


default search action
37th SP 2016: San Jose, CA, USA - Workshops
- 2016 IEEE Security and Privacy Workshops, SP Workshops 2016, San Jose, CA, USA, May 22-26, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-3690-5

IWPE: Second International Workshop on Privacy Engineering
- Michael Bar-Sinai

, Latanya Sweeney, Mercè Crosas:
DataTags, Data Handling Policy Spaces and the Tags Language. 1-8 - Florian Kelbert, Alexander Fromm:

Compliance Monitoring of Third-Party Applications in Online Social Networks. 9-16 - Stuart S. Shapiro:

Privacy Risk Analysis Based on System Control Structures: Adapting System-Theoretic Process Analysis for Privacy Engineering. 17-24 - Kaniz Fatema, Christophe Debruyne

, Dave Lewis, Declan O'Sullivan
, John P. Morrison, Abdullah-Al Mazed:
A Semi-Automated Methodology for Extracting Access Control Rules from the European Data Protection Directive. 25-32 - Michael Colesky, Jaap-Henk Hoepman, Christiaan Hillen:

A Critical Analysis of Privacy Design Strategies. 33-40 - Chien-Lun Chen, Ranjan Pal, Leana Golubchik:

Oblivious Mechanisms in Differential Privacy: Experiments, Conjectures, and Open Questions. 41-48 - Kiel Brennan-Marquez, Daniel Susser

:
Obstacles to Transparency in Privacy Engineering. 49-52 - Lilian Edwards, Derek McAuley

, Laurence Diver:
From Privacy Impact Assessment to Social Impact Assessment. 53-57 - Sourya Joyee De, Daniel Le Métayer:

Privacy Harm Analysis: A Case Study on Smart Grids. 58-65
BioStar: Workshop on Bio-inspired Security, Trust, Assurance and Resilience
- Faisal Alshanketi

, Issa Traoré, Ahmed Awad E. Ahmed:
Improving Performance and Usability in Mobile Keystroke Dynamic Biometric Authentication. 66-73 - James Brown, Mohd Anwar, Gerry V. Dozier:

Detection of Mobile Malware: An Artificial Immunity Approach. 74-80 - Jake Drew, Tyler Moore

, Michael Hahsler:
Polymorphic Malware Detection Using Sequence Classification Methods. 81-87 - Christopher S. Oehmen

, Paul J. Bruillard, Brett D. Matzke, Aaron R. Phillips, Keith T. Star, Jeffrey L. Jensen, Doug Nordwall, Seth R. Thompson, Elena S. Peterson:
LINEBACKER: LINE-Speed Bio-Inspired Analysis and Characterization for Event Recognition. 88-95 - Mohamed Azab, Mohamed Eltoweissy:

MIGRATE: Towards a Lightweight Moving-Target Defense Against Cloud Side-Channels. 96-103 - Shin-Ming Cheng

, Pin-Yu Chen:
Ecology-Based DoS Attack in Cognitive Radio Networks. 104-110 - Konstantin Böttinger:

Hunting Bugs with Lévy Flight Foraging. 111-117 - Christopher S. Oehmen

, Elena S. Peterson, Aaron R. Phillips, Darren S. Curtis
:
A Biosequence-Based Approach to Software Characterization. 118-125
LangSec: Third Workshop on Language Theoretic Security
Papers
- Guillaume Endignoux, Olivier Levillain, Jean-Yves Migeon:

Caradoc: A Pragmatic Approach to PDF Parsing and Validation. 126-139 - Katherine Underwood, Michael E. Locasto:

In Search of Shotgun Parsers in Android Applications. 140-155 - Harald Lampesberger:

An Incremental Learner for Language-Based Anomaly Detection in XML. 156-170 - Sheridan S. Curley, Richard E. Harang:

Grammatical Inference and Machine Learning Approaches to Post-Hoc LangSec. 171-178
Research Reports and Work-in-Progress Reports
- Peter Aldous, Matthew Might:

A Posteriori Taint-Tracking for Demonstrating Non-interference in Expressive Low-Level Languages. 179-184 - Jacob I. Torrey, Jonathan Miodownik:

Research Report: Analysis of Software for Restricted Computational Environment Applicability. 185-188 - Nathaniel Wesley Filardo:

Research Report: Mitigating LangSec Problems with Capabilities. 189-197 - Rick McGeer:

Declarative Verifiable SDI Specifications. 198-203
MoST: Mobile Security Technologies
Session 1: Studies
- Patrick Mutchler, Yeganeh Safaei, Adam Doupé, John C. Mitchell

:
Target Fragmentation in Android Apps. 204-213 - Shari Trewin, Calvin Swart, Larry Koved, Kapil Singh:

Perceptions of Risk in Mobile Transaction. 214-223 - Benjamin Andow, Adwait Nadkarni, Blake Bassett, William Enck

, Tao Xie:
A Study of Grayware on Google Play. 224-233
Session 2: Attacks
- Adrian Dabrowski

, Georg Merzdovnik
, Nikolaus Kommenda, Edgar R. Weippl:
Browser History Stealing with Captive Wi-Fi Portals. 234-240 - Chuan Yue:

Sensor-Based Mobile Web Fingerprinting and Cross-Site Input Inference Attacks. 241-244 - Bogdan Copos, Karl N. Levitt, Matt Bishop

, Jeff Rowe:
Is Anybody Home? Inferring Activity From Smart Home Network Traffic. 245-251
Session 3: Defenses
- Santanu Kumar Dash

, Guillermo Suarez-Tangil
, Salahuddin J. Khan, Kimberly Tam
, Mansour Ahmadi, Johannes Kinder, Lorenzo Cavallaro
:
DroidScribe: Classifying Android Malware Based on Runtime Behavior. 252-261 - Ke Tian, Danfeng Yao

, Barbara G. Ryder, Gang Tan
:
Analysis of Code Heterogeneity for High-Precision Classification of Repackaged Malware. 262-271 - Zaire Ali, Jamie Payton, Vincent Sritapan:

At Your Fingertips: Considering Finger Distinctness in Continuous Touch-Based Authentication for Mobile Devices. 272-275 - Attaullah Buriro

, Bruno Crispo, Filippo Del Frari, Konrad S. Wrona
:
Hold and Sign: A Novel Behavioral Biometrics for Smartphone User Authentication. 276-285
WRIT: Workshop on Research for Insider Threat
- Ioannis Agrafiotis, Arnau Erola, Jassim Happa, Michael Goldsmith, Sadie Creese:

Validating an Insider Threat Detection System: A Real Scenario Perspective. 286-295 - Liron Schiff, Stefan Schmid

:
PRI: Privacy Preserving Inspection of Encrypted Network Traffic. 296-303 - Florian Kammüller, Manfred Kerber:

Investigating Airplane Safety and Security Against Insider Threats Using Logical Modeling. 304-313 - Shannon C. Roberts

, John T. Holodnak, Trang Nguyen, Sophia Yuditskaya, Maja Milosavljevic, William W. Streilein:
A Model-Based Approach to Predicting the Performance of Insider Threat Detection Systems. 314-323 - Elisa Costante, Davide Fauri, Sandro Etalle, Jerry den Hartog, Nicola Zannone

:
A Hybrid Framework for Data Loss Prevention and Detection. 324-333 - Alan C. Lin, Gilbert L. Peterson

:
Activity Pattern Discovery from Network Captures. 334-342

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














