the proceedings contain 40 papers. the topics discussed include: DBMask: fine-grained access control on encrypted relational databases;differentially-private mining of moderately-frequent high-confidence association r...
ISBN:
(纸本)9781450331913
the proceedings contain 40 papers. the topics discussed include: DBMask: fine-grained access control on encrypted relational databases;differentially-private mining of moderately-frequent high-confidence association rules;StaDynA: addressing the problem of dynamic code updates in the security analysis of android applications;CoinParty: secure multi-party mixing of bitcoins;how your phone camera can be used to stealthily spy on you: transplantation attacks against android camera service;Pleco and Plectron two provably secure password hashing algorithms;one thing leads to another: credential based privilege escalation;epidemic behavior of negative users in online social sites;rapid screening of transformed data leaks with efficient algorithms and parallel computing;ABSS: an attribute-based sanitizable signature for integrity of outsourced database with public cloud;and privacy-preserving scanning of big content for sensitive data exposure with MapReduce.
the proceedings contain 43 papers. the topics discussed include: estimating the runtime and global network traffic of SMPC protocols;a unified time series analytics based intrusion detection framework for CAN BUS atta...
ISBN:
(纸本)9798400704215
the proceedings contain 43 papers. the topics discussed include: estimating the runtime and global network traffic of SMPC protocols;a unified time series analytics based intrusion detection framework for CAN BUS attacks;investigating TLS version downgrade in enterprise software;examining cryptography and randomness failures in open-source cellular cores;nothing personal: understanding the spread and use of personally identifiable information in the financial ecosystem;CCSM: building cross-cluster security models for edge-core environments involving multiple Kubernetes clusters;process-aware intrusion detection in MQTT networks;accelerating performance of bilinear map cryptography using FPGA;exploiting update leakage in searchable symmetric encryption;and the avg-act swap and plaintext overflow detection in fully homomorphic operations over deep circuits.
the proceedings contain 30 papers. the topics discussed include: comparative privacy analysis of mobile browsers;IdDecoder: a face embedding inversion tool and its privacy and security implications on facial recogniti...
ISBN:
(纸本)9798400700675
the proceedings contain 30 papers. the topics discussed include: comparative privacy analysis of mobile browsers;IdDecoder: a face embedding inversion tool and its privacy and security implications on facial recognition systems;attribute inference attacks in online multiplayer video games: a case study on DOTA2;AutoSpill: credential leakage from mobile password managers;multi-modality mobile datasets for behavioral biometrics research: data/toolset paper;a tenant-based two-stage approach to auditing the integrity of virtual network function chains hosted on third-party clouds;CloudShield: real-time anomaly detection in the cloud;Grote: group testing for privacy-preserving face identification;anonymous system for fully distributed and robust secure multi-party computation;and protecting encrypted virtual machines from nested page fault controlled channel.
the proceedings contain 45 papers. the topics discussed include: how (not) to deploy cryptography on the Internet;GINN: fast GPU-TEE based integrity for neural network training;leveraging synthetic data and PU learnin...
ISBN:
(纸本)9781450392204
the proceedings contain 45 papers. the topics discussed include: how (not) to deploy cryptography on the Internet;GINN: fast GPU-TEE based integrity for neural network training;leveraging synthetic data and PU learning for phishing email detection;DP-UTIL: comprehensive utility analysis of differential privacy in machine learning;privacy-preserving maximum matching on general graphs and its application to enable privacy-preserving kidney exchange;towards automated content-based photo privacy control in user-centered social networks;genomic data sharing under dependent local differential privacy;prediction of mobile app privacy preferences with user profiles via federated learning;building a commit-level dataset of real-world vulnerabilities;and ReSIL: revivifying function signature inference using deep learning with domain-specific knowledge.
the proceedings contain 38 papers. the topics discussed include: membership inference attacks and defenses in classification models;using single-step adversarial training to defend iterative adversarial examples;real-...
