{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T04:28:52Z","timestamp":1778128132675,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,28]],"date-time":"2023-11-28T00:00:00Z","timestamp":1701129600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"NSF","award":["CNS-2054869"],"award-info":[{"award-number":["CNS-2054869"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,28]]},"DOI":"10.1145\/3626111.3628207","type":"proceedings-article","created":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T12:11:20Z","timestamp":1699877480000},"page":"287-294","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Lightweb"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0025-1742","authenticated-orcid":false,"given":"Emma","family":"Dauterman","sequence":"first","affiliation":[{"name":"UC Berkeley"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-7577-4512","authenticated-orcid":false,"given":"Henry","family":"Corrigan-Gibbs","sequence":"additional","affiliation":[{"name":"MIT"}]}],"member":"320","published-online":{"date-parts":[[2023,11,28]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Snowden documents say","author":"Yahoo NSA","year":"2013","unstructured":"NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say, October 2013."},{"key":"e_1_3_2_1_2_1","unstructured":"Government push for Yahoo's user data set stage for broad surveillance September 2014."},{"key":"e_1_3_2_1_3_1","volume-title":"July","author":"In","year":"2014","unstructured":"In NSA-intercepted data, those not targeted far outnumber the foreigners who are, July 2014."},{"key":"e_1_3_2_1_4_1","volume-title":"June","author":"Owe You Money Google Might","year":"2023","unstructured":"Google Might Owe You Money. Here's How to Get It., June 2023."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-14791-3_23"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483586"},{"key":"e_1_3_2_1_7_1","first-page":"551","volume-title":"OSDI","volume":"16","author":"Angel Sebastian","year":"2016","unstructured":"Sebastian Angel and Srinath TV Setty. Unobservable communication over fully untrusted infrastructure. In OSDI, volume 16, pages 551--569, 2016."},{"key":"e_1_3_2_1_8_1","volume-title":"August","year":"2023","unstructured":"Apple. About iCloud Private Relay, August 2023. https:\/\/support.apple.com\/en-us\/102602."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIoT48696.2020.9089497"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44598-6_4"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00048"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978429"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00020"},{"key":"e_1_3_2_1_14_1","volume-title":"Private information retrieval by keywords","author":"Chor Benny","year":"1997","unstructured":"Benny Chor, Niv Gilboa, and Moni Naor. Private information retrieval by keywords. 1997."},{"key":"e_1_3_2_1_15_1","volume-title":"Private information retrieval. Journal of the ACM (JACM), 45(6):965--981","author":"Chor Benny","year":"1998","unstructured":"Benny Chor, Eyal Kushilevitz, Oded Goldreich, and Madhu Sudan. Private information retrieval. Journal of the ACM (JACM), 45(6):965--981, 1998."},{"key":"e_1_3_2_1_16_1","first-page":"259","volume-title":"NSDI","author":"Corrigan-Gibbs Henry","year":"2017","unstructured":"Henry Corrigan-Gibbs and Dan Boneh. Prio: Private, robust, and scalable computation of aggregate statistics. In NSDI, pages 259--282, 2017."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.27"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866346"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483562"},{"key":"e_1_3_2_1_20_1","first-page":"1101","volume-title":"Proceedings of the 14th USENIX Conference on Operating Systems Design and Implementation","author":"Dauterman Emma","year":"2020","unstructured":"Emma Dauterman, Eric Feng, Ellen Luo, Raluca Ada Popa, and Ion Stoica. Dory: An encrypted search system with distributed trust. In Proceedings of the 14th USENIX Conference on Operating Systems Design and Implementation, pages 1101--1119, 2020."