default search action
CODASPY 2017: Scottsdale, AZ, USA
- Gail-Joon Ahn, Alexander Pretschner, Gabriel Ghinita:
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017. ACM 2017, ISBN 978-1-4503-4523-1
Keynote I
- Kang G. Shin:
Research Issues and Approaches for Connected and Automated Vehicles. 1
Session 1: Threats and Anomaly Detection
- Shagufta Mehnaz, Elisa Bertino:
Ghostbuster: A Fine-grained Approach for Anomaly Detection in File System Accesses. 3-14 - Hugo Gascon, Bernd Grobauer, Thomas Schreck, Lukas Rist, Daniel Arp, Konrad Rieck:
Mining Attributed Graphs for Threat Intelligence. 15-22 - Margaux Canet, Amrit Kumar, Cédric Lauradoux, Mary-Andréa Rakotomanga, Reihaneh Safavi-Naini:
Decompression Quines and Anti-Viruses. 23-34 - Shameek Bhattacharjee, Aditya Thakur, Simone Silvestri, Sajal K. Das:
Statistical Security Incident Forensics against Data Falsification in Smart Grid Advanced Metering Infrastructure. 35-45
Session 2: Access Control
- Jason Crampton, Conrad Williams:
Canonical Completeness in Lattice-Based Languages for Attribute-Based Access Control. 47-58 - Tahmina Ahmed, Ravi S. Sandhu, Jaehong Park:
Classifying and Comparing Attribute-Based and Relationship-Based Access Control. 59-70 - Panagiotis Ilia, Barbara Carminati, Elena Ferrari, Paraskevi Fragopoulou, Sotiris Ioannidis:
SAMPAC: Socially-Aware collaborative Multi-Party Access Control. 71-82
Session 3: Privacy I
- Jan Henrik Ziegeldorf, Jan Metzke, Jan Rüth, Martin Henze, Klaus Wehrle:
Privacy-Preserving HMM Forward Computation. 83-94 - Daniele Ucci, Leonardo Aniello, Roberto Baldoni:
Share a pie?: Privacy-Preserving Knowledge Base Export through Count-min Sketches. 95-106 - Fabian Foerg, Susanne Wetzel, Ulrike Meyer:
Efficient Commodity Matching for Privacy-Preserving Two-Party Bartering. 107-114
Session 4: Privacy II
- Vincent Bindschaedler, Shantanu Rane, Alejandro E. Brito, Vanishree Rao, Ersin Uzun:
Achieving Differential Privacy in Secure Multiparty Data Aggregation Protocols on Star Networks. 115-125 - Hamza Harkous, Karl Aberer:
"If You Can't Beat them, Join them": A Usability Approach to Interdependent Privacy in Cloud Apps. 127-138
Session 5: Reception and Poster Session
- Abdelouahab Amira, Abdelraouf Ouadjaout, Abdelouahid Derhab, Nadjib Badache:
Sound and Static Analysis of Session Fixation Vulnerabilities in PHP Web Applications. 139-141 - Chi Sing Chum, Xiaowen Zhang:
A New Bloom Filter Structure for Searchable Encryption Schemes. 143-145 - Syed Rafiul Hussain, Shagufta Mehnaz, Shahriar Nirjon, Elisa Bertino:
Seamless and Secure Bluetooth LE Connection Migration. 147-149 - Oana-Georgiana Niculaescu, Mihai Maruseac, Gabriel Ghinita:
Differentially-Private Big Data Analytics for High-Speed Research Network Traffic Measurement. 151-153 - Rakesh M. Verma, Ayman El Aassal:
Comprehensive Method for Detecting Phishing EmailsUsing Correlation-based Analysis and User Participation. 155-157 - Fang Liu, Haipeng Cai, Gang Wang, Danfeng (Daphne) Yao, Karim O. Elish, Barbara G. Ryder:
Prioritized Analysis of Inter-App Communication Risks. 159-161 - Pierre Bergé, Jason Crampton, Gregory Z. Gutin, Rémi Watrigant:
