USENIX Security '17 Poster Session

Accepted Posters

The following posters will be presented at the USENIX Security ’17 Poster Session and Happy Hour on Thursday, August 17, from 6:00 pm–7:30 pm in the Pavilion Ballroom and Foyer.

Cyber Security Strategy Wargame
Andreas Haggman, Royal Holloway University of London

CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds
Kirill Nikitin, Eleftherios Kokoris-Kogias, Philipp Jovanovic, Nicolas Gailly, and Linus Gasser, École polytechnique fédérale de Lausanne (EPFL); Ismail Khoffi, University of Bonn; Justin Cappos, New York University; Bryan Ford, École polytechnique fédérale de Lausanne (EPFL)

A penny for your password
Hazel Murray and David Malone, Maynooth University

STM/PE and XHIM
Eugene D. Myers, National Security Agency

Regaining Lost Cycles with HotCalls: A Fast Interface for SGX Secure Enclaves
Ofir Weisse, Valeria Bertacco, and Todd Austin, University of Michigan

Decentralized Certificate Authorities
Hannah Li, Bargav Jayaraman, and David Evans, University of Virginia

Ransomware based on hardware trojans. Forget the typical Ransomware, you should start worrying about hardware
Honorio Martin, Department of Electronics Technology, Universidad Carlos III de Madrid; Pedro Peris-Lopez, Department of Computer Science, Universidad Carlos III de Madrid; Luis Entrena, Department of Electronics Technology, Universidad Carlos III de Madrid; Giorgio Di Natale, LIRMM, Laboratoire d’Informatique, de Robotique et de Microélectronique de Montpellier

ECG Dj: Heart Beat Synchronization
Lara Ortiz-Martin and Pedro Peris-Lopez, Dept. of Computer Science. Carlos III University of Madrid; Pablo Picazo-Sanchez and Gerardo Schneider, Dept. of Computer Science and Engineering. Chalmers | Gothenburg University; Juan Tapiador, Dept. of Computer Science. Carlos III University of Madrid

TRIDEnT: Trustworthy collaboRative Intrusion DETection
Nikolaos Alexopoulos, Emmanouil Vasilomanolakis, Natália Réka Ivánkó, Tamara Frieß, and Max Mühlhäuser, TU Darmstadt

What if Hardware is Untrusted? A Study of the Hardware Double Fetch Problem in Linux Kernel
Kai Lu, Pengfei Wang, Gen Li, and Xu Zhou, National University of Defense Technology

EvadeML-Zoo: A Benchmarking and Visualization Tool for Adversarial Machine Learning
Weilin Xu, Andrew Norton, Noah Kim, Yanjun Qi, and David Evans, University of Virginia

On the use of first-hand sensorial data for user and context continuous authentication in smartphones
Jose Maria de Fuentes, Lorena Gonzalez-Manzano, and Arturo Ribagorda, Carlos III University of Madrid (Spain)

JSPolicy: Policied Sandboxes for Untrusted Third-Party JavaScript
Ethan Lowman and David Evans, University of Virginia

Exposing Falsified Data Attacks on CV-based Traffic Signal Control
Qi Alfred Chen, Yucheng Yin, Yiheng Feng, Z. Morley Mao, and Henry X. Liu, University of Michigan

Ulrera!: Securing Ultrasonic Sensor based on Signal Relation and Randomness
Sunwoo Lee, Wonsuk Choi, and Dong Hoon Lee, Korea University

Dial 258x: play your app on your speakers to get the malware family
Guillermo Izquierdo-Moreno, Pedro Peris-Lopez, and Carmen Camara, Department of Computer Science, Carlos III University of Madrid

Cookie Theft Attacks in HTTPS by Invalidating Cookie Flags
Hyunjae Nam, Hyunsoo Kwon, Hyungjun Shin, Jongmin Jeong, Changhee Hahn, and Junbeom Hur, Korea University

Hold The Door!: RF Fingerprint extraction in keyless entry system
Kyungho Joo, Wonsuk Choi, and Dong Hoon Lee, Korea University

KleeFL - Seeding Fuzzers With Symbolic Execution
Julian Fietkau and Bhargava Shastry, TU Berlin

Deobfuscation of Virtualization-based Obfuscated Binary
Mingyue Liang and Zhoujun Li, Beihang University; Qiang Zeng, Temple University; Zhejun Fang, CNCERT/CC

Dynamic Policy-Based Access Control for Emerging IoT Systems
Mehdi Karimibiuki, Ekta Aggarwal, Karthik Pattabiraman, and Andre Ivanov, University of British Columbia, Vancouver, Canada

Estimating Vulnerability Scores To Augment Enterprise Security Systems
Hassan Halawa, Matei Ripeanu, and Konstantin Beznosov, University of British Columbia; Alex Loffler, Telus

Approaches to Evading Windows PE Malware Classifiers
Anant Kharkar, Helen Simecek, Weilin Xu, and David Evans, University of Virginia; Hyrum S. Anderson, Endgame

Cyber Assurance Assessment Using Systems and Control Theory
Georgios Bakirtzis, Electrical & Computer Engineering, Virginia Commonwealth University; Bryan Carter, Systems & Information Engineering, University of Virginia; Carl R. Elks, Electrical & Computer Engineering, Virginia Commonwealth University; Cody H. Fleming, Systems & Information Engineering, University of Virginia

Image Processing based Phishing Detection Framework
Hyunsang Choi and Sanghyun Cho, Naver Corporation; Young-Gab Kim, Sejong University