


default search action
CODASPY 2020: New Orleans, LA, USA
- Vassil Roussev, Bhavani Thuraisingham, Barbara Carminati, Murat Kantarcioglu:
CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, New Orleans, LA, USA, March 16-18, 2020. ACM 2020, ISBN 978-1-4503-7107-0Due to the escalation of the COVID-19 situation around the world, CODASPY'20 was postponed to early fall 2020.
Invited Talk
- Bhavani M. Thuraisingham:
Can AI be for Good in the Midst of Cyber Attacks and Privacy Violations?: A Position Paper. 1-4
Session 1: Trusted Environment
- Aritra Dhar, Ivan Puddu
, Kari Kostiainen, Srdjan Capkun:
ProximiTEE: Hardened SGX Attestation by Proximity Verification. 5-16 - Thang Hoang, Rouzbeh Behnia, Yeongjin Jang, Attila A. Yavuz
:
MOSE: Practical Multi-User Oblivious Storage via Secure Enclaves. 17-28 - Edoardo Serra
, Anu Shrestha, Francesca Spezzano
, Anna Cinzia Squicciarini:
DeepTrust: An Automatic Framework to Detect Trustworthy Users in Opinion-based Systems. 29-38 - Dimitris Deyannis, Eva Papadogiannaki, Giorgos Kalivianakis, Giorgos Vasiliadis
, Sotiris Ioannidis:
TrustAV: Practical and Privacy Preserving Malware Analysis in the Cloud. 39-48
Session 2: Access Control and Authentication
- Hoai Viet Nguyen
, Luigi Lo Iacono:
CREHMA: Cache-aware REST-ful HTTP Message Authentication. 49-60 - Ivo Sluganovic, Mihael Liskij
, Ante Derek, Ivan Martinovic:
Tap-Pair: Using Spatial Secrets for Single-Tap Device Pairing of Augmented Reality Headsets. 61-72 - Clara Bertolissi, Maribel Fernández
, Bhavani Thuraisingham:
Admin-CBAC: An Administration Model for Category-Based Access Control. 73-84
Session 3: Adversarial Machine Learning
- Huangyi Ge, Sze Yiu Chau
, Bruno Ribeiro
, Ninghui Li:
Random Spiking and Systematic Evaluation of Defenses Against Adversarial Examples. 85-96 - Haoti Zhong, Cong Liao, Anna Cinzia Squicciarini, Sencun Zhu, David J. Miller:
Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation. 97-108 - Jiyu Chen, David Wang, Hao Chen
:
Explore the Transformation Space for Adversarial Images. 109-120
Session 4: Privacy I
- Bo Zhang, Boxiang Dong, Haipei Sun, Wendy Hui Wang:
AuthPDB: Authentication of Probabilistic Queries on Outsourced Uncertain Data. 121-132 - Markus Hittmeir
, Rudolf Mayer
, Andreas Ekelhart
:
A Baseline for Attribute Disclosure Risk in Synthetic Data. 133-143
Poster Session
- Keita Kayaba, Hidenobu Oguri, Yuji Yamaoka:
Evaluation of Secure Remote Offering Service for Information Bank. 144-146 - Katsuya Matsuoka, Mhd Irvan, Ryosuke Kobayashi, Rie Shigetomi Yamaguchi:
A Score Fusion Method by Neural Network in Multi-Factor Authentication. 147-149 - Kees Leune, Sung Kim:
Service-Oriented Modeling for Cyber Threat Analysis. 150-152 - Mohammad Shameel bin Mohammad Fadilah, Vivek Balachandran, Peter K. K. Loh, Melissa Wan Jun Chua:
DRAT: A Drone Attack Tool for Vulnerability Assessment. 153-155 - Devyani Vij, Vivek Balachandran, Tony Thomas
, Roopak Surendran:
GRAMAC: A Graph Based Android Malware Classification Mechanism. 156-158 - Eduardo Anaya, Jimil Patel, Prerak Shah, Vrushank Shah, Yuan Cheng
:
A Performance Study on Cryptographic Algorithms for IoT Devices. 159-161 - Steven Mackey, Ivan Mihov, Alex Nosenko, Francisco Vega, Yuan Cheng
:
A Performance Comparison of WireGuard and OpenVPN. 162-164 - Peeyush Gupta, Yin Li, Sharad Mehrotra, Nisha Panwar
, Shantanu Sharma
:
Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries. 165-167 - Florian Nuding, Rudolf Mayer
:
Poisoning Attacks in Federated Learning: An Evaluation on Traffic Sign Classification. 168-170 - Ruijia (Roger) Hu, Wyatt Dorris, Nishant Vishwamitra, Feng Luo, Matthew Costello:
