


default search action
CODASPY 2023: Charlotte, NC, USA
- Mohamed Shehab, Maribel Fernández, Ninghui Li:

Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2023, Charlotte, NC, USA, April 24-26, 2023. ACM 2023
Keynote I
- Michael K. Reiter

:
Tackling Credential Abuse Together. 1
Session 1: Privacy Analysis
- Ahsan Zafar

, Anupam Das
:
Comparative Privacy Analysis of Mobile Browsers. 3-14 - Minh-Ha Le

, Niklas Carlsson
:
IdDecoder: A Face Embedding Inversion Tool and its Privacy and Security Implications on Facial Recognition Systems. 15-26 - Pier Paolo Tricomi

, Lisa Facciolo, Giovanni Apruzzese
, Mauro Conti
:
Attribute Inference Attacks in Online Multiplayer Video Games: A Case Study on DOTA2. 27-38 - Ankit Gangwal

, Shubham Singh
, Abhijeet Srivastava
:
AutoSpill: Credential Leakage from Mobile Password Managers. 39-47
Session 2: Human Factors and Cloud
- Md. Lutfor Rahman

, Daniel Timko
, Hamid Wali
, Ajaya Neupane
:
Users Really Do Respond To Smishing. 49-60 - Ahmed Anu Wahab

, Daqing Hou
, Stephanie Schuckers
:
A User Study of Keystroke Dynamics as Second Factor in Web MFA. 61-72 - Aratrika Ray-Dowling

, Ahmed Anu Wahab
, Daqing Hou
, Stephanie Schuckers
:
Multi-Modality Mobile Datasets for Behavioral Biometrics Research: Data/Toolset paper. 73-78 - Momen Oqaily

, Suryadipta Majumdar
, Lingyu Wang
, Mohammad Ekramul Kabir
, Yosr Jarraya
, A. S. M. Asadujjaman
, Makan Pourzandi
, Mourad Debbabi
:
A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual Network Function Chains Hosted on Third-Party Clouds. 79-90 - Zecheng He

, Guangyuan Hu
, Ruby B. Lee
:
CloudShield: Real-time Anomaly Detection in the Cloud. 91-102
Keynote II
- Catuscia Palamidessi

:
Local Methods for Privacy Protection and Impact on Fairness. 103
Session 3: Privacy Enhancing Techniques
- Andreas Klinger

, Ulrike Meyer
:
Privacy-Preserving Fully Online Matching with Deadlines. 105-116 - Alberto Ibarrondo

, Hervé Chabanne
, Vincent Despiegel
, Melek Önen
:
Grote: Group Testing for Privacy-Preserving Face Identification. 117-128 - Andreas Klinger

, Felix Battermann
, Ulrike Meyer
:
Anonymous System for Fully Distributed and Robust Secure Multi-Party Computation. 129-139 - Ricardo Mendes

, Mariana Cunha
, João P. Vilela
:
Velocity-Aware Geo-Indistinguishability. 141-152
Session 4: Software and Systems Security
- Md Shihabul Islam

, Mahmoud Zamani
, Chung Hwan Kim
, Latifur Khan
, Kevin W. Hamlen
:
Confidential Execution of Deep Learning Inference at the Untrusted Edge with ARM TrustZone. 153-164 - Haoxiang Qin

, Zhenyu Song
, Weijuan Zhang
, Sicong Huang
, Wentao Yao
, Ge Liu
, Xiaoqi Jia
, Haichao Du
:
Protecting Encrypted Virtual Machines from Nested Page Fault Controlled Channel. 165-175 - Claudius Pott

, Berk Gülmezoglu
, Thomas Eisenbarth
:
Overcoming the Pitfalls of HPC-based Cryptojacking Detection in Presence of GPUs. 177-188 - Tom Ganz

, Inaam Ashraf
, Martin Härterich
, Konrad Rieck
:
Detecting Backdoors in Collaboration Graphs of Software Repositories. 189-200
Session 5: IoT and Embedded Systesms Security
- Seonghoon Jeong

, Minsoo Ryu
, Hyunjae Kang
, Huy Kang Kim
:
Infotainment System Matters: Understanding the Impact and Implications of In-Vehicle Infotainment System Hacking with Automotive Grade Linux. 201-212 - Sayon Duttagupta

, Eduard Marin
, Dave Singelée
, Bart Preneel
:
HAT: Secure and Practical Key Establishment for Implantable Medical Devices. 213-224 - Sebastian Surminski, Christian Niesler, Sebastian Linsner, Lucas Davi, Christian Reuter:

SCAtt-man: Side-Channel-Based Remote Attestation for Embedded Devices that Users Understand. 225-236 - Vincent Unsel

, Stephan Wiefling
, Nils Gruschka
, Luigi Lo Iacono
:
Risk-Based Authentication for OpenStack: A Fully Functional Implementation and Guiding Example. 237-243 - Bhaskar Tejaswi

, Mohammad Mannan
, Amr M. Youssef
:
All Your IoT Devices Are Belong to Us: Security Weaknesses in IoT Management Platforms. 245-250
Session 6: Access Control
- Babak Amin Azad

, Nick Nikiforakis
:
Role Models: Role-based Debloating for Web Applications. 251-262 - Amani Abu Jabal

, Elisa Bertino
, Jorge Lobo
, Dinesh C. Verma
, Seraphin B. Calo
, Alessandra Russo
:
FLAP - A Federated Learning Framework for Attribute-based Access Control Policies. 263-272 - Ritwik Rai

, Shamik Sural
:
Tool/Dataset Paper: Realistic ABAC Data Generation using Conditional Tabular GAN. 273-278
Poster Session
- Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam:

Exploiting Windows PE Structure for Adversarial Malware Evasion Attacks. 279-281 - Safwa Ameer

, Ram Krishnan
, Ravi S. Sandhu
, Maanak Gupta
:
Utilizing The DLBAC Approach Toward a ZT Score-based Authorization for IoT Systems. 283-285 - Talaya Farasat, Muhammad Ahmad Rathore, JongWon Kim:

Securing Kubernetes Pods communicating over Weave Net through eBPF/XDP from DDoS attacks. 287-289 - Nakul Aggarwal

, Shamik Sural
:
RanSAM: Randomized Search for ABAC Policy Mining. 291-293 - Khandakar Ashrafi Akbar

, Sadaf Md. Halim
, Anoop Singhal
, Basel Abdeen
, Latifur Khan
, Bhavani Thuraisingham
:
The Design of an Ontology for ATT&CK and its Application to Cybersecurity. 295-297

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














