default search action
37th SP 2016: San Jose, CA, USA - Workshops
- 2016 IEEE Security and Privacy Workshops, SP Workshops 2016, San Jose, CA, USA, May 22-26, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-3690-5
IWPE: Second International Workshop on Privacy Engineering
- Michael Bar-Sinai, Latanya Sweeney, Mercè Crosas:
DataTags, Data Handling Policy Spaces and the Tags Language. 1-8 - Florian Kelbert, Alexander Fromm:
Compliance Monitoring of Third-Party Applications in Online Social Networks. 9-16 - Stuart S. Shapiro:
Privacy Risk Analysis Based on System Control Structures: Adapting System-Theoretic Process Analysis for Privacy Engineering. 17-24 - Kaniz Fatema, Christophe Debruyne, Dave Lewis, Declan O'Sullivan, John P. Morrison, Abdullah-Al Mazed:
A Semi-Automated Methodology for Extracting Access Control Rules from the European Data Protection Directive. 25-32 - Michael Colesky, Jaap-Henk Hoepman, Christiaan Hillen:
A Critical Analysis of Privacy Design Strategies. 33-40 - Chien-Lun Chen, Ranjan Pal, Leana Golubchik:
Oblivious Mechanisms in Differential Privacy: Experiments, Conjectures, and Open Questions. 41-48 - Kiel Brennan-Marquez, Daniel Susser:
Obstacles to Transparency in Privacy Engineering. 49-52 - Lilian Edwards, Derek McAuley, Laurence Diver:
From Privacy Impact Assessment to Social Impact Assessment. 53-57 - Sourya Joyee De, Daniel Le Métayer:
Privacy Harm Analysis: A Case Study on Smart Grids. 58-65
BioStar: Workshop on Bio-inspired Security, Trust, Assurance and Resilience
- Faisal Alshanketi, Issa Traoré, Ahmed Awad E. Ahmed:
Improving Performance and Usability in Mobile Keystroke Dynamic Biometric Authentication. 66-73 - James Brown, Mohd Anwar, Gerry V. Dozier:
Detection of Mobile Malware: An Artificial Immunity Approach. 74-80 - Jake Drew, Tyler Moore, Michael Hahsler:
Polymorphic Malware Detection Using Sequence Classification Methods. 81-87 - Christopher S. Oehmen, Paul J. Bruillard, Brett D. Matzke, Aaron R. Phillips, Keith T. Star, Jeffrey L. Jensen, Doug Nordwall, Seth R. Thompson, Elena S. Peterson:
LINEBACKER: LINE-Speed Bio-Inspired Analysis and Characterization for Event Recognition. 88-95 - Mohamed Azab, Mohamed Eltoweissy:
MIGRATE: Towards a Lightweight Moving-Target Defense Against Cloud Side-Channels. 96-103 - Shin-Ming Cheng, Pin-Yu Chen:
Ecology-Based DoS Attack in Cognitive Radio Networks. 104-110 - Konstantin Böttinger:
Hunting Bugs with Lévy Flight Foraging. 111-117 - Christopher S. Oehmen, Elena S. Peterson, Aaron R. Phillips, Darren S. Curtis:
A Biosequence-Based Approach to Software Characterization. 118-125
LangSec: Third Workshop on Language Theoretic Security
Papers
- Guillaume Endignoux, Olivier Levillain, Jean-Yves Migeon:
Caradoc: A Pragmatic Approach to PDF Parsing and Validation. 126-139 - Katherine Underwood, Michael E. Locasto:
In Search of Shotgun Parsers in Android Applications. 140-155 - Harald Lampesberger:
An Incremental Learner for Language-Based Anomaly Detection in XML. 156-170 - Sheridan S. Curley, Richard E. Harang:
Grammatical Inference and Machine Learning Approaches to Post-Hoc LangSec. 171-178
Research Reports and Work-in-Progress Reports
- Peter Aldous, Matthew Might:
A Posteriori Taint-Tracking for Demonstrating Non-interference in Expressive Low-Level Languages. 179-184 - Jacob I. Torrey, Jonathan Miodownik:
Research Report: Analysis of Software for Restricted Computational Environment Applicability. 185-188 - Nathaniel Wesley Filardo:
Research Report: Mitigating LangSec Problems with Capabilities. 189-197 - Rick McGeer:
Declarative Verifiable SDI Specifications. 198-203
MoST: Mobile Security Technologies
Session 1: Studies
- Patrick Mutchler, Yeganeh Safaei, Adam Doupé, John C. Mitchell:
Target Fragmentation in Android Apps. 204-213 - Shari Trewin, Calvin Swart, Larry Koved, Kapil Singh:
Perceptions of Risk in Mobile Transaction. 214-223 - Benjamin Andow, Adwait Nadkarni, Blake Bassett, William Enck, Tao Xie:
A Study of Grayware on Google Play. 224-233
Session 2: Attacks
- Adrian Dabrowski, Georg Merzdovnik, Nikolaus Kommenda, Edgar R. Weippl:
Browser History Stealing with Captive Wi-Fi Portals. 234-240 - Chuan Yue:
Sensor-Based Mobile Web Fingerprinting and Cross-Site Input Inference Attacks. 241-244 - Bogdan Copos, Karl N. Levitt, Matt Bishop, Jeff Rowe:
Is Anybody Home? Inferring Activity From Smart Home Network Traffic. 245-251
Session 3: Defenses
- Santanu Kumar Dash, Guillermo Suarez-Tangil, Salahuddin J. Khan, Kimberly Tam, Mansour Ahmadi, Johannes Kinder, Lorenzo Cavallaro:
DroidScribe: Classifying Android Malware Based on Runtime Behavior. 252-261 - Ke Tian, Danfeng Yao, Barbara G. Ryder, Gang Tan:
Analysis of Code Heterogeneity for High-Precision Classification of Repackaged Malware. 262-271 - Zaire Ali, Jamie Payton, Vincent Sritapan:
At Your Fingertips: Considering Finger Distinctness in Continuous Touch-Based Authentication for Mobile Devices. 272-275 - Attaullah Buriro, Bruno Crispo, Filippo Del Frari, Konrad S. Wrona:
Hold and Sign: A Novel Behavioral Biometrics for Smartphone User Authentication. 276-285
WRIT: Workshop on Research for Insider Threat
- Ioannis Agrafiotis, Arnau Erola, Jassim Happa, Michael Goldsmith, Sadie Creese:
Validating an Insider Threat Detection System: A Real Scenario Perspective. 286-295 - Liron Schiff, Stefan Schmid:
PRI: Privacy Preserving Inspection of Encrypted Network Traffic. 296-303 - Florian Kammüller, Manfred Kerber:
Investigating Airplane Safety and Security Against Insider Threats Using Logical Modeling. 304-313 - Shannon C. Roberts, John T. Holodnak, Trang Nguyen, Sophia Yuditskaya, Maja Milosavljevic, William W. Streilein:
A Model-Based Approach to Predicting the Performance of Insider Threat Detection Systems. 314-323 - Elisa Costante, Davide Fauri, Sandro Etalle, Jerry den Hartog, Nicola Zannone:
A Hybrid Framework for Data Loss Prevention and Detection. 324-333 - Alan C. Lin, Gilbert L. Peterson:
Activity Pattern Discovery from Network Captures. 334-342
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.