default search action
CODASPY 2018: Tempe, AZ, USA
- Ziming Zhao, Gail-Joon Ahn, Ram Krishnan, Gabriel Ghinita:
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018. ACM 2018
Keynote Address I
- Brad Wardman:
Managing the Crossroads of Academia and Industry. 1
Cloud Security
- Matthew W. Sanders, Chuan Yue:
Minimizing Privilege Assignment Errors in Cloud Services. 2-12 - Iraklis Leontiadis, Reza Curtmola:
Secure Storage with Replication and Transparent Deduplication. 13-23 - Cong Liao, Haoti Zhong, Sencun Zhu, Anna Cinzia Squicciarini:
Server-Based Manipulation Attacks Against Machine Learning Models. 24-34 - Aravind Ramachandran, Murat Kantarcioglu:
SmartProvenance: A Distributed, Blockchain Based DataProvenance System. 35-42
Privacy
- Aleksandra Korolova, Vinod Sharma:
Cross-App Tracking via Nearby Bluetooth Low Energy Devices. 43-52 - Cetin Sahin, Brandon Kuczenski, Ömer Egecioglu, Amr El Abbadi:
Privacy-Preserving Certification of Sustainability Metrics. 53-63 - Daniel Le Métayer, Pablo Rauzy:
Capacity: an Abstract Model of Control over Personal Data. 64-75 - Thomas Hupperich, Dennis Tatang, Nicolai Wilkop, Thorsten Holz:
An Empirical Study on Online Price Differentiation. 76-83
IoT Security
- Xiruo Liu, Rafael Misoczki, Manoj R. Sastry:
Remote Attestation for Low-End Prover Devices with Post-Quantum Capabilities. 84-94 - Khalid Alghamdi, Ali Alqazzaz, Anyi Liu, Ming Hua:
IoTVerif: An Automated Tool to Verify SSL/TLS Certificate Validation in Android MQTT Client Applications. 95-102 - S. Abhishek Anand, Nitesh Saxena:
Keyboard Emanations in Remote Voice Calls: Password Leakage and Noise(less) Masking Defenses. 103-110 - Mahmoud Ammar, Wilfried Daniels, Bruno Crispo, Danny Hughes:
SPEED: Secure Provable Erasure for Class-1 IoT Devices. 111-118
Attacks I (Vulnerability Analysis/Malware)
- Luca Allodi, Sebastian Banescu, Henning Femmer, Kristian Beckers:
Identifying Relevant Information Cues for Vulnerability Assessment Using CVSS. 119-126 - Hiromu Yakura, Shinnosuke Shinozaki, Reon Nishimura, Yoshihiro Oyama, Jun Sakuma:
Malware Analysis of Imaged Binary Samples by Convolutional Neural Network with Attention Mechanism. 127-134 - M. Ugur Aksu, Kemal Bicakci, M. Hadi Dilek, A. Murat Ozbayoglu, Emin Islam Tatli:
Automated Generation of Attack Graphs Using NVD. 135-142
Reception and Posters
- Melissa Wan Jun Chua, Vivek Balachandran:
Effectiveness of Android Obfuscation on Evading Anti-malware. 143-145 - D. Geethanjali, Tan Li Ying, Melissa Wan Jun Chua, Vivek Balachandran:
AEON: Android Encryption based Obfuscation. 146-148 - Oana-Georgiana Niculaescu, Gabriel Ghinita:
An Empirical Study of Differentially-Private Analytics for High-Speed Network Data. 149-151 - Pallavi Sivakumaran, Jorge Blasco Alís:
A Low Energy Profile: Analysing Characteristic Security on BLE Peripherals. 152-154 - Yongxian Zhang, Xinluo Wang, Ziming Zhao, Hui Li:
Secure Display for FIDO Transaction Confirmation. 155-157 - Farhad Rasapour, Hoda Mehrpouyan:
Misusing Sensory Channel to Attack Industrial Control Systems. 158-160 - Penghui Zhang, Bernard Ngabonziza, Haehyun Cho, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
SeCore: Continuous Extrospection with High Visibility on Multi-core ARM Platforms. 161-163 - Roshan Shrestha, Hoda Mehrpouyan, Dianxiang Xu:
