Table of Contents
|
Data and Applications Security and Privacy XXXIII Simon N. Foley |
Front Matter |
Attacks
|
Detecting Adversarial Attacks in the Context of Bayesian Networks Emad Alsuwat, Hatim Alsuwat, John Rose, Marco Valtorta, Csilla Farkas |
3-22 |
AGBuilder: An AI Tool for Automated Attack Graph Building, Analysis, and Refinement Bruhadeshwar Bezawada, Indrajit Ray, Kushagra Tiwary |
23-42 |
On Practical Aspects of PCFG Password Cracking Radek Hranický, Filip Lištiak, Dávid Mikuš, Ondřej Ryšavý |
43-60 |
That’s My DNA: Detecting Malicious Tampering of Synthesized DNA Diptendu Kar, Indrajit Ray |
61-80 |
Mobile and Web Security
|
Adversarial Sampling Attacks Against Phishing Detection Hossein Shirazi, Bruhadeshwar Bezawada, Indrakshi Ray, Charles Anderson |
83-101 |
Is My Phone Listening in? On the Feasibility and Detectability of Mobile Eavesdropping Jacob Kröger, Philip Raschke |
102-120 |
Droids in Disarray: Detecting Frame Confusion in Hybrid Android Apps Davide Caputo, Luca Verderame, Simone Aonzo, Alessio Merlo |
121-139 |
Privacy
|
Geo-Graph-Indistinguishability: Protecting Location Privacy for LBS over Road Networks Shun Takagi, Yang Cao, Yasuhito Asano, Masatoshi Yoshikawa |
143-163 |
“When and Where Do You Want to Hide?” – Recommendation of Location Privacy Preferences with Local Differential Privacy Maho Asada, Masatoshi Yoshikawa, Yang Cao |
164-176 |
Analysis of Privacy Policies to Enhance Informed Consent Raúl Pardo, Daniel Le Métayer |
177-198 |
Security Protocol Practices
|
Lost in TLS? No More! Assisted Deployment of Secure TLS Configurations Salvatore Manfredi, Silvio Ranise, Giada Sciarretta |
201-220 |
Contributing to Current Challenges in Identity and Access Management with Visual Analytics Alexander Puchta, Fabian Böhm, Günther Pernul |
221-239 |
Analysis of Multi-path Onion Routing-Based Anonymization Networks Wladimir Cadena, Daniel Kaiser, Asya Mitseva, Andriy Panchenko, Thomas Engel |
240-258 |
Distributed Systems
|
Shoal: Query Optimization and Operator Placement for Access Controlled Stream Processing Systems Cory Thoma, Alexandros Labrinidis, Adam Lee |
261-280 |
A Distributed Ledger Approach to Digital Twin Secure Data Sharing Marietheres Dietz, Benedikt Putz, Günther Pernul |
281-300 |
Refresh Instead of Revoke Enhances Safety and Availability: A Formal Analysis Mehrnoosh Shakarami, Ravi Sandhu |
301-313 |
Source Code Security
|
Wrangling in the Power of Code Pointers with ProxyCFI Misiker Aga, Colton Holoday, Todd Austin |
317-337 |
CASFinder: Detecting Common Attack Surface Mengyuan Zhang, Yue Xin, Lingyu Wang, Sushil Jajodia, Anoop Singhal |
338-358 |
Algorithm Diversity for Resilient Systems Scott Stoller, Yanhong Liu |
359-378 |
Malware
|
Online Malware Detection in Cloud Auto-scaling Systems Using Shallow Convolutional Neural Networks Mahmoud Abdelsalam, Ram Krishnan, Ravi Sandhu |
381-397 |
Redirecting Malware’s Target Selection with Decoy Processes Sara Sutton, Garret Michilli, Julian Rrushi |
398-417 |