default search action
CODASPY 2022: Baltimore, MD, USA
- Anupam Joshi, Maribel Fernández, Rakesh M. Verma:
CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24 - 27, 2022. ACM 2022, ISBN 978-1-4503-9220-4
Keynote Talk 1
- Haya Schulmann:
How (Not) to Deploy Cryptography on the Internet. 1
Keynote Talk 2
- Catherine Meadows:
Predicting Asymptotic Behavior of Network Covert Channels: Experimental Results. 2-3
Session 1: Machine Learning and Security
- Aref Asvadishirehjini, Murat Kantarcioglu, Bradley A. Malin:
GINN: Fast GPU-TEE Based Integrity for Neural Network Training. 4-15 - Abderrahmen Amich, Birhanu Eshete:
EG-Booster: Explanation-Guided Booster of ML Evasion Attacks. 16-28 - Fatima Zahra Qachfar, Rakesh M. Verma, Arjun Mukherjee:
Leveraging Synthetic Data and PU Learning For Phishing Email Detection. 29-40 - Ismat Jarin, Birhanu Eshete:
DP-UTIL: Comprehensive Utility Analysis of Differential Privacy in Machine Learning. 41-52
Session 2: Privacy
- Malte Breuer, Ulrike Meyer, Susanne Wetzel:
Privacy-Preserving Maximum Matching on General Graphs and its Application to Enable Privacy-Preserving Kidney Exchange. 53-64 - Nishant Vishwamitra, Yifang Li, Hongxin Hu, Kelly Caine, Long Cheng, Ziming Zhao, Gail-Joon Ahn:
Towards Automated Content-based Photo Privacy Control in User-Centered Social Networks. 65-76 - Emre Yilmaz, Tianxi Ji, Erman Ayday, Pan Li:
Genomic Data Sharing under Dependent Local Differential Privacy. 77-88 - André Brandão, Ricardo Mendes, João P. Vilela:
Prediction of Mobile App Privacy Preferences with User Profiles via Federated Learning. 89-100
Session 3: Software Security
- Alexis Challande, Robin David, Guénaël Renault:
Building a Commit-level Dataset of Real-world Vulnerabilities. 101-106 - Yan Lin, Debin Gao, David Lo:
ReSIL: Revivifying Function Signature Inference using Deep Learning with Domain-Specific Knowledge. 107-118 - Matteo Rizzi, Salvatore Manfredi, Giada Sciarretta, Silvio Ranise:
A Modular and Extensible Framework for Securing TLS. 119-124 - Seshagiri Prabhu Narasimha, Arun Lakhotia:
Recovering Structure of Input of a Binary Program. 125-136 - Patrick Stöckle, Ionut Pruteanu, Bernd Grobauer, Alexander Pretschner:
Hardening with Scapolite: A DevOps-based Approach for Improved Authoring and Testing of Security-Configuration Guides in Large-Scale Organizations. 137-142
Session 4: Access Control and Privacy
- Mohammad Nur Nobi, Ram Krishnan, Yufei Huang, Mehrnoosh Shakarami, Ravi S. Sandhu:
Toward Deep Learning Based Access Control. 143-154 - Hugo Kermabon-Bobinnec, Mahmood Gholipourchoubeh, Sima Bagheri, Suryadipta Majumdar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang:
ProSPEC: Proactive Security Policy Enforcement for Containers. 155-166 - Charalampos Katsis, Fabrizio Cicala, Dan Thomsen, Nathan Ringo, Elisa Bertino:
NEUTRON: A Graph-based Pipeline for Zero-trust Network Architectures. 167-178 - Manos Katsomallos, Katerina Tzompanaki, Dimitris Kotzinos:
Landmark Privacy: Configurable Differential Privacy Protection for Time Series. 179-190
Session 5: IoT Security
- Daniël Reijsbergen, Aung Maw, Tien Tuan Anh Dinh, Wen-Tai Li, Chau Yuen:
Securing Smart Grids Through an Incentive Mechanism for Blockchain-Based Data Sharing. 191-202 - Tuba Yavuz, Christopher Brant:
Security Analysis of IoT Frameworks using Static Taint Analysis. 203-213 - Zhangxiang Hu, Jun Li, Samuel Mergendahl, Christopher Wilson:
Toward a Resilient Key Exchange Protocol for IoT. 214-225 - Stefan Hristozov, Moritz Wettermann, Manuel Huber:
A TOCTOU Attack on DICE Attestation. 226-235
