


default search action
CODASPY 2017: Scottsdale, AZ, USA
- Gail-Joon Ahn, Alexander Pretschner, Gabriel Ghinita:

Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017. ACM 2017, ISBN 978-1-4503-4523-1
Keynote I
- Kang G. Shin:

Research Issues and Approaches for Connected and Automated Vehicles. 1
Session 1: Threats and Anomaly Detection
- Shagufta Mehnaz, Elisa Bertino:

Ghostbuster: A Fine-grained Approach for Anomaly Detection in File System Accesses. 3-14 - Hugo Gascon, Bernd Grobauer

, Thomas Schreck
, Lukas Rist, Daniel Arp, Konrad Rieck:
Mining Attributed Graphs for Threat Intelligence. 15-22 - Margaux Canet, Amrit Kumar, Cédric Lauradoux, Mary-Andréa Rakotomanga, Reihaneh Safavi-Naini:

Decompression Quines and Anti-Viruses. 23-34 - Shameek Bhattacharjee

, Aditya Thakur, Simone Silvestri, Sajal K. Das
:
Statistical Security Incident Forensics against Data Falsification in Smart Grid Advanced Metering Infrastructure. 35-45
Session 2: Access Control
- Jason Crampton, Conrad Williams:

Canonical Completeness in Lattice-Based Languages for Attribute-Based Access Control. 47-58 - Tahmina Ahmed, Ravi S. Sandhu, Jaehong Park:

Classifying and Comparing Attribute-Based and Relationship-Based Access Control. 59-70 - Panagiotis Ilia

, Barbara Carminati
, Elena Ferrari
, Paraskevi Fragopoulou
, Sotiris Ioannidis:
SAMPAC: Socially-Aware collaborative Multi-Party Access Control. 71-82
Session 3: Privacy I
- Jan Henrik Ziegeldorf, Jan Metzke, Jan Rüth

, Martin Henze
, Klaus Wehrle
:
Privacy-Preserving HMM Forward Computation. 83-94 - Daniele Ucci

, Leonardo Aniello, Roberto Baldoni:
Share a pie?: Privacy-Preserving Knowledge Base Export through Count-min Sketches. 95-106 - Fabian Foerg, Susanne Wetzel, Ulrike Meyer:

Efficient Commodity Matching for Privacy-Preserving Two-Party Bartering. 107-114
Session 4: Privacy II
- Vincent Bindschaedler

, Shantanu Rane, Alejandro E. Brito, Vanishree Rao, Ersin Uzun
:
Achieving Differential Privacy in Secure Multiparty Data Aggregation Protocols on Star Networks. 115-125 - Hamza Harkous, Karl Aberer:

"If You Can't Beat them, Join them": A Usability Approach to Interdependent Privacy in Cloud Apps. 127-138
Session 5: Reception and Poster Session
- Abdelouahab Amira

, Abdelraouf Ouadjaout
, Abdelouahid Derhab, Nadjib Badache:
Sound and Static Analysis of Session Fixation Vulnerabilities in PHP Web Applications. 139-141 - Chi Sing Chum, Xiaowen Zhang:

A New Bloom Filter Structure for Searchable Encryption Schemes. 143-145 - Syed Rafiul Hussain, Shagufta Mehnaz, Shahriar Nirjon, Elisa Bertino:

Seamless and Secure Bluetooth LE Connection Migration. 147-149 - Oana-Georgiana Niculaescu, Mihai Maruseac, Gabriel Ghinita:

Differentially-Private Big Data Analytics for High-Speed Research Network Traffic Measurement. 151-153 - Rakesh M. Verma

, Ayman El Aassal:
Comprehensive Method for Detecting Phishing EmailsUsing Correlation-based Analysis and User Participation. 155-157 - Fang Liu, Haipeng Cai

, Gang Wang, Danfeng (Daphne) Yao
, Karim O. Elish, Barbara G. Ryder:
Prioritized Analysis of Inter-App Communication Risks. 159-161 - Pierre Bergé, Jason Crampton, Gregory Z. Gutin, Rémi Watrigant:

