Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Sigmund Albert Gorski III, Benjamin Andow, Adwait Nadkarni, Sunil Manandhar, William Enck, Eric Bodden, Alexandre Bartel |
ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, CODASPY 2019, Richardson, TX, USA, March 25-27, 2019, pp. 25-36, 2019, ACM, 978-1-4503-6099-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Kaushal Kafle, Kevin Moran, Sunil Manandhar, Adwait Nadkarni, Denys Poshyvanyk |
A Study of Data Store-based Home Automation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, CODASPY 2019, Richardson, TX, USA, March 25-27, 2019, pp. 73-84, 2019, ACM, 978-1-4503-6099-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Nikolai J. Podlesny, Anne V. D. M. Kayem, Christoph Meinel |
Attribute Compartmentation and Greedy UCC Discovery for High-Dimensional Data Anonymization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, CODASPY 2019, Richardson, TX, USA, March 25-27, 2019, pp. 109-119, 2019, ACM, 978-1-4503-6099-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Roshan Shrestha, Hoda Mehrpouyan, Dianxiang Xu |
Model Checking of Security Properties in Industrial Control Systems (ICS). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 164-166, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Eduard Marin, Dave Singelée, Bohan Yang 0001, Vladimir Volskiy, Guy A. E. Vandenbosch, Bart Nuttin, Bart Preneel |
Securing Wireless Neurostimulators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 287-298, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Attaullah Buriro, Bruno Crispo, Sandeep Gupta 0002, Filippo Del Frari |
DIALERAUTH: A Motion-assisted Touch-based Smartphone User Authentication Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 267-276, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Md. Mahmud Hossain, Yasser Karim, Ragib Hasan |
SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in 6LoWPAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 307-318, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Matthew W. Sanders, Chuan Yue |
Minimizing Privilege Assignment Errors in Cloud Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 2-12, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Iraklis Leontiadis, Reza Curtmola |
Secure Storage with Replication and Transparent Deduplication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 13-23, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Khalid Alghamdi, Ali Alqazzaz, Anyi Liu, Ming Hua 0003 |
IoTVerif: An Automated Tool to Verify SSL/TLS Certificate Validation in Android MQTT Client Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 95-102, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Hiromu Yakura, Shinnosuke Shinozaki, Reon Nishimura, Yoshihiro Oyama, Jun Sakuma |
Malware Analysis of Imaged Binary Samples by Convolutional Neural Network with Attention Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 127-134, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Melissa Wan Jun Chua, Vivek Balachandran |
Effectiveness of Android Obfuscation on Evading Anti-malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 143-145, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Hugo Gonzalez, Natalia Stakhanova, Ali A. Ghorbani 0001 |
Authorship Attribution of Android Apps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 277-286, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Cong Liao, Haoti Zhong, Sencun Zhu, Anna Cinzia Squicciarini |
Server-Based Manipulation Attacks Against Machine Learning Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 24-34, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Christine Schuppler, Maria Leitner, Stefanie Rinderle-Ma |
Privacy-aware Data Assessment of Online Social Network Registration Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 167-169, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Guilherme Cox, Zi Yan, Abhishek Bhattacharjee, Vinod Ganapathy |
Secure, Consistent, and High-Performance Memory Snapshotting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 236-247, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Cetin Sahin, Brandon Kuczenski, Ömer Egecioglu, Amr El Abbadi |
Privacy-Preserving Certification of Sustainability Metrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 53-63, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Mahmoud Ammar, Wilfried Daniels, Bruno Crispo, Danny Hughes 0001 |
SPEED: Secure Provable Erasure for Class-1 IoT Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 111-118, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Brad Wardman |
Managing the Crossroads of Academia and Industry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 1, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | M. Ugur Aksu, Kemal Bicakci, M. Hadi Dilek, A. Murat Ozbayoglu, Emin Islam Tatli |
Automated Generation of Attack Graphs Using NVD. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 135-142, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | D. Geethanjali, Tan Li Ying, Melissa Wan Jun Chua, Vivek Balachandran |
AEON: Android Encryption based Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 146-148, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Farhad Rasapour, Hoda Mehrpouyan |
Misusing Sensory Channel to Attack Industrial Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 158-160, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Chun Wang, Steve T. K. Jan, Hang Hu 0002, Douglas Bossart, Gang Wang 0011 |
The Next Domino to Fall: Empirical Analysis of User Passwords across Online Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 196-203, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Christian S. Collberg |
Code Obfuscation: Why is This Still a Thing? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 173-174, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Luca Allodi, Sebastian Banescu, Henning Femmer, Kristian Beckers |
