Main Page

ASIACCS 2017

ASIACCS 2017 Workshops

CCS 2016

CCS 2016
Workshops

CODASPY 2017

CODASPY 2017 Workshops

SACMAT 2017

WiSec 2016

Compilation Author Index

ACM SIGSAC Membership Application

IWSPA'17 Table of Contents

IWSPA 2017 Chairs Welcome
Rakesh Verma (University of Houston)

Bhavani Thuraisingham (UT-Dallas)

IWSPA 2017 Workshop Organization 


Privacy and Threats Session
Session Chair: Lila Ghemri (Texas Southern University)

Non-interactive (t, n)-Incidence Counting from Differentially Private Indicator Vectors (Page 1)
Mohammad Alaggan (Inria)

Mathieu Cunche (INSA Lyon)

Marine Minier (LORIA)

An Internal/Insider Threat Score for Data Loss Prevention and Detection (Page 11)
Kyrre W. Kongsgård (Norwegian Defense Research Establishment)

Nils A. Nordbotten (Norwegian Defense Research Establishment)

Federico Mancini (Norwegian Defense Research Establishment)

Paal E. Engelstad (Norwegian Defense Research Establishment)

Model-based Cluster Analysis for Identifying Suspicious Activity Sequences in Software (Page 17)
Hemank Lamba (Carnegie Mellon University)

Thomas J. Glazier (Carnegie Mellon University)

Javier Cámara (Carnegie Mellon University)

Bradley Schmerl (Carnegie Mellon University)

David Garlan (Carnegie Mellon University)

Jürgen Pfeffer (Carnegie Mellon University)

Identifying Key Cyber-Physical Terrain (Page 23)
Brian Thompson (The MITRE Corporation)

Richard Harang (U.S. Army Research Lab)

(Return to Top)

Authentication Keynote and Attacks Session
Session Chair: Carlos Ordonez (University of Houston)

Continuous Authentication Using Behavioral Biometrics (Page 29)
Shambhu J. Upadhyaya (University at Buffalo)

Analysis of Causative Attacks against SVMs Learning from Data Streams (Page 31)
Cody Burkard (University of Washington, Bothell)

Brent Lagesse (University of Washington, Bothell)

MCDefender: Toward Effective Cyberbullying Defense in Mobile Online Social Networks (Page 37)
Nishant Vishwamitra (Clemson University)

Xiang Zhang (Clemson University)

Jonathan Tong (Clemson University)

Hongxin Hu (Clemson University)

Feng Luo (Clemson University)

Robin Kowalski (Clemson University)

Joseph Mazer (Clemson University)

(Return to Top)

Smartphone Security Keynote and Software Vulnerabilities Session
Session Chair: Bhavani Thuraisingham (UT Dallas)

Tracing the Arc of Smartphone Application Security (Page 43)
Patrick McDaniel (Penn State University)

Predicting Exploitation of Disclosed Software Vulnerabilities Using Open-source Data (Page 45)
Benjamin L. Bullough (Massachusets Institute of Technology)

Anna K. Yanchenko (Massachusets Institute of Technology)

Christopher L. Smith (Massachusets Institute of Technology)

Joseph R. Zipkin (Massachusets Institute of Technology)

(Return to Top)

Attacks and New Detection Method Session
Session Chair:Wenyaw Chan (UT-HSC Houston)

What's in a URL: Fast Feature Extraction and Malicious URL Detection (Page 55)
Rakesh Verma (University of Houston)

Avisha Das (University of Houston)

EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning (Page 65)
Mohammed K. Alzaylaee (Queen's University Belfast)

Suleiman Y. Yerima (Queen's University Belfast)

Sakir Sezer (Queen's University Belfast)

Feature Cultivation in Privileged Information-augmented Detection (Page 73)
Z. Berkay Celik (Penn State University)

Patrick McDaniel (Penn State University)

Rauf Izmailov (Vencore Labs)