Model Checking of Security Properties in Industrial Control Systems (ICS). 164-166 - Christine Schuppler, Maria Leitner, Stefanie Rinderle-Ma:
Privacy-aware Data Assessment of Online Social Network Registration Processes. 167-169 - Juan D. Parra Rodriguez, Joachim Posegga:
CSP & Co. Can Save Us from a Rogue Cross-Origin Storage Browser Network! But for How Long? 170-172
Keynote Address II
- Christian S. Collberg:
Code Obfuscation: Why is This Still a Thing? 173-174
Access Control and Authentication
- Asma Alshehri, James O. Benson, Farhan Patwa, Ravi S. Sandhu:
Access Control Model for Virtual Objects (Shadows) Communication for AWS Internet of Things. 175-185 - Amirreza Masoumzadeh:
Security Analysis of Relationship-Based Access Control Policies. 186-195 - Chun Wang, Steve T. K. Jan, Hang Hu, Douglas Bossart, Gang Wang:
The Next Domino to Fall: Empirical Analysis of User Passwords across Online Services. 196-203 - Syed Zain R. Rizvi, Philip W. L. Fong:
Efficient Authorization of Graph Database Queries in an Attribute-Supporting ReBAC Model. 204-211
Virtualization/System Security
- Micah Bushouse, Douglas S. Reeves:
Hyperagents: Migrating Host Agents to the Hypervisor. 212-223 - Samira Briongos, Gorka Irazoqui, Pedro Malagón, Thomas Eisenbarth:
CacheShield: Detecting Cache Attacks through Self-Observation. 224-235 - Guilherme Cox, Zi Yan, Abhishek Bhattacharjee, Vinod Ganapathy:
Secure, Consistent, and High-Performance Memory Snapshotting. 236-247 - Hussain M. J. Almohri, David Evans:
Fidelius Charm: Isolating Unsafe Rust Code. 248-255
Mobile Security
- Oyindamola Oluwatimi, Elisa Bertino:
A Multi-Enterprise Containerization Approach with an Interoperable Position-Based System. 256-266 - Attaullah Buriro, Bruno Crispo, Sandeep Gupta, Filippo Del Frari:
DIALERAUTH: A Motion-assisted Touch-based Smartphone User Authentication Scheme. 267-276 - Hugo Gonzalez, Natalia Stakhanova, Ali A. Ghorbani:
Authorship Attribution of Android Apps. 277-286 - Eduard Marin, Dave Singelée, Bohan Yang, Vladimir Volskiy, Guy A. E. Vandenbosch, Bart Nuttin, Bart Preneel:
Securing Wireless Neurostimulators. 287-298 - Daoyuan Wu, Yao Cheng, Debin Gao, Yingjiu Li, Robert H. Deng:
SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications. 299-306
Attacks II (Networks)
- Md. Mahmud Hossain, Yasser Karim, Ragib Hasan:
SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in 6LoWPAN. 307-318 - Saranyan Senthivel, Shrey Dhungana, Hyunguk Yoo, Irfan Ahmed, Vassil Roussev:
Denial of Engineering Operations Attacks in Industrial Control Systems. 319-329
Web Security
- Issa M. Khalil, Bei Guan, Mohamed Nabeel, Ting Yu:
A Domain is only as Good as its Buddies: Detecting Stealthy Malicious Domains via Graph Inference. 330-341 - Ghous Amjad, Muhammad Shujaat Mirza, Christina Pöpper:
Forgetting with Puzzles: Using Cryptographic Puzzles to support Digital Forgetting. 342-353
Code Analysis
- Fabio Pagani, Matteo Dell'Amico, Davide Balzarotti:
Beyond Precision and Recall: Understanding Uses (and Misuses) of Similarity Hashes in Binary Analysis. 354-365 - Dongrui Zeng, Gang Tan:
From Debugging-Information Based Binary-Level Type Inference to CFG Generation. 366-376 - Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar:
MASCAT: Preventing Microarchitectural Attacks Before Distribution. 377-388
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.