Main Page

ASIACCS 2017

ASIACCS 2017 Workshops

CCS 2016

CCS 2016
Workshops

CODASPY 2017

CODASPY 2017 Workshops

SACMAT 2017

WiSec 2016

Compilation Author Index

ACM SIGSAC Membership Application

 

(Return to Top)

CODASPY'17 Table of Contents

CODASPY'17 Conference/General Chairs' Welcome Message
Alexander Pretschner (Technische Universität München)

Gabriel Ghinita (University of Massachusetts at Boston)

Gail-Joon Ahn (Arizona State University)

CODASPY 2017 Conference Organization

CODASPY'17 Sponsor & Supporters

Keynote I

Session 6: Protection Against Malware and Static Analysis

Session 1: Threats and Anomaly Detection

Session 7: Panel Trustworthy Data Science

Session 2: Access Control

Session 8: Malware Detection

Session 3: Privacy I

Session 9: Virtualization and Hardware

Session 4: Privacy II

Session 10: Mobile Security

Session 5: Reception and Poster Session

Session 11: Applications

Keynote II

 

Keynote I
Session Chair: Gail Joon Ahn (Arizona State University)

Research Issues and Approaches for Connected and Automated Vehicles (Page 1)
Kang G. Shin (University of Michigan)

(Return to Top)

Session 1: Threats and Anomaly Detection
Session Chair: Alexander Pretschner (Technische Universität München)

Ghostbuster: A Fine-grained Approach for Anomaly Detection in File System Accesses (Page 3)
Shagufta Mehnaz (Purdue University)

Elisa Bertino (Purdue University)

Mining Attributed Graphs for Threat Intelligence (Page 15)
Hugo Gascon (Technische Universität Braunschweig)

Bernd Grobauer (Siemens AG)

Thomas Schreck (Siemens AG)

Lukas Rist (Symantec Corporation)

Daniel Arp (Technische Universität Braunschweig)

Konrad Rieck (Technische Universität Braunschweig)

Decompression Quines and Anti-Viruses (Page 23)
Margaux Canet (Inria, Université Grenoble Alpes)

Amrit Kumar (Inria, Université Grenoble Alpes)

Cédric Lauradoux (Inria)

Mary-Andréa Rakotomanga (Inria, Université Grenoble Alpes)

Reihaneh Safavi-Naini (University of Calgary)

Statistical Security Incident Forensics against Data Falsification in Smart Grid Advanced Metering Infrastructure (Page 35)
Shameek Bhattacharjee (Missouri University of Science and Technology)

Aditya Thakur (Missouri University of Science and Technology)

Simone Silvestri (Missouri University of Science and Technology)

Sajal K. Das (Missouri University of Science and Technology)

(Return to Top)

Session 2: Access Control
Session Chair: Elisa Bertino (Purdue University)

Canonical Completeness in Lattice-Based Languages for Attribute-Based Access Control (Page 47)
Jason Crampton (Royal Holloway, University of London)

Conrad Williams (Royal Holloway, University of London)

Classifying and Comparing Attribute-Based and Relationship-Based Access Control (Page 59)
Tahmina Ahmed (University of Texas at San Antonio)

Ravi Sandhu (University of Texas at San Antonio)

Jaehong Park (University of Alabama in Huntsville)

SAMPAC: Socially-Aware collaborative Multi-Party Access Control (Page 71)
Panagiotis Ilia (Foundation for Research and Technology - Hellas (FORTH))

Barbara Carminati (University of Insubria)

Elena Ferrari (University of Insubria)

Paraskevi Fragopoulou (Foundation for Research and Technology - Hellas (FORTH))

Sotiris Ioannidis (Foundation for Research and Technology - Hellas (FORTH))

(Return to Top)

Session 3: Privacy I
Session Chair: Adam J. Lee (University of Pittsburgh)

Privacy-Preserving HMM Forward Computation (Page 83)
Jan Henrik Ziegeldorf (RWTH Aachen University)

Jan Metzke (RWTH Aachen University)

Jan Rüth (RWTH Aachen University)

Martin Henze (RWTH Aachen University)

Klaus Wehrle (RWTH Aachen University)

Share a pie? Privacy-Preserving Knowledge Base Export through Count-min Sketches (Page 95)
Daniele Ucci ("La Sapienza", University of Rome)

Leonardo Aniello ("La Sapienza", University of Rome)

Roberto Baldoni ("La Sapienza", University of Rome)

Efficient Commodity Matching for Privacy-Preserving Two-Party Bartering (Page 107)
Fabian Förg (Stevens Institute of Technology)

Susanne Wetzel (Stevens Institute of Technology)

