-cookies-chrome-topics. (2022)."},{"key":"e_1_3_2_1_23_1","unstructured":"2022. Google's Topics API: Rebranding FLoC Without Addressing Key Privacy Issues. https:\/\/brave.com\/web-standards-at-brave\/7-googles-topics-api\/. (2022).  2022. Google's Topics API: Rebranding FLoC Without Addressing Key Privacy Issues. https:\/\/brave.com\/web-standards-at-brave\/7-googles-topics-api\/. (2022)."},{"key":"e_1_3_2_1_24_1","unstructured":"2022. Internet Security Research Group. https:\/\/abetterinternet.org\/. (2022).  2022. Internet Security Research Group. https:\/\/abetterinternet.org\/. (2022)."},{"key":"e_1_3_2_1_25_1","unstructured":"2022. Let's Encrypt: A nonprofit Certificate Authority providing TLS certificates to 260 million websites. https:\/\/letsencrypt.org\/. (2022).  2022. Let's Encrypt: A nonprofit Certificate Authority providing TLS certificates to 260 million websites. https:\/\/letsencrypt.org\/. (2022)."},{"key":"e_1_3_2_1_26_1","volume-title":"https:\/\/github.com\/Microsoft\/SEAL. (March","author":"Microsoft SEAL","year":"2022","unstructured":"2022. Microsoft SEAL (release 4.0). https:\/\/github.com\/Microsoft\/SEAL. (March 2022 ). 2022. Microsoft SEAL (release 4.0). https:\/\/github.com\/Microsoft\/SEAL. (March 2022)."},{"key":"e_1_3_2_1_27_1","unstructured":"2022. OpenRTB Protocol Buffer 2.5.0. https:\/\/developers.google.com\/authorizedbuyers\/rtb\/downloads\/openrtb-proto. (2022).  2022. OpenRTB Protocol Buffer 2.5.0. https:\/\/developers.google.com\/authorizedbuyers\/rtb\/downloads\/openrtb-proto. (2022)."},{"key":"e_1_3_2_1_28_1","volume-title":"https:\/\/www.openssl.org","author":"SSL.","year":"2022","unstructured":"2022. Open SSL. ( 2022 ). https:\/\/www.openssl.org . 2022. OpenSSL. (2022). https:\/\/www.openssl.org."},{"key":"e_1_3_2_1_29_1","unstructured":"2022. Privacy Preserving Attribution for Advertising. https: \/\/blog.mozilla.org\/en\/mozilla\/privacy-preserving-attribution-for-advertising\/. (2022).  2022. Privacy Preserving Attribution for Advertising. https: \/\/blog.mozilla.org\/en\/mozilla\/privacy-preserving-attribution-for-advertising\/. (2022)."},{"key":"e_1_3_2_1_30_1","unstructured":"2022. SealPIR: A computational PIR library that achieves low communication costs and high performance. https:\/\/github.com\/microsoft\/SealPIR. (2022).  2022. SealPIR: A computational PIR library that achieves low communication costs and high performance. https:\/\/github.com\/microsoft\/SealPIR. (2022)."},{"key":"e_1_3_2_1_31_1","unstructured":"2022. SimilarWeb. https:\/\/www.similarweb.com. (2022).  2022. SimilarWeb. https:\/\/www.similarweb.com. (2022)."},{"key":"e_1_3_2_1_32_1","unstructured":"2022. The Topics API. https:\/\/github.com\/patcg-individual-drafts\/topics\/. (2022).  2022. The Topics API. https:\/\/github.com\/patcg-individual-drafts\/topics\/. (2022)."},{"key":"e_1_3_2_1_33_1","unstructured":"2022. This is how Google plans to track you now. https: \/\/www.slashgear.com\/this-is-how-google-plans-to-track-you-now-25708910\/. (2022).  2022. This is how Google plans to track you now. https: \/\/www.slashgear.com\/this-is-how-google-plans-to-track-you-now-25708910\/. (2022)."},{"key":"e_1_3_2_1_34_1","unstructured":"2022. Understand your conversion tracking data. https:\/\/support.google.com\/google-ads\/answer\/6270625. (2022).  2022. Understand your conversion tracking data. https:\/\/support.google.com\/google-ads\/answer\/6270625. (2022)."},{"key":"e_1_3_2_1_35_1","unstructured":"2022. What is fingerprinting and why you should block it. https:\/\/www.mozilla.org\/en-US\/firefox\/features\/block-fingerprinting\/. (2022).  2022. What is fingerprinting and why you should block it. https:\/\/www.mozilla.org\/en-US\/firefox\/features\/block-fingerprinting\/. (2022)."},{"key":"e_1_3_2_1_36_1","volume-title":"Paper 2021\/1490.","author":"Anderson Erik","year":"2021","unstructured":"Erik Anderson , Melissa Chase , F. Betul Durak , Esha Ghosh , Kim Laine , and Chenkai Weng . 