Identifying Relevant Information Cues for Vulnerability Assessment Using CVSS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 119-126, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Samira Briongos, Gorka Irazoqui, Pedro Malagón, Thomas Eisenbarth 0001 |
CacheShield: Detecting Cache Attacks through Self-Observation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 224-235, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Saranyan Senthivel, Shrey Dhungana, Hyunguk Yoo, Irfan Ahmed 0001, Vassil Roussev |
Denial of Engineering Operations Attacks in Industrial Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 319-329, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Aravind Ramachandran, Murat Kantarcioglu |
SmartProvenance: A Distributed, Blockchain Based DataProvenance System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 35-42, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Juan D. Parra Rodriguez, Joachim Posegga |
CSP & Co. Can Save Us from a Rogue Cross-Origin Storage Browser Network! But for How Long? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 170-172, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Syed Zain R. Rizvi, Philip W. L. Fong |
Efficient Authorization of Graph Database Queries in an Attribute-Supporting ReBAC Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 204-211, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | S. Abhishek Anand, Nitesh Saxena |
Keyboard Emanations in Remote Voice Calls: Password Leakage and Noise(less) Masking Defenses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 103-110, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Ziming Zhao 0001, Gail-Joon Ahn, Ram Krishnan, Gabriel Ghinita (eds.) |
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![ACM The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
1 | Xiruo Liu, Rafael Misoczki, Manoj R. Sastry |
Remote Attestation for Low-End Prover Devices with Post-Quantum Capabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 84-94, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Asma Alshehri, James O. Benson, Farhan Patwa, Ravi S. Sandhu |
Access Control Model for Virtual Objects (Shadows) Communication for AWS Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 175-185, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Oana-Georgiana Niculaescu, Gabriel Ghinita |
An Empirical Study of Differentially-Private Analytics for High-Speed Network Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 149-151, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Aleksandra Korolova, Vinod Sharma |
Cross-App Tracking via Nearby Bluetooth Low Energy Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 43-52, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Penghui Zhang, Bernard Ngabonziza, Haehyun Cho, Ziming Zhao 0001, Adam Doupé, Gail-Joon Ahn |
SeCore: Continuous Extrospection with High Visibility on Multi-core ARM Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 161-163, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Amirreza Masoumzadeh 0001 |
Security Analysis of Relationship-Based Access Control Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 186-195, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Ghous Amjad, Muhammad Shujaat Mirza, Christina Pöpper |
Forgetting with Puzzles: Using Cryptographic Puzzles to support Digital Forgetting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 342-353, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Daoyuan Wu, Yao Cheng, Debin Gao, Yingjiu Li, Robert H. Deng |
SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 299-306, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Micah Bushouse, Douglas S. Reeves |
Hyperagents: Migrating Host Agents to the Hypervisor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 212-223, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Issa M. Khalil, Bei Guan, Mohamed Nabeel, Ting Yu 0001 |
A Domain is only as Good as its Buddies: Detecting Stealthy Malicious Domains via Graph Inference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 330-341, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Dongrui Zeng, Gang Tan |
From Debugging-Information Based Binary-Level Type Inference to CFG Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 366-376, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Oyindamola Oluwatimi, Elisa Bertino |
A Multi-Enterprise Containerization Approach with an Interoperable Position-Based System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 256-266, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Hupperich, Dennis Tatang, Nicolai Wilkop, Thorsten Holz |
An Empirical Study on Online Price Differentiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 76-83, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Yongxian Zhang, Xinluo Wang, Ziming Zhao 0001, Hui Li 0070 |
Secure Display for FIDO Transaction Confirmation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 155-157, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Le Métayer, Pablo Rauzy |
Capacity: an Abstract Model of Control over Personal Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 64-75, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Gorka Irazoqui, Thomas Eisenbarth 0001, Berk Sunar |
MASCAT: Preventing Microarchitectural Attacks Before Distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 377-388, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Pallavi Sivakumaran, Jorge Blasco Alís |
A Low Energy Profile: Analysing Characteristic Security on BLE Peripherals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 152-154, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Hussain M. J. Almohri, David Evans 0001 |
Fidelius Charm: Isolating Unsafe Rust Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 248-255, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Pagani, Matteo Dell'Amico, Davide Balzarotti |
Beyond Precision and Recall: Understanding Uses (and Misuses) of Similarity Hashes in Binary Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 354-365, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Kang G. Shin |
