default search action
CODASPY 2023: Charlotte, NC, USA
- Mohamed Shehab, Maribel Fernández, Ninghui Li:
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2023, Charlotte, NC, USA, April 24-26, 2023. ACM 2023
Keynote I
- Michael K. Reiter:
Tackling Credential Abuse Together. 1
Session 1: Privacy Analysis
- Ahsan Zafar, Anupam Das:
Comparative Privacy Analysis of Mobile Browsers. 3-14 - Minh-Ha Le, Niklas Carlsson:
IdDecoder: A Face Embedding Inversion Tool and its Privacy and Security Implications on Facial Recognition Systems. 15-26 - Pier Paolo Tricomi, Lisa Facciolo, Giovanni Apruzzese, Mauro Conti:
Attribute Inference Attacks in Online Multiplayer Video Games: A Case Study on DOTA2. 27-38 - Ankit Gangwal, Shubham Singh, Abhijeet Srivastava:
AutoSpill: Credential Leakage from Mobile Password Managers. 39-47
Session 2: Human Factors and Cloud
- Md. Lutfor Rahman, Daniel Timko, Hamid Wali, Ajaya Neupane:
Users Really Do Respond To Smishing. 49-60 - Ahmed Anu Wahab, Daqing Hou, Stephanie Schuckers:
A User Study of Keystroke Dynamics as Second Factor in Web MFA. 61-72 - Aratrika Ray-Dowling, Ahmed Anu Wahab, Daqing Hou, Stephanie Schuckers:
Multi-Modality Mobile Datasets for Behavioral Biometrics Research: Data/Toolset paper. 73-78 - Momen Oqaily, Suryadipta Majumdar, Lingyu Wang, Mohammad Ekramul Kabir, Yosr Jarraya, A. S. M. Asadujjaman, Makan Pourzandi, Mourad Debbabi:
A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual Network Function Chains Hosted on Third-Party Clouds. 79-90 - Zecheng He, Guangyuan Hu, Ruby B. Lee:
CloudShield: Real-time Anomaly Detection in the Cloud. 91-102
Keynote II
- Catuscia Palamidessi:
Local Methods for Privacy Protection and Impact on Fairness. 103
Session 3: Privacy Enhancing Techniques
- Andreas Klinger, Ulrike Meyer:
Privacy-Preserving Fully Online Matching with Deadlines. 105-116 - Alberto Ibarrondo, Hervé Chabanne, Vincent Despiegel, Melek Önen:
Grote: Group Testing for Privacy-Preserving Face Identification. 117-128 - Andreas Klinger, Felix Battermann, Ulrike Meyer:
Anonymous System for Fully Distributed and Robust Secure Multi-Party Computation. 129-139 - Ricardo Mendes, Mariana Cunha, João P. Vilela:
Velocity-Aware Geo-Indistinguishability. 141-152
Session 4: Software and Systems Security
- Md Shihabul Islam, Mahmoud Zamani, Chung Hwan Kim, Latifur Khan, Kevin W. Hamlen:
Confidential Execution of Deep Learning Inference at the Untrusted Edge with ARM TrustZone. 153-164 - Haoxiang Qin, Zhenyu Song, Weijuan Zhang, Sicong Huang, Wentao Yao, Ge Liu, Xiaoqi Jia, Haichao Du:
Protecting Encrypted Virtual Machines from Nested Page Fault Controlled Channel. 165-175 - Claudius Pott, Berk Gülmezoglu, Thomas Eisenbarth:
Overcoming the Pitfalls of HPC-based Cryptojacking Detection in Presence of GPUs. 177-188 - Tom Ganz, Inaam Ashraf, Martin Härterich, Konrad Rieck:
Detecting Backdoors in Collaboration Graphs of Software Repositories. 189-200
Session 5: IoT and Embedded Systesms Security
- Seonghoon Jeong, Minsoo Ryu, Hyunjae Kang, Huy Kang Kim:
Infotainment System Matters: Understanding the Impact and Implications of In-Vehicle Infotainment System Hacking with Automotive Grade Linux. 201-212 - Sayon Duttagupta, Eduard Marin, Dave Singelée, Bart Preneel:
HAT: Secure and Practical Key Establishment for Implantable Medical Devices. 213-224 - Sebastian Surminski, Christian Niesler, Sebastian Linsner, Lucas Davi, Christian Reuter:
SCAtt-man: Side-Channel-Based Remote Attestation for Embedded Devices that Users Understand. 225-236 - Vincent Unsel, Stephan Wiefling, Nils Gruschka, Luigi Lo Iacono:
Risk-Based Authentication for OpenStack: A Fully Functional Implementation and Guiding Example. 237-243 - Bhaskar Tejaswi, Mohammad Mannan, Amr M. Youssef:
All Your IoT Devices Are Belong to Us: Security Weaknesses in IoT Management Platforms. 245-250
Session 6: Access Control
- Babak Amin Azad, Nick Nikiforakis:
Role Models: Role-based Debloating for Web Applications. 251-262 - Amani Abu Jabal, Elisa Bertino, Jorge Lobo, Dinesh C. Verma, Seraphin B. Calo, Alessandra Russo:
FLAP - A Federated Learning Framework for Attribute-based Access Control Policies. 263-272 - Ritwik Rai, Shamik Sural:
Tool/Dataset Paper: Realistic ABAC Data Generation using Conditional Tabular GAN. 273-278
Poster Session
- Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam:
Exploiting Windows PE Structure for Adversarial Malware Evasion Attacks. 279-281 - Safwa Ameer, Ram Krishnan, Ravi S. Sandhu, Maanak Gupta:
Utilizing The DLBAC Approach Toward a ZT Score-based Authorization for IoT Systems. 283-285 - Talaya Farasat, Muhammad Ahmad Rathore, JongWon Kim:
Securing Kubernetes Pods communicating over Weave Net through eBPF/XDP from DDoS attacks. 287-289 - Nakul Aggarwal, Shamik Sural:
RanSAM: Randomized Search for ABAC Policy Mining. 291-293 - Khandakar Ashrafi Akbar, Sadaf Md. Halim, Anoop Singhal, Basel Abdeen, Latifur Khan, Bhavani Thuraisingham:
The Design of an Ontology for ATT&CK and its Application to Cybersecurity. 295-297
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.