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833611"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560631"},{"key":"e_1_3_2_1_23_1","volume-title":"Naval Research Lab Washington DC","author":"Dingledine Roger","year":"2004","unstructured":"Roger Dingledine, Nick Mathewson, and Paul Syverson. Tor: The second-generation onion router. Technical report, Naval Research Lab Washington DC, 2004."},{"key":"e_1_3_2_1_24_1","first-page":"1775","volume-title":"USENIX Security Symposium","author":"Eskandarian Saba","year":"2021","unstructured":"Saba Eskandarian, Henry Corrigan-Gibbs, Matei Zaharia, Dan Boneh, et al. Express: Lowering the cost of metadata-hiding communication with cryptographic privacy. In USENIX Security Symposium, pages 1775--1792, 2021."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48329-2_40"},{"issue":"13","key":"e_1_3_2_1_26_1","first-page":"2009","article-title":"Above the clouds: A berkeley view of cloud computing. Dept. Electrical Eng. and Comput. Sciences, University of California, Berkeley","volume":"28","author":"Fox Armando","year":"2009","unstructured":"Armando Fox, Rean Griffith, Anthony Joseph, Randy Katz, Andrew Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, Ion Stoica, et al. Above the clouds: A berkeley view of cloud computing. Dept. Electrical Eng. and Comput. Sciences, University of California, Berkeley, Rep. UCB\/EECS, 28(13):2009, 2009.","journal-title":"Rep. UCB\/EECS"},{"key":"e_1_3_2_1_27_1","unstructured":"Google. About google fi plans. https:\/\/support.google.com\/fi\/answer\/9462098?hl=en."},{"key":"e_1_3_2_1_28_1","unstructured":"Google. An implementation of incremental distributed point functions in c++. https:\/\/github.com\/google\/distributed_point_functions."},{"key":"e_1_3_2_1_29_1","first-page":"91","volume-title":"13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16)","author":"Gupta Trinabh","year":"2016","unstructured":"Trinabh Gupta, Natacha Crooks, Whitney Mulhern, Srinath Setty, Lorenzo Alvisi, and Michael Walfish. Scalable and private media consumption with popcorn. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16), pages 91--107, 2016."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3600006.3613134"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655013"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516651"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3093615"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36467-6_17"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1997.646125"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132755"},{"key":"e_1_3_2_1_37_1","first-page":"711","volume-title":"13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18)","author":"Lazar David","year":"2018","unstructured":"David Lazar, Yossi Gilad, and Nickolai Zeldovich. Karaoke: Distributed private messaging immune to passive traffic analysis. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18), pages 711--725, 2018."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00045"},{"key":"e_1_3_2_1_39_1","volume-title":"Plasma: Private, lightweight aggregated statistics against malicious adversaries with full security. Cryptology ePrint Archive","author":"Mouris Dimitris","year":"2023","unstructured":"Dimitris Mouris, Pratik Sarkar, and Nektarios Georgios Tsoutsos. Plasma: Private, lightweight aggregated statistics against malicious adversaries with full security. Cryptology ePrint Archive, 2023."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.12"},{"key":"e_1_3_2_1_41_1","first-page":"41","volume-title":"2001 Proceedings 21","author":"Naor Dalit","year":"2001","unstructured":"Dalit Naor, Moni Naor, and Jeff Lotspiech. Revocation and tracing schemes for stateless receivers. In Advances in Cryptology---CRYPTO 2001: 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19--23, 2001 Proceedings 21, pages 41--62. Springer, 2001."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243824"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/2590636.2590640"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-016-0044-x"},{"key":"e_1_3_2_1_45_1","unstructured":"Colin Raffel Noam Shazeer Adam Roberts Katherine Lee Sharan Narang Michael Matena Yanqi Zhou Wei Li and Peter J. Liu. C4 model. https:\/\/huggingface.co\/datasets\/c4."