default search action
CODASPY 2014: San Antonio, TX, USA
- Elisa Bertino, Ravi S. Sandhu, Jaehong Park:
Fourth ACM Conference on Data and Application Security and Privacy, CODASPY'14, San Antonio, TX, USA - March 03 - 05, 2014. ACM 2014, ISBN 978-1-4503-2278-2
Access control for applications
- William C. Garrison III, Yechen Qiao, Adam J. Lee:
On the suitability of dissemination-centric access control systems for group-centric sharing. 1-12 - Tien Tuan Anh Dinh, Anwitaman Datta:
Streamforce: outsourcing access control enforcement for stream data to the clouds. 13-24 - Yifei Wang, Srinivas Hariharan, Chenxi Zhao, Jiaming Liu, Wenliang Du:
Compac: enforce component-level access control in android. 25-36
Web security
- Fabien Duchene, Sanjay Rawat, Jean-Luc Richier, Roland Groz:
KameleonFuzz: evolutionary fuzzing for black-box XSS detection. 37-48 - Xiaowei Li, Xujie Si, Yuan Xue:
Automated black-box detection of access control vulnerabilities in web applications. 49-60 - Bastian Braun, Martin Johns, Johannes Köstler, Joachim Posegga:
PhishSafe: leveraging modern JavaScript API's for transparent and robust protection. 61-72
Keynote address 1
- Dongyan Xu:
Virtualization and security: happily ever after? 73-74
Novel techniques for application security
- Ebrahim Tarameshloo, Philip W. L. Fong, Payman Mohassel:
On protection in federated social computing systems. 75-86 - Euijin Choo, Jianchun Jiang, Ting Yu:
COMPARS: toward an empirical approach for comparing the resilience of reputation systems. 87-98 - Yiming Jing, Gail-Joon Ahn, Ziming Zhao, Hongxin Hu:
RiskMon: continuous and automated risk assessment of mobile applications. 99-110 - Anna Cinzia Squicciarini, Giuseppe Petracca, William G. Horne, Aurnob Nath:
Situational awareness through reasoning on network incidents. 111-122
Poster session
- Sandrine Blazy, Stéphanie Riaud:
Measuring the robustness of source program obfuscation: studying the impact of compiler optimizations on the obfuscation of C programs. 123-126 - Ragib Hasan, Rasib Khan:
Interaction provenance model for unified authentication factors in service oriented computing. 127-130 - Visa Antero Vallivaara, Mirko Sailio, Kimmo Halunen:
Detecting man-in-the-middle attacks on non-mobile systems. 131-134 - Justin Hummel, Andrew McDonald, Vatsal Shah, Riju Singh, Bradford D. Boyle, Tingshan Huang, Nagarajan Kandasamy, Harish Sethu, Steven Weber:
A modular multi-location anonymized traffic monitoring tool for a WiFi network. 135-138 - Anja Remshagen, Li Yang:
Consistency checking in access control. 139-142 - Seung-Hyun Seo, Jongho Won, Elisa Bertino:
POSTER: a pairing-free certificateless hybrid sign-cryption scheme for advanced metering infrastructures. 143-146 - Holger Kühner, Hannes Hartenstein:
Spoilt for choice: graph-based assessment of key management protocols to share encrypted data. 147-150 - Haruna Kibirige, Lila Ghemri:
Trust ranking of medical websites. 151-154 - Koki Murakami, Tsuyoshi Yamada, Rie Shigetomi Yamaguchi, Masahiro Goshima, Shuichi Sakai:
A cloud architecture for protecting guest's information from malicious operators with memory management. 155-158 - Mihai Maruseac, Gabriel Ghinita, Razvan Rughinis:
Privacy-preserving publication of provenance workflows. 159-162 - Kevin Allix, Tegawendé F. Bissyandé, Quentin Jérome, Jacques Klein, Radu State, Yves Le Traon:
Large-scale machine learning-based malware detection: confronting the "10-fold cross validation" scheme with reality. 163-166 - Mohamed Shehab, Fadi Mohsen:
Securing OAuth implementations in smart phones. 167-170 - Kalpana Gondi, A. Prasad Sistla, V. N. Venkatakrishnan:
Minimizing lifetime of sensitive data in concurrent programs. 171-174
Mobile security
- Michael Mitchell, Guanyu Tian, Zhi Wang:
Systematic audit of third-party android phones. 175-186 - Tsung-Hsuan Ho, Daniel Joseph Dean, Xiaohui Gu, William Enck:
PREC: practical root exploit containment for android devices. 187-198 - Wu Zhou, Zhi Wang, Yajin Zhou, Xuxian Jiang:
DIVILAR: diversifying intermediate language for anti-repackaging on android platform. 199-210
Novel techniques for data security
- Enrico Lovat, Johan Oudinet, Alexander Pretschner:
On quantitative dynamic data flow tracking. 211-222 - Muhammad Umer Arshad, Ashish Kundu, Elisa Bertino, Krishna Madhavan, Arif Ghafoor:
Security of graph data: hashing schemes and definitions. 223-234 - Mohammad Saiful Islam, Mehmet Kuzu, Murat Kantarcioglu:
Inference attack against encrypted range queries on outsourced databases. 235-246
Keynote address 2
- Jarret Raim:
Shared responsibility is better than no responsibility: federated encryption in the cloud. 247-248
Short papers 1
- Mehmet Kuzu, Mohammad Saiful Islam, Murat Kantarcioglu:
Efficient privacy-aware search over encrypted databases. 249-256 - Hussain M. J. Almohri, Danfeng (Daphne) Yao, Dennis G. Kafura:
DroidBarrier: know what is executing on your android. 257-264 - Kangjie Lu, Siyang Xiong, Debin Gao:
RopSteg: program steganography with return oriented programming. 265-272 - Julian Horsch, Sascha Wessel, Frederic Stumpf, Claudia Eckert:
SobrTrA: a software-based trust anchor for ARM cortex application processors. 273-280
Short papers 2
- Julian Horsch, Konstantin Böttinger, Michael Weiß, Sascha Wessel, Frederic Stumpf:
TrustID: trustworthy identities for untrusted mobile devices. 281-288 - Chee Meng Tey, Payas Gupta, Kartik Muralidharan, Debin Gao:
Keystroke biometrics: the user perspective. 289-296 - Davide Alberto Albertini, Barbara Carminati:
Relationship-based information sharing in cloud-based decentralized social networks. 297-304 - Birhanu Eshete, V. N. Venkatakrishnan:
WebWinnow: leveraging exploit kit workflows to detect malicious urls. 305-312 - Se Eun Oh, Ji Young Chun, Limin Jia, Deepak Garg, Carl A. Gunter, Anupam Datta:
Privacy-preserving audit for broker-based health information exchange. 313-320
Privacy preserving techniques
- Gabriel Ghinita, Razvan Rughinis:
An efficient privacy-preserving system for monitoring mobile users: making searchable encryption practical. 321-332 - Paul Giura, Ilona Murynets, Roger Piqueras Jover, Yevgeniy Vahlis:
Is it really you?: user identification via adaptive behavior fingerprinting. 333-344 - Hemant Sengar, Haining Wang, Seyed Amir Iranmanesh:
Wiretap-proof: what they hear is not what you speak, and what you speak they do not hear. 345-356
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.