Main Page

ASIACCS 2017

ASIACCS 2017 Workshops

CCS 2016

CCS 2016
Workshops

CODASPY 2017

CODASPY 2017 Workshops

SACMAT 2017

WiSec 2016

Compilation Author Index

ACM SIGSAC Membership Application

 

 

 

(Return to Top)

AISec'17 Table of Contents

Chairs' Introduction and Welcome to AISec 2016
David Mandell Freeman (LinkedIn Corporation)

Aikaterini Mitrokotsa (Chalmers University of Technology)

Arunesh Sinha (University of Michigan)

AISec 2016 Workshop Organization


Session 1: Security Data Sets
Session Chair: David Mandell Freeman (LinkedIn Corporation)

SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity Research (Page 1)
Yisroel Mirsky (Ben-Gurion University)

Asaf Shabtai (Ben-Gurion University)

Lior Rokach (Ben-Gurion University)

Bracha Shapira (Ben-Gurion University)

Yuval Elovici (Ben-Gurion University)

Session 2: Machine Learning and Security in Practice
Session Chair: Battista Biggio (University of Cagliari)

DeepDGA: Adversarially-Tuned Domain Generation and Detection (Page 13)
Hyrum S. Anderson (Endgame, Inc.)

Jonathan Woodbridge (Endgame. Inc.)

Bobby Filar (Endgame, Inc.)

Tracked Without a Trace: Linking Sessions of Users by Unsupervised Learning of Patterns in Their DNS Traffic (Page 23)
Matthias Kirchler (Humboldt Universität Berlin)

Dominik Herrmann (Universität Siegen)

Jens Lindemann (Universität Hamburg)

Marius Kloft (Humboldt Universität Berlin)

Identifying Encrypted Malware Traffic with Contextual Flow Data (Page 35)
Blake Anderson (Cisco)

David McGrew (Cisco)

Causality-based Sensemaking of Network Traffic for Android Application Security (Page 47)
Hao Zhang (Virginia Tech)

Danfeng (Daphne) Yao (Virginia Tech)

Naren Ramakrishnan (Virginia Tech)

(Return to Top)

Session 3: Foundations
Session Chair: Brad Miller (Google, Inc.)

Secure Kernel Machines against Evasion Attacks (Page 59)
Paolo Russu (Università di Cagliari)

Ambra Demontis (Università di Cagliari)

Battista Biggio (Università di Cagliari)

Giorgio Fumera (Università di Cagliari)

Fabio Roli (Università di Cagliari)

Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware Detection (Page 71)
Amit Deo (Royal Holloway, University of London)

Santanu Kumar Dash (Royal Holloway, University of London)

Guillermo Suarez-Tangil (Royal Holloway, University of London)

Volodya Vovk (Royal Holloway, University of London)

Lorenzo Cavallaro (Royal Holloway, University of London)

Discriminative Models for Multi-instance Problems with Tree Structure (Page 83)
Tomáš Pevný (Czech Technical University in Prague)

Petr Somol (Cisco R&D center in Prague)

(Return to Top)

Session 4: Privacy
Session Chair: Konrad Rieck (TU Braunschweig)

True Friends Let You Down: Benchmarking Social Graph Anonymization Schemes (Page 93)
Kumar Sharad (University of Cambridge)

Change of Guard: The Next Generation of Social Graph De-anonymization Attacks (Page 105)
Kumar Sharad (University of Cambridge)

Differentially Private Online Active Learning with Applications to Anomaly Detection (Page 117)
Mohsen Ghassemi (Rutgers, The State University of New Jersey)

Anand D. Sarwate (Rutgers, The State University of New Jersey)

Rebecca N. Wright (Rutgers, The State University of New Jersey)

A Dual Perturbation Approach for Differential Private ADMM-Based Distributed Empirical Risk Minimization (Page 129)
Tao Zhang (New York University)

Quanyan Zhu (New York University)