Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Mansour Ahmadi, Dmitry Ulyanov, Stanislav Semenov, Mikhail Trofimov, Giorgio Giacinto |
Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification. |
CODASPY |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Daren Fadolalkarim, Asmaa Sallam, Elisa Bertino |
PANDDE: Provenance-based ANomaly Detection of Data Exfiltration. |
CODASPY |
2016 |
DBLP BibTeX RDF |
|
1 | Nick Christoulakis, George Christou, Elias Athanasopoulos, Sotiris Ioannidis |
HCFI: Hardware-enforced Control-Flow Integrity. |
CODASPY |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Maliheh Monshizadeh, Prasad Naldurg, V. N. Venkatakrishnan |
Patching Logic Vulnerabilities for Web Applications using LogicPatcher. |
CODASPY |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jason Crampton, James Sellwood |
ARPPM: Administration in the RPPM Model. |
CODASPY |
2016 |
DBLP BibTeX RDF |
|
1 | Gustavo Grieco, Guillermo Luis Grinblat, Lucas C. Uzal, Sanjay Rawat 0001, Josselin Feist, Laurent Mounier |
Toward Large-Scale Vulnerability Discovery using Machine Learning. |
CODASPY |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mahdi Alizadeh, Nicola Zannone |
Risk-based Analysis of Business Process Executions. |
CODASPY |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Noriko Tomuro, Steven L. Lytinen, Kurt Hornsburg |
Automatic Summarization of Privacy Policies using Ensemble Learning. |
CODASPY |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Iberia Medeiros, Miguel Beatriz, Nuno Ferreira Neves, Miguel Correia 0001 |
Hacking the DBMS to Prevent Injection Attacks. |
CODASPY |
2016 |
DBLP BibTeX RDF |
|
1 | John Knight |
DIVERSITY. |
CODASPY |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jeffrey M. Voas |
Decoding the Mystery of the Internet of Things. |
CODASPY |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ryan Stevens, Jonathan Crussell, Hao Chen 0003 |
On the Origin of Mobile Apps: Network Provenance for Android Applications. |
CODASPY |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Xing Gao 0001, Dachuan Liu, Daiping Liu, Haining Wang |
On Energy Security of Smartphones. |
CODASPY |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Johannes Hoffmann, Teemu Rytilahti, Davide Maiorca, Marcel Winandy, Giorgio Giacinto, Thorsten Holz |
Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation. |
CODASPY |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ameni Ben Fadhel, Domenico Bianculli, Lionel C. Briand, Benjamin Hourte |
A Model-driven Approach to Representing and Checking RBAC Contextual Policies. |
CODASPY |
2016 |
DBLP BibTeX RDF |
|
1 | Gaoyao Xiao, Jun Wang 0141, Peng Liu 0005, Jiang Ming 0002, Dinghao Wu |
Program-object Level Data Flow Analysis with Applications to Data Leakage and Contamination Forensics. |
CODASPY |
2016 |
DBLP BibTeX RDF |
|
1 | Zhenquan Cai, Roland H. C. Yap |
Inferring the Detection Logic and Evaluating the Effectiveness of Android Anti-Virus Apps. |
CODASPY |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Navid Pustchi, Farhan Patwa, Ravi S. Sandhu |
Multi Cloud IaaS with Domain Trust in OpenStack. |
CODASPY |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yufei Gu, Zhiqiang Lin |
Derandomizing Kernel Address Space Layout for Memory Introspection and Forensics. |
CODASPY |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Syed Zain R. Rizvi, Philip W. L. Fong |
Interoperability of Relationship- and Role-Based Access Control. |
CODASPY |
2016 |
DBLP BibTeX RDF |
|
1 | Taous Madi, Suryadipta Majumdar, Yushun Wang, Yosr Jarraya, Makan Pourzandi, Lingyu Wang 0001 |
Auditing Security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack. |
CODASPY |
2016 |
DBLP BibTeX RDF |
|
1 | Eduard Marin, Dave Singelée, Bohan Yang 0001, Ingrid Verbauwhede, Bart Preneel |
On the Feasibility of Cryptography for a Wireless Insulin Pump System. |
CODASPY |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yue Chen, Zhi Wang 0004, David B. Whalley, Long Lu |
Remix: On-demand Live Randomization. |
CODASPY |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yoshinori Aono, Takuya Hayashi 0001, Le Trieu Phong, Lihua Wang 0001 |
Scalable and Secure Logistic Regression via Homomorphic Encryption. |
CODASPY |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Carlo Combi, Luca Viganò 0001, Matteo Zavatteri |
Security Constraints in Temporal Role-Based Access-Controlled Workflows. |
