ACM CODASPY '24 Day 2 Keynote: Malware Research: History, Milestones, and Open Questions
ACM CODASPY
ACM CODASPY '24 Day 2 Keynote: Malware Research: History, Milestones, and Open Questions
1:05:42
ACM CODASPY '24 Day 1 Keynote:  The Encryption Debate: An Enduring Struggle
ACM CODASPY
ACM CODASPY '24 Day 1 Keynote: The Encryption Debate: An Enduring Struggle
1:17:05
CODASPY '22 Panel: Security and Privacy for Emerging IoT and CPS Domains
ACM CODASPY
CODASPY '22 Panel: Security and Privacy for Emerging IoT and CPS Domains
1:06:00
CODASPY '22 Report
ACM CODASPY
CODASPY '22 Report
10:41
CODASPY '22: NEUTRON: A Graph-based Pipeline for Zero-trust Network Architectures
ACM CODASPY
CODASPY '22: NEUTRON: A Graph-based Pipeline for Zero-trust Network Architectures
29:02
CODASPY '22: Landmark Privacy: Configurable Differential Privacy Protection for Time Series
ACM CODASPY
CODASPY '22: Landmark Privacy: Configurable Differential Privacy Protection for Time Series
21:12
CODASPY '22: ProSPEC: Proactive Security Policy Enforcement for Containers
ACM CODASPY
CODASPY '22: ProSPEC: Proactive Security Policy Enforcement for Containers
24:34
CODASPY '22: Toward Deep Learning Based Access Control
ACM CODASPY
CODASPY '22: Toward Deep Learning Based Access Control
29:08
CODASPY '22: Hardening with Scapolite: A DevOps-based Approach for Improved Authoring and Testing of
ACM CODASPY
CODASPY '22: Hardening with Scapolite: A DevOps-based Approach for Improved Authoring and Testing of
14:45
CODASPY '22: Recovering Structure of Input of a Binary Program
ACM CODASPY
CODASPY '22: Recovering Structure of Input of a Binary Program
19:14
CODASPY '22: A Modular and Extensible Framework for Securing TLS
ACM CODASPY
CODASPY '22: A Modular and Extensible Framework for Securing TLS
18:52
CODASPY '22: ReSIL: Revivifying Function Signature Inference using Deep Learning with Domain-Specifi
ACM CODASPY
CODASPY '22: ReSIL: Revivifying Function Signature Inference using Deep Learning with Domain-Specifi
19:07
CODASPY '22 Keynote: Predicting Asymptotic Behavior of Network Covert Channels: Experimental Results
ACM CODASPY
CODASPY '22 Keynote: Predicting Asymptotic Behavior of Network Covert Channels: Experimental Results
54:00
CODASPY '22: Building a Commit-level Dataset of Real-world Vulnerabilities
ACM CODASPY
CODASPY '22: Building a Commit-level Dataset of Real-world Vulnerabilities
10:42
IWSPA '22: A Dataset of Networks of Computing Hosts
ACM CODASPY
IWSPA '22: A Dataset of Networks of Computing Hosts
17:40
IWSPA '22: On the Effectiveness of Dataset Watermarking
ACM CODASPY
IWSPA '22: On the Effectiveness of Dataset Watermarking
19:01
IWSPA '22: An Empirical Evaluation of Adversarial Examples Defences, Combinations and Robustness Sco
ACM CODASPY
IWSPA '22: An Empirical Evaluation of Adversarial Examples Defences, Combinations and Robustness Sco
19:29
IWSPA '22: No Features Needed: Using BPE Sequence Embeddings for Web Log Anomaly Detection
ACM CODASPY
IWSPA '22: No Features Needed: Using BPE Sequence Embeddings for Web Log Anomaly Detection
27:02
IWSPA '22: Chronos vs. Chaos: Timing Weak Memory Executions in the Linux Kernel
ACM CODASPY
IWSPA '22: Chronos vs. Chaos: Timing Weak Memory Executions in the Linux Kernel
25:18
IWSPA '22: How Attacker Knowledge Affects Privacy Risks: An Analysis Using Probabilistic Programming
ACM CODASPY
IWSPA '22: How Attacker Knowledge Affects Privacy Risks: An Analysis Using Probabilistic Programming
24:03
IWSPA '22: The Proof is in the Glare: On the Privacy Risk Posed by Eyeglasses in Video Calls
ACM CODASPY
IWSPA '22: The Proof is in the Glare: On the Privacy Risk Posed by Eyeglasses in Video Calls
31:22
