Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMarch 2020
GRAMAC: A Graph Based Android Malware Classification Mechanism
CODASPY '20: Proceedings of the Tenth ACM Conference on Data and Application Security and PrivacyPages 156–158https://doi.org/10.1145/3374664.3379530Android malware analysis has been an active area of research as the number and types of Android malwares have increased dramatically. Most of the previous works have used permission based model, behavioral analysis, and code analysis to identify the ...
- research-articleMarch 2020
DeepTrust: An Automatic Framework to Detect Trustworthy Users in Opinion-based Systems
CODASPY '20: Proceedings of the Tenth ACM Conference on Data and Application Security and PrivacyPages 29–38https://doi.org/10.1145/3374664.3375744Opinion spamming has recently gained attention as more and more online platforms rely on users' opinions to help potential customers make informed decisions on products and services. Yet, while work on opinion spamming abounds, most efforts have focused ...
- research-articleMarch 2020
The Good, the Bad and the (Not So) Ugly of Out-of-Band Authentication with eID Cards and Push Notifications: Design, Formal and Risk Analysis
CODASPY '20: Proceedings of the Tenth ACM Conference on Data and Application Security and PrivacyPages 223–234https://doi.org/10.1145/3374664.3375727Everyday life is permeated by new technologies allowing people to perform almost any kind of operation from their smart devices. Although this is amazing from a convenience perspective, it may result in several security issues concerning the need for ...
- research-articleMarch 2020
Admin-CBAC: An Administration Model for Category-Based Access Control
CODASPY '20: Proceedings of the Tenth ACM Conference on Data and Application Security and PrivacyPages 73–84https://doi.org/10.1145/3374664.3375725We present Admin-CBAC, an administrative model for Category- Based Access Control (CBAC). Since most of the access control models in use nowadays are instances of CBAC, in particular the popular RBAC and ABAC models, from Admin-CBAC we derive ...