Search - Data and Applications Security and Privacy XXXIII Access content directly

Filter your results

22 results
Contributor/author Internal identifier : 200187
Image document

Adversarial Sampling Attacks Against Phishing Detection

Hossein Shirazi , Bruhadeshwar Bezawada , Indrakshi Ray , Charles Anderson
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.83-101, ⟨10.1007/978-3-030-22479-0_5⟩
Conference papers hal-02384598v1
Image document

A Distributed Ledger Approach to Digital Twin Secure Data Sharing

Marietheres Dietz , Benedikt Putz , Günther Pernul
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.281-300, ⟨10.1007/978-3-030-22479-0_15⟩
Conference papers hal-02384607v1
Image document

On Practical Aspects of PCFG Password Cracking

Radek Hranický , Filip Lištiak , Dávid Mikuš , Ondřej Ryšavý
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.43-60, ⟨10.1007/978-3-030-22479-0_3⟩
Conference papers hal-02384606v1
Image document

“When and Where Do You Want to Hide?” – Recommendation of Location Privacy Preferences with Local Differential Privacy

Maho Asada , Masatoshi Yoshikawa , Yang Cao
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.164-176, ⟨10.1007/978-3-030-22479-0_9⟩
Conference papers hal-02384592v1
Image document

Refresh Instead of Revoke Enhances Safety and Availability: A Formal Analysis

Mehrnoosh Shakarami , Ravi Sandhu
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.301-313, ⟨10.1007/978-3-030-22479-0_16⟩
Conference papers hal-02384596v1
Image document

Is My Phone Listening in? On the Feasibility and Detectability of Mobile Eavesdropping

Jacob Leon Kröger , Philip Raschke
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.102-120, ⟨10.1007/978-3-030-22479-0_6⟩
Conference papers hal-02384582v1
Image document

Shoal: Query Optimization and Operator Placement for Access Controlled Stream Processing Systems

Cory Thoma , Alexandros Labrinidis , Adam J. Lee
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.261-280, ⟨10.1007/978-3-030-22479-0_14⟩
Conference papers hal-02384602v1
Image document

That’s My DNA: Detecting Malicious Tampering of Synthesized DNA

Diptendu Mohan Kar , Indrajit Ray
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.61-80, ⟨10.1007/978-3-030-22479-0_4⟩
Conference papers hal-02384604v1
Image document

Droids in Disarray: Detecting Frame Confusion in Hybrid Android Apps

Davide Caputo , Luca Verderame , Simone Aonzo , Alessio Merlo
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.121-139, ⟨10.1007/978-3-030-22479-0_7⟩
Conference papers hal-02384600v1
Image document

Algorithm Diversity for Resilient Systems

Scott D. Stoller , Yanhong A. Liu
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.359-378, ⟨10.1007/978-3-030-22479-0_19⟩
Conference papers hal-02384586v1
Image document

AGBuilder: An AI Tool for Automated Attack Graph Building, Analysis, and Refinement

Bruhadeshwar Bezawada , Indrajit Ray , Kushagra Tiwary
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.23-42, ⟨10.1007/978-3-030-22479-0_2⟩
Conference papers hal-02384601v1
Image document

Wrangling in the Power of Code Pointers with ProxyCFI

Misiker Tadesse Aga , Colton Holoday , Todd Austin
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.317-337, ⟨10.1007/978-3-030-22479-0_17⟩
Conference papers hal-02384583v1
Image document

Lost in TLS? No More! Assisted Deployment of Secure TLS Configurations

Salvatore Manfredi , Silvio Ranise , Giada Sciarretta
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.201-220, ⟨10.1007/978-3-030-22479-0_11⟩
Conference papers hal-02384588v1
Image document

Detecting Adversarial Attacks in the Context of Bayesian Networks

Emad Alsuwat , Hatim Alsuwat , John Rose , Marco Valtorta , Csilla Farkas
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.3-22, ⟨10.1007/978-3-030-22479-0_1⟩
Conference papers hal-02384585v1
Image document

Analysis of Privacy Policies to Enhance Informed Consent

Raúl Pardo , Daniel Le Métayer
DBSEC 2019 - 33rd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, Jul 2019, Charleston, SC, United States. pp.177-198, ⟨10.1007/978-3-030-22479-0_10⟩
Conference papers hal-02384593v1
Image document

Redirecting Malware’s Target Selection with Decoy Processes

Sara Sutton , Garret Michilli , Julian Rrushi
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.398-417, ⟨10.1007/978-3-030-22479-0_21⟩
Conference papers hal-02384597v1
Image document

Analysis of Multi-path Onion Routing-Based Anonymization Networks

Wladimir de La Cadena , Daniel Kaiser , Asya Mitseva , Andriy Panchenko , Thomas Engel
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.240-258, ⟨10.1007/978-3-030-22479-0_13⟩
Conference papers hal-02384590v1
Image document

Online Malware Detection in Cloud Auto-scaling Systems Using Shallow Convolutional Neural Networks

Mahmoud Abdelsalam , Ram Krishnan , Ravi Sandhu
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.381-397, ⟨10.1007/978-3-030-22479-0_20⟩
Conference papers hal-02384587v1
Image document

Contributing to Current Challenges in Identity and Access Management with Visual Analytics

Alexander Puchta , Fabian Böhm , Günther Pernul
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.221-239, ⟨10.1007/978-3-030-22479-0_12⟩
Conference papers hal-02384584v1

Data and Applications Security and Privacy XXXIII

Simon N. Foley
Springer International Publishing, LNCS-11559, 2019, Lecture Notes in Computer Science, 978-3-030-22478-3. ⟨10.1007/978-3-030-22479-0⟩
Books hal-02384599v1
Image document

CASFinder: Detecting Common Attack Surface

Mengyuan Zhang , Yue Xin , Lingyu Wang , Sushil Jajodia , Anoop Singhal
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.338-358, ⟨10.1007/978-3-030-22479-0_18⟩
Conference papers hal-02384581v1
Image document

Geo-Graph-Indistinguishability: Protecting Location Privacy for LBS over Road Networks

Shun Takagi , Yang Cao , Yasuhito Asano , Masatoshi Yoshikawa
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.143-163, ⟨10.1007/978-3-030-22479-0_8⟩
Conference papers hal-02384594v1