


default search action
CODASPY 2020: New Orleans, LA, USA
- Vassil Roussev, Bhavani Thuraisingham, Barbara Carminati, Murat Kantarcioglu:

CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, New Orleans, LA, USA, March 16-18, 2020. ACM 2020, ISBN 978-1-4503-7107-0Due to the escalation of the COVID-19 situation around the world, CODASPY'20 was postponed to early fall 2020.
Invited Talk
- Bhavani M. Thuraisingham:

Can AI be for Good in the Midst of Cyber Attacks and Privacy Violations?: A Position Paper. 1-4
Session 1: Trusted Environment
- Aritra Dhar

, Ivan Puddu
, Kari Kostiainen, Srdjan Capkun:
ProximiTEE: Hardened SGX Attestation by Proximity Verification. 5-16 - Thang Hoang, Rouzbeh Behnia, Yeongjin Jang, Attila A. Yavuz

:
MOSE: Practical Multi-User Oblivious Storage via Secure Enclaves. 17-28 - Edoardo Serra

, Anu Shrestha, Francesca Spezzano
, Anna Cinzia Squicciarini:
DeepTrust: An Automatic Framework to Detect Trustworthy Users in Opinion-based Systems. 29-38 - Dimitris Deyannis, Eva Papadogiannaki, Giorgos Kalivianakis, Giorgos Vasiliadis

, Sotiris Ioannidis:
TrustAV: Practical and Privacy Preserving Malware Analysis in the Cloud. 39-48
Session 2: Access Control and Authentication
- Hoai Viet Nguyen

, Luigi Lo Iacono:
CREHMA: Cache-aware REST-ful HTTP Message Authentication. 49-60 - Ivo Sluganovic, Mihael Liskij

, Ante Derek, Ivan Martinovic:
Tap-Pair: Using Spatial Secrets for Single-Tap Device Pairing of Augmented Reality Headsets. 61-72 - Clara Bertolissi, Maribel Fernández

, Bhavani Thuraisingham:
Admin-CBAC: An Administration Model for Category-Based Access Control. 73-84
Session 3: Adversarial Machine Learning
- Huangyi Ge, Sze Yiu Chau

, Bruno Ribeiro
, Ninghui Li:
Random Spiking and Systematic Evaluation of Defenses Against Adversarial Examples. 85-96 - Haoti Zhong, Cong Liao, Anna Cinzia Squicciarini, Sencun Zhu, David J. Miller:

Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation. 97-108 - Jiyu Chen

, David Wang, Hao Chen
:
Explore the Transformation Space for Adversarial Images. 109-120
Session 4: Privacy I
- Bo Zhang, Boxiang Dong, Haipei Sun, Wendy Hui Wang:

AuthPDB: Authentication of Probabilistic Queries on Outsourced Uncertain Data. 121-132 - Markus Hittmeir

, Rudolf Mayer
, Andreas Ekelhart
:
A Baseline for Attribute Disclosure Risk in Synthetic Data. 133-143
Poster Session
- Keita Kayaba, Hidenobu Oguri, Yuji Yamaoka:

Evaluation of Secure Remote Offering Service for Information Bank. 144-146 - Katsuya Matsuoka, Mhd Irvan, Ryosuke Kobayashi, Rie Shigetomi Yamaguchi:

A Score Fusion Method by Neural Network in Multi-Factor Authentication. 147-149 - Kees Leune, Sung Kim:

Service-Oriented Modeling for Cyber Threat Analysis. 150-152 - Mohammad Shameel bin Mohammad Fadilah, Vivek Balachandran, Peter K. K. Loh, Melissa Wan Jun Chua:

DRAT: A Drone Attack Tool for Vulnerability Assessment. 153-155 - Devyani Vij, Vivek Balachandran, Tony Thomas

, Roopak Surendran:
GRAMAC: A Graph Based Android Malware Classification Mechanism. 156-158 - Eduardo Anaya, Jimil Patel, Prerak Shah, Vrushank Shah, Yuan Cheng

:
A Performance Study on Cryptographic Algorithms for IoT Devices. 159-161 - Steven Mackey, Ivan Mihov, Alex Nosenko, Francisco Vega, Yuan Cheng

:
A Performance Comparison of WireGuard and OpenVPN. 162-164 - Peeyush Gupta, Yin Li, Sharad Mehrotra, Nisha Panwar

, Shantanu Sharma
:
Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries. 165-167 - Florian Nuding, Rudolf Mayer

:
Poisoning Attacks in Federated Learning: An Evaluation on Traffic Sign Classification. 168-170 - Ruijia (Roger) Hu, Wyatt Dorris, Nishant Vishwamitra

