default search action
CODASPY 2015: San Antonio, TX, USA
- Jaehong Park, Anna Cinzia Squicciarini:
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015, San Antonio, TX, USA, March 2-4, 2015. ACM 2015, ISBN 978-1-4503-3191-3
Privacy and Access Control
- Muhammad I. Sarfraz, Mohamed Nabeel, Jianneng Cao, Elisa Bertino:
DBMask: Fine-Grained Access Control on Encrypted Relational Databases. 1-11 - Mihai Maruseac, Gabriel Ghinita:
Differentially-Private Mining of Moderately-Frequent High-Confidence Association Rules. 13-24 - Syed Rafiul Hussain, Asmaa Sallam, Elisa Bertino:
DetAnom: Detecting Anomalous Database Transactions by Insiders. 25-35
Mobile Security
- Yury Zhauniarovich, Maqsood Ahmad, Olga Gadyatskaya, Bruno Crispo, Fabio Massacci:
StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications. 37-48 - Zach Jorgensen, Jing Chen, Christopher S. Gates, Ninghui Li, Robert W. Proctor, Ting Yu:
Dimensions of Risk in Mobile Applications: A User Study. 49-60 - Zhi Xu, Sencun Zhu:
SemaDroid: A Privacy-Aware Sensor Management Framework for Smartphones. 61-72
Keynote Address 1
- William G. Horne:
Collecting, Analyzing and Responding to Enterprise Scale DNS Events. 73
Novel Techniques for Data Security
- Jan Henrik Ziegeldorf, Fred Grossmann, Martin Henze, Nicolas Inden, Klaus Wehrle:
CoinParty: Secure Multi-Party Mixing of Bitcoins. 75-86 - Matthias Neugschwandtner, Paolo Milani Comparetti, István Haller, Herbert Bos:
The BORG: Nanoprobing Binaries for Buffer Overreads. 87-97 - Zhongwen Zhang, Peng Liu, Ji Xiang, Jiwu Jing, Lingguang Lei:
How Your Phone Camera Can Be Used to Stealthily Spy on You: Transplantation Attacks against Android Camera Service. 99-110 - Rakesh M. Verma, Keith Dyer:
On the Character of Phishing URLs: Accurate and Robust Statistical Learning Classifiers. 111-122
Poster Session
- Prosunjit Biswas, Farhan Patwa, Ravi S. Sandhu:
Content Level Access Control for OpenStack Swift Storage. 123-126 - Bo Zhu, Xinxin Fan, Guang Gong:
Pleco and Plectron - Two Provably Secure Password Hashing Algorithms. 127-129 - Yun Zhang, Ram Krishnan, Ravi S. Sandhu:
Secure Information and Resource Sharing in Cloud. 131-133 - Peter Snyder, Chris Kanich:
One Thing Leads to Another: Credential Based Privilege Escalation. 135-137 - Jules Dupont, Anna Cinzia Squicciarini:
Toward De-Anonymizing Bitcoin by Mapping Users Location. 139-141 - Cong Liao, Anna Cinzia Squicciarini, Christopher Griffin:
Epidemic Behavior of Negative Users in Online Social Sites. 143-145 - Xiaokui Shu, Jing Zhang, Danfeng Yao, Wu-chun Feng:
Rapid Screening of Transformed Data Leaks with Efficient Algorithms and Parallel Computing. 147-149 - Anna Vapen, Niklas Carlsson, Anirban Mahanti, Nahid Shahmehri:
Information Sharing and User Privacy in the Third-party Identity Management Landscape. 151-153 - Daniele Gallingani, Rigel Gjomemo, V. N. Venkatakrishnan, Stefano Zanero:
Practical Exploit Generation for Intent Message Vulnerabilities in Android. 155-157 - Vivek Shandilya, Sajjan G. Shiva:
A Network Security Game Model. 159-161 - Cory Thoma, Adam J. Lee, Alexandros Labrinidis:
CryptStream: Cryptographic Access Controls for Streaming Data. 163-165 - Lei Xu, Xinwen Zhang, Xiaoxin Wu, Weidong Shi:
ABSS: An Attribute-based Sanitizable Signature for Integrity of Outsourced Database with Public Cloud. 167-169
Cloud and BigData Security
- Erman Pattuk, Murat Kantarcioglu, Huseyin Ulusoy:
BigGate: Access Control Framework for Outsourced Key-Value Stores. 171-182 - Khalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu:
Virtual Resource Orchestration Constraints in Cloud Infrastructure as a Service. 183-194 - Fang Liu, Xiaokui Shu, Danfeng Yao, Ali Raza Butt:
Privacy-Preserving Scanning of Big Content for Sensitive Data Exposure with MapReduce. 195-206
Software Security
- Jing Qiu, Babak Yadegari, Brian Johannesmeyer, Saumya Debray, Xiaohong Su:
Identifying and Understanding Self-Checksumming Defenses in Software. 207-218 - Irfan Ahmed, Vassil Roussev, Aisha I. Ali-Gombe:
Robust Fingerprinting for Relocatable Code. 219-229 - Sebastian Banescu, Alexander Pretschner, Dominic Battré, Stéfano Cazzulani, Robert Shield, Greg Thompson:
Software-Based Protection against Changeware. 231-242
Keynote Address 2
- Günter Karjoth:
Aligning Security and Business Objectives for Process-Aware Information Systems. 243
Short Papers 1
- Mohammad Saiful Islam, Mehmet Kuzu, Murat Kantarcioglu:
A Dynamic Approach to Detect Anomalous Queries on Relational Databases. 245-252 - Steven Van Acker, Daniel Hausknecht, Wouter Joosen, Andrei Sabelfeld:
Password Meters and Generators on the Web: From Large-Scale Empirical Study to Getting It Right. 253-262 - Xiaofeng Xu, Li Xiong, Jinfei Liu:
Database Fragmentation with Confidentiality Constraints: A Graph Search Approach. 263-270 - Mehmet Kuzu, Mohammad Saiful Islam, Murat Kantarcioglu:
Distributed Search over Encrypted Big Data. 271-278
Panel Session
- Bhavani Thuraisingham:
Big Data Security and Privacy. 279-280
Short Papers 2
- Bo Chen, Anil Kumar Ammula, Reza Curtmola:
Towards Server-side Repair for Erasure Coding-based Distributed Storage Systems. 281-288 - Jonathan L. Dautrich Jr., Chinya V. Ravishankar:
Combining ORAM with PIR to Minimize Bandwidth Costs. 289-296 - Mauro Conti, Luigi V. Mancini, Riccardo Spolaor, Nino Vincenzo Verde:
Can't You Hear Me Knocking: Identification of User Actions on Android Apps via Traffic Analysis. 297-304 - Jing (Dave) Tian, Kevin R. B. Butler, Patrick D. McDaniel, Padma Krishnaswamy:
Securing ARP From the Ground Up. 305-312
Privacy Preserving Techniques
- Jonathan L. Dautrich Jr., Chinya V. Ravishankar:
Tunably-Oblivious Memory: Generalizing ORAM to Enable Privacy-Efficiency Tradeoffs. 313-324 - Jason Gionta, William Enck, Peng Ning:
HideM: Protecting the Contents of Userspace Memory in the Face of Disclosure Vulnerabilities. 325-336 - Kadhim Hayawi, Alireza Mortezaei, Mahesh V. Tripunitara:
The Limits of the Trade-Off Between Query-Anonymity and Communication-Cost in Wireless Sensor Networks. 337-348
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.