


default search action
CODASPY 2024: Porto, Portugal
- João P. Vilela, Haya Schulmann, Ninghui Li:

Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2024, Porto, Portugal, June 19-21, 2024. ACM 2024
Keynote Talks
- Bart Preneel

:
The Encryption Debate: An Enduring Struggle. 1-3 - Davide Balzarotti

:
Malware Research: History, Milestones, and Open Questions. 5-6
Session 1: Measuring Privacy & Security Deployments
- Andreas Klinger

, Vincent Ehrmanntraut
, Ulrike Meyer
:
Estimating the Runtime and Global Network Traffic of SMPC Protocols. 7-18 - Maisha Maliha

, Shameek Bhattacharjee
:
A Unified Time Series Analytics based Intrusion Detection Framework for CAN BUS Attacks. 19-30 - Ka Fun Tang

, Ka Lok Wu
, Sze Yiu Chau
:
Investigating TLS Version Downgrade in Enterprise Software. 31-42 - K. Virgil English

, Nathaniel Bennett
, Seaver Thorn
, Kevin R. B. Butler
, William Enck
, Patrick Traynor
:
Examining Cryptography and Randomness Failures in Open-Source Cellular Cores. 43-54 - Mehrnoosh Zaeifi

, Faezeh Kalantari
, Adam Oest
, Zhibo Sun
, Gail-Joon Ahn
, Yan Shoshitaishvili
, Tiffany Bao
, Ruoyu Wang
, Adam Doupé
:
Nothing Personal: Understanding the Spread and Use of Personally Identifiable Information in the Financial Ecosystem. 55-65
Session 2: Network, IoT, & Embedded Security
- Luke A. Bauer

, James K. Howes IV
, Sam A. Markelon
, Vincent Bindschaedler
, Thomas Shrimpton
:
Leveraging Generative Models for Covert Messaging: Challenges and Tradeoffs for "Dead-Drop" Deployments. 67-78 - Mahmood Gholipourchoubeh

, Hugo Kermabon-Bobinnec
, Suryadipta Majumdar
, Yosr Jarraya
, Lingyu Wang
, Boubakr Nour
, Makan Pourzandi
:
CCSM: Building Cross-Cluster Security Models for Edge-Core Environments Involving Multiple Kubernetes Clusters. 79-90 - Philip Empl

, Fabian Böhm
, Günther Pernul
:
Process-Aware Intrusion Detection in MQTT Networks. 91-102
Session 3: Security of Cryptographic Protocols and Implementations
- Andrei Ouatu

, Gabriel Ghinita
, Razvan Rughinis
:
Accelerating Performance of Bilinear Map Cryptography using FPGA. 103-113 - Jacob Haltiwanger

, Thang Hoang
:
Exploiting Update Leakage in Searchable Symmetric Encryption. 115-126 - Ihyun Nam

:
The Avg-Act Swap and Plaintext Overflow Detection in Fully Homomorphic Operations Over Deep Circuits. 127-138
Poster Session
- Giovanni Ciaramella

, Fabio Martinelli
, Francesco Mercaldo
, Antonella Santone
:
DroidDefender: An Image-based Android Antimalware Proof-of-Concept. 139-141 - Fabio Martinelli

, Francesco Mercaldo
, Luca Petrillo
, Antonella Santone
:
Security Policy Generation and Verification through Large Language Models: A Proposal. 143-145 - Anand Agrawal

, Rajib Ranjan Maiti
:
Guarding the Wi-Fi 4-Way Handshake against Channel-based MiTM: A Case Study on KRACK Attack. 147-149 - Talaya Farasat

, Joachim Posegga
:
Machine Learning Techniques for Python Source Code Vulnerability Detection. 151-153 - Joseph Guan Quan Lim

, Zhen Yu Kwok
, Isaac Soon
, Jun Xian Yong
, Samuel Song Yuhao
, Siti Halilah Binte Rosley
, Vivek Balachandran
:
A-COPILOT: Android Covert Operation for Private Information Lifting and OTP Theft: A study on how Malware Masquerading as Legitimate Applications compromise Security and Privacy. 155-157 - Sasi Bhushan V. Saladi

, Nagesh Bhattu Sristy
:
Communicate Less, Learn More: A Locally Differential Private Approach for Counting Triangles with Better Accuracy. 159-161 - Shashank Sharma

, Ayushi Sharma
, Aravind Machiry
:
Aunor: Converting Rust crates to [no_std] at scale. 163-165 - Anderson Sales

, Nuno Torres
, Pedro Pinto
:
An Overview of Threats Exploring the Confusion Between Top-Level Domains and File Type Extensions? 167-169 - Priyanka Rushikesh Chaudhary

