default search action
CODASPY 2024: Porto, Portugal
- João P. Vilela, Haya Schulmann, Ninghui Li:
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2024, Porto, Portugal, June 19-21, 2024. ACM 2024
Keynote Talks
- Bart Preneel:
The Encryption Debate: An Enduring Struggle. 1-3 - Davide Balzarotti:
Malware Research: History, Milestones, and Open Questions. 5-6
Session 1: Measuring Privacy & Security Deployments
- Andreas Klinger, Vincent Ehrmanntraut, Ulrike Meyer:
Estimating the Runtime and Global Network Traffic of SMPC Protocols. 7-18 - Maisha Maliha, Shameek Bhattacharjee:
A Unified Time Series Analytics based Intrusion Detection Framework for CAN BUS Attacks. 19-30 - Ka Fun Tang, Ka Lok Wu, Sze Yiu Chau:
Investigating TLS Version Downgrade in Enterprise Software. 31-42 - K. Virgil English, Nathaniel Bennett, Seaver Thorn, Kevin R. B. Butler, William Enck, Patrick Traynor:
Examining Cryptography and Randomness Failures in Open-Source Cellular Cores. 43-54 - Mehrnoosh Zaeifi, Faezeh Kalantari, Adam Oest, Zhibo Sun, Gail-Joon Ahn, Yan Shoshitaishvili, Tiffany Bao, Ruoyu Wang, Adam Doupé:
Nothing Personal: Understanding the Spread and Use of Personally Identifiable Information in the Financial Ecosystem. 55-65
Session 2: Network, IoT, & Embedded Security
- Luke A. Bauer, James K. Howes IV, Sam A. Markelon, Vincent Bindschaedler, Thomas Shrimpton:
Leveraging Generative Models for Covert Messaging: Challenges and Tradeoffs for "Dead-Drop" Deployments. 67-78 - Mahmood Gholipourchoubeh, Hugo Kermabon-Bobinnec, Suryadipta Majumdar, Yosr Jarraya, Lingyu Wang, Boubakr Nour, Makan Pourzandi:
CCSM: Building Cross-Cluster Security Models for Edge-Core Environments Involving Multiple Kubernetes Clusters. 79-90 - Philip Empl, Fabian Böhm, Günther Pernul:
Process-Aware Intrusion Detection in MQTT Networks. 91-102
Session 3: Security of Cryptographic Protocols and Implementations
- Andrei Ouatu, Gabriel Ghinita, Razvan Rughinis:
Accelerating Performance of Bilinear Map Cryptography using FPGA. 103-113 - Jacob Haltiwanger, Thang Hoang:
Exploiting Update Leakage in Searchable Symmetric Encryption. 115-126 - Ihyun Nam:
The Avg-Act Swap and Plaintext Overflow Detection in Fully Homomorphic Operations Over Deep Circuits. 127-138
Poster Session
- Giovanni Ciaramella, Fabio Martinelli, Francesco Mercaldo, Antonella Santone:
DroidDefender: An Image-based Android Antimalware Proof-of-Concept. 139-141 - Fabio Martinelli, Francesco Mercaldo, Luca Petrillo, Antonella Santone:
Security Policy Generation and Verification through Large Language Models: A Proposal. 143-145 - Anand Agrawal, Rajib Ranjan Maiti:
Guarding the Wi-Fi 4-Way Handshake against Channel-based MiTM: A Case Study on KRACK Attack. 147-149 - Talaya Farasat, Joachim Posegga:
Machine Learning Techniques for Python Source Code Vulnerability Detection. 151-153 - Joseph Guan Quan Lim, Zhen Yu Kwok, Isaac Soon, Jun Xian Yong, Samuel Song Yuhao, Siti Halilah Binte Rosley, Vivek Balachandran:
A-COPILOT: Android Covert Operation for Private Information Lifting and OTP Theft: A study on how Malware Masquerading as Legitimate Applications compromise Security and Privacy. 155-157 - Sasi Bhushan V. Saladi, Nagesh Bhattu Sristy:
Communicate Less, Learn More: A Locally Differential Private Approach for Counting Triangles with Better Accuracy. 159-161 - Shashank Sharma, Ayushi Sharma, Aravind Machiry:
Aunor: Converting Rust crates to [no_std] at scale. 163-165 - Anderson Sales, Nuno Torres, Pedro Pinto:
An Overview of Threats Exploring the Confusion Between Top-Level Domains and File Type Extensions? 167-169 - Priyanka Rushikesh Chaudhary, N. Pranav Krishna, Rajib Ranjan Maiti:
