


default search action
CODASPY 2025: Pittsburgh, PA, USA
- James Joshi, Jaideep Vaidya, Haya Schulmann:
Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2025, Pittsburgh, PA, USA, June 4-6, 2025. ACM 2024, ISBN 979-8-4007-1476-4
Keynote Talks
- Orr Dunkelman
:
Privacy - From the Ivory Tower to the Trenches in the Parliament. 1-4 - V. S. Subrahmanian
:
Covert Social Influence Operations: Past, Present, and Future. 5
Session 1: Web and Browser Security
- Mohammad M. Ahmadpanah
, Matías F. Gobbi, Daniel Hedin
, Johannes Kinder
, Andrei Sabelfeld
:
CodeX: Contextual Flow Tracking for Browser Extensions. 6-17 - Theodoros Apostolopoulos
, Vasilios Koutsokostas
, Nikolaos Totosis
, Constantinos Patsakis
, Georgios Smaragdakis
:
Coding Malware in Fancy Programming Languages for Fun and Profit. 18-29 - Neil P. Thimmaiah
, Rigel Gjomemo
, V. N. Venkatakrishnan
:
SemFinder: A Semantics-Based Approach to Enhance Vulnerability Analysis in Web Applications. 30-41 - Oghenerukevwe Elohor Oyinloye
, Carol Fung
:
Evaluating Website Data Leaks through Spam Collection on Honeypots. 42-53 - Pieter Philippaerts
, Stef Verreydt
, Wouter Joosen
:
Enhanced Threat Modeling and Attack Scenario Generation for OAuth 2.0 Implementations: Data/Toolset paper. 54-59
Session 2: Differential Privacy
- Shuya Feng
, Meisam Mohammady
, Hanbin Hong
, Shenao Yan
, Ashish Kundu
, Binghui Wang
, Yuan Hong
:
Harmonizing Differential Privacy Mechanisms for Federated Learning: Boosting Accuracy and Convergence. 60-71 - Amol Khanna
, Fred Lu
, Edward Raff
:
Differentially Private Iterative Screening Rules for Linear Regression. 72-83 - Stephen Meisenbacher
, Chaeeun Joy Lee
, Florian Matthes
:
Spend Your Budget Wisely: Towards an Intelligent Distribution of the Privacy Budget in Differentially Private Text Rewriting. 84-95
Session 3: Access Control Management and Policy Compliance
- Ferhat Demirkiran
, Amir Masoumzadeh
:
Enhancing Relationship-Based Access Control Policies with Negative Rule Mining. 96-106 - Florian Jacob
, Hannes Hartenstein
:
To the Best of Knowledge and Belief: On Eventually Consistent Access Control. 107-118 - Md. Al Amin
, Hemanth Tummala
, Rushabh Shah
, Indrajit Ray
:
Proof of Compliance (PoC): A Consensus Mechanism to Verify the Compliance with Informed Consent Policy in Healthcare. 119-130
Session 4: Systems and Hardware Security
- Sayed Erfan Arefin
, Abdul Serwadda
:
Exploiting HDMI and USB Ports for GPU Side-Channel Insights. 131-142 - Matteo Zoia, Marco Cutecchia, Davide Rusconi, Andrea Monzani, Mirco Picca, Danilo Bruschi, Andrea Lanzi:
VS-TEE: A Framework for Virtualizing TEEs in ARM Cloud Contexts. 143-154 - Axel Durbet
, Paul-Marie Grollemund
, Pascal Lafourcade
, Kevin Thiry-Atighehchi
:
Defining Security Limits in Biometrics. 155-166 - Mia Filic
, Jonas Hofmann
, Sam A. Markelon
, Kenneth G. Paterson
, Anupama Unnikrishnan
:
Probabilistic Data Structures in the Wild: A Security Analysis of Redis. 167-178 - Raphael Springer
, Alexander Schmitz
, Artur Leinweber
, Tobias Urban
, Christian Dietrich
:
Padding Matters - Exploring Function Detection in PE Files: Data/Toolset paper. 179-184
Session 5: Privacy Inference and Data Aggregation
- Bingyu Liu
, Ali Arastehfard
, Rujia Wang
, Weiran Liu
, Zhongjie Ba
, Shanglin Zhou
, Yuan Hong
:
Secure and Efficient Video Inferences with Compressed 3-Dimensional Deep Neural Networks. 185-196 - Riccardo Taiello
, Clémentine Gritti, Melek Önen
, Marco Lorenzi
:
Buffalo: A Practical Secure Aggregation Protocol for Buffered Asynchronous Federated Learning. 197-208 - Edgardo Alberto Barsallo Yi
, Joshua David Oetting Majors
, Aditya Vardhan Padala
, Darren Wu