Research Issues and Approaches for Connected and Automated Vehicles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 1, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Banescu, Mohsen Ahmadvand, Alexander Pretschner, Robert Shield, Chris Hamilton |
Detecting Patching of Executables without System Calls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 185-196, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Yufei Gu, Qingchuan Zhao, Yinqian Zhang, Zhiqiang Lin |
PT-CFI: Transparent Backward-Edge Control Flow Violation Detection Using Intel Processor Trace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 173-184, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Yifei Zhang 0001, Tian Tan 0001, Yue Li 0006, Jingling Xue |
Ripple: Reflection Analysis for Android Apps in Incomplete Information Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 281-288, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Hamza Harkous, Karl Aberer |
"If You Can't Beat them, Join them": A Usability Approach to Interdependent Privacy in Cloud Apps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 127-138, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Syed Rafiul Hussain, Shagufta Mehnaz, Shahriar Nirjon, Elisa Bertino |
Seamless and Secure Bluetooth LE Connection Migration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 147-149, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Hugo Gascon, Bernd Grobauer, Thomas Schreck, Lukas Rist, Daniel Arp, Konrad Rieck |
Mining Attributed Graphs for Threat Intelligence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 15-22, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Rui Shu, Xiaohui Gu, William Enck |
A Study of Security Vulnerabilities on Docker Hub. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 269-280, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Shameek Bhattacharjee, Aditya Thakur 0002, Simone Silvestri, Sajal K. Das 0001 |
Statistical Security Incident Forensics against Data Falsification in Smart Grid Advanced Metering Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 35-45, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Bo Li 0026, Kevin A. Roundy, Christopher S. Gates, Yevgeniy Vorobeychik |
Large-Scale Identification of Malicious Singleton Files. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 227-238, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jan Henrik Ziegeldorf, Jan Metzke, Jan Rüth, Martin Henze, Klaus Wehrle |
Privacy-Preserving HMM Forward Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 83-94, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Mehadi Hassen, Philip K. Chan |
Scalable Function Call Graph-based Malware Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 239-248, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Luca Compagna, Daniel Ricardo dos Santos, Serena Elisa Ponta, Silvio Ranise |
Aegis: Automatic Enforcement of Security Policies in Workflow-driven Web Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 321-328, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Cetin Sahin, Brandon Kuczenski, Ömer Egecioglu, Amr El Abbadi |
Towards Practical Privacy-Preserving Life Cycle Assessment Computations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 167-169, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Mohamed Elsabagh, Daniel Barbará, Dan Fleck, Angelos Stavrou |
Detecting ROP with Statistical Learning of Program Characteristics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 219-226, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Gail-Joon Ahn, Alexander Pretschner, Gabriel Ghinita (eds.) |
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![ACM, 978-1-4503-4523-1 The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
1 | Oana-Georgiana Niculaescu, Mihai Maruseac, Gabriel Ghinita |
Differentially-Private Big Data Analytics for High-Speed Research Network Traffic Measurement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 151-153, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Rakesh M. Verma, Ayman El Aassal |
Comprehensive Method for Detecting Phishing EmailsUsing Correlation-based Analysis and User Participation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 155-157, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jason Crampton, Conrad Williams |
Canonical Completeness in Lattice-Based Languages for Attribute-Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 47-58, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Fabian Foerg, Susanne Wetzel, Ulrike Meyer |
Efficient Commodity Matching for Privacy-Preserving Two-Party Bartering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 107-114, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Zhe Zhou 0001, Zhou Li 0001, Kehuan Zhang |
All Your VMs are Disconnected: Attacking Hardware Virtualized Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 249-260, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Guillermo Suarez-Tangil, Santanu Kumar Dash 0001, Mansour Ahmadi, Johannes Kinder, Giorgio Giacinto, Lorenzo Cavallaro |
DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 309-320, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Tahmina Ahmed, Ravi S. Sandhu, Jaehong Park |
Classifying and Comparing Attribute-Based and Relationship-Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 59-70, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Zhiyuan Lin, Mahesh Tripunitara |
Graph Automorphism-Based, Semantics-Preserving Security for the Resource Description Framework (RDF). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 337-348, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Alexandra Dmitrienko, Christian Plappert |
Secure Free-Floating Car Sharing for Offline Cars. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 349-360, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Andrew Reed, Michael J. Kranch |
Identifying HTTPS-Protected Netflix Videos in Real-Time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 361-368, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Pierre Bergé, Jason Crampton, Gregory Z. Gutin, Rémi Watrigant |