The Authorization Policy Existence Problem. 163-165 - Cetin Sahin, Brandon Kuczenski, Ömer Egecioglu, Amr El Abbadi:
Towards Practical Privacy-Preserving Life Cycle Assessment Computations. 167-169
Keynote II
- S. Raj Rajagopalan:
The Human Capital Model for Security Research: New Insights into Technology Transition. 171-172
Session 6: Protection Against Malware and Static Analysis
- Yufei Gu, Qingchuan Zhao, Yinqian Zhang, Zhiqiang Lin:
PT-CFI: Transparent Backward-Edge Control Flow Violation Detection Using Intel Processor Trace. 173-184 - Sebastian Banescu, Mohsen Ahmadvand, Alexander Pretschner, Robert Shield, Chris Hamilton:
Detecting Patching of Executables without System Calls. 185-196 - Robert Buhren, Shay Gueron, Jan Nordholz, Jean-Pierre Seifert, Julian Vetter:
Fault Attacks on Encrypted General Purpose Compute Platforms. 197-204 - Babak Yadegari, Jon Stephens, Saumya Debray:
Analysis of Exception-Based Control Transfers. 205-216
Session 7: Panel Trustworthy Data Science
- Adam Doupé:
Panel: Trustworthy Data Science. 217
Session 8: Malware Detection
- Mohamed Elsabagh, Daniel Barbará, Dan Fleck, Angelos Stavrou:
Detecting ROP with Statistical Learning of Program Characteristics. 219-226 - Bo Li, Kevin A. Roundy, Christopher S. Gates, Yevgeniy Vorobeychik:
Large-Scale Identification of Malicious Singleton Files. 227-238 - Mehadi Hassen, Philip K. Chan:
Scalable Function Call Graph-based Malware Classification. 239-248
Session 9: Virtualization and Hardware
- Zhe Zhou, Zhou Li, Kehuan Zhang:
All Your VMs are Disconnected: Attacking Hardware Virtualized Network. 249-260 - Samuel Weiser, Mario Werner:
SGXIO: Generic Trusted I/O Path for Intel SGX. 261-268 - Rui Shu, Xiaohui Gu, William Enck:
A Study of Security Vulnerabilities on Docker Hub. 269-280
Session 10: Mobile Security
- Yifei Zhang, Tian Tan, Yue Li, Jingling Xue:
Ripple: Reflection Analysis for Android Apps in Incomplete Information Environments. 281-288 - Luka Malisa, Kari Kostiainen, Srdjan Capkun:
Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception. 289-300 - Niall McLaughlin, Jesús Martínez del Rincón, BooJoong Kang, Suleiman Y. Yerima, Paul Miller, Sakir Sezer, Yeganeh Safaei, Erik Trickel, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Deep Android Malware Detection. 301-308 - Guillermo Suarez-Tangil, Santanu Kumar Dash, Mansour Ahmadi, Johannes Kinder, Giorgio Giacinto, Lorenzo Cavallaro:
DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware. 309-320
Session 11: Applications
- Luca Compagna, Daniel Ricardo dos Santos, Serena Elisa Ponta, Silvio Ranise:
Aegis: Automatic Enforcement of Security Policies in Workflow-driven Web Applications. 321-328 - Alexander Sjösten, Steven Van Acker, Andrei Sabelfeld:
Discovering Browser Extensions via Web Accessible Resources. 329-336 - Zhiyuan Lin, Mahesh Tripunitara:
Graph Automorphism-Based, Semantics-Preserving Security for the Resource Description Framework (RDF). 337-348 - Alexandra Dmitrienko, Christian Plappert:
Secure Free-Floating Car Sharing for Offline Cars. 349-360 - Andrew Reed, Michael J. Kranch:
Identifying HTTPS-Protected Netflix Videos in Real-Time. 361-368
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.