{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:32:42Z","timestamp":1766442762412,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","funder":[{"name":"the National Natural Science Foundation of China","award":["62372201"],"award-info":[{"award-number":["62372201"]}]},{"name":"the National Natural Science Foundation of China","award":["62272186"],"award-info":[{"award-number":["62272186"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3765075","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:42:02Z","timestamp":1763854922000},"page":"2429-2443","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Peekaboo, I See Your Queries: Passive Attacks Against DSSE Via Intermittent Observations"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-9961-5817","authenticated-orcid":false,"given":"Hao","family":"Nie","sequence":"first","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, Hubei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4457-6709","authenticated-orcid":false,"given":"Wei","family":"Wang","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, Hubei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4268-4976","authenticated-orcid":false,"given":"Peng","family":"Xu","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, Hubei, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-8983-9375","authenticated-orcid":false,"given":"Wei","family":"Chen","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, Hubei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7986-4244","authenticated-orcid":false,"given":"Laurence T.","family":"Yang","sequence":"additional","affiliation":[{"name":"St. Francis Xavier University, Antigonish, Nova Scotia, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3612-1934","authenticated-orcid":false,"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[{"name":"University of Padua, Padua, Veneto, Italy and \u00d6rebro University, \u00d6rebro, \u00d6rebro County, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0262-7678","authenticated-orcid":false,"given":"Kaitai","family":"Liang","sequence":"additional","affiliation":[{"name":"TU Delft, Delft, South Holland, Netherlands and University of Turku, Turku, Southwest Finland, Finland"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2018. Latest Trickbot Variant has New Tricks Up Its Sleeve. https:\/\/www.cyberbit.com\/endpoint-security\/latest-trickbot-variant-has-new-tricks-up-its-sleeve\/"},{"key":"e_1_3_2_1_2_1","unstructured":"2023. WHO Model List of Essential Medicines. https:\/\/www.who.int\/publications\/i\/item\/WHO-MHP-HPS-EML-2023.02"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"N Ambika. 2020. Improved Methodology to Detect Advanced Persistent Threat Attacks. In Quantum Cryptography and the Future of Cyber Security.","DOI":"10.4018\/978-1-7998-2253-0.ch009"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.2478\/POPETS-2019-0014"},{"key":"e_1_3_2_1_5_1","volume-title":"Revisiting Leakage Abuse Attacks. In 27th Annual Network and Distributed System Security Symposium. https:\/\/www.ndss-symposium.org\/ndss-paper\/revisiting-leakage-abuseattacks\/","author":"Blackstone Laura","year":"2020","unstructured":"Laura Blackstone, Seny Kamara, and Tarik Moataz. 2020. Revisiting Leakage Abuse Attacks. In 27th Annual Network and Distributed System Security Symposium. https:\/\/www.ndss-symposium.org\/ndss-paper\/revisiting-leakage-abuseattacks\/"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978303"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133980"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813700"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486381"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.24725"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180417"},{"key":"e_1_3_2_1_12_1","volume-title":"30th USENIX Security Symposium. 143--160","author":"Damie Marc","year":"2021","unstructured":"Marc Damie, Florian Hahn, and Andreas Peter. 2021. A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents. In 30th USENIX Security Symposium. 143--160. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/damie"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3350330"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-031--15985--5_6"},{"key":"e_1_3_2_1_15_1","unstructured":"Apache Foundation. 1999. Mail Archieves of Lucene. https:\/\/mailarchives.apache.org\/mod_mbox\/#lucene"},{"key":"e_1_3_2_1_16_1","unstructured":"Wikipedia Foundation. 2020. Wikipedia databases. https:\/\/www.wikipedia.org."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243833"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179460"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3626232.3653260"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01908075"},{"volume-title":"19th Annual Network and Distributed System Security Symposium. https:\/\/www.ndss-symposium.org\/ndss2012\/access-pattern-disclosuresearchable-encryption-ramification-attack-and-mitigation","author":"Islam Mohammad Saiful","key":"e_1_3_2_1_21_1","unstructured":"Mohammad Saiful Islam, Mehmet Kuzu, and Murat Kantarcioglu. 2012. Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation. In 19th Annual Network and Distributed System Security Symposium. https:\/\/www.ndss-symposium.org\/ndss2012\/access-pattern-disclosuresearchable-encryption-ramification-attack-and-mitigation"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.56553\/POPETS-2024-0025"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382298"},{"volume-title":"The Hungarian method for the assignment problem. Naval research logistics quarterly 2, 1--2","year":"1955","key":"e_1_3_2_1_24_1","unstructured":"HaroldWKuhn. 1955. The Hungarian method for the assignment problem. Naval research logistics quarterly 2, 1--2 (1955), 83--97."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/J.INS.2013.11.021"},{"key":"e_1_3_2_1_26_1","unstructured":"Marcel Ruiz Forns MusikAnimal Kaldari. 2015. Pageviews Toolforge. https:\/\/pageviews.toolforge.org\/"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.47"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","unstructured":"Hao Nie Wei Wang Peng Xu Wei Chen Laurence T. Yang Mauro Conti and Kaitai Liang. 2025. Peekaboo I See Your Queries: Passive Attacks Against DSSE Via Intermittent Observations Full Version. https:\/\/doi.org\/10.48550\/arXiv.2509.03806","DOI":"10.48550\/arXiv.2509.03806"},{"key":"e_1_3_2_1_29_1","volume-title":"33rd USENIX Security Symposium. https:\/\/www.usenix.org\/conference\/usenixsecurity24\/presentation\/nie","author":"Nie Hao","year":"2024","unstructured":"Hao Nie, Wei Wang, Peng Xu, Xianglong Zhang, Laurence T. Yang, and Kaitai Liang. 2024. Query Recovery from Easy to Hard: Jigsaw Attack against SSE. In 33rd USENIX Security Symposium. https:\/\/www.usenix.org\/conference\/usenixsecurity24\/presentation\/nie"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484540"},{"key":"e_1_3_2_1_31_1","volume-title":"30th USENIX Security Symposium. 127--142","author":"Oya Simon","year":"2021","unstructured":"Simon Oya and Florian Kerschbaum. 2021. Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption. In 30th USENIX Security Symposium. 127--142. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/oya"},{"key":"e_1_3_2_1_32_1","volume-title":"31st USENIX Security Symposium. 2407--2424","author":"Oya Simon","year":"2022","unstructured":"Simon Oya and Florian Kerschbaum. 2022. IHOP: Improved Statistical Query Recovery against Searchable Symmetric Encryption through Quadratic Optimization. In 31st USENIX Security Symposium. 2407--2424. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/oya"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-031--38551--3_6"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/EUROSP48549.2020.00030"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978401"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1971.10482356"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3422337.3447838"},{"key":"e_1_3_2_1_38_1","volume-title":"Obfuscated Access and Search Patterns in Searchable Encryption. In 28th Annual Network and Distributed System Security Symposium, NDSS 2021","author":"Shang Zhiwei","year":"2021","unstructured":"Zhiwei Shang, Simon Oya, Andreas Peter, and Florian Kerschbaum. 2021. Obfuscated Access and Search Patterns in Searchable Encryption. In 28th Annual Network and Distributed System Security Symposium, NDSS 2021, virtually, February 21--25, 2021. The Internet Society. https:\/\/www.ndss-symposium.org\/ndsspaper\/obfuscated-access-and-search-patterns-in-searchable-encryption\/"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848445"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23298"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243782"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3126607"},{"key":"e_1_3_2_1_43_1","unstructured":"Carnegie Mellon University William W. Cohen MLD. 2015. Enron Email Datasets. https:\/\/www.cs.cmu.edu\/~.\/enron\/"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623085"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3296189"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3155977"},{"key":"e_1_3_2_1_47_1","volume-title":"32nd USENIX Security Symposium. 5953--5970","author":"Zhang Xianglong","year":"2023","unstructured":"Xianglong Zhang, Wei Wang, Peng Xu, Laurence T. Yang, and Kaitai Liang. 2023. High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption. In 32nd USENIX Security Symposium. 5953--5970. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/zhang-xianglong"},{"key":"e_1_3_2_1_48_1","volume-title":"25th USENIX Security Symposium. 707--720","author":"Zhang Yupeng","year":"2016","unstructured":"Yupeng Zhang, Jonathan Katz, and Charalampos Papamanthou. 2016. All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption. In 25th USENIX Security Symposium. 707--720. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/zhang"},{"key":"e_1_3_2_1_49_1","unstructured":"George Kingsley Zipf. 2016. Human behavior and the principle of least effort: An introduction to human ecology. Ravenio books."}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"CCS '25"},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3765075","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:31:23Z","timestamp":1766442683000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3765075"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":49,"alternative-id":["10.1145\/3719027.3765075","10.1145\/3719027"],"URL":"https:\/\/doi.org\/10.1145\/3719027.3765075","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}