IWSPA '22: Data Poisoning in Sequential and Parallel Federated Learning
ACM CODASPY
IWSPA '22: Data Poisoning in Sequential and Parallel Federated Learning
25:21
IWSPA '22: PriveTAB: Secure and Privacy-Preserving sharing of Tabular Data
ACM CODASPY
IWSPA '22: PriveTAB: Secure and Privacy-Preserving sharing of Tabular Data
28:54
IWSPA '22 Keynote 2: Shadows Behind the Keyboard: Dark Personalities and Deception in Cyberattacks
ACM CODASPY
IWSPA '22 Keynote 2: Shadows Behind the Keyboard: Dark Personalities and Deception in Cyberattacks
38:19
IWSPA '22 Keynote 1: SDP Based Zero-Trust Architectures
ACM CODASPY
IWSPA '22 Keynote 1: SDP Based Zero-Trust Architectures
54:18
6th ACM International Workshop on Security and Privacy Analytics (IWSPA 2020) - Part 1
ACM CODASPY
6th ACM International Workshop on Security and Privacy Analytics (IWSPA 2020) - Part 1
1:57:54
6th ACM International Workshop on Security and Privacy Analytics (IWSPA 2020) - Part 2
ACM CODASPY
6th ACM International Workshop on Security and Privacy Analytics (IWSPA 2020) - Part 2
54:06
ACM CODASPY '20 Keynote -  Towards Privacy-Preserving Access Control and Authority Transparency
ACM CODASPY
ACM CODASPY '20 Keynote - Towards Privacy-Preserving Access Control and Authority Transparency
1:10:58
ACM CODASPY '20 Keynote - Trustworthy Machine Learning: Past, Present, and Future
ACM CODASPY
ACM CODASPY '20 Keynote - Trustworthy Machine Learning: Past, Present, and Future
1:15:55
ACM CODASPY '20 - The Good, the Bad and the (Not So) Ugly of Out-Of-Band Authentication with eID..
ACM CODASPY
ACM CODASPY '20 - The Good, the Bad and the (Not So) Ugly of Out-Of-Band Authentication with eID..
14:14
ACM CODASPY '20 - Admin-CBAC: An Administration Model for Category-Based Access Control
ACM CODASPY
ACM CODASPY '20 - Admin-CBAC: An Administration Model for Category-Based Access Control
14:34
ACM CODASPY '20 - Tap-Pair: Using Spatial Secrets for Single-Tap Device Pairing of Augmented Reality
ACM CODASPY
ACM CODASPY '20 - Tap-Pair: Using Spatial Secrets for Single-Tap Device Pairing of Augmented Reality
13:46
ACM CODASPY '20 - PESC: A Per System-Call Stack Canary Design for Linux Kernel
ACM CODASPY
ACM CODASPY '20 - PESC: A Per System-Call Stack Canary Design for Linux Kernel
14:11
ACM CODASPY '20 - SeCaS: Secure Capability Sharing Framework for IoT Devices in a Structured P2P Net
ACM CODASPY
ACM CODASPY '20 - SeCaS: Secure Capability Sharing Framework for IoT Devices in a Structured P2P Net
13:21
ACM CODASPY '20 - ProximiTEE: Hardened SGX Attestation by Proximity Verification
ACM CODASPY
ACM CODASPY '20 - ProximiTEE: Hardened SGX Attestation by Proximity Verification
15:27
ACM CODASPY '20 - DANdroid: A Multi-View Discriminative Adversarial Network for Obfuscated Android..
ACM CODASPY
ACM CODASPY '20 - DANdroid: A Multi-View Discriminative Adversarial Network for Obfuscated Android..
12:38
ACM CODASPY '20 - CRAPE: A Privacy-Enhanced Crash Reporting System
ACM CODASPY
ACM CODASPY '20 - CRAPE: A Privacy-Enhanced Crash Reporting System
16:40
ACM CODASPY '20 - Understanding Privacy Awareness in Android App Descriptions Using Deep Learning
ACM CODASPY
ACM CODASPY '20 - Understanding Privacy Awareness in Android App Descriptions Using Deep Learning
15:35
ACM CODASPY '20 - AuthPDB: Authentication of Probabilistic Queries on Outsourced Uncertain Data
ACM CODASPY
ACM CODASPY '20 - AuthPDB: Authentication of Probabilistic Queries on Outsourced Uncertain Data
14:03
ACM CODASPY '20 - CREHMA: Cache-aware REST-ful HTTP Message Authentication
ACM CODASPY
ACM CODASPY '20 - CREHMA: Cache-aware REST-ful HTTP Message Authentication
18:46
ACM CODASPY '20 - Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturb...
