


default search action
CODASPY 2019: Richardson, TX, USA
- Gail-Joon Ahn, Bhavani Thuraisingham, Murat Kantarcioglu, Ram Krishnan:

Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, CODASPY 2019, Richardson, TX, USA, March 25-27, 2019. ACM 2019, ISBN 978-1-4503-6099-9
Session 1: Mobile Security
- Kailiang Ying, Priyank Thavai, Wenliang Du:

TruZ-View: Developing TrustZone User Interface for Mobile OS Using Delegation Integration Model. 1-12 - Tatsuhiko Yasumatsu, Takuya Watanabe, Fumihiro Kanei, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori

:
Understanding the Responsiveness of Mobile App Developers to Software Library Updates. 13-24 - Sigmund Albert Gorski III, Benjamin Andow, Adwait Nadkarni, Sunil Manandhar, William Enck

, Eric Bodden, Alexandre Bartel:
ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware. 25-36 - Michalis Diamantaris, Elias P. Papadopoulos, Evangelos P. Markatos, Sotiris Ioannidis, Jason Polakis:

REAPER: Real-time App Analysis for Augmenting the Android Permission System. 37-48
Session 2: IoT/Smart Device Security
- Nisha Panwar

, Shantanu Sharma
, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian:
Verifiable Round-Robin Scheme for Smart Homes. 49-60 - Maanak Gupta, James O. Benson

, Farhan Patwa, Ravi S. Sandhu:
Dynamic Groups and Attribute-Based Access Control for Next-Generation Smart Cars. 61-72 - Kaushal Kafle, Kevin Moran, Sunil Manandhar, Adwait Nadkarni, Denys Poshyvanyk

:
A Study of Data Store-based Home Automation. 73-84 - Amit Tambe, Yan Lin Aung, Ragav Sridharan, Martín Ochoa, Nils Ole Tippenhauer, Asaf Shabtai, Yuval Elovici:

Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots. 85-96
Session 3: Data Security and Privacy
- Ehsan Hesamifard, Hassan Takabi, Mehdi Ghasemi:

Deep Neural Networks Classification over Encrypted Data. 97-108 - Nikolai J. Podlesny, Anne V. D. M. Kayem, Christoph Meinel:

Attribute Compartmentation and Greedy UCC Discovery for High-Dimensional Data Anonymization. 109-119 - Z. Berkay Celik, Abbas Acar

, Hidayet Aksu, Ryan Sheatsley, Patrick D. McDaniel, A. Selcuk Uluagac
:
Curie: Policy-based Secure Data Exchange. 121-132 - Asmaa Sallam, Elisa Bertino:

Result-Based Detection of Insider Threats to Relational Databases. 133-143
Session 4: Poster Session
- Maryam Fanaeepour

, Ashwin Machanavajjhala:
PrivStream: Differentially Private Event Detection on Data Streams. 145-147 - Wakana Maeda, Yuji Yamaoka:

Custom-made Anonymization by Data Analysis Program Provided by Recipient. 149-151 - Augustee Meshram, Saptarshi Das

, Shamik Sural
, Jaideep Vaidya, Vijayalakshmi Atluri
:
ABACaaS: Attribute-Based Access Control as a Service. 153-155 - Yihe Zhang

, Hao Zhang
, Xu Yuan:
Toward Efficient Spammers Gathering in Twitter Social Networks. 157-159 - Ryosuke Kobayashi, Nobuyuki Saji, Nobuo Shigeta, Rie Shigetomi Yamaguchi:

Large Scale PoC Experiment with 57, 000 people to Accumulate Patterns for Lifestyle Authentication. 161-163 - Sharad Mehrotra, Shantanu Sharma

, Jeffrey D. Ullman:
Scaling Cryptographic Techniques by Exploiting Data Sensitivity at a Public Cloud. 165-167 - Houtan Faridi, Srivathsan Srinivasagopalan, Rakesh M. Verma

:
Parameter Tuning and Confidence Limits of Malware Clustering. 169-171
Session 5: Access Control and Information Flow
- Maribel Fernández

, Ian Mackie, Bhavani Thuraisingham:
Specification and Analysis of ABAC Policies via the Category-based Metamodel. 173-184 - Philip W. L. Fong:

Results in Workflow Resiliency: Complexity, New Formulation, and ASP Encoding. 185-196 - Tobias F. Pfeffer, Thomas Göthel, Sabine Glesner:

Efficient and Precise Information Flow Control for Machine Code through Demand-Driven Secure Multi-Execution. 197-208 - Yuseok Jeon, Junghwan Rhee, Chung Hwan Kim

, Zhichun Li, Mathias Payer, Byoungyoung Lee
, Zhenyu Wu:
PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications. 209-220
Session 6: Hardware Assisted Data Security
- Mathias Morbitzer

, Manuel Huber
, Julian Horsch
:
Extracting Secrets from Encrypted Virtual Machines. 221-230 - Flavio Toffalini, Martín Ochoa, Jun Sun, Jianying Zhou

:
Careful-Packing: A Practical and Scalable Anti-Tampering Software Protection enforced by Trusted Computing. 231-242 - Cory Thoma, Adam J. Lee

, Alexandros Labrinidis
:
Behind Enemy Lines: Exploring Trusted Data Stream Processing on Untrusted Systems. 243-254 - Dave (Jing) Tian, Joseph I. Choi, Grant Hernandez, Patrick Traynor, Kevin R. B. Butler

:
A Practical Intel SGX Setting for Linux Containers in the Cloud. 255-266
Session 7: Web Security and Privacy
- Blake Anderson, Andrew Chi, Scott Dunlop, David A. McGrew:

Limitless HTTP in an HTTPS World: Inferring the Semantics of the HTTPS Protocol without Decryption. 267-278 - Hasan Faik Alan, Jasleen Kaur:

Client Diversity Factor in HTTPS Webpage Fingerprinting. 279-290 - Alina Matyukhina

, Natalia Stakhanova, Mila Dalla Preda, Celine Perley:
Adversarial Authorship Attribution in Open-Source Projects. 291-302 - Zhibo Sun

, Carlos E. Rubio-Medrano, Ziming Zhao, Tiffany Bao, Adam Doupé, Gail-Joon Ahn
:
Understanding and Predicting Private Interactions in Underground Forums. 303-314
Session 8: System Security and Authentication
- Ronny Chevalier

, Stefano Cristalli
, Christophe Hauser, Yan Shoshitaishvili, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna, Danilo Bruschi, Andrea Lanzi:
BootKeeper: Validating Software Integrity Properties on Boot Firmware Images. 315-325 - Peiying Wang, Shijie Jia, Bo Chen, Luning Xia, Peng Liu:

MimosaFTL: Adding Secure and Practical Ransomware Defense Strategy to Flash Translation Layer. 327-338 - Gaurav Panwar, Satyajayant Misra, Roopa Vishwanathan:

BlAnC: Blockchain-based Anonymous and Decentralized Credit Networks. 339-350 - Laleh Eskandarian, Dilara Akdogan, Duygu Karaoglan Altop, Albert Levi

:
SKA-CaNPT: Secure Key Agreement using Cancelable and Noninvertible Biometrics based on Periodic Transformation. 351-362

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














