CODASPY '18- Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy
Full Citation in the ACM Digital Library
SESSION: Keynote Address I
Gail-Joon Ahn
Managing the Crossroads of Academia and Industry
Brad Wardman
SESSION: Cloud Security
Alexander Pretschner
Minimizing Privilege Assignment Errors in Cloud Services
Matthew W. Sanders
Chuan Yue
Secure Storage with Replication and Transparent Deduplication
Iraklis Leontiadis
Reza Curtmola
Server-Based Manipulation Attacks Against Machine Learning Models
Cong Liao
Haoti Zhong
Sencun Zhu
Anna Squicciarini
SmartProvenance: A Distributed, Blockchain Based DataProvenance System
Aravind Ramachandran
Murat Kantarcioglu
SESSION: Privacy
Amirreza Masoumzadeh
Cross-App Tracking via Nearby Bluetooth Low Energy Devices
Aleksandra Korolova
Vinod Sharma
Privacy-Preserving Certification of Sustainability Metrics
Cetin Sahin
Brandon Kuczenski
Omer Egecioglu
Amr El Abbadi
Capacity: an Abstract Model of Control over Personal Data
Daniel Le Métayer
Pablo Rauzy
An Empirical Study on Online Price Differentiation
Thomas Hupperich
Dennis Tatang
Nicolai Wilkop
Thorsten Holz
SESSION: IoT Security
Reza Curtmola
Remote Attestation for Low-End Prover Devices with Post-Quantum Capabilities
Xiruo Liu
Rafael Misoczki
Manoj R. Sastry
IoTVerif: An Automated Tool to Verify SSL/TLS Certificate Validation in Android MQTT Client Applications
Khalid Alghamdi
Ali Alqazzaz
Anyi Liu
Hua Ming
Keyboard Emanations in Remote Voice Calls: Password Leakage and Noise(less) Masking Defenses
S Abhishek Anand
Nitesh Saxena
SPEED: Secure Provable Erasure for Class-1 IoT Devices
Mahmoud Ammar
Wilfried Daniels
Bruno Crispo
Danny Hughes
SESSION: Attacks I (Vulnerability Analysis/Malware)
Hoda Mehrpouyan
Identifying Relevant Information Cues for Vulnerability Assessment Using CVSS
Luca Allodi
Sebastian Banescu
Henning Femmer
Kristian Beckers
Malware Analysis of Imaged Binary Samples by Convolutional Neural Network with Attention Mechanism
Hiromu Yakura
Shinnosuke Shinozaki
Reon Nishimura
Yoshihiro Oyama
Jun Sakuma
Automated Generation of Attack Graphs Using NVD
M. Ugur Aksu
Kemal Bicakci
M. Hadi Dilek
A. Murat Ozbayoglu
E. ıslam Tatli
SESSION: Reception and Posters
Hongxin Hu
Effectiveness of Android Obfuscation on Evading Anti-malware
Melissa Chua
Vivek Balachandran
AEON: Android Encryption based Obfuscation
D Geethanjali
Tan Li Ying
Chua Wan Jun Melissa
Vivek Balachandran
An Empirical Study of Differentially-Private Analytics for High-Speed Network Data
Oana-Georgiana Niculaescu
Gabriel Ghinita
A Low Energy Profile: Analysing Characteristic Security on BLE Peripherals
Pallavi Sivakumaran
Jorge Blasco Alis
Secure Display for FIDO Transaction Confirmation
Yongxian Zhang
Xinluo Wang
Ziming Zhao
Hui Li
Misusing Sensory Channel to Attack Industrial Control Systems
Farhad Rasapour
Hoda Mehrpouyan
SeCore: Continuous Extrospection with High Visibility on Multi-core ARM Platforms
Penghui Zhang
Bernard Ngabonziza
Haehyun Cho
Ziming Zhao
Adam Doupé
Gail-Joon Ahn
Model Checking of Security Properties in Industrial Control Systems (ICS)
Roshan Shrestha
Hoda Mehrpouyan
Dianxiang Xu
Privacy-aware Data Assessment of Online Social Network Registration Processes
Christine Schuppler
Maria Leitner
Stefanie Rinderle-Ma
CSP & Co. Can Save Us from a Rogue Cross-Origin Storage Browser Network! But for How Long?
