CODASPY 2020 论文录用列表
2020-02-03 00:38:10 Author: mp.weixin.qq.com(查看原文) 阅读量:160 收藏

CODASPY(Conference on Data and Applications Security and Privacy) 作为CCF C 类会议,该会议主要关注数据和应用的安全与隐私方向,2020年是第10届会议,共录取了30份论文,接收率(2020: 20%,2019: 23.5%),CODASPY 2019 论文录用列表CODASPY 2018论文录用列表2020年开始接收工具或者数据类型的论文,小编将一些跟自己相关的论文标记出来供大家查阅,所有录用论文标题如下:

ProximiTEE: Hardened SGX Attestation by Proximity Verification

Aritra Dhar (ETH Zurich), Ivan Puddu (ETH Zurich), Kari Kostiainen (ETH Zurich) and Srdjan Capkun (ETH Zurich)

Deceiving Portable Executable Malware Classifiers into Targeted Misclassification with Practical Adversarial Examples

Yunus Kucuk (Binghamton University) and Guanhua Yan (Binghamton University)

Random Spiking and Systematic Evaluation of Defenses Against Adversarial Examples

Huangyi Ge (Purdue University), Sze Yiu Chau (Purdue University), Bruno Ribeiro (Purdue University) and Ninghui Li (Purdue University)

AuthPDB: Authentication of Probabilistic Queries on Outsourced Uncertain Data

Bo Zhang (Stevens Institute of Technology), Boxiang Dong (Montclair State University), Haipei Sun (Stevens Institute of Technology) and Hui Wang (Stevens Institute of Technology)

PESC: A Per System-Call Stack Canary Design for Linux Kernel

Jiadong Sun (Zhejiang University), Xia Zhou (Zhejiang University), Wenbo Shen (Zhejiang University), Yajin Zhou (Zhejiang University) and Kui Ren (Zhejiang University)

CRAPE: A Privacy-Enhanced Crash Reporting System

Kiavash Satvat (University of Illinois at Chicago), Maliheh Shirvanian (Visa Research Lab), Mahshid Hosseini (University of Illinois at Chicago) and Nitesh Saxena (University of Alabama at Birmingham)

•  (Dataset/Tool Paper) ISAdetect: Usable Automated Detection of CPU Architecture and Endianness for Arbitrary Binary Files and Object Code Sequences

Sami Kairajärvi (University of Jyväskylä), Andrei Costin (University of Jyväskylä) and Timo Hamalainen (University of Jyväskylä)

A Hypothesis Testing Approach to Sharing Logs with Confidence

Yunhui Long (University of Illinois at Urbana-Champaign), Le Xu (University of Illinois at Urbana-Champaign) and Carl Gunter (University of Illinois at Urbana-Champaign)

DeepTrust: An Automatic Framework to Detect Trustworthy Users in Opinion-based Systems

Edoardo Serra (Boise State University), Anu Shrestha (Boise State University), Francesca Spezzano (Boise State University) and Anna Squicciarini (The Pennsylvania State University)

n-m-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based Web Applications

Isaac Polinsky (North Carolina State University), Kyle Martin (North Carolina State University), William Enck (North Carolina State University) and Mike Reiter (The University of North Carolina at Chapel Hill)

•   DANdroid: A Multi-View Discriminative Adversarial Network for Obfuscated Android Malware Detection

Stuart Millar (Queen's University of Belfast), Niall McLaughlin (Queen's University of Belfast), Jesus Martinez del Rincon (Queen's University of Belfast), Paul Miller (Queen's University of Belfast) and Ziming Zhao (Rochester Institute of Technology)

FridgeLock: Preventing Data Theft on Suspended Linux with Usable Memory Encryption

Fabian Franzen (Technical University of Munich), Manuel Andreas (Technical University of Munich) and Manuel Huber (Fraunhofer)

MOSE: Practical Multi-User Oblivious Storage via Secure Enclaves

Thang Hoang (University of South Florida), Rouzbeh Behnia (University of South Florida), Yeongjin Jang (Oregon State University) and Attila Yavuz (University of South Florida)

•  CREHMA: Cache-aware REST-ful HTTP Message Authentication

Hoai Viet Nguyen (TH Köln) and Luigi Lo Iacono (Cologne University of Applied Sciences)

•  DeepDoor: Targeted Attack Against Convolutional Neural Networks via Stealthy Backdoor Injection

Haoti Zhong (The Pennsylvania State University), Cong Liao (The Pennsylvania State University), Anna Squicciarini (The Pennsylvania State University), Sencun Zhu (The Pennsylvania State University) and David Miller (The Pennsylvania State University)