2021. Aggregate Measurement via Oblivious Shuffling. Cryptology ePrint Archive , Paper 2021\/1490. ( 2021 ). https:\/\/ia.cr\/2021\/1490. Erik Anderson, Melissa Chase, F. Betul Durak, Esha Ghosh, Kim Laine, and Chenkai Weng. 2021. Aggregate Measurement via Oblivious Shuffling. Cryptology ePrint Archive, Paper 2021\/1490. (2021). https:\/\/ia.cr\/2021\/1490."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00062"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486038"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.25"},{"key":"e_1_3_2_1_40_1","volume-title":"SEAL: Sealed-Bid Auction Without Auctioneers","author":"Bag Samiran","year":"2020","unstructured":"Samiran Bag , Feng Hao , Siamak F. Shahandashti , and Indranil Ghosh Ray . 2020 . SEAL: Sealed-Bid Auction Without Auctioneers . IEEE Transactions on Information Forensics and Security 15 (2020). Samiran Bag, Feng Hao, Siamak F. Shahandashti, and Indranil Ghosh Ray. 2020. SEAL: Sealed-Bid Auction Without Auctioneers. IEEE Transactions on Information Forensics and Security 15 (2020)."},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the International Cryptology Conference (CRYPTO).","author":"Beaver Donald","year":"1991","unstructured":"Donald Beaver . 1991 . Efficient Multiparty Protocols Using Circuit Randomization . In Proceedings of the International Cryptology Conference (CRYPTO). Donald Beaver. 1991. Efficient Multiparty Protocols Using Circuit Randomization. In Proceedings of the International Cryptology Conference (CRYPTO)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00048"},{"key":"e_1_3_2_1_43_1","volume-title":"PPAD: Privacy Preserving Group-Based ADvertising in Online Social Networks. In 2018 IFIP Networking Conference (IFIP Networking) and Workshops.","author":"Boshrooyeh Sanaz Taheri","unstructured":"Sanaz Taheri Boshrooyeh , Alptekin K\u00fcp\u00e7\u00fc , and \u00d6znur \u00d6zkasap. 2018 . PPAD: Privacy Preserving Group-Based ADvertising in Online Social Networks. In 2018 IFIP Networking Conference (IFIP Networking) and Workshops. Sanaz Taheri Boshrooyeh, Alptekin K\u00fcp\u00e7\u00fc, and \u00d6znur \u00d6zkasap. 2018. PPAD: Privacy Preserving Group-Based ADvertising in Online Social Networks. In 2018 IFIP Networking Conference (IFIP Networking) and Workshops."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978429"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"e_1_3_2_1_46_1","volume-title":"Proceedings of the 5th International Workshop on Deception, Fraud and Trust in Agent Societies.","author":"Brandt Felix","year":"2002","unstructured":"Felix Brandt . 2002 . A verifiable, bidder-resolved Auction Protocol . In Proceedings of the 5th International Workshop on Deception, Fraud and Trust in Agent Societies. Felix Brandt. 2002. A verifiable, bidder-resolved Auction Protocol. In Proceedings of the 5th International Workshop on Deception, Fraud and Trust in Agent Societies."},{"key":"e_1_3_2_1_47_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Bulck Jo Van","year":"2018","unstructured":"Jo Van Bulck , Marina Minkin , Ofir Weisse , Daniel Genkin , Baris Kasikci , Frank Piessens , Mark Silberstein , Thomas F. Wenisch , Yuval Yarom , and Raoul Strackx . 2018 . Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution . In Proceedings of the USENIX Security Symposium. Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, and Raoul Strackx. 2018. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_48_1","volume-title":"Group Signatures. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT).","author":"Chaum David","year":"1991","unstructured":"David Chaum and Eug\u00e8ne van Heyst . 1991 . Group Signatures. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT). David Chaum and Eug\u00e8ne van Heyst. 1991. Group Signatures. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT)."},{"key":"e_1_3_2_1_49_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (S&P).","author":"Chen Guoxing","unstructured":"Guoxing Chen , Sanchuan Chen , Yuan Xiao , Yinqian Zhang , Zhiqiang Lin , and Ten H. Lai . 