Ulrike Meyer (RWTH Aachen University)

(Return to Top)

Session 4: Privacy II
Session Chair: Ram Krishnan (University of Texas at San Antonio)

Achieving Differential Privacy in Secure Multiparty Data Aggregation Protocols on Star Networks (Page 115)
Vincent Bindschaedler (University of Illinois)

Shantanu Rane (Palo Alto Research Center)

Alejandro Brito (Palo Alto Research Center)

Vanishree Rao (Palo Alto Research Center)

Ersin Uzun (Palo Alto Research Center)

"If You Can't Beat them Join them": A Usability Approach to Interdependent Privacy in Cloud Apps (Page 127)
Hamza Harkous (École Polytechnique Fédérale de Lausanne)

Karl Aberer (École Polytechnique Fédérale de Lausanne)

(Return to Top)

Session 5: Reception and Poster Session
Session Chair: Jaehong Park (The University of Alabama in Huntsville)

Sound and Static Analysis of Session Fixation Vulnerabilities in PHP Web Applications (Page 139)
Abdelouahab Amira (CERIST & A.MIRA University)

Abdelraouf Ouadjaout (LIP6, University Pierre and Marie Curie)

Abdelouahid Derhab (King Saud University)

Nadjib Badache (CERIST)

A New Bloom Filter Structure for Searchable Encryption Schemes (Page 143)
Chi Sing Chum (City University of New York)

Xiaowen Zhang (City University of New York)

Seamless and Secure Bluetooth LE Connection Migration (Page 147)
Syed Rafiul Hussain (Purdue University)

Shagufta Mehnaz (Purdue University)

Shahriar Nirjon (University of North Carolina Chapel Hill)

Elisa Bertino (Purdue University)

Differentially-Private Big Data Analytics for High-Speed Research Network Traffic Measurement (Page 151)
Oana-Georgiana Niculaescu (Umass Boston)

Mihai Maruseac (Umass Boston)

Gabriel Ghinita (Umass Boston)

(Return to Top)

Comprehensive Method for Detecting Phishing EmailsUsing Correlation-based Analysis and User Participation (Page 155)
Rakesh Verma (University of Houston)

Ayman El Aassal (ENSIAS)

Prioritized Analysis of Inter-App Communication Risks (Page 159)
Fang Liu (Virginia Tech)

Haipeng Cai (Washington State University)

Gang Wang (Virginia Tech)

Danfeng (Daphne) Yao (Virginia Tech)

Karim O. Elish (Florida Polytechnic University)

Barbara G. Ryder (Virginia Tech)

The Authorization Policy Existence Problem (Page 163)
Pierre Bergé (Universite Paris-Saclay)

Jason Crampton (Royal Holloway, University of London)

Gregory Gutin (Royal Holloway, University of London)

Rémi Watrigant (INRIA Sophia-Antipolis)

Towards Practical Privacy-Preserving Life Cycle Assessment Computations (Page 167)
Cetin Sahin (University of California, Santa Barbara)

Brandon Kuczenski (University of California, Santa Barbara)

Omer Egecioglu (University of California, Santa Barbara)

Amr El Abbadi (University of California, Santa Barbara)

(Return to Top)

Keynote II
Session Chair: Gabriel Ghinita (University of Massachusetts Boston)

The Human Capital Model for Security Research: New Insights into Technology Transition (Page 171)
S. Raj Rajagopalan (Honeywell)

(Return to Top)

Session 6: Protection Against Malware and Static Analysis
Session Chair: Alexandros Kapravelos (North Carolina State University)

PT-CFI: Transparent Backward-Edge Control Flow Violation Detection Using Intel Processor Trace (Page 173)
Yufei Gu (Cloudera Inc. & The University of Texas at Dallas)

Qingchuan Zhao (The University of Texas at Dallas)

Yinqian Zhang (The Ohio State University)

Zhiqiang Lin (The University of Texas at Dallas)

Detecting Patching of Executables without System Calls (Page 185)
Sebastian Banescu (Technische Universität München)

Mohsen Ahmadvand (Technische Universität München)

Alexander Pretschner (Technische Universität München)

Robert Shield (Google Inc.)

Chris Hamilton (Google Inc.)