Session 6: Authentication and Device Security
- Ahmed Anu Wahab, Daqing Hou, Mahesh K. Banavar, Stephanie Schuckers, Kenneth Eaton, Jacob Baldwin, Robert Wright:
Shared Multi-Keyboard and Bilingual Datasets to Support Keystroke Dynamics Research. 236-241 - John Lim, Jan-Michael Frahm, Fabian Monrose:
Leveraging Disentangled Representations to Improve Vision-Based Keystroke Inference Attacks Under Low Data Constraints. 242-251 - Haipeng Li, Nan Niu, Boyang Wang:
Cache Shaping: An Effective Defense Against Cache-Based Website Fingerprinting. 252-263 - Stefan Czybik, Daniel Arp, Konrad Rieck:
Quantifying the Risk of Wormhole Attacks on Bluetooth Contact Tracing. 264-275 - Hossein Shirazi, William Pickard, Indrakshi Ray, Haonan Wang:
Towards Resiliency of Heavy Vehicles through Compromised Sensor Data Reconstruction. 276-287
Session 7: Encryption and Privacy
- Jakub Klemsa, Melek Önen:
Parallel Operations over TFHE-Encrypted Multi-Digit Integers. 288-299 - Alexandros Bakas, Antonis Michalas, Tassos Dimitriou:
Private Lives Matter: A Differential Private Functional Encryption Scheme. 300-311 - Yohei Watanabe, Kazuma Ohara, Mitsugu Iwamoto, Kazuo Ohta:
Efficient Dynamic Searchable Encryption with Forward Privacy under the Decent Leakage. 312-323 - Israt Jahan Mouri, Muhammad Ridowan, Muhammad Abdullah Adnan:
RS-PKE: Ranked Searchable Public-Key Encryption for Cloud-Assisted Lightweight Platforms. 324-335
Panel I
- Elisa Bertino, Ravi S. Sandhu, Bhavani Thuraisingham, Indrakshi Ray, Wenjia Li, Maanak Gupta, Sudip Mittal:
Security and Privacy for Emerging IoT and CPS Domains. 336-337
Panel II
- Murat Kantarcioglu, Barbara Carminati, Sagar Samtani, Sudip Mittal, Maanak Gupta:
Enforcement of Laws and Privacy Preferences in Modern Computing Systems. 338-339
Poster Session I
- Elizabeth Miller, Md. Rashedur Rahman, Moinul Hossain, Aisha I. Ali-Gombe:
I Don't Know Why You Need My Data: A Case Study of Popular Social Media Privacy Policies. 340-342 - Fang Liu, Xingyuan Zhao:
Disclosure Risk from Homogeneity Attack in Differentially Private Release of Frequency Distribution. 343-345 - Xingyuan Zhao, Fang Liu:
A New Bound for Privacy Loss from Bayesian Posterior Sampling. 346-348 - Victor Zeng, Xuting Liu, Rakesh M. Verma:
Does Deception Leave a Content Independent Stylistic Trace? 349-351 - Ramyapandian Vijayakanthan, Irfan Ahmed, Aisha I. Ali-Gombe:
Transforming Memory Image to Sound Wave Signals for an Effective IoT Fingerprinting. 352-354
Poster Session II
- Shawn Chua, Kai Yuan Tay, Melissa Wan Jun Chua, Vivek Balachandran:
Using Adversarial Defences Against Image Classification CAPTCHA. 355-357 - Robin Mayerhofer, Rudolf Mayer:
Poisoning Attacks against Feature-Based Image Classification. 358-360 - Priyanka Rushikesh Chaudhary, Avinash Narasimhan, Rajib Ranjan Maiti:
Demystifying Video Traffic from IoT (Spy) Camera using Undecrypted Network Traffic. 361-363 - Anand Agrawal, Urbi Chatterjee, Rajib Ranjan Maiti:
kTRACKER: Passively Tracking KRACK using ML Model. 364-366 - Julie Germain, Ram Dantu, Mark A. Thompson:
Qubit Reset and Refresh: A Gamechanger for Random Number Generation. 367-369 - Kai Yuan Tay, Shawn Chua, Melissa Wan Jun Chua, Vivek Balachandran:
Towards Robust Detection of PDF-based Malware. 370-372 - Rudolf Mayer, Andreas Ekelhart:
Macro-level Inference in Collaborative Learning. 373-375 - Israt Jahan Mouri, Muhammad Ridowan, Muhammad Abdullah Adnan:
MK-RS-PKE: Multi-Keyword Ranked Searchable Public-Key Encryption for Cloud-Assisted Lightweight Platforms. 376-378
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.