, Aravind Machiry
, Saurabh Bagchi
:
Multi-Device Context-Sensitive Attacks Against Privacy. 209-220 - Scott Seidenberger
, Oluwasijibomi Ajisegiri
, Noah Pursell
, Fazil Raja
, Anindya Maiti
:
Why You've Got Mail: Evaluating Inbox Privacy Implications of Email Marketing Practices in Online Apps and Services. 221-232 - Mir Imtiaz Mostafiz
, Imtiaz Karim
, Elisa Bertino
:
How Feasible is Augmenting Fake Nodes with Learnable Features as a Counter-strategy against Link Stealing Attacks? 233-244
Session 6: Threat Detection and Intelligence
- Sutanu Kumar Ghosh
, Rigel Gjomemo
, V. N. Venkatakrishnan
:
Citar: Cyberthreat Intelligence-driven Attack Reconstruction. 245-256 - Seyed Mohammad Sanjari
, Ashfak Md Shibli
, Maraz Mia
, Maanak Gupta
, Mir Mehedi Ahsan Pritom
:
SmishViz: Towards A Graph-based Visualization System for Monitoring and Characterizing Ongoing Smishing Threats. 257-268 - Anh-Duy Tran
, Laurens Sion
, Koen Yskout
, Wouter Joosen
:
TerrARA: Automated Security Threat Modeling for Infrastructure as Code. 269-280
Session 7: Blockchain and Decentralized Finance
- Abdulrahman Alhaidari
, Balaji Palanisamy
, Prashant Krishnamurthy
:
Protecting DeFi Platforms against Non-Price Flash Loan Attacks. 281-292 - Abdulrahman Alhaidari
, Bhavani Kalal
, Balaji Palanisamy
, Shamik Sural
:
SolRPDS: A Dataset for Analyzing Rug Pulls in Solana Decentralized Finance. 293-298 - Lukas Ingmarsson
, Karl Duckert Karlsson
, Niklas Carlsson
:
Using Venom to Flip the Coin and Peel the Onion: Measurement Tool and Dataset for Studying the Bitcoin - Dark Web Synergy: Data/Toolset Paper. 299-304
Session 8: AI and Security
- Anudeep Das
, Vasisht Duddu
, Rui Zhang
, N. Asokan
:
Espresso: Robust Concept Filtering in Text-to-Image Models. 305-316 - Vasisht Duddu
, Lachlan J. Gunn
, N. Asokan
:
Laminator: Verifiable ML Property Cards using Hardware-assisted Attestations. 317-328 - Advije Rizvani
, Giovanni Apruzzese
, Pavel Laskov
:
The Ephemeral Threat: Assessing the Security of Algorithmic Trading Systems powered by Deep Learning. 329-340 - Dennis Jacob
, Hend Alzahrani
, Zhanhao Hu
, Basel Alomair
, David A. Wagner
:
PromptShield: Deployable Detection for Prompt Injection Attacks. 341-352 - Elisa Braconaro
, Eleonora Losiouk
:
A Dataset for Evaluating LLMs Vulnerability Repair Performance in Android Applications: Data/Toolset paper. 353-358
Session 9: Cryptography and Secure Communication
- Md Rabbi Alam
, Jinpeng Wei
, Qingyang Wang
:
CryptMove: Moving Stealthily through Legitimate and Encrypted Communication Channels. 359-370 - Eugene Frimpong
, Bin Liu
, Camille Nuoskala
, Antonis Michalas
:
Blind Brother: Attribute-Based Selective Video Encryption. 371-382 - Julie Ha
, Chloé Cachet
, Luke Demarest
, Sohaib Ahmad
, Benjamin Fuller
:
Private Eyes: Zero-Leakage Iris Searchable Encryption. 383-394 - Yuzhou Feng
, Sandeep Kiran Pinjala
, Radu Sion
, Bogdan Carbunar
:
Trilobyte: Plausibly Deniable Communications Through Single Player Games: Data/Toolset Paper. 395-400
Session 10: Vulnerability and Intrusion Detection
- Asmaa Hailane
, Paria Shirani
, Guy-Vincent Jourdan
:
VulPatrol: Interprocedural Vulnerability Detection and Localization through Semantic Graph Learning. 401-412 - Hyunwoo Lee
, Charalampos Katsis
, Alireza Lotfi
, Taejun Choi
, Soeun Kim
, Ashish Kundu
, Elisa Bertino
:
IoTDSCreator: A Framework to Create Labeled Datasets for IoT Intrusion Detection Systems. 413-418 - Eric Wagner
, Lennart Bader
, Konrad Wolsing
, Martin Serror
:
Sherlock: A Dataset for Process-aware Intrusion Detection Research on Power Grid Networks: Dataset Paper. 419-424

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.