ACM CODASPY
ACM CODASPY '20 - Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturb...
19:53
ACM CODASPY '20 - TrustAV: Practical and Privacy Preserving Malware Analysis in the Cloud
ACM CODASPY
ACM CODASPY '20 - TrustAV: Practical and Privacy Preserving Malware Analysis in the Cloud
11:11
ACM CODASPY '20 - ISAdetect: Usable Automated Detection of CPU Architecture and Endianness for ...
ACM CODASPY
ACM CODASPY '20 - ISAdetect: Usable Automated Detection of CPU Architecture and Endianness for ...
13:36
ACM CODASPY '20 - Deceiving Portable Executable Malware Classifiers into Targeted Misclassification
ACM CODASPY
ACM CODASPY '20 - Deceiving Portable Executable Malware Classifiers into Targeted Misclassification
15:07
ACM CODASPY '20 - IoT Expunge: Implementing Verifiable Retention of IoT Data
ACM CODASPY
ACM CODASPY '20 - IoT Expunge: Implementing Verifiable Retention of IoT Data
15:13
ACM CODASPY '20 - Attacking and Protecting Tunneled Traffic of Smart Home Devices
ACM CODASPY
ACM CODASPY '20 - Attacking and Protecting Tunneled Traffic of Smart Home Devices
15:24
ACM CODASPY '20 - ZeroLender: Trustless Peer-to-Peer Bitcoin Lending Platform
ACM CODASPY
ACM CODASPY '20 - ZeroLender: Trustless Peer-to-Peer Bitcoin Lending Platform
13:28
ACM CODASPY '20 - n-m-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based..
ACM CODASPY
ACM CODASPY '20 - n-m-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based..
14:16
ACM CODASPY '20 - Explore the Transformation Space for Adversarial Images
ACM CODASPY
ACM CODASPY '20 - Explore the Transformation Space for Adversarial Images
15:44
ACM CODASPY '20 - Random Spiking and Systematic Evaluation of Defenses Against Adversarial Examples
ACM CODASPY
ACM CODASPY '20 - Random Spiking and Systematic Evaluation of Defenses Against Adversarial Examples
15:30
ACM CODASPY '20 - DeepTrust: An Automatic Framework to Detect Trustworthy Users in Opinion-based...
ACM CODASPY
ACM CODASPY '20 - DeepTrust: An Automatic Framework to Detect Trustworthy Users in Opinion-based...
16:10
ACM CODASPY '20 - MOSE: Practical Multi-User Oblivious Storage via Secure Enclaves
ACM CODASPY
ACM CODASPY '20 - MOSE: Practical Multi-User Oblivious Storage via Secure Enclaves
21:09
ACM CODASPY '20 - FridgeLock: Preventing Data Theft on Suspended Linux with Usable Memory Encryption
ACM CODASPY
ACM CODASPY '20 - FridgeLock: Preventing Data Theft on Suspended Linux with Usable Memory Encryption
12:56
ACM CODASPY '20 - Dissecting Android Cryptocurrency Miners
ACM CODASPY
ACM CODASPY '20 - Dissecting Android Cryptocurrency Miners
15:10
ACM CODASPY '20 - Defensive Charging: Mitigating Power Side-Channel Attacks on Charging Smartphones
ACM CODASPY
ACM CODASPY '20 - Defensive Charging: Mitigating Power Side-Channel Attacks on Charging Smartphones
16:18
ACM CODASPY '20 - A Baseline for Attribute Disclosure Risk in Synthetic Data
ACM CODASPY
ACM CODASPY '20 - A Baseline for Attribute Disclosure Risk in Synthetic Data
15:32
ACM CODASPY '20 - Efficient Private Disease Susceptibility Testing in Direct-to-Consumer Model
ACM CODASPY
ACM CODASPY '20 - Efficient Private Disease Susceptibility Testing in Direct-to-Consumer Model
18:45
ACM CODASPY '20 - Renyi Differentially Private ADMM for Non-Smooth Regularized Optimization
ACM CODASPY
ACM CODASPY '20 - Renyi Differentially Private ADMM for Non-Smooth Regularized Optimization
14:41
ACM CODASPY '20 Invited Talk - Can AI be Good in the Midst of Cyber Attacks and Privacy Violations?
ACM CODASPY
ACM CODASPY '20 Invited Talk - Can AI be Good in the Midst of Cyber Attacks and Privacy Violations?
33:32
ACM CODASPY '20 - A Hypothesis Testing Approach to Sharing Logs with Confidence
ACM CODASPY
ACM CODASPY '20 - A Hypothesis Testing Approach to Sharing Logs with Confidence
13:53