


default search action
CODASPY 2018: Tempe, AZ, USA
- Ziming Zhao, Gail-Joon Ahn, Ram Krishnan, Gabriel Ghinita:

Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018. ACM 2018
Keynote Address I
- Brad Wardman:

Managing the Crossroads of Academia and Industry. 1
Cloud Security
- Matthew W. Sanders, Chuan Yue:

Minimizing Privilege Assignment Errors in Cloud Services. 2-12 - Iraklis Leontiadis, Reza Curtmola:

Secure Storage with Replication and Transparent Deduplication. 13-23 - Cong Liao, Haoti Zhong, Sencun Zhu, Anna Cinzia Squicciarini:

Server-Based Manipulation Attacks Against Machine Learning Models. 24-34 - Aravind Ramachandran, Murat Kantarcioglu:

SmartProvenance: A Distributed, Blockchain Based DataProvenance System. 35-42
Privacy
- Aleksandra Korolova, Vinod Sharma:

Cross-App Tracking via Nearby Bluetooth Low Energy Devices. 43-52 - Cetin Sahin, Brandon Kuczenski, Ömer Egecioglu, Amr El Abbadi:

Privacy-Preserving Certification of Sustainability Metrics. 53-63 - Daniel Le Métayer, Pablo Rauzy

:
Capacity: an Abstract Model of Control over Personal Data. 64-75 - Thomas Hupperich

, Dennis Tatang, Nicolai Wilkop, Thorsten Holz
:
An Empirical Study on Online Price Differentiation. 76-83
IoT Security
- Xiruo Liu, Rafael Misoczki, Manoj R. Sastry:

Remote Attestation for Low-End Prover Devices with Post-Quantum Capabilities. 84-94 - Khalid Alghamdi, Ali Alqazzaz

, Anyi Liu, Ming Hua:
IoTVerif: An Automated Tool to Verify SSL/TLS Certificate Validation in Android MQTT Client Applications. 95-102 - S. Abhishek Anand, Nitesh Saxena:

Keyboard Emanations in Remote Voice Calls: Password Leakage and Noise(less) Masking Defenses. 103-110 - Mahmoud Ammar

, Wilfried Daniels, Bruno Crispo, Danny Hughes:
SPEED: Secure Provable Erasure for Class-1 IoT Devices. 111-118
Attacks I (Vulnerability Analysis/Malware)
- Luca Allodi, Sebastian Banescu

, Henning Femmer
, Kristian Beckers:
Identifying Relevant Information Cues for Vulnerability Assessment Using CVSS. 119-126 - Hiromu Yakura, Shinnosuke Shinozaki, Reon Nishimura, Yoshihiro Oyama, Jun Sakuma:

Malware Analysis of Imaged Binary Samples by Convolutional Neural Network with Attention Mechanism. 127-134 - M. Ugur Aksu, Kemal Bicakci

, M. Hadi Dilek, A. Murat Ozbayoglu
, Emin Islam Tatli:
Automated Generation of Attack Graphs Using NVD. 135-142
Reception and Posters
- Melissa Wan Jun Chua, Vivek Balachandran:

Effectiveness of Android Obfuscation on Evading Anti-malware. 143-145 - D. Geethanjali, Tan Li Ying, Melissa Wan Jun Chua, Vivek Balachandran:

AEON: Android Encryption based Obfuscation. 146-148 - Oana-Georgiana Niculaescu, Gabriel Ghinita:

An Empirical Study of Differentially-Private Analytics for High-Speed Network Data. 149-151 - Pallavi Sivakumaran, Jorge Blasco Alís:

A Low Energy Profile: Analysing Characteristic Security on BLE Peripherals. 152-154 - Yongxian Zhang, Xinluo Wang, Ziming Zhao, Hui Li:

Secure Display for FIDO Transaction Confirmation. 155-157 - Farhad Rasapour, Hoda Mehrpouyan

:
Misusing Sensory Channel to Attack Industrial Control Systems. 158-160 - Penghui Zhang, Bernard Ngabonziza, Haehyun Cho, Ziming Zhao, Adam Doupé, Gail-Joon Ahn

:
SeCore: Continuous Extrospection with High Visibility on Multi-core ARM Platforms. 161-163 - Roshan Shrestha, Hoda Mehrpouyan