IoTFuzzSentry: Hunting Bugs In The IoT Wilderness In Operational Phase Using Payload Fuzzing. 171-173
Session 4: Data Privacy & Privacy in Computation I
- Trevor Kann, Lujo Bauer, Robert K. Cunningham:
CoCoT: Collaborative Contact Tracing. 175-186 - Alessandro N. Baccarini, Marina Blanton, Shaofeng Zou:
Understanding Information Disclosure from Secure Computation Output: A Study of Average Salary Computation. 187-198 - Sofiane Azogagh, Zelma Aubin Birba, Sébastien Gambs, Marc-Olivier Killijian:
Crypto'Graph: Leveraging Privacy-Preserving Distributed Link Prediction for Robust Graph Learning. 199-210 - Aleksandr Dolgavin, Mark Yampolskiy, Moti Yung:
Stop Stealing My Data: Sanitizing Stego Channels in 3D Printing Design Files. 211-220
Session 5: Data Privacy & Privacy in Computation II
- Saskia Nuñez von Voigt, Luise Mehner, Florian Tschorsch:
From Theory to Comprehension: A Comparative Study of Differential Privacy and k-Anonymity. 221-232 - K. Naveen Kumar, C. Krishna Mohan, Aravind Machiry:
Precision Guided Approach to Mitigate Data Poisoning Attacks in Federated Learning. 233-244 - Clément Elliker, Emeric Tonnelier, Aymen Shabou:
Coherent Multi-Table Data Synthesis for Tabular and Time-Series Data with GANs. 245-252
Session 6: Web & Mobile Application Security
- Shou-Ching Hsiao, Shih-Wei Li, Hsu-Chun Hsiao:
Risky Cohabitation: Understanding and Addressing Over-privilege Risks of Commodity Application Virtualization Platforms in Android. 253-264 - Jinghui Liao, Niusen Chen, Lichen Xia, Bo Chen, Weisong Shi:
FSPDE: A Full Stack Plausibly Deniable Encryption System for Mobile Devices. 265-276 - Mashari Alatawi, Nitesh Saxena:
Automating Key Fingerprint Comparisons in Secure Mobile Messaging Apps: A Case Study of Signal. 277-288 - Daniel Timko, Muhammad Lutfor Rahman:
Smishing Dataset I: Phishing SMS Dataset from Smishtank.com. 289-294
Session 7: Data Privacy & Privacy in Computation III
- Ana-Maria Cretu, Miruna Rusu, Yves-Alexandre de Montjoye:
Re-pseudonymization Strategies for Smart Meter Data Are Not Robust to Deep Learning Profiling Attacks. 295-306 - Matta Varun, Shuya Feng, Han Wang, Shamik Sural, Yuan Hong:
Towards Accurate and Stronger Local Differential Privacy for Federated Learning with Staircase Randomized Response. 307-318 - Mariana Cunha, Guilherme Duarte, Ricardo Andrade, Ricardo Mendes, João P. Vilela:
Privkit: A Toolkit of Privacy-Preserving Mechanisms for Heterogeneous Data Types. 319-324
Session 8: Attack & Malware
- Kento Hasegawa, Seira Hidano, Kazuhide Fukushima:
AutoRed: Automating Red Team Assessment via Strategic Thinking Using Reinforcement Learning. 325-336 - Kedrian James, Kevin Valakuzhy, Kevin Z. Snow, Fabian Monrose:
CrashTalk: Automated Generation of Precise, Human Readable, Descriptions of Software Security Bugs. 337-347 - Kiavash Satvat, Rigel Gjomemo, V. N. Venkatakrishnan:
TIPCE: A Longitudinal Threat Intelligence Platform Comprehensiveness Analysis. 349-360 - Gabriel Loiseau, Valentin Lefils, Maxime Meyer, Damien Riquet:
WikiPhish: A Diverse Wikipedia-Based Dataset for Phishing Website Detection: Data/Toolset Paper. 361-366
Session 9: Secure Access Control & Privacy Preserving Authentication
- Marina Blanton, Dennis Murphy:
Privacy Preserving Biometric Authentication for Fingerprints and Beyond. 367-378 - Yongqi Wang, Thalia Laing, José Moreira, Mark D. Ryan:
Remote Registration of Multiple Authenticators. 379-390 - Ala Eddine Laouir, Abdessamad Imine:
SLIM-View: Sampling and Private Publishing of Multidimensional Databases. 391-402 - Si Zhang, Philip W. L. Fong:
Mining Domain-Based Policies. 403-414
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.