


default search action
CODASPY 2025: Pittsburgh, PA, USA
- James Joshi, Jaideep Vaidya, Haya Schulmann:

Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2025, Pittsburgh, PA, USA, June 4-6, 2025. ACM 2024, ISBN 979-8-4007-1476-4
Keynote Talks
- Orr Dunkelman

:
Privacy - From the Ivory Tower to the Trenches in the Parliament. 1-4 - V. S. Subrahmanian

:
Covert Social Influence Operations: Past, Present, and Future. 5
Session 1: Web and Browser Security
- Mohammad M. Ahmadpanah

, Matías F. Gobbi
, Daniel Hedin
, Johannes Kinder
, Andrei Sabelfeld
:
CodeX: Contextual Flow Tracking for Browser Extensions. 6-17 - Theodoros Apostolopoulos

, Vasilios Koutsokostas
, Nikolaos Totosis
, Constantinos Patsakis
, Georgios Smaragdakis
:
Coding Malware in Fancy Programming Languages for Fun and Profit. 18-29 - Neil P. Thimmaiah

, Rigel Gjomemo
, V. N. Venkatakrishnan
:
SemFinder: A Semantics-Based Approach to Enhance Vulnerability Analysis in Web Applications. 30-41 - Oghenerukevwe Elohor Oyinloye

, Carol J. Fung
:
Evaluating Website Data Leaks through Spam Collection on Honeypots. 42-53 - Pieter Philippaerts

, Stef Verreydt
, Wouter Joosen
:
Enhanced Threat Modeling and Attack Scenario Generation for OAuth 2.0 Implementations: Data/Toolset paper. 54-59
Session 2: Differential Privacy
- Shuya Feng

, Meisam Mohammady
, Hanbin Hong
, Shenao Yan
, Ashish Kundu
, Binghui Wang
, Yuan Hong
:
Harmonizing Differential Privacy Mechanisms for Federated Learning: Boosting Accuracy and Convergence. 60-71 - Amol Khanna

, Fred Lu
, Edward Raff
:
Differentially Private Iterative Screening Rules for Linear Regression. 72-83 - Stephen Meisenbacher

, Chaeeun Joy Lee
, Florian Matthes
:
Spend Your Budget Wisely: Towards an Intelligent Distribution of the Privacy Budget in Differentially Private Text Rewriting. 84-95
Session 3: Access Control Management and Policy Compliance
- Ferhat Demirkiran

, Amir Masoumzadeh
:
Enhancing Relationship-Based Access Control Policies with Negative Rule Mining. 96-106 - Florian Jacob

, Hannes Hartenstein
:
To the Best of Knowledge and Belief: On Eventually Consistent Access Control. 107-118 - Md. Al Amin

, Hemanth Tummala
, Rushabh Shah
, Indrajit Ray
:
Proof of Compliance (PoC): A Consensus Mechanism to Verify the Compliance with Informed Consent Policy in Healthcare. 119-130
Session 4: Systems and Hardware Security
- Sayed Erfan Arefin

, Abdul Serwadda
:
Exploiting HDMI and USB Ports for GPU Side-Channel Insights. 131-142 - Matteo Zoia, Marco Cutecchia, Davide Rusconi, Andrea Monzani, Mirco Picca, Danilo Bruschi, Andrea Lanzi:

VS-TEE: A Framework for Virtualizing TEEs in ARM Cloud Contexts. 143-154 - Axel Durbet

, Paul-Marie Grollemund
, Pascal Lafourcade
, Kevin Thiry-Atighehchi
:
Defining Security Limits in Biometrics. 155-166 - Mia Filic

, Jonas Hofmann
, Sam A. Markelon
, Kenneth G. Paterson
, Anupama Unnikrishnan
:
Probabilistic Data Structures in the Wild: A Security Analysis of Redis. 167-178 - Raphael Springer

, Alexander Schmitz
, Artur Leinweber
, Tobias Urban
, Christian Dietrich
:
Padding Matters - Exploring Function Detection in PE Files: Data/Toolset paper. 179-184
Session 5: Privacy Inference and Data Aggregation
- Bingyu Liu

, Ali Arastehfard
, Rujia Wang
, Weiran Liu
, Zhongjie Ba
, Shanglin Zhou
, Yuan Hong
:
Secure and Efficient Video Inferences with Compressed 3-Dimensional Deep Neural Networks. 185-196 - Riccardo Taiello

, Clémentine Gritti
, Melek Önen
, Marco Lorenzi
:
Buffalo: A Practical Secure Aggregation Protocol for Buffered Asynchronous Federated Learning. 197-208 - Edgardo Alberto Barsallo Yi

