index - Data and Applications Security and Privacy XXXIII Access content directly
   


Full Text Documents

21

Search


 
Table of Contents
Data and Applications Security and Privacy XXXIII
Simon N. Foley
Front Matter

Attacks


Detecting Adversarial Attacks in the Context of Bayesian Networks
Emad Alsuwat, Hatim Alsuwat, John Rose, Marco Valtorta, Csilla Farkas
3-22
AGBuilder: An AI Tool for Automated Attack Graph Building, Analysis, and Refinement
Bruhadeshwar Bezawada, Indrajit Ray, Kushagra Tiwary
23-42
On Practical Aspects of PCFG Password Cracking
Radek Hranický, Filip Lištiak, Dávid Mikuš, Ondřej Ryšavý
43-60
That’s My DNA: Detecting Malicious Tampering of Synthesized DNA
Diptendu Kar, Indrajit Ray
61-80

Mobile and Web Security


Adversarial Sampling Attacks Against Phishing Detection
Hossein Shirazi, Bruhadeshwar Bezawada, Indrakshi Ray, Charles Anderson
83-101
Is My Phone Listening in? On the Feasibility and Detectability of Mobile Eavesdropping
Jacob Kröger, Philip Raschke
102-120
Droids in Disarray: Detecting Frame Confusion in Hybrid Android Apps
Davide Caputo, Luca Verderame, Simone Aonzo, Alessio Merlo
121-139

Privacy


Geo-Graph-Indistinguishability: Protecting Location Privacy for LBS over Road Networks
Shun Takagi, Yang Cao, Yasuhito Asano, Masatoshi Yoshikawa
143-163
“When and Where Do You Want to Hide?” – Recommendation of Location Privacy Preferences with Local Differential Privacy
Maho Asada, Masatoshi Yoshikawa, Yang Cao
164-176
Analysis of Privacy Policies to Enhance Informed Consent
Raúl Pardo, Daniel Le Métayer
177-198

Security Protocol Practices


Lost in TLS? No More! Assisted Deployment of Secure TLS Configurations
Salvatore Manfredi, Silvio Ranise, Giada Sciarretta
201-220
Contributing to Current Challenges in Identity and Access Management with Visual Analytics
Alexander Puchta, Fabian Böhm, Günther Pernul
221-239
Analysis of Multi-path Onion Routing-Based Anonymization Networks
Wladimir Cadena, Daniel Kaiser, Asya Mitseva, Andriy Panchenko, Thomas Engel
240-258

Distributed Systems


Shoal: Query Optimization and Operator Placement for Access Controlled Stream Processing Systems
Cory Thoma, Alexandros Labrinidis, Adam Lee
261-280
A Distributed Ledger Approach to Digital Twin Secure Data Sharing
Marietheres Dietz, Benedikt Putz, Günther Pernul
281-300
Refresh Instead of Revoke Enhances Safety and Availability: A Formal Analysis
Mehrnoosh Shakarami, Ravi Sandhu
301-313

Source Code Security


Wrangling in the Power of Code Pointers with ProxyCFI
Misiker Aga, Colton Holoday, Todd Austin
317-337
CASFinder: Detecting Common Attack Surface
Mengyuan Zhang, Yue Xin, Lingyu Wang, Sushil Jajodia, Anoop Singhal
338-358
Algorithm Diversity for Resilient Systems
Scott Stoller, Yanhong Liu
359-378

Malware


Online Malware Detection in Cloud Auto-scaling Systems Using Shallow Convolutional Neural Networks
Mahmoud Abdelsalam, Ram Krishnan, Ravi Sandhu
381-397
Redirecting Malware’s Target Selection with Decoy Processes
Sara Sutton, Garret Michilli, Julian Rrushi
398-417

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/