2019. SgxPectre Attacks: Leaking Enclave Secrets via Speculative Execution . In Proceedings of the IEEE Symposium on Security and Privacy (S&P). Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, and Ten H. Lai. 2019. SgxPectre Attacks: Leaking Enclave Secrets via Speculative Execution. In Proceedings of the IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_1_50_1","volume-title":"Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI).","author":"Corrigan-Gibbs Henry","year":"2017","unstructured":"Henry Corrigan-Gibbs and Dan Boneh . 2017 . Prio: Private, Robust, and Scalable Computation of Aggregate Statistics . In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI). Henry Corrigan-Gibbs and Dan Boneh. 2017. Prio: Private, Robust, and Scalable Computation of Aggregate Statistics. In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI)."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_53_1","first-page":"3","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork and Aaron Roth . 2014 . The algorithmic foundations of differential privacy . Found. Trends Theor. Comput. Sci. 9 , 3 -- 4 (2014). Cynthia Dwork and Aaron Roth. 2014. The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9, 3--4 (2014).","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"e_1_3_2_1_56_1","volume-title":"Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT).","author":"Gentry Craig","unstructured":"Craig Gentry , Shai Halevi , and Nigel P. Smart . 2012. Fully Homomorphic Encryption with Polylog Overhead . In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT). Craig Gentry, Shai Halevi, and Nigel P. Smart. 2012. Fully Homomorphic Encryption with Polylog Overhead. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT)."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/800070.802212"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978407"},{"key":"e_1_3_2_1_60_1","volume-title":"Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI).","author":"Guha Saikat","year":"2011","unstructured":"Saikat Guha , Bin Cheng , and Paul Francis . 2011 . Privad: Practical Privacy in Online Advertising . In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI). Saikat Guha, Bin Cheng, and Paul Francis. 2011. Privad: Practical Privacy in Online Advertising. In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI)."},{"key":"e_1_3_2_1_61_1","volume-title":"Proceedings of the ACM Workshop on Hot Topics in Networks (HotNets).","author":"Guha Saikat","year":"2009","unstructured":"Saikat Guha , Alexey Reznichenko , Kevin Tang , Hamed Haddadi , and Paul Francis . 2009 . Serving Ads from localhost for Performance, Privacy, and Profit . In Proceedings of the ACM Workshop on Hot Topics in Networks (HotNets). Saikat Guha, Alexey Reznichenko, Kevin Tang, Hamed Haddadi, and Paul Francis. 2009. Serving Ads from localhost for Performance, Privacy, and Profit. In Proceedings of the ACM Workshop on Hot Topics in Networks (HotNets)."},{"key":"e_1_3_2_1_62_1","volume-title":"Electronic Auctions with Private Bids. In 3rd USENIX Workshop on Electronic Commerce (EC 98)","author":"Harkavy Michael","year":"1998","unstructured":"Michael Harkavy , J. D. Tygar , and Hiroaki Kikuchi . 1998 . Electronic Auctions with Private Bids. In 3rd USENIX Workshop on Electronic Commerce (EC 98) . Michael Harkavy, J. D. Tygar, and Hiroaki Kikuchi. 1998. Electronic Auctions with Private Bids. In 3rd USENIX Workshop on Electronic Commerce (EC 98)."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"crossref","unstructured":"Leon J. Helsloot Gamze Tillem and Zekeriya Erkin. 2018. BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing. In Provable Security.  Leon J. Helsloot Gamze Tillem and Zekeriya Erkin. 2018. BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing. In Provable Security.","DOI":"10.1007\/978-3-030-01446-9_23"},{"key":"e_1_3_2_1_64_1","volume-title":"Paper 2022\/949.","author":"Henzinger Alexandra","year":"2022","unstructured":"Alexandra Henzinger , Matthew M. Hong , Henry Corrigan-Gibbs , Sarah Meiklejohn , and Vinod Vaikuntanathan . 