


default search action
33rd DBSec 2019: Charleston, SC, USA
- Simon N. Foley:

Data and Applications Security and Privacy XXXIII - 33rd Annual IFIP WG 11.3 Conference, DBSec 2019, Charleston, SC, USA, July 15-17, 2019, Proceedings. Lecture Notes in Computer Science 11559, Springer 2019, ISBN 978-3-030-22478-3
Attacks
- Emad Alsuwat, Hatim Alsuwat, John R. Rose, Marco Valtorta, Csilla Farkas:

Detecting Adversarial Attacks in the Context of Bayesian Networks. 3-22 - Bruhadeshwar Bezawada

, Indrajit Ray, Kushagra Tiwary:
AGBuilder: An AI Tool for Automated Attack Graph Building, Analysis, and Refinement. 23-42 - Radek Hranický

, Filip Listiak, Dávid Mikus, Ondrej Rysavý:
On Practical Aspects of PCFG Password Cracking. 43-60 - Diptendu Mohan Kar, Indrajit Ray:

That's My DNA: Detecting Malicious Tampering of Synthesized DNA. 61-80
Mobile and Web Security
- Hossein Shirazi

, Bruhadeshwar Bezawada
, Indrakshi Ray, Charles Anderson
:
Adversarial Sampling Attacks Against Phishing Detection. 83-101 - Jacob Leon Kröger

, Philip Raschke:
Is My Phone Listening in? On the Feasibility and Detectability of Mobile Eavesdropping. 102-120 - Davide Caputo

, Luca Verderame
, Simone Aonzo
, Alessio Merlo:
Droids in Disarray: Detecting Frame Confusion in Hybrid Android Apps. 121-139
Privacy
- Shun Takagi

, Yang Cao
, Yasuhito Asano
, Masatoshi Yoshikawa
:
Geo-Graph-Indistinguishability: Protecting Location Privacy for LBS over Road Networks. 143-163 - Maho Asada, Masatoshi Yoshikawa, Yang Cao

:
"When and Where Do You Want to Hide?" - Recommendation of Location Privacy Preferences with Local Differential Privacy. 164-176 - Raúl Pardo, Daniel Le Métayer:

Analysis of Privacy Policies to Enhance Informed Consent. 177-198
Security Protocol Practices
- Salvatore Manfredi

, Silvio Ranise
, Giada Sciarretta
:
Lost in TLS? No More! Assisted Deployment of Secure TLS Configurations. 201-220 - Alexander Puchta, Fabian Böhm

, Günther Pernul:
Contributing to Current Challenges in Identity and Access Management with Visual Analytics. 221-239 - Wladimir De la Cadena, Daniel Kaiser, Asya Mitseva, Andriy Panchenko, Thomas Engel

:
Analysis of Multi-path Onion Routing-Based Anonymization Networks. 240-258
Distributed Systems
- Cory Thoma, Alexandros Labrinidis, Adam J. Lee:

Shoal: Query Optimization and Operator Placement for Access Controlled Stream Processing Systems. 261-280 - Marietheres Dietz, Benedikt Putz

, Günther Pernul:
A Distributed Ledger Approach to Digital Twin Secure Data Sharing. 281-300 - Mehrnoosh Shakarami, Ravi S. Sandhu:

Refresh Instead of Revoke Enhances Safety and Availability: A Formal Analysis. 301-313
Source Code Security
- Misiker Tadesse Aga, Colton Holoday, Todd M. Austin:

Wrangling in the Power of Code Pointers with ProxyCFI. 317-337 - Mengyuan Zhang

, Yue Xin, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
CASFinder: Detecting Common Attack Surface. 338-358 - Scott D. Stoller, Yanhong A. Liu:

Algorithm Diversity for Resilient Systems. 359-378
Malware
- Mahmoud Abdelsalam, Ram Krishnan

, Ravi S. Sandhu:
Online Malware Detection in Cloud Auto-scaling Systems Using Shallow Convolutional Neural Networks. 381-397 - Sara M. Sutton, Garret Michilli, Julian L. Rrushi:

Redirecting Malware's Target Selection with Decoy Processes. 398-417

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














