All sessions will be held in Grand Ballroom D unless otherwise noted.
Downloads for Registered Attendees
(Sign in to your USENIX account to download these files.)


Tuesday, August 15
9:00 am–9:15 am
Opening Remarks
9:15 am–9:40 am
Privacy & Access Lightning Talks
Scalable Privacy—Attacks on Local Privacy and Countermeasures
Josh Joy, University of California, Los Angeles
Out of Sight, But Not Out of Mind: Security and Privacy of Bionic Eyes
Tamara Bonaci, Northeastern University
PRIVACY—Primary Relevant Issue Vs. Academic Controversial Yacking
Asaf Avidan, Haifa University
Purpose-based Access Control for Android
Haoyu Wang, Beijing University of Posts and Telecommunications
9:40 am–10:10 am
Privacy & Access Discussion
10:10 am–10:30 am
Break with Refreshments
10:30 am–11:10 am
Machine Learning & Data Lightning Talks
Deep Neural Networks: The Next Frontier in Machine Learning
Lenny Evans, Uber
Improving Online Conversations through Machine Learning
Deepa Vivekanandan, Google
Optimus Prime: Linear Transformations to Secure Machine Learning Systems
Arjun Nitin Bhagoji, Princeton University
Clustering and Behavior Analysis of Web Robot
Prof. Dong-Her Shih, National Yunlin University of Science & Technology
Hardening and Interrogating Machine Learning Models
Xinyu Xing, Pennsylvania State University
Bots, Trolls, and Warriors: The Modern Adversary Playbook
Andrea Little Limbago, Endgame
11:10 am–12:30 pm
Machine Learning & Data Discussion
12:30 pm–2:00 pm
Workshop Luncheon
2:00 pm–2:35 pm
Securing the Next Wave of Technology Lightning Talks
IoT Security: Why Is It Challenging and What Can We Do
Yuan Tian, Carnegie Mellon University
Defender Movement: Significant Productivity Improvement of Defenders by Open Internet-based Collaboration
Kanta Matsuura, The University of Tokyo
Is Security Advice Useless, or Are We Just Doing It Wrong?
Elissa Redmiles, University of Maryland
Awarded Most Engaging Talk
Analog Cybersecurity Fails at the
Kevin Fu, University of Michigan
Security Is a Game
Tiffany Bao, Carnegie Mellon University
Awarded Most Amusing Talk
Security Challenges In Hardware as a Service
Xiaoning Li, Alibaba Cloud
2:35 pm–3:30 pm
Securing the Next Wave of Technology Discussion
3:30 pm–4:00 pm
Break with Refreshments
4:00 pm–4:30 pm
Sampler Plate Lightning Talks
Mitigating Email Attacks with Usable Email Encryption
John S. Koh, Columbia University
URLs Are the Worst, the Best, and Need to be Replaced
Adrienne Porter Felt, Google
Awarded Most Surprising Talk and Most Controversial Talk
SPAM: a Secure Package Manager Unlike Your Current Package Managers
Deian Stefan, UC San Diego
Securing Trigger-Action Platforms
Earlence Fernandes, University of Michigan
Globally Targeted Hijacking
Mark Risher, Google