CODASPY |
2016 |
DBLP BibTeX RDF |
|
1 | John Maheswaran, Daniel Jackowitz, Ennan Zhai, David Isaac Wolinsky, Bryan Ford |
Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities. |
CODASPY |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Awad A. Younis, Yashwant K. Malaiya, Charles Anderson 0001, Indrajit Ray |
To Fear or Not to Fear That is the Question: Code Characteristics of a Vulnerable Functionwith an Existing Exploit. |
CODASPY |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Manar Mohamed, Babins Shrestha, Nitesh Saxena |
SMASheD: Sniffing and Manipulating Android Sensor Data. |
CODASPY |
2016 |
DBLP BibTeX RDF |
|
1 | Judicael Briand Djoko, Brandon Jennings, Adam J. Lee |
TPRIVEXEC: Private Execution in Virtual Memory. |
CODASPY |
2016 |
DBLP BibTeX RDF |
|
1 | Teryl Taylor, Xin Hu 0001, Ting Wang 0006, Jiyong Jang, Marc Ph. Stoecklin, Fabian Monrose, Reiner Sailer |
Detecting Malicious Exploit Kits using Tree-based Similarity Searches. |
CODASPY |
2016 |
DBLP BibTeX RDF |
|
1 | Anita Nikolich |
SDN Research Challenges and Opportunities. |
CODASPY |
2016 |
DBLP BibTeX RDF |
|
1 | Alexandru Ionut Egner, Duc Luu, Jerry den Hartog, Nicola Zannone |
An Authorization Service for Collaborative Situation Awareness. |
CODASPY |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Dong Su, Jianneng Cao, Ninghui Li, Elisa Bertino, Hongxia Jin |
Differentially Private K-Means Clustering. |
CODASPY |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mihai Maruseac, Gabriel Ghinita |
Privacy-Preserving Mining of Sequential Association Rules from Provenance Workflows. |
CODASPY |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Elisa Bertino, Ravi S. Sandhu, Alexander Pretschner (eds.) |
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, CODASPY 2016, New Orleans, LA, USA, March 9-11, 2016 |
CODASPY |
2016 |
DBLP BibTeX RDF |
|
1 | Bo Zhu 0007, Xinxin Fan, Guang Gong |
Pleco and Plectron - Two Provably Secure Password Hashing Algorithms. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Zhongwen Zhang, Peng Liu 0005, Ji Xiang, Jiwu Jing, Lingguang Lei |
How Your Phone Camera Can Be Used to Stealthily Spy on You: Transplantation Attacks against Android Camera Service. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Irfan Ahmed 0001, Vassil Roussev, Aisha I. Ali-Gombe |
Robust Fingerprinting for Relocatable Code. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jing (Dave) Tian, Kevin R. B. Butler, Patrick D. McDaniel, Padma Krishnaswamy |
Securing ARP From the Ground Up. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mihai Maruseac, Gabriel Ghinita |
Differentially-Private Mining of Moderately-Frequent High-Confidence Association Rules. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Zhi Xu 0004, Sencun Zhu |
SemaDroid: A Privacy-Aware Sensor Management Framework for Smartphones. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Zach Jorgensen, Jing Chen 0005, Christopher S. Gates, Ninghui Li, Robert W. Proctor, Ting Yu 0001 |
Dimensions of Risk in Mobile Applications: A User Study. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Bhavani Thuraisingham |
Big Data Security and Privacy. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan L. Dautrich Jr., Chinya V. Ravishankar |
Combining ORAM with PIR to Minimize Bandwidth Costs. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Daniele Gallingani, Rigel Gjomemo, V. N. Venkatakrishnan, Stefano Zanero |
Practical Exploit Generation for Intent Message Vulnerabilities in Android. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Kadhim Hayawi, Alireza Mortezaei, Mahesh V. Tripunitara |
The Limits of the Trade-Off Between Query-Anonymity and Communication-Cost in Wireless Sensor Networks. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Steven Van Acker, Daniel Hausknecht, Wouter Joosen, Andrei Sabelfeld |
Password Meters and Generators on the Web: From Large-Scale Empirical Study to Getting It Right. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Xiaofeng Xu, Li Xiong 0001, Jinfei Liu |
Database Fragmentation with Confidentiality Constraints: A Graph Search Approach. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Rakesh M. Verma, Keith Dyer |
On the Character of Phishing URLs: Accurate and Robust Statistical Learning Classifiers. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Bo Chen, Anil Kumar Ammula, Reza Curtmola |