},{"key":"e_1_3_2_1_46_1","volume-title":"Exploring the limits of transfer learning with a unified text-to-text transformer","author":"Raffel Colin","year":"2019","unstructured":"Colin Raffel, Noam Shazeer, Adam Roberts, Katherine Lee, Sharan Narang, Michael Matena, Yanqi Zhou, Wei Li, and Peter J. Liu. Exploring the limits of transfer learning with a unified text-to-text transformer, 2019. https:\/\/arxiv.org\/abs\/1910.10683."},{"key":"e_1_3_2_1_47_1","volume-title":"Security & Privacy","author":"Ragab Hany","year":"2021","unstructured":"Hany Ragab, Alyssa Milburn, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. Crosstalk: Speculative data leaks across cores are real. In Security & Privacy. IEEE, 2021."},{"key":"e_1_3_2_1_48_1","volume-title":"Zerotrace: Oblivious memory primitives from intel sgx. Cryptology ePrint Archive","author":"Sasy Sajin","year":"2017","unstructured":"Sajin Sasy, Sergey Gorbunov, and Christopher W Fletcher. Zerotrace: Oblivious memory primitives from intel sgx. Cryptology ePrint Archive, 2017."},{"key":"e_1_3_2_1_49_1","first-page":"1357","volume-title":"USENIX Security Symposium","author":"Schuster Roei","year":"2017","unstructured":"Roei Schuster, Vitaly Shmatikov, and Eran Tromer. Beauty and the burst: Remote identification of encrypted video streams. In USENIX Security Symposium, pages 1357--1374, 2017."},{"key":"e_1_3_2_1_50_1","volume-title":"CCS. ACM","author":"Schwarz Michael","year":"2019","unstructured":"Michael Schwarz, Moritz Lipp, Daniel Moghimi, Jo Van Bulck, Julian Stecklina, Thomas Prescher, and Daniel Gruss. ZombieLoad: Cross-privilege-boundary data sampling. In CCS. ACM, 2019."},{"key":"e_1_3_2_1_51_1","first-page":"271","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Sun Yixin","year":"2015","unstructured":"Yixin Sun, Anne Edmundson, Laurent Vanbever, Oscar Li, Jennifer Rexford, Mung Chiang, and Prateek Mittal. RAPTOR: Routing attacks on privacy in tor. In 24th USENIX Security Symposium (USENIX Security 15), pages 271--286, 2015."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132783"},{"key":"e_1_3_2_1_53_1","volume-title":"Proceedings fo the 27th USENIX Security Symposium. USENIX Association","author":"Bulck Jo Van","year":"2018","unstructured":"Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F Wenisch, Yuval Yarom, and Raoul Strackx. Foreshadow: Extracting the keys to the intel sgx kingdom with transient out-of-order execution. In Proceedings fo the 27th USENIX Security Symposium. USENIX Association, 2018."},{"key":"e_1_3_2_1_54_1","volume-title":"Security & Privacy","author":"Bulck Jo Van","year":"2020","unstructured":"Jo Van Bulck, Daniel Moghimi, Michael Schwarz, Moritz Lipp, Marina Minkin, Daniel Genkin, Yarom Yuval, Berk Sunar, Daniel Gruss, and Frank Piessens. LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection. In Security & Privacy. IEEE, 2020."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815417"},{"key":"e_1_3_2_1_56_1","volume-title":"Security & Privacy","author":"Schaik Stephan Van","year":"2019","unstructured":"Stephan Van Schaik, Alyssa Milburn, Sebastian \u00d6sterlund, Pietro Frigo, Giorgi Maisuradze, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. RIDL: Rogue in-flight data load. In Security & Privacy. IEEE, 2019."},{"key":"e_1_3_2_1_57_1","first-page":"299","volume-title":"NSDI","author":"Wang Frank","year":"2017","unstructured":"Frank Wang, Catherine Yun, Shafi Goldwasser, Vinod Vaikuntanathan, and Matei Zaharia. Splinter: Practical private queries on public data. In NSDI, pages 299--313, 2017."}],"event":{"name":"HotNets '23: The 22nd ACM Workshop on Hot Topics in Networks","location":"Cambridge MA USA","acronym":"HotNets '23","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 22nd ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3626111.3628207","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3626111.3628207","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T19:38:27Z","timestamp":1755891507000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3626111.3628207"}},"subtitle":["Private web browsing without all the baggage"],"short-title":[],"issued":{"date-parts":[[2023,11,28]]},"references-count":57,"alternative-id":["10.1145\/3626111.3628207","10.1145\/3626111"],"URL":"https:\/\/doi.org\/10.1145\/3626111.3628207","relation":{},"subject":[],"published":{"date-parts":[[2023,11,28]]},"assertion":[{"value":"2023-11-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}