default search action
CODASPY 2016: New Orleans, LA, USA
- Elisa Bertino, Ravi S. Sandhu, Alexander Pretschner:
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, CODASPY 2016, New Orleans, LA, USA, March 9-11, 2016. ACM 2016, ISBN 978-1-4503-3935-3
Keynote Address
- Jeffrey M. Voas:
Decoding the Mystery of the Internet of Things. 1-2
Privacy and Data Deletion
- John Maheswaran, Daniel Jackowitz, Ennan Zhai, David Isaac Wolinsky, Bryan Ford:
Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities. 3-13 - Apostolis Zarras, Katharina Kohls, Markus Dürmuth, Christina Pöpper:
Neuralyzer: Flexible Expiration Times for the Revocation of Online Data. 14-25 - Dong Su, Jianneng Cao, Ninghui Li, Elisa Bertino, Hongxia Jin:
Differentially Private K-Means Clustering. 26-37
Address Space Randomization and Control Flow Integrity
- Nick Christoulakis, George Christou, Elias Athanasopoulos, Sotiris Ioannidis:
HCFI: Hardware-enforced Control-Flow Integrity. 38-49 - Yue Chen, Zhi Wang, David B. Whalley, Long Lu:
Remix: On-demand Live Randomization. 50-61 - Yufei Gu, Zhiqiang Lin:
Derandomizing Kernel Address Space Layout for Memory Introspection and Forensics. 62-72
Static Vulnerability Detection and Removal
- Maliheh Monshizadeh, Prasad Naldurg, V. N. Venkatakrishnan:
Patching Logic Vulnerabilities for Web Applications using LogicPatcher. 73-84 - Gustavo Grieco, Guillermo Luis Grinblat, Lucas C. Uzal, Sanjay Rawat, Josselin Feist, Laurent Mounier:
Toward Large-Scale Vulnerability Discovery using Machine Learning. 85-96 - Awad A. Younis, Yashwant K. Malaiya, Charles Anderson, Indrajit Ray:
To Fear or Not to Fear That is the Question: Code Characteristics of a Vulnerable Functionwith an Existing Exploit. 97-104
Attacks and Vulnerabilities
- Valeriu-Daniel Stanciu, Riccardo Spolaor, Mauro Conti, Cristiano Giuffrida:
On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against Statistical Attacks. 105-112 - Eduard Marin, Dave Singelée, Bohan Yang, Ingrid Verbauwhede, Bart Preneel:
On the Feasibility of Cryptography for a Wireless Insulin Pump System. 113-120
Reception and Poster Session
- Navid Pustchi, Farhan Patwa, Ravi S. Sandhu:
Multi Cloud IaaS with Domain Trust in OpenStack. 121-123 - Anjila Tamrakar, Justin D. Russell, Irfan Ahmed, Golden G. Richard III, Carl F. Weems:
SPICE: A Software Tool for Bridging the Gap Between End-user's Insecure Cyber Behavior and Personality Traits. 124-126 - Mihai Maruseac, Gabriel Ghinita:
Privacy-Preserving Mining of Sequential Association Rules from Provenance Workflows. 127-129 - Mahdi Alizadeh, Nicola Zannone:
Risk-based Analysis of Business Process Executions. 130-132 - Noriko Tomuro, Steven L. Lytinen, Kurt Hornsburg:
Automatic Summarization of Privacy Policies using Ensemble Learning. 133-135 - Alexandru Ionut Egner, Duc Luu, Jerry den Hartog, Nicola Zannone:
An Authorization Service for Collaborative Situation Awareness. 136-138 - Johannes Hoffmann, Teemu Rytilahti, Davide Maiorca, Marcel Winandy, Giorgio Giacinto, Thorsten Holz:
Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation. 139-141 - Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang:
Scalable and Secure Logistic Regression via Homomorphic Encryption. 142-144 - Aisha I. Ali-Gombe, Irfan Ahmed, Golden G. Richard III, Vassil Roussev:
AspectDroid: Android App Analysis System. 145-147 - Xing Gao, Dachuan Liu, Daiping Liu, Haining Wang:
On Energy Security of Smartphones. 148-150
Keynote Address
- John Knight:
DIVERSITY. 151
Android Security and Malware Detection
- Manar Mohamed, Babins Shrestha, Nitesh Saxena:
SMASheD: Sniffing and Manipulating Android Sensor Data. 152-159 - Ryan Stevens, Jonathan Crussell, Hao Chen:
On the Origin of Mobile Apps: Network Provenance for Android Applications. 160-171 - Zhenquan Cai, Roland H. C. Yap:
Inferring the Detection Logic and Evaluating the Effectiveness of Android Anti-Virus Apps. 172-182 - Mansour Ahmadi, Dmitry Ulyanov, Stanislav Semenov, Mikhail Trofimov, Giorgio Giacinto:
Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification. 183-194
Cloud Management and Access Control I
- Taous Madi, Suryadipta Majumdar, Yushun Wang, Yosr Jarraya, Makan Pourzandi, Lingyu Wang:
Auditing Security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack. 195-206 - Carlo Combi, Luca Viganò, Matteo Zavatteri:
Security Constraints in Temporal Role-Based Access-Controlled Workflows. 207-218 - Jason Crampton, James Sellwood:
ARPPM: Administration in the RPPM Model. 219-230
Access Control II
- Syed Zain R. Rizvi, Philip W. L. Fong:
Interoperability of Relationship- and Role-Based Access Control. 231-242 - Ameni Ben Fadhel, Domenico Bianculli, Lionel C. Briand, Benjamin Hourte:
A Model-driven Approach to Representing and Checking RBAC Contextual Policies. 243-253
Keynote Address
- Anita Nikolich:
SDN Research Challenges and Opportunities. 254
Behavior/Data Flow Anomolies and Containment
- Teryl Taylor, Xin Hu, Ting Wang, Jiyong Jang, Marc Ph. Stoecklin, Fabian Monrose, Reiner Sailer:
Detecting Malicious Exploit Kits using Tree-based Similarity Searches. 255-266 - Daren Fadolalkarim, Asmaa Sallam, Elisa Bertino:
PANDDE: Provenance-based ANomaly Detection of Data Exfiltration. 267-276 - Gaoyao Xiao, Jun Wang, Peng Liu, Jiang Ming, Dinghao Wu:
Program-object Level Data Flow Analysis with Applications to Data Leakage and Contamination Forensics. 277-284 - Judicael Briand Djoko, Brandon Jennings, Adam J. Lee:
TPRIVEXEC: Private Execution in Virtual Memory. 285-294
Data Flows in Web Applications and Query Paths
- Iberia Medeiros, Miguel Beatriz, Nuno Ferreira Neves, Miguel Correia:
Hacking the DBMS to Prevent Injection Attacks. 295-306 - Musard Balliu, Benjamin Liebe, Daniel Schoepe, Andrei Sabelfeld:
JSLINQ: Building Secure Applications across Tiers. 307-318 - Sushama Karumanchi, Jingwei Li, Anna Cinzia Squicciarini:
Efficient Network Path Verification for Policy-routedQueries. 319-328
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.