Towards Server-side Repair for Erasure Coding-based Distributed Storage Systems. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jason Gionta, William Enck, Peng Ning |
HideM: Protecting the Contents of Userspace Memory in the Face of Disclosure Vulnerabilities. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jing Qiu 0003, Babak Yadegari, Brian Johannesmeyer, Saumya Debray, Xiaohong Su |
Identifying and Understanding Self-Checksumming Defenses in Software. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Cong Liao, Anna Cinzia Squicciarini, Christopher Griffin 0001 |
Epidemic Behavior of Negative Users in Online Social Sites. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yun Zhang, Ram Krishnan, Ravi S. Sandhu |
Secure Information and Resource Sharing in Cloud. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Peter Snyder, Chris Kanich |
One Thing Leads to Another: Credential Based Privilege Escalation. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Fang Liu, Xiaokui Shu, Danfeng Yao, Ali Raza Butt |
Privacy-Preserving Scanning of Big Content for Sensitive Data Exposure with MapReduce. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Lei Xu 0012, Xinwen Zhang, Xiaoxin Wu 0001, Weidong Shi |
ABSS: An Attribute-based Sanitizable Signature for Integrity of Outsourced Database with Public Cloud. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | William G. Horne |
Collecting, Analyzing and Responding to Enterprise Scale DNS Events. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan L. Dautrich Jr., Chinya V. Ravishankar |
Tunably-Oblivious Memory: Generalizing ORAM to Enable Privacy-Efficiency Tradeoffs. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Banescu, Alexander Pretschner, Dominic Battré, Stéfano Cazzulani, Robert Shield, Greg Thompson |
Software-Based Protection against Changeware. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Günter Karjoth |
Aligning Security and Business Objectives for Process-Aware Information Systems. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jaehong Park, Anna Cinzia Squicciarini (eds.) |
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015, San Antonio, TX, USA, March 2-4, 2015 |
CODASPY |
2015 |
DBLP BibTeX RDF |
|
1 | Mauro Conti, Luigi V. Mancini, Riccardo Spolaor, Nino Vincenzo Verde |
Can't You Hear Me Knocking: Identification of User Actions on Android Apps via Traffic Analysis. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Syed Rafiul Hussain, Asmaa Sallam, Elisa Bertino |
DetAnom: Detecting Anomalous Database Transactions by Insiders. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mehmet Kuzu, Mohammad Saiful Islam, Murat Kantarcioglu |
Distributed Search over Encrypted Big Data. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Cory Thoma, Adam J. Lee, Alexandros Labrinidis |
CryptStream: Cryptographic Access Controls for Streaming Data. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Xiaokui Shu, Jing Zhang 0039, Danfeng Yao, Wu-chun Feng |
Rapid Screening of Transformed Data Leaks with Efficient Algorithms and Parallel Computing. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yury Zhauniarovich, Maqsood Ahmad 0001, Olga Gadyatskaya, Bruno Crispo, Fabio Massacci |
StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad I. Sarfraz, Mohamed Nabeel, Jianneng Cao, Elisa Bertino |
DBMask: Fine-Grained Access Control on Encrypted Relational Databases. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Prosunjit Biswas, Farhan Patwa, Ravi S. Sandhu |
Content Level Access Control for OpenStack Swift Storage. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Anna Vapen, Niklas Carlsson, Anirban Mahanti, Nahid Shahmehri |
Information Sharing and User Privacy in the Third-party Identity Management Landscape. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jan Henrik Ziegeldorf, Fred Grossmann, Martin Henze, Nicolas Inden, Klaus Wehrle |
CoinParty: Secure Multi-Party Mixing of Bitcoins. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Vivek Shandilya, Sajjan G. Shiva |
A Network Security Game Model. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Saiful Islam, Mehmet Kuzu, Murat Kantarcioglu |
A Dynamic Approach to Detect Anomalous Queries on Relational Databases. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Erman Pattuk, Murat Kantarcioglu, Huseyin Ulusoy |
BigGate: Access Control Framework for Outsourced Key-Value Stores. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Khalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu |
