


default search action
CODASPY 2024: Porto, Portugal
- João P. Vilela, Haya Schulmann, Ninghui Li:
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2024, Porto, Portugal, June 19-21, 2024. ACM 2024
Keynote Talks
- Bart Preneel
:
The Encryption Debate: An Enduring Struggle. 1-3 - Davide Balzarotti
:
Malware Research: History, Milestones, and Open Questions. 5-6
Session 1: Measuring Privacy & Security Deployments
- Andreas Klinger
, Vincent Ehrmanntraut
, Ulrike Meyer
:
Estimating the Runtime and Global Network Traffic of SMPC Protocols. 7-18 - Maisha Maliha
, Shameek Bhattacharjee
:
A Unified Time Series Analytics based Intrusion Detection Framework for CAN BUS Attacks. 19-30 - Ka Fun Tang
, Ka Lok Wu
, Sze Yiu Chau
:
Investigating TLS Version Downgrade in Enterprise Software. 31-42 - K. Virgil English
, Nathaniel Bennett
, Seaver Thorn
, Kevin R. B. Butler
, William Enck
, Patrick Traynor
:
Examining Cryptography and Randomness Failures in Open-Source Cellular Cores. 43-54 - Mehrnoosh Zaeifi
, Faezeh Kalantari
, Adam Oest
, Zhibo Sun
, Gail-Joon Ahn
, Yan Shoshitaishvili
, Tiffany Bao
, Ruoyu Wang
, Adam Doupé
:
Nothing Personal: Understanding the Spread and Use of Personally Identifiable Information in the Financial Ecosystem. 55-65
Session 2: Network, IoT, & Embedded Security
- Luke A. Bauer
, James K. Howes IV
, Sam A. Markelon
, Vincent Bindschaedler
, Thomas Shrimpton
:
Leveraging Generative Models for Covert Messaging: Challenges and Tradeoffs for "Dead-Drop" Deployments. 67-78 - Mahmood Gholipourchoubeh
, Hugo Kermabon-Bobinnec
, Suryadipta Majumdar
, Yosr Jarraya
, Lingyu Wang
, Boubakr Nour
, Makan Pourzandi
:
CCSM: Building Cross-Cluster Security Models for Edge-Core Environments Involving Multiple Kubernetes Clusters. 79-90 - Philip Empl
, Fabian Böhm
, Günther Pernul
:
Process-Aware Intrusion Detection in MQTT Networks. 91-102
Session 3: Security of Cryptographic Protocols and Implementations
- Andrei Ouatu
, Gabriel Ghinita
, Razvan Rughinis
:
Accelerating Performance of Bilinear Map Cryptography using FPGA. 103-113 - Jacob Haltiwanger
, Thang Hoang
:
Exploiting Update Leakage in Searchable Symmetric Encryption. 115-126 - Ihyun Nam
:
The Avg-Act Swap and Plaintext Overflow Detection in Fully Homomorphic Operations Over Deep Circuits. 127-138
Poster Session
- Giovanni Ciaramella
, Fabio Martinelli
, Francesco Mercaldo
, Antonella Santone
:
DroidDefender: An Image-based Android Antimalware Proof-of-Concept. 139-141 - Fabio Martinelli
, Francesco Mercaldo
, Luca Petrillo
, Antonella Santone
:
Security Policy Generation and Verification through Large Language Models: A Proposal. 143-145 - Anand Agrawal
, Rajib Ranjan Maiti
:
Guarding the Wi-Fi 4-Way Handshake against Channel-based MiTM: A Case Study on KRACK Attack. 147-149 - Talaya Farasat
, Joachim Posegga
:
Machine Learning Techniques for Python Source Code Vulnerability Detection. 151-153 - Joseph Guan Quan Lim
, Zhen Yu Kwok
, Isaac Soon
, Jun Xian Yong
, Samuel Song Yuhao
, Siti Halilah Binte Rosley
, Vivek Balachandran
:
A-COPILOT: Android Covert Operation for Private Information Lifting and OTP Theft: A study on how Malware Masquerading as Legitimate Applications compromise Security and Privacy. 155-157 - Sasi Bhushan V. Saladi
, Nagesh Bhattu Sristy
:
Communicate Less, Learn More: A Locally Differential Private Approach for Counting Triangles with Better Accuracy. 159-161 - Shashank Sharma
, Ayushi Sharma
, Aravind Machiry
:
Aunor: Converting Rust crates to [no_std] at scale. 163-165 - Anderson Sales
, Nuno Torres
, Pedro Pinto
:
An Overview of Threats Exploring the Confusion Between Top-Level Domains and File Type Extensions? 167-169 - Priyanka Rushikesh Chaudhary
, N. Pranav Krishna
, Rajib Ranjan Maiti