The Authorization Policy Existence Problem. 163-165 - Cetin Sahin, Brandon Kuczenski, Ömer Egecioglu, Amr El Abbadi:

Towards Practical Privacy-Preserving Life Cycle Assessment Computations. 167-169
Keynote II
- S. Raj Rajagopalan:

The Human Capital Model for Security Research: New Insights into Technology Transition. 171-172
Session 6: Protection Against Malware and Static Analysis
- Yufei Gu, Qingchuan Zhao

, Yinqian Zhang, Zhiqiang Lin:
PT-CFI: Transparent Backward-Edge Control Flow Violation Detection Using Intel Processor Trace. 173-184 - Sebastian Banescu

, Mohsen Ahmadvand, Alexander Pretschner, Robert Shield, Chris Hamilton:
Detecting Patching of Executables without System Calls. 185-196 - Robert Buhren, Shay Gueron, Jan Nordholz, Jean-Pierre Seifert, Julian Vetter:

Fault Attacks on Encrypted General Purpose Compute Platforms. 197-204 - Babak Yadegari, Jon Stephens

, Saumya Debray:
Analysis of Exception-Based Control Transfers. 205-216
Session 7: Panel Trustworthy Data Science
- Adam Doupé:

Panel: Trustworthy Data Science. 217
Session 8: Malware Detection
- Mohamed Elsabagh

, Daniel Barbará, Dan Fleck
, Angelos Stavrou
:
Detecting ROP with Statistical Learning of Program Characteristics. 219-226 - Bo Li, Kevin A. Roundy, Christopher S. Gates, Yevgeniy Vorobeychik:

Large-Scale Identification of Malicious Singleton Files. 227-238 - Mehadi Hassen, Philip K. Chan:

Scalable Function Call Graph-based Malware Classification. 239-248
Session 9: Virtualization and Hardware
- Zhe Zhou, Zhou Li

, Kehuan Zhang:
All Your VMs are Disconnected: Attacking Hardware Virtualized Network. 249-260 - Samuel Weiser, Mario Werner:

SGXIO: Generic Trusted I/O Path for Intel SGX. 261-268 - Rui Shu, Xiaohui Gu, William Enck:

A Study of Security Vulnerabilities on Docker Hub. 269-280
Session 10: Mobile Security
- Yifei Zhang, Tian Tan, Yue Li, Jingling Xue

:
Ripple: Reflection Analysis for Android Apps in Incomplete Information Environments. 281-288 - Luka Malisa, Kari Kostiainen, Srdjan Capkun:

Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception. 289-300 - Niall McLaughlin

, Jesús Martínez del Rincón
, BooJoong Kang, Suleiman Y. Yerima, Paul Miller, Sakir Sezer, Yeganeh Safaei, Erik Trickel, Ziming Zhao, Adam Doupé, Gail-Joon Ahn
:
Deep Android Malware Detection. 301-308 - Guillermo Suarez-Tangil

, Santanu Kumar Dash
, Mansour Ahmadi, Johannes Kinder, Giorgio Giacinto
, Lorenzo Cavallaro
:
DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware. 309-320
Session 11: Applications
- Luca Compagna, Daniel Ricardo dos Santos, Serena Elisa Ponta, Silvio Ranise

:
Aegis: Automatic Enforcement of Security Policies in Workflow-driven Web Applications. 321-328 - Alexander Sjösten

, Steven Van Acker, Andrei Sabelfeld:
Discovering Browser Extensions via Web Accessible Resources. 329-336 - Zhiyuan Lin, Mahesh Tripunitara:

Graph Automorphism-Based, Semantics-Preserving Security for the Resource Description Framework (RDF). 337-348 - Alexandra Dmitrienko, Christian Plappert

:
Secure Free-Floating Car Sharing for Offline Cars. 349-360 - Andrew Reed, Michael J. Kranch:

Identifying HTTPS-Protected Netflix Videos in Real-Time. 361-368

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