On the Impact of Word Representation in Hate Speech and Offensive Language Detection and Explanation. 171-173 - Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Ke Tian, Miles Frantz, Na Meng, Barton P. Miller, Fahad Shaon, Murat Kantarcioglu, Danfeng (Daphne) Yao
:
Deployment-quality and Accessible Solutions for Cryptography Code Development. 174-176 - Sharmin Afrose, Sazzadur Rahaman, Danfeng (Daphne) Yao
:
A Comprehensive Benchmark on Java Cryptographic API Misuses. 177-178
Session 5: Mobile Security
- Richard Matovu, Abdul Serwadda, Argenis V. Bilbao, Isaac Griswold-Steiner:
Defensive Charging: Mitigating Power Side-Channel Attacks on Charging Smartphones. 179-190 - Stanislav Dashevskyi, Yury Zhauniarovich, Olga Gadyatskaya, Aleksandr Pilgun
, Hamza Ouhssain:
Dissecting Android Cryptocurrency Miners. 191-202 - Johannes Feichtner, Stefan Gruber:
Understanding Privacy Awareness in Android App Descriptions Using Deep Learning. 203-214 - Fabian Franzen, Manuel Andreas, Manuel Huber:
FridgeLock: Preventing Data Theft on Suspended Linux with Usable Memory Encryption. 215-219
Panel: A Vision for Winning the Cybersecurity Arms Race
- Elisa Bertino, Anoop Singhal, Srivathsan Srinivasagopalan, Rakesh M. Verma
:
Developing A Compelling Vision for Winning the Cybersecurity Arms Race. 220-222
Session 6: System Security
- Marco Pernpruner
, Roberto Carbone
, Silvio Ranise, Giada Sciarretta:
The Good, the Bad and the (Not So) Ugly of Out-of-Band Authentication with eID Cards and Push Notifications: Design, Formal and Risk Analysis. 223-234 - Isaac Polinsky
, Kyle Martin, William Enck, Michael K. Reiter:
n-m-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based Web Applications. 235-246 - Yi Xie, Joshua Holmes, Gaby G. Dagher
:
ZeroLender: Trustless Peer-to-Peer Bitcoin Lending Platform. 247-258
Session 7: IoT
- Ahmed Alshehri, Jacob Granley, Chuan Yue:
Attacking and Protecting Tunneled Traffic of Smart Home Devices. 259-270 - Angeliki Aktypi, Kübra Kalkan, Kasper Bonne Rasmussen:
SeCaS: Secure Capability Sharing Framework for IoT Devices in a Structured P2P Network. 271-282 - Nisha Panwar
, Shantanu Sharma
, Peeyush Gupta, Dhrubajyoti Ghosh, Sharad Mehrotra, Nalini Venkatasubramanian:
IoT Expunge: Implementing Verifiable Retention of IoT Data. 283-294
Session 8: Privacy II
- Kiavash Satvat, Maliheh Shirvanian, Mahshid Hosseini, Nitesh Saxena:
CREPE: A Privacy-Enhanced Crash Reporting System. 295-306 - Yunhui Long, Le Xu, Carl A. Gunter:
A Hypothesis Testing Approach to Sharing Logs with Confidence. 307-318 - Chen Chen, Jaewoo Lee:
Rényi Differentially Private ADMM for Non-Smooth Regularized Optimization. 319-328 - Chibuike Ugwuoke, Zekeriya Erkin
, Marcel J. T. Reinders, Reginald L. Lagendijk:
PREDICT: Efficient Private Disease Susceptibility Testing in Direct-to-Consumer Model. 329-340
Session 9: Malware Detection
- Yunus Kucuk, Guanhua Yan:
Deceiving Portable Executable Malware Classifiers into Targeted Misclassification with Practical Adversarial Examples. 341-352 - Stuart Millar, Niall McLaughlin
, Jesús Martínez del Rincón
, Paul Miller, Ziming Zhao:
DANdroid: A Multi-View Discriminative Adversarial Network for Obfuscated Android Malware Detection. 353-364 - Jiadong Sun, Xia Zhou, Wenbo Shen, Yajin Zhou, Kui Ren:
PESC: A Per System-Call Stack Canary Design for Linux Kernel. 365-375 - Sami Kairajärvi, Andrei Costin, Timo Hämäläinen
:
ISAdetect: Usable Automated Detection of CPU Architecture and Endianness for Executable Binary Files and Object Code. 376-380

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.