


default search action
CODASPY 2016: New Orleans, LA, USA
- Elisa Bertino, Ravi S. Sandhu, Alexander Pretschner:

Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, CODASPY 2016, New Orleans, LA, USA, March 9-11, 2016. ACM 2016, ISBN 978-1-4503-3935-3
Keynote Address
- Jeffrey M. Voas:

Decoding the Mystery of the Internet of Things. 1-2
Privacy and Data Deletion
- John Maheswaran, Daniel Jackowitz, Ennan Zhai, David Isaac Wolinsky, Bryan Ford

:
Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities. 3-13 - Apostolis Zarras

, Katharina Kohls, Markus Dürmuth
, Christina Pöpper
:
Neuralyzer: Flexible Expiration Times for the Revocation of Online Data. 14-25 - Dong Su, Jianneng Cao, Ninghui Li, Elisa Bertino, Hongxia Jin:

Differentially Private K-Means Clustering. 26-37
Address Space Randomization and Control Flow Integrity
- Nick Christoulakis, George Christou, Elias Athanasopoulos, Sotiris Ioannidis:

HCFI: Hardware-enforced Control-Flow Integrity. 38-49 - Yue Chen, Zhi Wang, David B. Whalley, Long Lu:

Remix: On-demand Live Randomization. 50-61 - Yufei Gu, Zhiqiang Lin:

Derandomizing Kernel Address Space Layout for Memory Introspection and Forensics. 62-72
Static Vulnerability Detection and Removal
- Maliheh Monshizadeh, Prasad Naldurg, V. N. Venkatakrishnan:

Patching Logic Vulnerabilities for Web Applications using LogicPatcher. 73-84 - Gustavo Grieco, Guillermo Luis Grinblat, Lucas C. Uzal, Sanjay Rawat

, Josselin Feist, Laurent Mounier:
Toward Large-Scale Vulnerability Discovery using Machine Learning. 85-96 - Awad A. Younis, Yashwant K. Malaiya, Charles Anderson

, Indrajit Ray:
To Fear or Not to Fear That is the Question: Code Characteristics of a Vulnerable Functionwith an Existing Exploit. 97-104
Attacks and Vulnerabilities
- Valeriu-Daniel Stanciu, Riccardo Spolaor, Mauro Conti

, Cristiano Giuffrida
:
On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against Statistical Attacks. 105-112 - Eduard Marin

, Dave Singelée
, Bohan Yang
, Ingrid Verbauwhede
, Bart Preneel
:
On the Feasibility of Cryptography for a Wireless Insulin Pump System. 113-120
Reception and Poster Session
- Navid Pustchi, Farhan Patwa, Ravi S. Sandhu:

Multi Cloud IaaS with Domain Trust in OpenStack. 121-123 - Anjila Tamrakar, Justin D. Russell

, Irfan Ahmed
, Golden G. Richard III
, Carl F. Weems
:
SPICE: A Software Tool for Bridging the Gap Between End-user's Insecure Cyber Behavior and Personality Traits. 124-126 - Mihai Maruseac, Gabriel Ghinita:

Privacy-Preserving Mining of Sequential Association Rules from Provenance Workflows. 127-129 - Mahdi Alizadeh, Nicola Zannone

:
Risk-based Analysis of Business Process Executions. 130-132 - Noriko Tomuro, Steven L. Lytinen, Kurt Hornsburg:

Automatic Summarization of Privacy Policies using Ensemble Learning. 133-135 - Alexandru Ionut Egner, Duc Luu, Jerry den Hartog, Nicola Zannone

:
An Authorization Service for Collaborative Situation Awareness. 136-138 - Johannes Hoffmann, Teemu Rytilahti, Davide Maiorca

, Marcel Winandy, Giorgio Giacinto
, Thorsten Holz
:
Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation. 139-141 - Yoshinori Aono, Takuya Hayashi

, Le Trieu Phong, Lihua Wang:
Scalable and Secure Logistic Regression via Homomorphic Encryption. 142-144 - Aisha I. Ali-Gombe

, Irfan Ahmed
, Golden G. Richard III
, Vassil Roussev:
AspectDroid: Android App Analysis System. 145-147 - Xing Gao, Dachuan Liu, Daiping Liu, Haining Wang:

On Energy Security of Smartphones. 148-150
Keynote Address
- John Knight:

DIVERSITY. 151
Android Security and Malware Detection
- Manar Mohamed, Babins Shrestha, Nitesh Saxena:

SMASheD: Sniffing and Manipulating Android Sensor Data. 152-159 - Ryan Stevens, Jonathan Crussell, Hao Chen

:
On the Origin of Mobile Apps: Network Provenance for Android Applications. 160-171 - Zhenquan Cai, Roland H. C. Yap:

Inferring the Detection Logic and Evaluating the Effectiveness of Android Anti-Virus Apps. 172-182 - Mansour Ahmadi, Dmitry Ulyanov, Stanislav Semenov, Mikhail Trofimov, Giorgio Giacinto

:
Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification. 183-194
Cloud Management and Access Control I
- Taous Madi, Suryadipta Majumdar, Yushun Wang, Yosr Jarraya, Makan Pourzandi, Lingyu Wang:

Auditing Security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack. 195-206 - Carlo Combi

, Luca Viganò
, Matteo Zavatteri
:
Security Constraints in Temporal Role-Based Access-Controlled Workflows. 207-218 - Jason Crampton, James Sellwood:

ARPPM: Administration in the RPPM Model. 219-230
Access Control II
- Syed Zain R. Rizvi, Philip W. L. Fong:

Interoperability of Relationship- and Role-Based Access Control. 231-242 - Ameni Ben Fadhel, Domenico Bianculli

, Lionel C. Briand, Benjamin Hourte:
A Model-driven Approach to Representing and Checking RBAC Contextual Policies. 243-253
Keynote Address
- Anita Nikolich:

SDN Research Challenges and Opportunities. 254
Behavior/Data Flow Anomolies and Containment
- Teryl Taylor, Xin Hu, Ting Wang, Jiyong Jang, Marc Ph. Stoecklin, Fabian Monrose, Reiner Sailer:

Detecting Malicious Exploit Kits using Tree-based Similarity Searches. 255-266 - Daren Fadolalkarim, Asmaa Sallam, Elisa Bertino:

PANDDE: Provenance-based ANomaly Detection of Data Exfiltration. 267-276 - Gaoyao Xiao, Jun Wang, Peng Liu, Jiang Ming, Dinghao Wu:

Program-object Level Data Flow Analysis with Applications to Data Leakage and Contamination Forensics. 277-284 - Judicael Briand Djoko, Brandon Jennings, Adam J. Lee

:
TPRIVEXEC: Private Execution in Virtual Memory. 285-294
Data Flows in Web Applications and Query Paths
- Iberia Medeiros

, Miguel Beatriz, Nuno Ferreira Neves
, Miguel Correia
:
Hacking the DBMS to Prevent Injection Attacks. 295-306 - Musard Balliu, Benjamin Liebe, Daniel Schoepe, Andrei Sabelfeld:

JSLINQ: Building Secure Applications across Tiers. 307-318 - Sushama Karumanchi, Jingwei Li

, Anna Cinzia Squicciarini
:
Efficient Network Path Verification for Policy-routedQueries. 319-328

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