, Dianxiang Xu:
Model Checking of Security Properties in Industrial Control Systems (ICS). 164-166 - Christine Schuppler, Maria Leitner

, Stefanie Rinderle-Ma
:
Privacy-aware Data Assessment of Online Social Network Registration Processes. 167-169 - Juan D. Parra Rodriguez, Joachim Posegga:

CSP & Co. Can Save Us from a Rogue Cross-Origin Storage Browser Network! But for How Long? 170-172
Keynote Address II
- Christian S. Collberg:

Code Obfuscation: Why is This Still a Thing? 173-174
Access Control and Authentication
- Asma Alshehri, James O. Benson

, Farhan Patwa, Ravi S. Sandhu:
Access Control Model for Virtual Objects (Shadows) Communication for AWS Internet of Things. 175-185 - Amirreza Masoumzadeh:

Security Analysis of Relationship-Based Access Control Policies. 186-195 - Chun Wang, Steve T. K. Jan, Hang Hu, Douglas Bossart, Gang Wang:

The Next Domino to Fall: Empirical Analysis of User Passwords across Online Services. 196-203 - Syed Zain R. Rizvi, Philip W. L. Fong:

Efficient Authorization of Graph Database Queries in an Attribute-Supporting ReBAC Model. 204-211
Virtualization/System Security
- Micah Bushouse, Douglas S. Reeves:

Hyperagents: Migrating Host Agents to the Hypervisor. 212-223 - Samira Briongos, Gorka Irazoqui, Pedro Malagón, Thomas Eisenbarth

:
CacheShield: Detecting Cache Attacks through Self-Observation. 224-235 - Guilherme Cox

, Zi Yan
, Abhishek Bhattacharjee, Vinod Ganapathy:
Secure, Consistent, and High-Performance Memory Snapshotting. 236-247 - Hussain M. J. Almohri

, David Evans
:
Fidelius Charm: Isolating Unsafe Rust Code. 248-255
Mobile Security
- Oyindamola Oluwatimi, Elisa Bertino:

A Multi-Enterprise Containerization Approach with an Interoperable Position-Based System. 256-266 - Attaullah Buriro

, Bruno Crispo
, Sandeep Gupta
, Filippo Del Frari:
DIALERAUTH: A Motion-assisted Touch-based Smartphone User Authentication Scheme. 267-276 - Hugo Gonzalez, Natalia Stakhanova, Ali A. Ghorbani:

Authorship Attribution of Android Apps. 277-286 - Eduard Marin

, Dave Singelée
, Bohan Yang, Vladimir Volskiy, Guy A. E. Vandenbosch, Bart Nuttin, Bart Preneel
:
Securing Wireless Neurostimulators. 287-298 - Daoyuan Wu

, Yao Cheng, Debin Gao
, Yingjiu Li, Robert H. Deng
:
SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications. 299-306
Attacks II (Networks)
- Md. Mahmud Hossain

, Yasser Karim, Ragib Hasan
:
SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in 6LoWPAN. 307-318 - Saranyan Senthivel, Shrey Dhungana, Hyunguk Yoo, Irfan Ahmed

, Vassil Roussev:
Denial of Engineering Operations Attacks in Industrial Control Systems. 319-329
Web Security
- Issa M. Khalil

, Bei Guan, Mohamed Nabeel, Ting Yu:
A Domain is only as Good as its Buddies: Detecting Stealthy Malicious Domains via Graph Inference. 330-341 - Ghous Amjad, Muhammad Shujaat Mirza

, Christina Pöpper
:
Forgetting with Puzzles: Using Cryptographic Puzzles to support Digital Forgetting. 342-353
Code Analysis
- Fabio Pagani, Matteo Dell'Amico

, Davide Balzarotti:
Beyond Precision and Recall: Understanding Uses (and Misuses) of Similarity Hashes in Binary Analysis. 354-365 - Dongrui Zeng, Gang Tan

:
From Debugging-Information Based Binary-Level Type Inference to CFG Generation. 366-376 - Gorka Irazoqui, Thomas Eisenbarth

, Berk Sunar:
MASCAT: Preventing Microarchitectural Attacks Before Distribution. 377-388

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