, N. Pranav Krishna
, Rajib Ranjan Maiti
:
IoTFuzzSentry: Hunting Bugs In The IoT Wilderness In Operational Phase Using Payload Fuzzing. 171-173
Session 4: Data Privacy & Privacy in Computation I
- Trevor Kann

, Lujo Bauer
, Robert K. Cunningham
:
CoCoT: Collaborative Contact Tracing. 175-186 - Alessandro N. Baccarini

, Marina Blanton
, Shaofeng Zou
:
Understanding Information Disclosure from Secure Computation Output: A Study of Average Salary Computation. 187-198 - Sofiane Azogagh

, Zelma Aubin Birba
, Sébastien Gambs
, Marc-Olivier Killijian
:
Crypto'Graph: Leveraging Privacy-Preserving Distributed Link Prediction for Robust Graph Learning. 199-210 - Aleksandr Dolgavin

, Mark Yampolskiy
, Moti Yung
:
Stop Stealing My Data: Sanitizing Stego Channels in 3D Printing Design Files. 211-220
Session 5: Data Privacy & Privacy in Computation II
- Saskia Nuñez von Voigt

, Luise Mehner
, Florian Tschorsch
:
From Theory to Comprehension: A Comparative Study of Differential Privacy and k-Anonymity. 221-232 - K. Naveen Kumar

, C. Krishna Mohan
, Aravind Machiry
:
Precision Guided Approach to Mitigate Data Poisoning Attacks in Federated Learning. 233-244 - Clément Elliker

, Emeric Tonnelier
, Aymen Shabou
:
Coherent Multi-Table Data Synthesis for Tabular and Time-Series Data with GANs. 245-252
Session 6: Web & Mobile Application Security
- Shou-Ching Hsiao

, Shih-Wei Li
, Hsu-Chun Hsiao
:
Risky Cohabitation: Understanding and Addressing Over-privilege Risks of Commodity Application Virtualization Platforms in Android. 253-264 - Jinghui Liao

, Niusen Chen
, Lichen Xia
, Bo Chen
, Weisong Shi
:
FSPDE: A Full Stack Plausibly Deniable Encryption System for Mobile Devices. 265-276 - Mashari Alatawi

, Nitesh Saxena
:
Automating Key Fingerprint Comparisons in Secure Mobile Messaging Apps: A Case Study of Signal. 277-288 - Daniel Timko

, Muhammad Lutfor Rahman
:
Smishing Dataset I: Phishing SMS Dataset from Smishtank.com. 289-294
Session 7: Data Privacy & Privacy in Computation III
- Ana-Maria Cretu

, Miruna Rusu
, Yves-Alexandre de Montjoye
:
Re-pseudonymization Strategies for Smart Meter Data Are Not Robust to Deep Learning Profiling Attacks. 295-306 - Matta Varun

, Shuya Feng
, Han Wang
, Shamik Sural
, Yuan Hong
:
Towards Accurate and Stronger Local Differential Privacy for Federated Learning with Staircase Randomized Response. 307-318 - Mariana Cunha

, Guilherme Duarte
, Ricardo Andrade
, Ricardo Mendes
, João P. Vilela
:
Privkit: A Toolkit of Privacy-Preserving Mechanisms for Heterogeneous Data Types. 319-324
Session 8: Attack & Malware
- Kento Hasegawa

, Seira Hidano
, Kazuhide Fukushima
:
AutoRed: Automating Red Team Assessment via Strategic Thinking Using Reinforcement Learning. 325-336 - Kedrian James

, Kevin Valakuzhy
, Kevin Z. Snow
, Fabian Monrose
:
CrashTalk: Automated Generation of Precise, Human Readable, Descriptions of Software Security Bugs. 337-347 - Kiavash Satvat

, Rigel Gjomemo
, V. N. Venkatakrishnan
:
TIPCE: A Longitudinal Threat Intelligence Platform Comprehensiveness Analysis. 349-360 - Gabriel Loiseau

, Valentin Lefils
, Maxime Meyer
, Damien Riquet
:
WikiPhish: A Diverse Wikipedia-Based Dataset for Phishing Website Detection: Data/Toolset Paper. 361-366
Session 9: Secure Access Control & Privacy Preserving Authentication
- Marina Blanton

, Dennis Murphy
:
Privacy Preserving Biometric Authentication for Fingerprints and Beyond. 367-378 - Yongqi Wang

, Thalia Laing
, José Moreira
, Mark D. Ryan
:
Remote Registration of Multiple Authenticators. 379-390 - Ala Eddine Laouir

, Abdessamad Imine
:
SLIM-View: Sampling and Private Publishing of Multidimensional Databases. 391-402 - Si Zhang

, Philip W. L. Fong
:
Mining Domain-Based Policies. 403-414

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














