Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
SPW
SPW 2018
Generate Citations
2018 IEEE Security and Privacy Workshops (SPW)
May 24 2018 to May 24 2018
San Francisco, CA, USA
Table of Contents
[Title page i]
Freely available from IEEE.
pp. 1-1
Title Page iii
Freely available from IEEE.
pp. 3-3
[Title page iii]
Freely available from IEEE.
pp. 3-3
Copyright Page
Freely available from IEEE.
pp. 4-4
[Copyright notice]
Freely available from IEEE.
pp. 4-4
Table of Contents
Freely available from IEEE.
pp. 5-9
Message from the Workshops General Chair
Freely available from IEEE.
pp. 10-10
Message from the DLS Organizers
Freely available from IEEE.
pp. 11-11
DLS Committees
Freely available from IEEE.
pp. 12-12
Message from the SADFE Organizers
Freely available from IEEE.
pp. 13-13
SADFE Committees
Freely available from IEEE.
pp. 14-15
Message from the WRIT Organizers
Freely available from IEEE.
pp. 16-16
WRIT Committees
Freely available from IEEE.
pp. 17-17
Message from the BioStar Organizers
Freely available from IEEE.
pp. 18-18
BioStar Committees
Freely available from IEEE.
pp. 19-19
Message from the LangSec Organizers
Freely available from IEEE.
pp. 20-20
LangSec Committees
Freely available from IEEE.
pp. 21-21
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
Freely available from IEEE.
pp. 1-7
by
Nicholas Carlini
,
David Wagner
A Deep Learning Approach to Fast, Format-Agnostic Detection of Malicious Web Content
Freely available from IEEE.
pp. 8-14
by
Joshua Saxe
,
Richard Harang
,
Cody Wild
,
Hillary Sanders
Mouse Authentication Without the Temporal Aspect – What Does a 2D-CNN Learn?
Freely available from IEEE.
pp. 15-21
by
Penny Chong
,
Yi Xiang Marcus Tan
,
Juan Guarnizo
,
Yuval Elovici
,
Alexander Binder
Detecting Homoglyph Attacks with a Siamese Neural Network
Freely available from IEEE.
pp. 22-28
by
Jonathan Woodbridge
,
Hyrum S. Anderson
,
Anjum Ahuja
,
Daniel Grant
Machine Learning DDoS Detection for Consumer Internet of Things Devices
Freely available from IEEE.
pp. 29-35
by
Rohan Doshi
,
Noah Apthorpe
,
Nick Feamster
Adversarial Examples for Generative Models
Freely available from IEEE.
pp. 36-42
by
Jernej Kos
,
Ian Fischer
,
Dawn Song
Learning Universal Adversarial Perturbations with Generative Models
Freely available from IEEE.
pp. 43-49
by
Jamie Hayes
,
George Danezis
Black-Box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers
Freely available from IEEE.
pp. 50-56
by
Ji Gao
,
Jack Lanchantin
,
Mary Lou Soffa
,
Yanjun Qi
Exploring the Use of Autoencoders for Botnets Traffic Representation
Freely available from IEEE.
pp. 57-62
by
Ruggiero Dargenio
,
Shashank Srikant
,
Erik Hemberg
,
Una-May O'Reilly
The Good, the Bad and the Bait: Detecting and Characterizing Clickbait on YouTube
Freely available from IEEE.
pp. 63-69
by
Savvas Zannettou
,
Sotirios Chatzis
,
Kostantinos Papadamou
,
Michael Sirivianos
Bringing a GAN to a Knife-Fight: Adapting Malware Communication to Avoid Detection
Freely available from IEEE.
pp. 70-75
by
Maria Rigaki
,
Sebastian Garcia
Adversarial Deep Learning for Robust Detection of Binary Encoded Malware
Freely available from IEEE.
pp. 76-82
by
Abdullah Al-Dujaili
,
Alex Huang
,
Erik Hemberg
,
Una-May O’Reilly
Extending Detection with Privileged Information via Generalized Distillation
Freely available from IEEE.
pp. 83-88
by
Z. Berkay Celik
,
Patrick McDaniel
Detecting Deceptive Reviews Using Generative Adversarial Networks
Freely available from IEEE.
pp. 89-95
by
Hojjat Aghakhani
,
Aravind Machiry
,
Shirin Nilizadeh
,
Christopher Kruegel
,
Giovanni Vigna
Background Class Defense Against Adversarial Examples
Freely available from IEEE.
pp. 96-102
by
Michael McCoyd
,
David Wagner
Time Series Deinterleaving of DNS Traffic
Freely available from IEEE.
pp. 103-108
by
Amir Asiaee T.
,
Hardik Goel
,
Shalini Ghosh
,
Vinod Yegneswaran
,
Arindam Banerjee
HeNet: A Deep Learning Approach on Intel® Processor Trace for Effective Exploit Detection
Freely available from IEEE.
pp. 109-115
by
Li Chen
,
Salmin Sultana
,
Ravi Sahita
Deep Reinforcement Fuzzing
Freely available from IEEE.
pp. 116-122
by
Konstantin Böttinger
,
Patrice Godefroid
,
Rishabh Singh
Security Risks in Deep Learning Implementations
Freely available from IEEE.
pp. 123-128
by
Qixue Xiao
,
Kang Li
,
Deyue Zhang
,
Weilin Xu
Evaluating Automated Facial Age Estimation Techniques for Digital Forensics
Freely available from IEEE.
pp. 129-139
by
Felix Anda
,
David Lillis
,
Nhien-An Le-Khac
,
Mark Scanlon
File Fragment Classification Using Grayscale Image Conversion and Deep Learning in Digital Forensics
Freely available from IEEE.