Fault Attacks on Encrypted General Purpose Compute Platforms (Page 197)
Robert Buhren (Technical University of Berlin)

Shay Gueron (University of Haifa & Intel Corporation)

Jan Nordholz (Technical University of Berlin)

Jean-Pierre Seifert (Technical University of Berlin)

Julian Vetter (Technical University of Berlin)

Analysis of Exception-Based Control Transfers (Page 205)
Babak Yadegari (University of Arizona)

Jon Stephens (University of Arizona)

Saumya Debray (University of Arizona)

(Return to Top)

Session 7: Panel Trustworthy Data Science
Session Chair: Adam Doupe (Arizona State University)

Panel: Trustworthy Data Science (Page 217)
Adam Doupé (Arizona State University)

(Return to Top)

Session 8: Malware Detection
Session Chair: Rakesh Verma (University of Houston)

Detecting ROP with Statistical Learning of Program Characteristics (Page 219)
Mohamed Elsabagh (George Mason University)

Daniel Barbara (George Mason University)

Dan Fleck (George Mason University)

Angelos Stavrou (George Mason University)

Large-Scale Identification of Malicious Singleton Files (Page 227)
Bo Li (University of Michigan)

Kevin Roundy (Symantec Research Labs)

Chris Gates (Symantec Research Labs)

Yevgeniy Vorobeychik (Vanderbilt University)

Scalable Function Call Graph-based Malware Classification (Page 239)
Mehadi Hassen (Florida Institute of Technology)

Philip K. Chan (Florida Institute of Technology)

(Return to Top)

Session 9: Virtualization and Hardware
Session Chair: Mahesh Tripunitara (University of Waterloo)

All Your VMs are Disconnected: Attacking Hardware Virtualized Network (Page 249)
Zhe Zhou (Chinese University of Hong Kong & CUHK Shenzhen Research Institute)

Zhou Li (ACM Member)

Kehuan Zhang (Chinese University of Hong Kong & CUHK Shenzhen Research Institute)

SGXIO: Generic Trusted I/O Path for Intel SGX (Page 261)
Samuel Weiser (Graz University of Technology)

Mario Werner (Graz University of Technology)

A Study of Security Vulnerabilities on Docker Hub (Page 269)
Rui Shu (North Carolina State University)

Xiaohui Gu (North Carolina State University)

William Enck (North Carolina State University)

(Return to Top)

Session 10: Mobile Security
Session Chair: Gabriel Ghinita (University of Massachusetts Boston)

Ripple: Reflection Analysis for Android Apps in Incomplete Information Environments (Page 281)
Yifei Zhang (University of New South Wales)

Tian Tan (University of New South Wales)

Yue Li (University of New South Wales)

Jingling Xue (University of New South Wales)

Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception (Page 289)
Luka Malisa (ETH Zurich)

Kari Kostiainen (ETH Zurich)

Srdjan Capkun (ETH Zurich)

Deep Android Malware Detection (Page 301)
Niall McLaughlin (Queen's University Belfast)

Jesus Martinez del Rincon (Queen's University Belfast)

BooJoong Kang (Queen's University Belfast)

Suleiman Yerima (Queen's University Belfast)

Paul Miller (Queen's University Belfast)

Sakir Sezer (Queen's University Belfast)

Yeganeh Safaei (Arizona State University)

Erik Trickel (Arizona State University)

Ziming Zhao (Arizona State University)

Adam Doupe (Arizona State University)

Gail Joon Ahn (Arizona State University)

DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware (Page 309)
Guillermo Suarez-Tangil (Royal Holloway, University of London)

Santanu Kumar Dash (Royal Holloway, University of London)

Mansour Ahmadi (University of Cagliari)

Johannes Kinder (Royal Holloway, University of London)

Giorgio Giacinto (University of Cagliari)

Lorenzo Cavallaro (Royal Holloway, University of London)

(Return to Top)

Session 11: Applications
Session Chair: Jaehong Park (The University of Alabama in Huntsville)

Aegis: Automatic Enforcement of Security Policies in Workflow-driven Web Applications (Page 321)
Luca Compagna (SAP Labs France)

Daniel Ricardo dos Santos (Fondazione Bruno Kessler & SAP Labs France)

Serena Elisa Ponta (SAP Labs France)

Silvio Ranise (Fondazione Bruno Kessler)

Discovering Browser Extensions via Web Accessible Resources (Page 329)
Alexander Sjösten (Chalmers University of Technology)

Steven Van Acker (Chalmers University of Technology)

Andrei Sabelfeld (Chalmers University of Technology)

Graph Automorphism-Based, Semantics-Preserving Security for the Resource Description Framework (RDF) (Page 337)
Zhiyuan Lin (University of Waterloo)

Mahesh Tripunitara (University of Waterloo)

Secure Free-Floating Car Sharing for Offline Cars (Page 349)
Alexandra Dmitrienko (ETH Zurich)

Christian Plappert (Fraunhofer SIT)

Identifying HTTPS-Protected Netflix Videos in Real-Time (Page 361)
Andrew Reed (United States Military Academy at West Point)

Michael Kranch (United States Military Academy at West Point)