2022. One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval. Cryptology ePrint Archive , Paper 2022\/949. ( 2022 ). https:\/\/eprint.iacr.org\/2022\/949. Alexandra Henzinger, Matthew M. Hong, Henry Corrigan-Gibbs, Sarah Meiklejohn, and Vinod Vaikuntanathan. 2022. One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval. Cryptology ePrint Archive, Paper 2022\/949. (2022). https:\/\/eprint.iacr.org\/2022\/949."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/PADSW.2000.884610"},{"key":"e_1_3_2_1_66_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Kogan Dmitry","year":"2021","unstructured":"Dmitry Kogan and Henry Corrigan-Gibbs . 2021 . Private Blocklist Lookups with Checklist . In Proceedings of the USENIX Security Symposium. Dmitry Kogan and Henry Corrigan-Gibbs. 2021. Private Blocklist Lookups with Checklist. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_67_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Lee Sangho","year":"2017","unstructured":"Sangho Lee , Ming-Wei Shih , Prasun Gera , Taesoo Kim , Hyesoon Kim , and Marcus Peinado . 2017 . Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing . In Proceedings of the USENIX Security Symposium. Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, and Marcus Peinado. 2017. Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2648584.2648590"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53890-6_13"},{"key":"e_1_3_2_1_70_1","volume-title":"On Ideal Lattices and Learning with Errors over Rings. J. ACM","author":"Lyubashevsky Vadim","year":"2013","unstructured":"Vadim Lyubashevsky , Chris Peikert , and Oded Regev . 2013. On Ideal Lattices and Learning with Errors over Rings. J. ACM ( 2013 ). Vadim Lyubashevsky, Chris Peikert, and Oded Regev. 2013. On Ideal Lattices and Learning with Errors over Rings. J. ACM (2013)."},{"key":"e_1_3_2_1_71_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Ma Yiping","year":"2022","unstructured":"Yiping Ma , Ke Zhong , Tal Rabin , and Sebastian Angel . 2022 . Incremental Offline\/Online PIR . In Proceedings of the USENIX Security Symposium. Yiping Ma, Ke Zhong, Tal Rabin, and Sebastian Angel. 2022. Incremental Offline\/Online PIR. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_72_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (S&P).","author":"Menon Samir Jordan","unstructured":"Samir Jordan Menon and David J. Wu . 2022. Spiral: Fast, High-Rate Single-Server PIR via FHE Composition . In Proceedings of the IEEE Symposium on Security and Privacy (S&P). Samir Jordan Menon and David J. Wu. 2022. Spiral: Fast, High-Rate Single-Server PIR via FHE Composition. In Proceedings of the IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2017.11"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24363"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00057"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"e_1_3_2_1_77_1","volume-title":"Practical secrecy-preserving, verifiably correct and trustworthy auctions. Electronic Commerce Research and Applications","author":"Parkes David C.","year":"2008","unstructured":"David C. Parkes , Michael O. Rabin , Stuart M. Shieber , and Christopher Thorpe . 2008. Practical secrecy-preserving, verifiably correct and trustworthy auctions. Electronic Commerce Research and Applications ( 2008 ). David C. Parkes, Michael O. Rabin, Stuart M. Shieber, and Christopher Thorpe. 2008. Practical secrecy-preserving, verifiably correct and trustworthy auctions. Electronic Commerce Research and Applications (2008)."},{"key":"e_1_3_2_1_78_1","unstructured":"Eric Rescorla and Martin Thomson. 2021. Technical Comments on FLoC Privacy. https:\/\/mozilla.github.io\/ppa-docs\/floc_report.pdf. (2021).  Eric Rescorla and Martin Thomson. 2021. Technical Comments on FLoC Privacy. https:\/\/mozilla.github.io\/ppa-docs\/floc_report.pdf. (2021)."},{"key":"e_1_3_2_1_80_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS).","author":"Toubiana Vincent","year":"2010","unstructured":"Vincent Toubiana , Arvind Narayanan , Dan Boneh , Helen Nissenbaum , and Solon Barocas . 