:
IoTFuzzSentry: Hunting Bugs In The IoT Wilderness In Operational Phase Using Payload Fuzzing. 171-173
Session 4: Data Privacy & Privacy in Computation I
- Trevor Kann
, Lujo Bauer
, Robert K. Cunningham
:
CoCoT: Collaborative Contact Tracing. 175-186 - Alessandro N. Baccarini
, Marina Blanton
, Shaofeng Zou
:
Understanding Information Disclosure from Secure Computation Output: A Study of Average Salary Computation. 187-198 - Sofiane Azogagh
, Zelma Aubin Birba
, Sébastien Gambs
, Marc-Olivier Killijian
:
Crypto'Graph: Leveraging Privacy-Preserving Distributed Link Prediction for Robust Graph Learning. 199-210 - Aleksandr Dolgavin
, Mark Yampolskiy
, Moti Yung
:
Stop Stealing My Data: Sanitizing Stego Channels in 3D Printing Design Files. 211-220
Session 5: Data Privacy & Privacy in Computation II
- Saskia Nuñez von Voigt
, Luise Mehner
, Florian Tschorsch
:
From Theory to Comprehension: A Comparative Study of Differential Privacy and k-Anonymity. 221-232 - K. Naveen Kumar
, C. Krishna Mohan
, Aravind Machiry
:
Precision Guided Approach to Mitigate Data Poisoning Attacks in Federated Learning. 233-244 - Clément Elliker
, Emeric Tonnelier
, Aymen Shabou
:
Coherent Multi-Table Data Synthesis for Tabular and Time-Series Data with GANs. 245-252
Session 6: Web & Mobile Application Security
- Shou-Ching Hsiao
, Shih-Wei Li
, Hsu-Chun Hsiao
:
Risky Cohabitation: Understanding and Addressing Over-privilege Risks of Commodity Application Virtualization Platforms in Android. 253-264 - Jinghui Liao
, Niusen Chen
, Lichen Xia
, Bo Chen
, Weisong Shi
:
FSPDE: A Full Stack Plausibly Deniable Encryption System for Mobile Devices. 265-276 - Mashari Alatawi
, Nitesh Saxena
:
Automating Key Fingerprint Comparisons in Secure Mobile Messaging Apps: A Case Study of Signal. 277-288 - Daniel Timko
, Muhammad Lutfor Rahman
:
Smishing Dataset I: Phishing SMS Dataset from Smishtank.com. 289-294
Session 7: Data Privacy & Privacy in Computation III
- Ana-Maria Cretu
, Miruna Rusu
, Yves-Alexandre de Montjoye
:
Re-pseudonymization Strategies for Smart Meter Data Are Not Robust to Deep Learning Profiling Attacks. 295-306 - Matta Varun
, Shuya Feng
, Han Wang
, Shamik Sural
, Yuan Hong
:
Towards Accurate and Stronger Local Differential Privacy for Federated Learning with Staircase Randomized Response. 307-318 - Mariana Cunha
, Guilherme Duarte
, Ricardo Andrade
, Ricardo Mendes
, João P. Vilela
:
Privkit: A Toolkit of Privacy-Preserving Mechanisms for Heterogeneous Data Types. 319-324
Session 8: Attack & Malware
- Kento Hasegawa
, Seira Hidano
, Kazuhide Fukushima
:
AutoRed: Automating Red Team Assessment via Strategic Thinking Using Reinforcement Learning. 325-336 - Kedrian James
, Kevin Valakuzhy
, Kevin Z. Snow
, Fabian Monrose
:
CrashTalk: Automated Generation of Precise, Human Readable, Descriptions of Software Security Bugs. 337-347 - Kiavash Satvat
, Rigel Gjomemo
, V. N. Venkatakrishnan
:
TIPCE: A Longitudinal Threat Intelligence Platform Comprehensiveness Analysis. 349-360 - Gabriel Loiseau
, Valentin Lefils
, Maxime Meyer
, Damien Riquet
:
WikiPhish: A Diverse Wikipedia-Based Dataset for Phishing Website Detection: Data/Toolset Paper. 361-366
Session 9: Secure Access Control & Privacy Preserving Authentication
- Marina Blanton
, Dennis Murphy
:
Privacy Preserving Biometric Authentication for Fingerprints and Beyond. 367-378 - Yongqi Wang
, Thalia Laing
, José Moreira
, Mark D. Ryan
:
Remote Registration of Multiple Authenticators. 379-390 - Ala Eddine Laouir
, Abdessamad Imine
:
SLIM-View: Sampling and Private Publishing of Multidimensional Databases. 391-402 - Si Zhang
, Philip W. L. Fong
:
Mining Domain-Based Policies. 403-414

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.