•  Attacking and Protecting Tunneled Traffic of Smart Home Devices

Ahmed Alshehri (Colorado School of Mines), Jacob Granley (Colorado School of Mines) and Chuan Yue (Colorado School of Mines)

SeCaS: Secure Capability Sharing Framework for IoT Devices in a Structured P2P Network

Angeliki Aktypi (University of Oxford), Kubra Kalkan (University of Oxford) and Kasper Rasmussen (University of Oxford)

TrustAV: Practical and Privacy Preserving Malware Analysis in the Cloud

Dimitris Deyannis (FORTH), Eva Papadogiannaki (FORTH), George Kalivianakis (FORTH), Giorgos Vasiliadis (FORTH) and Sotiris Ioannidis (FORTH)

The Good, the Bad and the (Not So) Ugly of Out-Of-Band Authentication with eID Cards and Push Notifications: Design, Formal and Risk Analysis

Marco Pernpruner (Fondazione Bruno Kessler), Roberto Carbone (Fondazione Bruno Kessler), Silvio Ranise (Fondazione Bruno Kessler) and Giada Sciarretta (Fondazione Bruno Kessler)

Explore the Transformation Space for Adversarial Images

Jiyu Chen (University of California, Davis) and Hao Chen (University of California, Davis)

Tap-Pair: Using Spatial Secrets for Single-Tap Device Pairing of Augmented Reality Headsets

Ivo Sluganovic (University of Oxford), Mihael Liskij (ETH Zurich), Ante Derek (University of Zagreb) and Ivan Martinovic (University of Oxford)

A Baseline for Attribute Disclosure Risk in Synthetic Data

Markus Hittmeir (SBA Research), Rudolf Mayer (SBA Research) and Andreas Ekelhart (SBA Research)

Dissecting Android Cryptocurrency Miners

Stanislav Dashevskyi (University of Luxembourg), Yury Zhauniarovich (Perfect Equanimity), Olga Gadyatskaya (University of Luxembourg), Aleksandr Pilgun (University of Luxembourg) and Hamza Ouhssain (University of Luxembourg)

Admin-CBAC: An Administration Model for Category-Based Access Control

Clara Bertolissi (LIF-Universite Aix-Marseille 1 and King's College London), Maribel Fernandez (King's College London) and Bhavani Thuraisingham (The University of Texas at Dallas)

Efficient Private Disease Susceptibility Testing in Direct-to-Consumer Model

Chibuike Ugwuoke (Delft University of Technology), Zekeriya Erkin (Delft University of Technology), Reginald Lagendijk (Delft University of Technology) and Marcel Reinders (Delft University of Technology)

Understanding Privacy Awareness in Android App Descriptions Using Deep Learning

Johannes Feichtner (Graz University of Technology) and Stefan Gruber (Graz University of Technology)

Defensive Charging: Mitigating Power Side-Channel Attacks on Charging Smartphones

Richard Matovu (Texas Tech University), Abdul Serwadda (Texas Tech University), Argenis V. Bilbao (U.S. Army Research Laboratory) and Isaac Griswold-Steiner (Texas Tech University)

Renyi Differentially Private ADMM for Non-Smooth Regularized Optimization

Chen Chen (University of Georgia) and Jaewoo Lee (University of Georgia)

ZeroLender: Trustless Peer-to-Peer Bitcoin Lending Platform

Yi Xie (Boise State University), Joshua Holmes (Boise State University) and Gaby G. Dagher (Boise State University)

IoT Expunge: Implementing Verifiable Retention of IoT Data

Nisha Panwar (University of California, Irvine), Shantanu Sharma (University of California, Irvine), Peeyush Gupta (University of California, Irvine), Dhrubajyoti Ghosh (University of California, Irvine), Sharad Mehrotra (University of California, Irvine) and Nalini Venkatasubramanian (University of California, Irvine)

会议主页:

http://www.codaspy.org/2020/

安全学术圈招募队友-ing,有兴趣加入学术圈的请联系secdr#qq.com


文章来源: http://mp.weixin.qq.com/s?__biz=MzU5MTM5MTQ2MA==&mid=2247484758&idx=1&sn=a88cda8da2d0ca165f360f29cea7e88e&chksm=fe2efaddc95973cb318dfd3d7fb1c0f97677b320d179b78cb69e82cb868537ce9c9e6fb43ac5#rd
如有侵权请联系:admin#unsafe.sh