


default search action
CODASPY 2022: Baltimore, MD, USA
- Anupam Joshi, Maribel Fernández, Rakesh M. Verma:

CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24 - 27, 2022. ACM 2022, ISBN 978-1-4503-9220-4
Keynote Talk 1
- Haya Schulmann:

How (Not) to Deploy Cryptography on the Internet. 1
Keynote Talk 2
- Catherine Meadows:

Predicting Asymptotic Behavior of Network Covert Channels: Experimental Results. 2-3
Session 1: Machine Learning and Security
- Aref Asvadishirehjini, Murat Kantarcioglu, Bradley A. Malin

:
GINN: Fast GPU-TEE Based Integrity for Neural Network Training. 4-15 - Abderrahmen Amich, Birhanu Eshete

:
EG-Booster: Explanation-Guided Booster of ML Evasion Attacks. 16-28 - Fatima Zahra Qachfar

, Rakesh M. Verma
, Arjun Mukherjee:
Leveraging Synthetic Data and PU Learning For Phishing Email Detection. 29-40 - Ismat Jarin, Birhanu Eshete

:
DP-UTIL: Comprehensive Utility Analysis of Differential Privacy in Machine Learning. 41-52
Session 2: Privacy
- Malte Breuer, Ulrike Meyer, Susanne Wetzel:

Privacy-Preserving Maximum Matching on General Graphs and its Application to Enable Privacy-Preserving Kidney Exchange. 53-64 - Nishant Vishwamitra

, Yifang Li, Hongxin Hu, Kelly Caine, Long Cheng, Ziming Zhao, Gail-Joon Ahn
:
Towards Automated Content-based Photo Privacy Control in User-Centered Social Networks. 65-76 - Emre Yilmaz, Tianxi Ji

, Erman Ayday, Pan Li:
Genomic Data Sharing under Dependent Local Differential Privacy. 77-88 - André Brandão, Ricardo Mendes, João P. Vilela:

Prediction of Mobile App Privacy Preferences with User Profiles via Federated Learning. 89-100
Session 3: Software Security
- Alexis Challande, Robin David, Guénaël Renault:

Building a Commit-level Dataset of Real-world Vulnerabilities. 101-106 - Yan Lin, Debin Gao

, David Lo
:
ReSIL: Revivifying Function Signature Inference using Deep Learning with Domain-Specific Knowledge. 107-118 - Matteo Rizzi

, Salvatore Manfredi
, Giada Sciarretta, Silvio Ranise:
A Modular and Extensible Framework for Securing TLS. 119-124 - Seshagiri Prabhu Narasimha, Arun Lakhotia:

Recovering Structure of Input of a Binary Program. 125-136 - Patrick Stöckle

, Ionut Pruteanu, Bernd Grobauer, Alexander Pretschner:
Hardening with Scapolite: A DevOps-based Approach for Improved Authoring and Testing of Security-Configuration Guides in Large-Scale Organizations. 137-142
Session 4: Access Control and Privacy
- Mohammad Nur Nobi, Ram Krishnan, Yufei Huang, Mehrnoosh Shakarami, Ravi S. Sandhu:

Toward Deep Learning Based Access Control. 143-154 - Hugo Kermabon-Bobinnec

, Mahmood Gholipourchoubeh
, Sima Bagheri, Suryadipta Majumdar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang:
ProSPEC: Proactive Security Policy Enforcement for Containers. 155-166 - Charalampos Katsis, Fabrizio Cicala, Dan Thomsen, Nathan Ringo

, Elisa Bertino:
NEUTRON: A Graph-based Pipeline for Zero-trust Network Architectures. 167-178 - Manos Katsomallos, Katerina Tzompanaki, Dimitris Kotzinos:

Landmark Privacy: Configurable Differential Privacy Protection for Time Series. 179-190
Session 5: IoT Security
- Daniël Reijsbergen, Aung Maw, Tien Tuan Anh Dinh, Wen-Tai Li, Chau Yuen:

Securing Smart Grids Through an Incentive Mechanism for Blockchain-Based Data Sharing. 191-202 - Tuba Yavuz, Christopher Brant:

Security Analysis of IoT Frameworks using Static Taint Analysis. 203-213 - Zhangxiang Hu, Jun Li, Samuel Mergendahl, Christopher Wilson:

Toward a Resilient Key Exchange Protocol for IoT. 214-225 - Stefan Hristozov, Moritz Wettermann

, Manuel Huber:
A TOCTOU Attack on DICE Attestation. 226-235
Session 6: Authentication and Device Security
- Ahmed Anu Wahab

