default search action
33rd DBSec 2019: Charleston, SC, USA
- Simon N. Foley:
Data and Applications Security and Privacy XXXIII - 33rd Annual IFIP WG 11.3 Conference, DBSec 2019, Charleston, SC, USA, July 15-17, 2019, Proceedings. Lecture Notes in Computer Science 11559, Springer 2019, ISBN 978-3-030-22478-3
Attacks
- Emad Alsuwat, Hatim Alsuwat, John R. Rose, Marco Valtorta, Csilla Farkas:
Detecting Adversarial Attacks in the Context of Bayesian Networks. 3-22 - Bruhadeshwar Bezawada, Indrajit Ray, Kushagra Tiwary:
AGBuilder: An AI Tool for Automated Attack Graph Building, Analysis, and Refinement. 23-42 - Radek Hranický, Filip Listiak, Dávid Mikus, Ondrej Rysavý:
On Practical Aspects of PCFG Password Cracking. 43-60 - Diptendu Mohan Kar, Indrajit Ray:
That's My DNA: Detecting Malicious Tampering of Synthesized DNA. 61-80
Mobile and Web Security
- Hossein Shirazi, Bruhadeshwar Bezawada, Indrakshi Ray, Charles Anderson:
Adversarial Sampling Attacks Against Phishing Detection. 83-101 - Jacob Leon Kröger, Philip Raschke:
Is My Phone Listening in? On the Feasibility and Detectability of Mobile Eavesdropping. 102-120 - Davide Caputo, Luca Verderame, Simone Aonzo, Alessio Merlo:
Droids in Disarray: Detecting Frame Confusion in Hybrid Android Apps. 121-139
Privacy
- Shun Takagi, Yang Cao, Yasuhito Asano, Masatoshi Yoshikawa:
Geo-Graph-Indistinguishability: Protecting Location Privacy for LBS over Road Networks. 143-163 - Maho Asada, Masatoshi Yoshikawa, Yang Cao:
"When and Where Do You Want to Hide?" - Recommendation of Location Privacy Preferences with Local Differential Privacy. 164-176 - Raúl Pardo, Daniel Le Métayer:
Analysis of Privacy Policies to Enhance Informed Consent. 177-198
Security Protocol Practices
- Salvatore Manfredi, Silvio Ranise, Giada Sciarretta:
Lost in TLS? No More! Assisted Deployment of Secure TLS Configurations. 201-220 - Alexander Puchta, Fabian Böhm, Günther Pernul:
Contributing to Current Challenges in Identity and Access Management with Visual Analytics. 221-239 - Wladimir De la Cadena, Daniel Kaiser, Asya Mitseva, Andriy Panchenko, Thomas Engel:
Analysis of Multi-path Onion Routing-Based Anonymization Networks. 240-258
Distributed Systems
- Cory Thoma, Alexandros Labrinidis, Adam J. Lee:
Shoal: Query Optimization and Operator Placement for Access Controlled Stream Processing Systems. 261-280 - Marietheres Dietz, Benedikt Putz, Günther Pernul:
A Distributed Ledger Approach to Digital Twin Secure Data Sharing. 281-300 - Mehrnoosh Shakarami, Ravi S. Sandhu:
Refresh Instead of Revoke Enhances Safety and Availability: A Formal Analysis. 301-313
Source Code Security
- Misiker Tadesse Aga, Colton Holoday, Todd M. Austin:
Wrangling in the Power of Code Pointers with ProxyCFI. 317-337 - Mengyuan Zhang, Yue Xin, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
CASFinder: Detecting Common Attack Surface. 338-358 - Scott D. Stoller, Yanhong A. Liu:
Algorithm Diversity for Resilient Systems. 359-378
Malware
- Mahmoud Abdelsalam, Ram Krishnan, Ravi S. Sandhu:
Online Malware Detection in Cloud Auto-scaling Systems Using Shallow Convolutional Neural Networks. 381-397 - Sara M. Sutton, Garret Michilli, Julian L. Rrushi:
Redirecting Malware's Target Selection with Decoy Processes. 398-417
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.