Juan D. Parra Rodriguez
Joachim Posegga
SESSION: Keynote Address II
Ziming Zhao
Code Obfuscation: Why is This Still a Thing?
Christian Collberg
SESSION: Access Control and Authentication
Mohamed Nabeel
Access Control Model for Virtual Objects (Shadows) Communication for AWS Internet of Things
Asma Alshehri
James Benson
Farhan Patwa
Ravi Sandhu
Security Analysis of Relationship-Based Access Control Policies
Amirreza Masoumzadeh
The Next Domino to Fall: Empirical Analysis of User Passwords across Online Services
Chun Wang
Steve T.K. Jan
Hang Hu
Douglas Bossart
Gang Wang
Efficient Authorization of Graph Database Queries in an Attribute-Supporting ReBAC Model
Syed Zain R. Rizvi
Philip W. L. Fong
SESSION: Virtualization/System Security
Hongxin Hu
Hyperagents: Migrating Host Agents to the Hypervisor
Micah Bushouse
Douglas Reeves
CacheShield: Detecting Cache Attacks through Self-Observation
Samira Briongos
Gorka Irazoqui
Pedro Malagón
Thomas Eisenbarth
Secure, Consistent, and High-Performance Memory Snapshotting
Guilherme Cox
Zi Yan
Abhishek Bhattacharjee
Vinod Ganapathy
Fidelius Charm: Isolating Unsafe Rust Code
Hussain M. J. Almohri
David Evans
SESSION: Mobile Security
Anna Cinzia Squicciarini
A Multi-Enterprise Containerization Approach with an Interoperable Position-Based System
Oyindamola Oluwatimi
Elisa Bertino
DIALERAUTH: A Motion-assisted Touch-based Smartphone User Authentication Scheme
Attaullah Buriro
Bruno Crispo
Sandeep Gupta
Filippo Del Frari
Authorship Attribution of Android Apps
Hugo Gonzalez
Natalia Stakhanova
Ali A. Ghorbani
Securing Wireless Neurostimulators
Eduard Marin
Dave Singelée
Bohan Yang
Vladimir Volski
Guy A. E. Vandenbosch
Bart Nuttin
Bart Preneel
SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications
Daoyuan Wu
Yao Cheng
Debin Gao
Yingjiu Li
Robert H. Deng
SESSION: Attacks II (Networks)
Xiruo Liu
SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in 6LoWPAN
Mahmud Hossain
Yasser Karim
Ragib Hasan
Denial of Engineering Operations Attacks in Industrial Control Systems
Saranyan Senthivel
Shrey Dhungana
Hyunguk Yoo
Irfan Ahmed
Vassil Roussev
SESSION: Web Security
Luca Allodi
A Domain is only as Good as its Buddies: Detecting Stealthy Malicious Domains via Graph Inference
Issa M. Khalil
Bei Guan
Mohamed Nabeel
Ting Yu
Forgetting with Puzzles: Using Cryptographic Puzzles to support Digital Forgetting
Ghous Amjad
Muhammad Shujaat Mirza
Christina Pöpper
SESSION: Code Analysis
Samira Briongos
Beyond Precision and Recall: Understanding Uses (and Misuses) of Similarity Hashes in Binary Analysis
Fabio Pagani
Matteo Dell'Amico
Davide Balzarotti
From Debugging-Information Based Binary-Level Type Inference to CFG Generation
Dongrui Zeng
Gang Tan
MASCAT: Preventing Microarchitectural Attacks Before Distribution
Gorka Irazoqui
Thomas Eisenbarth
Berk Sunar