2010 . Adnostic: Privacy Preserving Targeted Advertising . In Proceedings of the Network and Distributed System Security Symposium (NDSS). Vincent Toubiana, Arvind Narayanan, Dan Boneh, Helen Nissenbaum, and Solon Barocas. 2010. Adnostic: Privacy Preserving Targeted Advertising. In Proceedings of the Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_81_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (S&P).","author":"Bulck Jo Van","year":"2020","unstructured":"Jo Van Bulck , Daniel Moghimi , Michael Schwarz , Moritz Lipp , Marina Minkin , Daniel Genkin , Yarom Yuval , Berk Sunar , Daniel Gruss , and Frank Piessens . 2020 . LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection . In Proceedings of the IEEE Symposium on Security and Privacy (S&P). Jo Van Bulck, Daniel Moghimi, Michael Schwarz, Moritz Lipp, Marina Minkin, Daniel Genkin, Yarom Yuval, Berk Sunar, Daniel Gruss, and Frank Piessens. 2020. LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection. In Proceedings of the IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_1_82_1","unstructured":"Xiao Wang Alex J. Malozemoff and Jonathan Katz. 2016. EMP-toolkit: Efficient MultiParty computation toolkit. https:\/\/github.com\/emp-toolkit. (2016).  Xiao Wang Alex J. Malozemoff and Jonathan Katz. 2016. EMP-toolkit: Efficient MultiParty computation toolkit. https:\/\/github.com\/emp-toolkit. (2016)."},{"key":"e_1_3_2_1_83_1","volume-title":"Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI).","author":"Wang Xiao Sophia","year":"2013","unstructured":"Xiao Sophia Wang , Aruna Balasubramanian , Arvind Krishnamurthy , and David Wetherall . 2013 . Demystifying Page Load Performance with WProf . In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI). Xiao Sophia Wang, Aruna Balasubramanian, Arvind Krishnamurthy, and David Wetherall. 2013. Demystifying Page Load Performance with WProf. In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI)."},{"key":"e_1_3_2_1_84_1","unstructured":"Yao Xiao and Josh Karlin. 2021. Federated Learning of Cohorts. https:\/\/wicg.github.io\/floc\/. (2021).  Yao Xiao and Josh Karlin. 2021. Federated Learning of Cohorts. https:\/\/wicg.github.io\/floc\/. (2021)."},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623357"},{"key":"e_1_3_2_1_87_1","unstructured":"Weinan Zhang Shuai Yuan Jun Wang and Xuehua Shen. 2015. Real-Time Bidding Benchmarking with iPinYou Dataset. https:\/\/arxiv.org\/abs\/1407.7073. (2015).  Weinan Zhang Shuai Yuan Jun Wang and Xuehua Shen. 2015. Real-Time Bidding Benchmarking with iPinYou Dataset. https:\/\/arxiv.org\/abs\/1407.7073. (2015)."},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560651"},{"key":"e_1_3_2_1_89_1","volume-title":"Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI).","author":"Zhong Ke","year":"2023","unstructured":"Ke Zhong , Yiping Ma , Yifeng Mao , and Sebastian Angel . 2023 . Addax: A fast, private, and accountable ad exchange infrastructure . In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI). Ke Zhong, Yiping Ma, Yifeng Mao, and Sebastian Angel. 2023. Addax: A fast, private, and accountable ad exchange infrastructure. In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI)."}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","location":"Los Angeles CA USA","acronym":"CCS '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560651","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3560651","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3560651","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:59Z","timestamp":1750182539000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560651"}},"subtitle":["Privacy-preserving Ad Conversion Tracking and Bidding"],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":87,"alternative-id":["10.1145\/3548606.3560651","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3560651","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}