


default search action
CODASPY 2021: Virtual Event, USA
- Anupam Joshi, Barbara Carminati, Rakesh M. Verma:

CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, Virtual Event, USA, April 26-28, 2021. ACM 2021, ISBN 978-1-4503-8143-7
Keynote I
- David Evans:

When Models Learn Too Much. 1
Keynote II
- Danfeng (Daphne) Yao:

Measurable and Deployable Security: Gaps, Successes, and Opportunities. 3
Session 1A: Adversarial Machine Learning
- Jiacheng Li, Ninghui Li, Bruno Ribeiro:

Membership Inference Attacks and Defenses in Classification Models. 5-16 - Guanxiong Liu, Issa Khalil

, Abdallah Khreishah
:
Using Single-Step Adversarial Training to Defend Iterative Adversarial Examples. 17-27 - Jerome Dinal Herath, Ping Yang, Guanhua Yan:

Real-Time Evasion Attacks against Deep Learning-Based Anomaly Detection from Distributed System Logs. 29-40
Session 1B: Adversarial Machine Learning
- Thusitha Dayaratne

, Carsten Rudolph, Ariel Liebman, Mahsa Salehi
:
We Can Pay Less: Coordinated False Data Injection Attack Against Residential Demand Response in Smart Grids. 41-52 - Washington Garcia, Animesh Chhotaray, Joseph I. Choi, Suman Kalyan Adari, Kevin R. B. Butler

, Somesh Jha:
Brittle Features of Device Authentication. 53-64 - Iffat Anjum, Mu Zhu, Isaac Polinsky

, William Enck, Michael K. Reiter
, Munindar P. Singh:
Role-Based Deception in Enterprise Networks. 65-76
Session 2: Blockchains, Digital Currency
- Xinyu Lei, Guan-Hua Tu

, Tian Xie, Sihan Wang
:
BFastPay: A Routing-free Protocol for Fast Payment in Bitcoin Network. 77-87 - Yiwen Hu

, Sihan Wang
, Guan-Hua Tu
, Li Xiao, Tian Xie, Xinyu Lei, Chi-Yu Li
:
Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures. 89-100 - Harsh Bimal Desai, Mustafa Safa Özdayi

, Murat Kantarcioglu:
BlockFLA: Accountable Federated Learning via Hybrid Blockchain Architecture. 101-112 - Chao Li

, Balaji Palanisamy, Runhua Xu, Jinlai Xu
, Jingzhe Wang:
SteemOps: Extracting and Analyzing Key Operations in Steemit Blockchain-based Social Media Platform. 113-118
Session 3: Privacy
- Tassos Dimitriou:

Decentralized Reputation. 119-130 - Khosro Salmani, Ken Barker:

Don't fool yourself with Forward Privacy, Your queries STILL belong to us! 131-142 - Razieh Nokhbeh Zaeem, K. Suzanne Barber:

A Large Publicly Available Corpus of Website Privacy Policies Based on DMOZ. 143-148 - Chenggang Wang, Jimmy Dani

, Xiang Li
, Xiaodong Jia
, Boyang Wang:
Adaptive Fingerprinting: Website Fingerprinting over Few Encrypted Traffic. 149-160 - Yue Li, Zhenyu Wu, Haining Wang, Kun Sun, Zhichun Li, Kangkook Jee, Junghwan Rhee, Haifeng Chen:

UTrack: Enterprise User Tracking Based on OS-Level Audit Logs. 161-172
Session 4: Policies
- Clara Bertolissi, Maribel Fernández, Bhavani Thuraisingham:

Graph-Based Specification of Admin-CBAC Policies. 173-184 - Gunjan Batra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural

:
Incremental Maintenance of ABAC Policies. 185-196 - Shuvra Chakraborty, Ravi S. Sandhu:

Formal Analysis of ReBAC Policy Mining Feasibility. 197-207
Session 5: Pandemic Security Issues
- Pengcheng Xia, Mohamed Nabeel, Issa Khalil

, Haoyu Wang, Ting Yu:
Identifying and Characterizing COVID-19 Themed Malicious Domain Campaigns. 209-220 - Marco Casagrande

, Mauro Conti
, Eleonora Losiouk
:
Contact Tracing Made Un-relay-able. 221-232
Session 6 Hardware and Device Security/Privacy
- Robert Brotzman, Danfeng Zhang

, Mahmut T. Kandemir, Gang Tan:
Ghost Thread: Effective User-Space Cache Side Channel Protection. 233-244 - Stefan Hristozov, Manuel Huber, Lei Xu, Jaro Fietz, Marco Liess, Georg Sigl:

The Cost of OSCORE and EDHOC for Constrained Devices. 245-250 - Matteo Leonelli, Umberto Morelli

, Giada Sciarretta, Silvio Ranise:
Secure Pull Printing with QR Codes and National eID Cards: A Software-oriented Design and an Open-source Implementation. 251-256
Session 7 Software Security and Malware
- Priyam Biswas, Nathan Burow, Mathias Payer:

Code Specialization through Dynamic Feature Observation. 257-268 - Aleieldin Salem:

Towards Accurate Labeling of Android Apps for Reliable Malware Detection. 269-280 - Lamine Noureddine, Annelie Heuser, Cassius Puodzius, Olivier Zendra

:
SE-PAC: A Self-Evolving PAcker Classifier against rapid packers evolution. 281-292
Poster Session
- Vivek Balachandran:

Quantum Obfuscation: Quantum Predicates with Entangled qubits. 293-295 - Vivek Balachandran, Melissa Wan Jun Chua:

Neutralizing Hostile Drones with Surveillance Drones. 297-299 - Lim Wei Ming Shawn, Purnima Murali Mohan

, Peter Kok Keong Loh, Vivek Balachandran:
Blockchain-based Proof of Existence (PoE) Framework using Ethereum Smart Contracts. 301-303 - Bassam Zahran

, Adamu Hussaini
, Aisha I. Ali-Gombe
:
IIoT-ARAS: IIoT/ICS Automated Risk Assessment System for Prediction and Prevention. 305-307 - Seoyeon Kang, Sujeong Lee, Yumin Kim, Seong-Kyun Mok, Eun-Sun Cho:

OBFUS: An Obfuscation Tool for Software Copyright and Vulnerability Protection. 309-311 - Adamu Hussaini

, Bassam Zahran, Aisha I. Ali-Gombe
:
Object Allocation Pattern as an Indicator for Maliciousness - An Exploratory Analysis. 313-315 - Eeshan Gupta, Shamik Sural

, Jaideep Vaidya, Vijayalakshmi Atluri:
Attribute-Based Access Control for NoSQL Databases. 317-319 - Shravya Kanchi, Kamalakar Karlapalem:

A Multi Perspective Access Control in a Smart Home. 321-323 - Ankur Chattopadhyay, Abdikadar Ali, Danielle Thaxton:

Assessing the Alignment of Social Robots with Trustworthy AI Design Guidelines: A Preliminary Research Study. 325-327 - Kohei Masumi, Chansu Han, Tao Ban, Takeshi Takahashi:

Towards Efficient Labeling of Network Incident Datasets Using Tcpreplay and Snort. 329-331
Panels
- Elisa Bertino, Murat Kantarcioglu, Cuneyt Gurcan Akcora

, Sagar Samtani
, Sudip Mittal, Maanak Gupta:
AI for Security and Security for AI. 333-334 - Ambareen Siraj, Nigamanth Sridhar, John A. Drew Hamilton, Latifur Khan, Siddharth Kaza, Maanak Gupta, Sudip Mittal:

Is there a Security Mindset and Can it be Taught? 335-336

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