Virtual Resource Orchestration Constraints in Cloud Infrastructure as a Service. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Matthias Neugschwandtner, Paolo Milani Comparetti, István Haller, Herbert Bos |
The BORG: Nanoprobing Binaries for Buffer Overreads. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jules Dupont, Anna Cinzia Squicciarini |
Toward De-Anonymizing Bitcoin by Mapping Users Location. |
CODASPY |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Visa Antero Vallivaara, Mirko Sailio, Kimmo Halunen |
Detecting man-in-the-middle attacks on non-mobile systems. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Enrico Lovat, Johan Oudinet, Alexander Pretschner |
On quantitative dynamic data flow tracking. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Anna Cinzia Squicciarini, Giuseppe Petracca, William G. Horne, Aurnob Nath |
Situational awareness through reasoning on network incidents. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | William C. Garrison III, Yechen Qiao, Adam J. Lee |
On the suitability of dissemination-centric access control systems for group-centric sharing. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Kalpana Gondi, A. Prasad Sistla, V. N. Venkatakrishnan |
Minimizing lifetime of sensitive data in concurrent programs. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sandrine Blazy, Stéphanie Riaud |
Measuring the robustness of source program obfuscation: studying the impact of compiler optimizations on the obfuscation of C programs. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Fabien Duchene, Sanjay Rawat 0001, Jean-Luc Richier, Roland Groz |
KameleonFuzz: evolutionary fuzzing for black-box XSS detection. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Birhanu Eshete, V. N. Venkatakrishnan |
WebWinnow: leveraging exploit kit workflows to detect malicious urls. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Euijin Choo, Jianchun Jiang, Ting Yu 0001 |
COMPARS: toward an empirical approach for comparing the resilience of reputation systems. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dongyan Xu |
Virtualization and security: happily ever after? |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hemant Sengar, Haining Wang, Seyed Amir Iranmanesh |
Wiretap-proof: what they hear is not what you speak, and what you speak they do not hear. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Kangjie Lu, Siyang Xiong, Debin Gao |
RopSteg: program steganography with return oriented programming. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Anja Remshagen, Li Yang |
Consistency checking in access control. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Justin Hummel, Andrew McDonald, Vatsal Shah, Riju Singh, Bradford D. Boyle, Tingshan Huang, Nagarajan Kandasamy, Harish Sethu, Steven Weber 0001 |
A modular multi-location anonymized traffic monitoring tool for a WiFi network. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Michael Mitchell, Guanyu Tian, Zhi Wang 0004 |
Systematic audit of third-party android phones. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Se Eun Oh, Ji Young Chun, Limin Jia 0001, Deepak Garg 0001, Carl A. Gunter, Anupam Datta |
Privacy-preserving audit for broker-based health information exchange. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mehmet Kuzu, Mohammad Saiful Islam, Murat Kantarcioglu |
Efficient privacy-aware search over encrypted databases. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Julian Horsch, Konstantin Böttinger, Michael Weiß, Sascha Wessel, Frederic Stumpf |
TrustID: trustworthy identities for untrusted mobile devices. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yiming Jing, Gail-Joon Ahn, Ziming Zhao 0001, Hongxin Hu |
RiskMon: continuous and automated risk assessment of mobile applications. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xiaowei Li 0003, Xujie Si, Yuan Xue 0001 |
Automated black-box detection of access control vulnerabilities in web applications. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Julian Horsch, Sascha Wessel, Frederic Stumpf, Claudia Eckert 0001 |
SobrTrA: a software-based trust anchor for ARM cortex application processors. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mohamed Shehab, Fadi Mohsen |
Securing OAuth implementations in smart phones. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|