, Feng Luo, Matthew Costello:
On the Impact of Word Representation in Hate Speech and Offensive Language Detection and Explanation. 171-173 - Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Ke Tian, Miles Frantz, Na Meng, Barton P. Miller, Fahad Shaon, Murat Kantarcioglu, Danfeng (Daphne) Yao

:
Deployment-quality and Accessible Solutions for Cryptography Code Development. 174-176 - Sharmin Afrose, Sazzadur Rahaman, Danfeng (Daphne) Yao

:
A Comprehensive Benchmark on Java Cryptographic API Misuses. 177-178
Session 5: Mobile Security
- Richard Matovu, Abdul Serwadda, Argenis V. Bilbao, Isaac Griswold-Steiner:

Defensive Charging: Mitigating Power Side-Channel Attacks on Charging Smartphones. 179-190 - Stanislav Dashevskyi, Yury Zhauniarovich, Olga Gadyatskaya, Aleksandr Pilgun

, Hamza Ouhssain:
Dissecting Android Cryptocurrency Miners. 191-202 - Johannes Feichtner, Stefan Gruber:

Understanding Privacy Awareness in Android App Descriptions Using Deep Learning. 203-214 - Fabian Franzen, Manuel Andreas, Manuel Huber:

FridgeLock: Preventing Data Theft on Suspended Linux with Usable Memory Encryption. 215-219
Panel: A Vision for Winning the Cybersecurity Arms Race
- Elisa Bertino, Anoop Singhal, Srivathsan Srinivasagopalan, Rakesh M. Verma

:
Developing A Compelling Vision for Winning the Cybersecurity Arms Race. 220-222
Session 6: System Security
- Marco Pernpruner

, Roberto Carbone
, Silvio Ranise, Giada Sciarretta:
The Good, the Bad and the (Not So) Ugly of Out-of-Band Authentication with eID Cards and Push Notifications: Design, Formal and Risk Analysis. 223-234 - Isaac Polinsky

, Kyle Martin, William Enck, Michael K. Reiter:
n-m-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based Web Applications. 235-246 - Yi Xie, Joshua Holmes, Gaby G. Dagher

:
ZeroLender: Trustless Peer-to-Peer Bitcoin Lending Platform. 247-258
Session 7: IoT
- Ahmed Alshehri, Jacob Granley

, Chuan Yue:
Attacking and Protecting Tunneled Traffic of Smart Home Devices. 259-270 - Angeliki Aktypi, Kübra Kalkan, Kasper Bonne Rasmussen:

SeCaS: Secure Capability Sharing Framework for IoT Devices in a Structured P2P Network. 271-282 - Nisha Panwar

, Shantanu Sharma
, Peeyush Gupta, Dhrubajyoti Ghosh, Sharad Mehrotra, Nalini Venkatasubramanian:
IoT Expunge: Implementing Verifiable Retention of IoT Data. 283-294
Session 8: Privacy II
- Kiavash Satvat, Maliheh Shirvanian, Mahshid Hosseini, Nitesh Saxena:

CREPE: A Privacy-Enhanced Crash Reporting System. 295-306 - Yunhui Long, Le Xu, Carl A. Gunter:

A Hypothesis Testing Approach to Sharing Logs with Confidence. 307-318 - Chen Chen, Jaewoo Lee:

Rényi Differentially Private ADMM for Non-Smooth Regularized Optimization. 319-328 - Chibuike Ugwuoke, Zekeriya Erkin

, Marcel J. T. Reinders, Reginald L. Lagendijk:
PREDICT: Efficient Private Disease Susceptibility Testing in Direct-to-Consumer Model. 329-340
Session 9: Malware Detection
- Yunus Kucuk, Guanhua Yan:

Deceiving Portable Executable Malware Classifiers into Targeted Misclassification with Practical Adversarial Examples. 341-352 - Stuart Millar, Niall McLaughlin

, Jesús Martínez del Rincón
, Paul Miller, Ziming Zhao:
DANdroid: A Multi-View Discriminative Adversarial Network for Obfuscated Android Malware Detection. 353-364 - Jiadong Sun, Xia Zhou, Wenbo Shen, Yajin Zhou, Kui Ren:

PESC: A Per System-Call Stack Canary Design for Linux Kernel. 365-375 - Sami Kairajärvi, Andrei Costin, Timo Hämäläinen

:
ISAdetect: Usable Automated Detection of CPU Architecture and Endianness for Executable Binary Files and Object Code. 376-380

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