, Daqing Hou, Mahesh K. Banavar, Stephanie Schuckers, Kenneth Eaton, Jacob Baldwin, Robert Wright:
Shared Multi-Keyboard and Bilingual Datasets to Support Keystroke Dynamics Research. 236-241 - John Lim, Jan-Michael Frahm, Fabian Monrose:

Leveraging Disentangled Representations to Improve Vision-Based Keystroke Inference Attacks Under Low Data Constraints. 242-251 - Haipeng Li, Nan Niu, Boyang Wang:

Cache Shaping: An Effective Defense Against Cache-Based Website Fingerprinting. 252-263 - Stefan Czybik, Daniel Arp, Konrad Rieck:

Quantifying the Risk of Wormhole Attacks on Bluetooth Contact Tracing. 264-275 - Hossein Shirazi, William Pickard

, Indrakshi Ray, Haonan Wang:
Towards Resiliency of Heavy Vehicles through Compromised Sensor Data Reconstruction. 276-287
Session 7: Encryption and Privacy
- Jakub Klemsa, Melek Önen:

Parallel Operations over TFHE-Encrypted Multi-Digit Integers. 288-299 - Alexandros Bakas, Antonis Michalas

, Tassos Dimitriou:
Private Lives Matter: A Differential Private Functional Encryption Scheme. 300-311 - Yohei Watanabe, Kazuma Ohara, Mitsugu Iwamoto, Kazuo Ohta:

Efficient Dynamic Searchable Encryption with Forward Privacy under the Decent Leakage. 312-323 - Israt Jahan Mouri

, Muhammad Ridowan, Muhammad Abdullah Adnan:
RS-PKE: Ranked Searchable Public-Key Encryption for Cloud-Assisted Lightweight Platforms. 324-335
Panel I
- Elisa Bertino, Ravi S. Sandhu, Bhavani Thuraisingham, Indrakshi Ray, Wenjia Li, Maanak Gupta, Sudip Mittal:

Security and Privacy for Emerging IoT and CPS Domains. 336-337
Panel II
- Murat Kantarcioglu, Barbara Carminati, Sagar Samtani

, Sudip Mittal, Maanak Gupta:
Enforcement of Laws and Privacy Preferences in Modern Computing Systems. 338-339
Poster Session I
- Elizabeth Miller, Md. Rashedur Rahman

, Moinul Hossain, Aisha I. Ali-Gombe
:
I Don't Know Why You Need My Data: A Case Study of Popular Social Media Privacy Policies. 340-342 - Fang Liu

, Xingyuan Zhao:
Disclosure Risk from Homogeneity Attack in Differentially Private Release of Frequency Distribution. 343-345 - Xingyuan Zhao

, Fang Liu
:
A New Bound for Privacy Loss from Bayesian Posterior Sampling. 346-348 - Victor Zeng, Xuting Liu

, Rakesh M. Verma
:
Does Deception Leave a Content Independent Stylistic Trace? 349-351 - Ramyapandian Vijayakanthan, Irfan Ahmed

, Aisha I. Ali-Gombe
:
Transforming Memory Image to Sound Wave Signals for an Effective IoT Fingerprinting. 352-354
Poster Session II
- Shawn Chua, Kai Yuan Tay, Melissa Wan Jun Chua, Vivek Balachandran:

Using Adversarial Defences Against Image Classification CAPTCHA. 355-357 - Robin Mayerhofer, Rudolf Mayer:

Poisoning Attacks against Feature-Based Image Classification. 358-360 - Priyanka Rushikesh Chaudhary, Avinash Narasimhan, Rajib Ranjan Maiti:

Demystifying Video Traffic from IoT (Spy) Camera using Undecrypted Network Traffic. 361-363 - Anand Agrawal, Urbi Chatterjee, Rajib Ranjan Maiti:

kTRACKER: Passively Tracking KRACK using ML Model. 364-366 - Julie Germain

, Ram Dantu, Mark A. Thompson:
Qubit Reset and Refresh: A Gamechanger for Random Number Generation. 367-369 - Kai Yuan Tay, Shawn Chua, Melissa Wan Jun Chua, Vivek Balachandran:

Towards Robust Detection of PDF-based Malware. 370-372 - Rudolf Mayer, Andreas Ekelhart

:
Macro-level Inference in Collaborative Learning. 373-375 - Israt Jahan Mouri

, Muhammad Ridowan, Muhammad Abdullah Adnan:
MK-RS-PKE: Multi-Keyword Ranked Searchable Public-Key Encryption for Cloud-Assisted Lightweight Platforms. 376-378

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