pp. 140-147
by
Qian Chen
,
Qing Liao
,
Zoe L. Jiang
,
Junbin Fang
,
Siuming Yiu
,
Guikai Xi
,
Rong Li
,
Zhengzhong Yi
,
Xuan Wang
,
Lucas C.K. Hui
,
Dong Liu
,
En Zhang
Forensic-Aware Anti-DDoS Device
Freely available from IEEE.
pp. 148-159
by
Chi Yuen Tseung
,
Kam Pui Chow
A Dynamic Taint Analysis Tool for Android App Forensics
Freely available from IEEE.
pp. 160-169
by
Zhen Xu
,
Chen Shi
,
Chris Chao-Chun Cheng
,
Neil Zhengqiang Gong
,
Yong Guan
Fingerprinting Cryptographic Protocols with Key Exchange Using an Entropy Measure
Freely available from IEEE.
pp. 170-179
by
Shoufu Luo
,
Jeremy D. Seideman
,
Sven Dietrich
Forensic Analysis of Ransomware Families Using Static and Dynamic Analysis
Freely available from IEEE.
pp. 180-185
by
Kul Prasad Subedi
,
Daya Ram Budhathoki
,
Dipankar Dasgupta
Forensic Analysis of Immersive Virtual Reality Social Applications: A Primary Account
Freely available from IEEE.
pp. 186-196
by
Ananya Yarramreddy
,
Peter Gromkowski
,
Ibrahim Baggili
SOFIT: Sociotechnical and Organizational Factors for Insider Threat
Freely available from IEEE.
pp. 197-206
by
Frank Greitzer
,
Justin Purl
,
Yung Mei Leong
,
D.E. Sunny Becker
Insider Threat Cybersecurity Framework Webtool & Methodology: Defending Against Complex Cyber-Physical Threats
Freely available from IEEE.
pp. 207-216
by
Michael Mylrea
,
Sri Nikhil Gupta Gourisetti
,
Curtis Larimer
,
Christine Noonan
Detection of Masqueraders Based on Graph Partitioning of File System Access Events
Freely available from IEEE.
pp. 217-227
by
Flavio Toffalini
,
Ivan Homoliak
,
Athul Harilal
,
Alexander Binder
,
Martin Ochoa
Simulated User Bots: Real Time Testing of Insider Threat Detection Systems
Freely available from IEEE.
pp. 228-236
by
Preetam Dutta
,
Gabriel Ryan
,
Aleksander Zieba
,
Salvatore Stolfo
Balancing Organizational Incentives to Counter Insider Threat
Freely available from IEEE.
pp. 237-246
by
Andrew P. Moore
,
Tracy M. Cassidy
,
Michael C. Theis
,
Daniel Bauer
,
Denise M. Rousseau
,
Susan B. Moore
Navigating the Insider Threat Tool Landscape: Low Cost Technical Solutions to Jump Start an Insider Threat Program
Freely available from IEEE.
pp. 247-257
by
Derrick Spooner
,
George Silowash
,
Daniel Costa
,
Michael Albrethsen
S.P.O.O.F Net: Syntactic Patterns for identification of Ominous Online Factors
Freely available from IEEE.
pp. 258-263
by
Vysakh S Mohan
,
Vinayakumar R
,
Soman KP
,
Prabaharan Poornachandran
WACA: Wearable-Assisted Continuous Authentication
Freely available from IEEE.
pp. 264-269
by
Abbas Acar
,
Hidayet Aksu
,
A. Selcuk Uluagac
,
Kemal Akkaya
Evaluating Insider Threat Detection Workflow Using Supervised and Unsupervised Learning
Freely available from IEEE.
pp. 270-275
by
Duc C. Le
,
A. Nur Zincir-Heywood
Towards Human Bio-Inspired Defence Mechanism for Cyber Security
Freely available from IEEE.
pp. 276-280
by
Nanda Kumar Thanigaivelan
,
Ethiopia Nigussie
,
Seppo Virtanen
,
Jouni Isoaho
A Case Study in Tailoring a Bio-Inspired Cyber-Security Algorithm: Designing Anomaly Detection for Multilayer Networks
Freely available from IEEE.
pp. 281-286
by
Gonzalo Suárez
,
Lazaros Gallos
,
Nina Fefferman
Diversity-Based Moving-Target Defense for Secure Wireless Vehicular Communications
Freely available from IEEE.
pp. 287-292
by
Esraa M. Ghourab
,
Effat Samir
,
Mohamed Azab
,
Mohamed Eltoweissy
Biologically Inspired Safety and Security for Smart Built Environments: Position Paper
Freely available from IEEE.
pp. 293-298
by
Denis Gracanin
,
Adam D'Amico
,
Mark Manuel
,
Walter Carson
,
Mohamed Eltoweissy
,
Liang Cheng
Redesigning Secure Protocols to Compel Grammatical Compliance Checking
Freely available from IEEE.
pp. 299-305
by
Keith Irwin
A Binary Analysis Approach to Retrofit Security in Input Parsing Routines
Freely available from IEEE.
pp. 306-322
by
Jayakrishna Menon
,
Christophe Hauser
,
Yan Shoshitaishvili
,
Stephen Schwab
A Mathematical Modeling of Exploitations and Mitigation Techniques Using Set Theory
Freely available from IEEE.
pp. 323-328
by
Rodrigo Branco
,
Kekai Hu
,
Henrique Kawakami
,
Ke Sun
LangSec Revisited: Input Security Flaws of the Second Kind
Freely available from IEEE.
pp. 329-334
by
Erik Poll
Author Index
Freely available from IEEE.
pp. 335-337
Publisher's Information
Freely available from IEEE.
pp. 338-338
[Publisher's information]
Freely available from IEEE.
pp. 338-338
Showing 63 out of 63