default search action
CODASPY 2019: Richardson, TX, USA
- Gail-Joon Ahn, Bhavani Thuraisingham, Murat Kantarcioglu, Ram Krishnan:
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, CODASPY 2019, Richardson, TX, USA, March 25-27, 2019. ACM 2019, ISBN 978-1-4503-6099-9
Session 1: Mobile Security
- Kailiang Ying, Priyank Thavai, Wenliang Du:
TruZ-View: Developing TrustZone User Interface for Mobile OS Using Delegation Integration Model. 1-12 - Tatsuhiko Yasumatsu, Takuya Watanabe, Fumihiro Kanei, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori:
Understanding the Responsiveness of Mobile App Developers to Software Library Updates. 13-24 - Sigmund Albert Gorski III, Benjamin Andow, Adwait Nadkarni, Sunil Manandhar, William Enck, Eric Bodden, Alexandre Bartel:
ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware. 25-36 - Michalis Diamantaris, Elias P. Papadopoulos, Evangelos P. Markatos, Sotiris Ioannidis, Jason Polakis:
REAPER: Real-time App Analysis for Augmenting the Android Permission System. 37-48
Session 2: IoT/Smart Device Security
- Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian:
Verifiable Round-Robin Scheme for Smart Homes. 49-60 - Maanak Gupta, James O. Benson, Farhan Patwa, Ravi S. Sandhu:
Dynamic Groups and Attribute-Based Access Control for Next-Generation Smart Cars. 61-72 - Kaushal Kafle, Kevin Moran, Sunil Manandhar, Adwait Nadkarni, Denys Poshyvanyk:
A Study of Data Store-based Home Automation. 73-84 - Amit Tambe, Yan Lin Aung, Ragav Sridharan, Martín Ochoa, Nils Ole Tippenhauer, Asaf Shabtai, Yuval Elovici:
Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots. 85-96
Session 3: Data Security and Privacy
- Ehsan Hesamifard, Hassan Takabi, Mehdi Ghasemi:
Deep Neural Networks Classification over Encrypted Data. 97-108 - Nikolai J. Podlesny, Anne V. D. M. Kayem, Christoph Meinel:
Attribute Compartmentation and Greedy UCC Discovery for High-Dimensional Data Anonymization. 109-119 - Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Ryan Sheatsley, Patrick D. McDaniel, A. Selcuk Uluagac:
Curie: Policy-based Secure Data Exchange. 121-132 - Asmaa Sallam, Elisa Bertino:
Result-Based Detection of Insider Threats to Relational Databases. 133-143
Session 4: Poster Session
- Maryam Fanaeepour, Ashwin Machanavajjhala:
PrivStream: Differentially Private Event Detection on Data Streams. 145-147 - Wakana Maeda, Yuji Yamaoka:
Custom-made Anonymization by Data Analysis Program Provided by Recipient. 149-151 - Augustee Meshram, Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
ABACaaS: Attribute-Based Access Control as a Service. 153-155 - Yihe Zhang, Hao Zhang, Xu Yuan:
Toward Efficient Spammers Gathering in Twitter Social Networks. 157-159 - Ryosuke Kobayashi, Nobuyuki Saji, Nobuo Shigeta, Rie Shigetomi Yamaguchi:
Large Scale PoC Experiment with 57, 000 people to Accumulate Patterns for Lifestyle Authentication. 161-163 - Sharad Mehrotra, Shantanu Sharma, Jeffrey D. Ullman:
Scaling Cryptographic Techniques by Exploiting Data Sensitivity at a Public Cloud. 165-167 - Houtan Faridi, Srivathsan Srinivasagopalan, Rakesh M. Verma:
Parameter Tuning and Confidence Limits of Malware Clustering. 169-171
Session 5: Access Control and Information Flow
- Maribel Fernández, Ian Mackie, Bhavani Thuraisingham:
Specification and Analysis of ABAC Policies via the Category-based Metamodel. 173-184 - Philip W. L. Fong:
Results in Workflow Resiliency: Complexity, New Formulation, and ASP Encoding. 185-196 - Tobias F. Pfeffer, Thomas Göthel, Sabine Glesner:
Efficient and Precise Information Flow Control for Machine Code through Demand-Driven Secure Multi-Execution. 197-208 - Yuseok Jeon, Junghwan Rhee, Chung Hwan Kim, Zhichun Li, Mathias Payer, Byoungyoung Lee, Zhenyu Wu:
PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications. 209-220
Session 6: Hardware Assisted Data Security
- Mathias Morbitzer, Manuel Huber, Julian Horsch:
Extracting Secrets from Encrypted Virtual Machines. 221-230 - Flavio Toffalini, Martín Ochoa, Jun Sun, Jianying Zhou:
Careful-Packing: A Practical and Scalable Anti-Tampering Software Protection enforced by Trusted Computing. 231-242 - Cory Thoma, Adam J. Lee, Alexandros Labrinidis:
Behind Enemy Lines: Exploring Trusted Data Stream Processing on Untrusted Systems. 243-254 - Dave (Jing) Tian, Joseph I. Choi, Grant Hernandez, Patrick Traynor, Kevin R. B. Butler:
A Practical Intel SGX Setting for Linux Containers in the Cloud. 255-266
Session 7: Web Security and Privacy
- Blake Anderson, Andrew Chi, Scott Dunlop, David A. McGrew:
Limitless HTTP in an HTTPS World: Inferring the Semantics of the HTTPS Protocol without Decryption. 267-278 - Hasan Faik Alan, Jasleen Kaur:
Client Diversity Factor in HTTPS Webpage Fingerprinting. 279-290 - Alina Matyukhina, Natalia Stakhanova, Mila Dalla Preda, Celine Perley:
Adversarial Authorship Attribution in Open-Source Projects. 291-302 - Zhibo Sun, Carlos E. Rubio-Medrano, Ziming Zhao, Tiffany Bao, Adam Doupé, Gail-Joon Ahn:
Understanding and Predicting Private Interactions in Underground Forums. 303-314
Session 8: System Security and Authentication
- Ronny Chevalier, Stefano Cristalli, Christophe Hauser, Yan Shoshitaishvili, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna, Danilo Bruschi, Andrea Lanzi:
BootKeeper: Validating Software Integrity Properties on Boot Firmware Images. 315-325 - Peiying Wang, Shijie Jia, Bo Chen, Luning Xia, Peng Liu:
MimosaFTL: Adding Secure and Practical Ransomware Defense Strategy to Flash Translation Layer. 327-338 - Gaurav Panwar, Satyajayant Misra, Roopa Vishwanathan:
BlAnC: Blockchain-based Anonymous and Decentralized Credit Networks. 339-350 - Laleh Eskandarian, Dilara Akdogan, Duygu Karaoglan Altop, Albert Levi:
SKA-CaNPT: Secure Key Agreement using Cancelable and Noninvertible Biometrics based on Periodic Transformation. 351-362
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.