, Joshua David Oetting Majors
, Aditya Vardhan Padala
, Darren Wu
, Aravind Machiry
, Saurabh Bagchi
:
Multi-Device Context-Sensitive Attacks Against Privacy. 209-220 - Scott Seidenberger

, Oluwasijibomi Ajisegiri
, Noah Pursell
, Fazil Raja
, Anindya Maiti
:
Why You've Got Mail: Evaluating Inbox Privacy Implications of Email Marketing Practices in Online Apps and Services. 221-232 - Mir Imtiaz Mostafiz

, Imtiaz Karim
, Elisa Bertino
:
How Feasible is Augmenting Fake Nodes with Learnable Features as a Counter-strategy against Link Stealing Attacks? 233-244
Session 6: Threat Detection and Intelligence
- Sutanu Kumar Ghosh

, Rigel Gjomemo
, V. N. Venkatakrishnan
:
Citar: Cyberthreat Intelligence-driven Attack Reconstruction. 245-256 - Seyed Mohammad Sanjari

, Ashfak Md Shibli
, Maraz Mia
, Maanak Gupta
, Mir Mehedi Ahsan Pritom
:
SmishViz: Towards A Graph-based Visualization System for Monitoring and Characterizing Ongoing Smishing Threats. 257-268 - Anh-Duy Tran

, Laurens Sion
, Koen Yskout
, Wouter Joosen
:
TerrARA: Automated Security Threat Modeling for Infrastructure as Code. 269-280
Session 7: Blockchain and Decentralized Finance
- Abdulrahman Alhaidari

, Balaji Palanisamy
, Prashant Krishnamurthy
:
Protecting DeFi Platforms against Non-Price Flash Loan Attacks. 281-292 - Abdulrahman Alhaidari

, Bhavani Kalal
, Balaji Palanisamy
, Shamik Sural
:
SolRPDS: A Dataset for Analyzing Rug Pulls in Solana Decentralized Finance. 293-298 - Lukas Ingmarsson

, Karl Duckert Karlsson
, Niklas Carlsson
:
Using Venom to Flip the Coin and Peel the Onion: Measurement Tool and Dataset for Studying the Bitcoin - Dark Web Synergy: Data/Toolset Paper. 299-304
Session 8: AI and Security
- Anudeep Das

, Vasisht Duddu
, Rui Zhang
, N. Asokan
:
Espresso: Robust Concept Filtering in Text-to-Image Models. 305-316 - Vasisht Duddu

, Lachlan J. Gunn
, N. Asokan
:
Laminator: Verifiable ML Property Cards using Hardware-assisted Attestations. 317-328 - Advije Rizvani

, Giovanni Apruzzese
, Pavel Laskov
:
The Ephemeral Threat: Assessing the Security of Algorithmic Trading Systems powered by Deep Learning. 329-340 - Dennis Jacob

, Hend Alzahrani
, Zhanhao Hu
, Basel Alomair
, David A. Wagner
:
PromptShield: Deployable Detection for Prompt Injection Attacks. 341-352 - Elisa Braconaro

, Eleonora Losiouk
:
A Dataset for Evaluating LLMs Vulnerability Repair Performance in Android Applications: Data/Toolset paper. 353-358
Session 9: Cryptography and Secure Communication
- Md Rabbi Alam

, Jinpeng Wei
, Qingyang Wang
:
CryptMove: Moving Stealthily through Legitimate and Encrypted Communication Channels. 359-370 - Eugene Frimpong

, Bin Liu
, Camille Nuoskala
, Antonis Michalas
:
Blind Brother: Attribute-Based Selective Video Encryption. 371-382 - Julie Ha

, Chloé Cachet
, Luke Demarest
, Sohaib Ahmad
, Benjamin Fuller
:
Private Eyes: Zero-Leakage Iris Searchable Encryption. 383-394 - Yuzhou Feng

, Sandeep Kiran Pinjala
, Radu Sion
, Bogdan Carbunar
:
Trilobyte: Plausibly Deniable Communications Through Single Player Games: Data/Toolset Paper. 395-400
Session 10: Vulnerability and Intrusion Detection
- Asmaa Hailane

, Paria Shirani
, Guy-Vincent Jourdan
:
VulPatrol: Interprocedural Vulnerability Detection and Localization through Semantic Graph Learning. 401-412 - Hyunwoo Lee

, Charalampos Katsis
, Alireza Lotfi
, Taejun Choi
, Soeun Kim
, Ashish Kundu
, Elisa Bertino
:
IoTDSCreator: A Framework to Create Labeled Datasets for IoT Intrusion Detection Systems. 413-418 - Eric Wagner

, Lennart Bader
, Konrad Wolsing
, Martin Serror
:
Sherlock: A Dataset for Process-aware Intrusion Detection Research on Power Grid Networks: Dataset Paper. 419-424

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