ISBN:
(纸本)9781450381437
the proceedings contain 38 papers. the topics discussed include: membership inference attacks and defenses in classification models;using single-step adversarial training to defend iterative adversarial examples;real-time evasion attacks against deep learning-based anomaly detection from distributed system logs;we can pay less: coordinated false data injection attack against residential demand response in smart grids;brittle features of device authentication;role-based deception in enterprise networks;securitythreats from bitcoin wallet smartphone applications: vulnerabilities, attacks, and countermeasures;and adaptive fingerprinting: website fingerprinting over few encrypted traffic.
the proceedings contain 35 papers. the topics discussed include: understanding the responsiveness of mobile app developers to software library updates;acminer: extraction and analysis of authorization checks in androi...
ISBN:
(纸本)9781450360999
the proceedings contain 35 papers. the topics discussed include: understanding the responsiveness of mobile app developers to software library updates;acminer: extraction and analysis of authorization checks in android’s middleware;verifiable round-robin scheme for smart homes;dynamic groups and attribute-based access control for next-generation smart cars;a study of data store-based home automation;detection of threats to iot devices using scalable VPN-forwarded honeypots;deep neural networks classification over encrypted data;curie: policy-based secure data exchange;result-based detection of insider threats to relational databases;custom-made anonymization by data analysis program provided by recipient;and toward efficient spammers gathering in twitter social networks.
Despite the enormous data processing capacity available in big data frameworks, obtaining appropriate and private responses to large-scale queries without revealing sensitive information is still a challenging problem...
详细信息
ISBN:
(纸本)9798400704215
Despite the enormous data processing capacity available in big data frameworks, obtaining appropriate and private responses to large-scale queries without revealing sensitive information is still a challenging problem. In this paper, we address the problem of combining offline sampling techniques for space efficiency in multidimensional databases and Differential privacy (DP) to protect sensitive data. We present our framework SLIM-View, which uses a novel sampling technique relying on a bi-objective optimization to decide the best sample size and the exponential mechanism to select the best sample while ensuring privacy. Our extensive experiments demonstrate that SLIM-View outperforms existing approaches by orders of magnitude in terms of utility and scalability while ensuring the same level of privacy.
In the era of artificial intelligence, the integration of AI technology into network security has transformed how threats are detected and *** paper explores the application of AI in maintaining network security, with...
详细信息
the notion of epsilon-differential privacy is a widely used concept of providing quantifiable privacy to individuals. However, it is unclear how to explain the level of privacy protection provided by a differential pr...
详细信息
ISBN:
(纸本)9798400704215
the notion of epsilon-differential privacy is a widely used concept of providing quantifiable privacy to individuals. However, it is unclear how to explain the level of privacy protection provided by a differential privacy mechanism with a set epsilon. In this study, we focus on users' comprehension of the privacy protection provided by a differential privacy mechanism. To do so, we study three variants of explaining the privacy protection provided by differential privacy: (1) the original mathematical definition;(2) epsilon translated into a specific privacy risk;and (3) an explanation using the randomized response technique. We compare users' comprehension of privacy protection employing these explanatory models withtheir comprehension of privacy protection of kappa-anonymity as baseline comprehensibility. Our findings suggest that participants' comprehension of differential privacy protection is enhanced by the privacy risk model and the randomized response-based model. Moreover, our results confirm our intuition that privacy protection provided by :-anonymity is more comprehensible.
this paper investigates an underexplored avenue of cybersecuritythreats in mobile computing, with a particular focus on the Android platform which, due to its open nature and widespread adoption, is a fertile ground ...
详细信息
ISBN:
(纸本)9798400704215
this paper investigates an underexplored avenue of cybersecuritythreats in mobile computing, with a particular focus on the Android platform which, due to its open nature and widespread adoption, is a fertile ground for cyber threats. We present a Proof-of-Concept (PoC) Android applicationthat, while ostensibly benign, can execute covert malicious operations by exploiting the process of permission granted. Specifically, the app manipulates accessibility permissions to autonomously acquire additional permissions needed for executing unauthorized activities without the user's knowledge. Our work outlines conditions for minimal detection risk, leveraging periods when users are less likely to interact withtheir devices. the study provides a deeper understanding of the abuse potential of Android's accessibility features and highlights the critical need for comprehensive security measures to counteract such exploitations.
暂无评论