The Authorization Policy Existence Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 163-165, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Robert Buhren, Shay Gueron, Jan Nordholz, Jean-Pierre Seifert, Julian Vetter |
Fault Attacks on Encrypted General Purpose Compute Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 197-204, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Samuel Weiser, Mario Werner |
SGXIO: Generic Trusted I/O Path for Intel SGX. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 261-268, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Luka Malisa, Kari Kostiainen, Srdjan Capkun |
Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 289-300, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Niall McLaughlin, Jesús Martínez del Rincón, BooJoong Kang, Suleiman Y. Yerima, Paul Miller 0003, Sakir Sezer, Yeganeh Safaei, Erik Trickel, Ziming Zhao 0001, Adam Doupé, Gail-Joon Ahn |
Deep Android Malware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 301-308, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Shagufta Mehnaz, Elisa Bertino |
Ghostbuster: A Fine-grained Approach for Anomaly Detection in File System Accesses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 3-14, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Vincent Bindschaedler, Shantanu Rane, Alejandro E. Brito, Vanishree Rao, Ersin Uzun |
Achieving Differential Privacy in Secure Multiparty Data Aggregation Protocols on Star Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 115-125, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | S. Raj Rajagopalan |
The Human Capital Model for Security Research: New Insights into Technology Transition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 171-172, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Margaux Canet, Amrit Kumar 0001, Cédric Lauradoux, Mary-Andréa Rakotomanga, Reihaneh Safavi-Naini |
Decompression Quines and Anti-Viruses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 23-34, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Daniele Ucci, Leonardo Aniello, Roberto Baldoni |
Share a pie?: Privacy-Preserving Knowledge Base Export through Count-min Sketches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 95-106, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Chi Sing Chum, Xiaowen Zhang |
A New Bloom Filter Structure for Searchable Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 143-145, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Panagiotis Ilia, Barbara Carminati, Elena Ferrari, Paraskevi Fragopoulou, Sotiris Ioannidis |
SAMPAC: Socially-Aware collaborative Multi-Party Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 71-82, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Fang Liu, Haipeng Cai, Gang Wang 0011, Danfeng (Daphne) Yao, Karim O. Elish, Barbara G. Ryder |
Prioritized Analysis of Inter-App Communication Risks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 159-161, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Adam Doupé |
Panel: Trustworthy Data Science. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 217, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Babak Yadegari, Jon Stephens, Saumya Debray |
Analysis of Exception-Based Control Transfers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 205-216, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Alexander Sjösten, Steven Van Acker, Andrei Sabelfeld |
Discovering Browser Extensions via Web Accessible Resources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 329-336, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Abdelouahab Amira, Abdelraouf Ouadjaout, Abdelouahid Derhab, Nadjib Badache |
Sound and Static Analysis of Session Fixation Vulnerabilities in PHP Web Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 139-141, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Musard Balliu, Benjamin Liebe, Daniel Schoepe, Andrei Sabelfeld |
JSLINQ: Building Secure Applications across Tiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, CODASPY 2016, New Orleans, LA, USA, March 9-11, 2016, pp. 307-318, 2016, ACM, 978-1-4503-3935-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Apostolis Zarras, Katharina Kohls, Markus Dürmuth, Christina Pöpper |
Neuralyzer: Flexible Expiration Times for the Revocation of Online Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, CODASPY 2016, New Orleans, LA, USA, March 9-11, 2016, pp. 14-25, 2016, ACM, 978-1-4503-3935-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Valeriu Daniel Stanciu, Riccardo Spolaor, Mauro Conti, Cristiano Giuffrida |
On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against Statistical Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, CODASPY 2016, New Orleans, LA, USA, March 9-11, 2016, pp. 105-112, 2016, ACM, 978-1-4503-3935-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Anjila Tamrakar, Justin D. Russell, Irfan Ahmed 0001, Golden G. Richard III, Carl F. Weems |
SPICE: A Software Tool for Bridging the Gap Between End-user's Insecure Cyber Behavior and Personality Traits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, CODASPY 2016, New Orleans, LA, USA, March 9-11, 2016, pp. 124-126, 2016, ACM, 978-1-4503-3935-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Aisha I. Ali-Gombe, Irfan Ahmed 0001, Golden G. Richard III, Vassil Roussev |
AspectDroid: Android App Analysis System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, CODASPY 2016, New Orleans, LA, USA, March 9-11, 2016, pp. 145-147, 2016, ACM, 978-1-4503-3935-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sushama Karumanchi, Jingwei Li 0001, Anna Cinzia Squicciarini |
Efficient Network Path Verification for Policy-routedQueries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, CODASPY 2016, New Orleans, LA, USA, March 9-11, 2016, pp. 319-328, 2016, ACM, 978-1-4503-3935-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|