


default search action
CODASPY 2015: San Antonio, TX, USA
- Jaehong Park, Anna Cinzia Squicciarini:

Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015, San Antonio, TX, USA, March 2-4, 2015. ACM 2015, ISBN 978-1-4503-3191-3
Privacy and Access Control
- Muhammad I. Sarfraz, Mohamed Nabeel, Jianneng Cao, Elisa Bertino:

DBMask: Fine-Grained Access Control on Encrypted Relational Databases. 1-11 - Mihai Maruseac, Gabriel Ghinita:

Differentially-Private Mining of Moderately-Frequent High-Confidence Association Rules. 13-24 - Syed Rafiul Hussain, Asmaa Sallam, Elisa Bertino:

DetAnom: Detecting Anomalous Database Transactions by Insiders. 25-35
Mobile Security
- Yury Zhauniarovich, Maqsood Ahmad, Olga Gadyatskaya, Bruno Crispo, Fabio Massacci

:
StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications. 37-48 - Zach Jorgensen, Jing Chen, Christopher S. Gates, Ninghui Li, Robert W. Proctor, Ting Yu:

Dimensions of Risk in Mobile Applications: A User Study. 49-60 - Zhi Xu, Sencun Zhu:

SemaDroid: A Privacy-Aware Sensor Management Framework for Smartphones. 61-72
Keynote Address 1
- William G. Horne:

Collecting, Analyzing and Responding to Enterprise Scale DNS Events. 73
Novel Techniques for Data Security
- Jan Henrik Ziegeldorf, Fred Grossmann, Martin Henze

, Nicolas Inden, Klaus Wehrle
:
CoinParty: Secure Multi-Party Mixing of Bitcoins. 75-86 - Matthias Neugschwandtner, Paolo Milani Comparetti, István Haller, Herbert Bos

:
The BORG: Nanoprobing Binaries for Buffer Overreads. 87-97 - Zhongwen Zhang, Peng Liu, Ji Xiang, Jiwu Jing, Lingguang Lei:

How Your Phone Camera Can Be Used to Stealthily Spy on You: Transplantation Attacks against Android Camera Service. 99-110 - Rakesh M. Verma

, Keith Dyer:
On the Character of Phishing URLs: Accurate and Robust Statistical Learning Classifiers. 111-122
Poster Session
- Prosunjit Biswas, Farhan Patwa, Ravi S. Sandhu:

Content Level Access Control for OpenStack Swift Storage. 123-126 - Bo Zhu, Xinxin Fan, Guang Gong:

Pleco and Plectron - Two Provably Secure Password Hashing Algorithms. 127-129 - Yun Zhang, Ram Krishnan, Ravi S. Sandhu:

Secure Information and Resource Sharing in Cloud. 131-133 - Peter Snyder, Chris Kanich:

One Thing Leads to Another: Credential Based Privilege Escalation. 135-137 - Jules Dupont, Anna Cinzia Squicciarini

:
Toward De-Anonymizing Bitcoin by Mapping Users Location. 139-141 - Cong Liao, Anna Cinzia Squicciarini

, Christopher Griffin
:
Epidemic Behavior of Negative Users in Online Social Sites. 143-145 - Xiaokui Shu, Jing Zhang, Danfeng Yao

, Wu-chun Feng:
Rapid Screening of Transformed Data Leaks with Efficient Algorithms and Parallel Computing. 147-149 - Anna Vapen, Niklas Carlsson, Anirban Mahanti, Nahid Shahmehri:

Information Sharing and User Privacy in the Third-party Identity Management Landscape. 151-153 - Daniele Gallingani, Rigel Gjomemo, V. N. Venkatakrishnan, Stefano Zanero

:
Practical Exploit Generation for Intent Message Vulnerabilities in Android. 155-157 - Vivek Shandilya, Sajjan G. Shiva:

A Network Security Game Model. 159-161 - Cory Thoma, Adam J. Lee

, Alexandros Labrinidis
:
CryptStream: Cryptographic Access Controls for Streaming Data. 163-165 - Lei Xu

, Xinwen Zhang, Xiaoxin Wu, Weidong Shi:
ABSS: An Attribute-based Sanitizable Signature for Integrity of Outsourced Database with Public Cloud. 167-169
Cloud and BigData Security
- Erman Pattuk, Murat Kantarcioglu, Huseyin Ulusoy:

BigGate: Access Control Framework for Outsourced Key-Value Stores. 171-182 - Khalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu:

Virtual Resource Orchestration Constraints in Cloud Infrastructure as a Service. 183-194 - Fang Liu, Xiaokui Shu, Danfeng Yao

, Ali Raza Butt
:
Privacy-Preserving Scanning of Big Content for Sensitive Data Exposure with MapReduce. 195-206
Software Security
- Jing Qiu

, Babak Yadegari, Brian Johannesmeyer, Saumya Debray, Xiaohong Su:
Identifying and Understanding Self-Checksumming Defenses in Software. 207-218 - Irfan Ahmed

, Vassil Roussev, Aisha I. Ali-Gombe
:
Robust Fingerprinting for Relocatable Code. 219-229 - Sebastian Banescu

, Alexander Pretschner, Dominic Battré, Stéfano Cazzulani, Robert Shield, Greg Thompson:
Software-Based Protection against Changeware. 231-242
Keynote Address 2
- Günter Karjoth:

Aligning Security and Business Objectives for Process-Aware Information Systems. 243
Short Papers 1
- Mohammad Saiful Islam, Mehmet Kuzu, Murat Kantarcioglu:

A Dynamic Approach to Detect Anomalous Queries on Relational Databases. 245-252 - Steven Van Acker, Daniel Hausknecht, Wouter Joosen, Andrei Sabelfeld:

Password Meters and Generators on the Web: From Large-Scale Empirical Study to Getting It Right. 253-262 - Xiaofeng Xu, Li Xiong

, Jinfei Liu:
Database Fragmentation with Confidentiality Constraints: A Graph Search Approach. 263-270 - Mehmet Kuzu, Mohammad Saiful Islam, Murat Kantarcioglu:

Distributed Search over Encrypted Big Data. 271-278
Panel Session
- Bhavani Thuraisingham:

Big Data Security and Privacy. 279-280
Short Papers 2
- Bo Chen, Anil Kumar Ammula, Reza Curtmola:

Towards Server-side Repair for Erasure Coding-based Distributed Storage Systems. 281-288 - Jonathan L. Dautrich Jr., Chinya V. Ravishankar

:
Combining ORAM with PIR to Minimize Bandwidth Costs. 289-296 - Mauro Conti

, Luigi V. Mancini
, Riccardo Spolaor, Nino Vincenzo Verde:
Can't You Hear Me Knocking: Identification of User Actions on Android Apps via Traffic Analysis. 297-304 - Jing (Dave) Tian, Kevin R. B. Butler

, Patrick D. McDaniel, Padma Krishnaswamy:
Securing ARP From the Ground Up. 305-312
Privacy Preserving Techniques
- Jonathan L. Dautrich Jr., Chinya V. Ravishankar

:
Tunably-Oblivious Memory: Generalizing ORAM to Enable Privacy-Efficiency Tradeoffs. 313-324 - Jason Gionta, William Enck, Peng Ning:

HideM: Protecting the Contents of Userspace Memory in the Face of Disclosure Vulnerabilities. 325-336 - Kadhim Hayawi

, Alireza Mortezaei, Mahesh V. Tripunitara:
The Limits of the Trade-Off Between Query-Anonymity and Communication-Cost in Wireless Sensor Networks. 337-348

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














