All sessions will be held in Grand Ballroom VII–VIII unless otherwise noted.
Downloads for Registered Attendees
(Sign in to your USENIX account to download these files.)
August 14, 2018
8:00 am-9:00 am
Contintental Breakfast
Grand Ballroom Foyer
9:00 am–9:15 am
Opening Remarks
Program Co-Chairs: David Brumley, ForAllSecure, and Parisa Tabriz, Google
9:15 am–9:50 am
Sensors, IOT, and Car Talks
Taking the Red Pill: Designing Sensors that Recognize False Realities
Connor Bolton, University of Michigan
Learning sensitive indoor location from unprotected sensors on mobile devices
Huadi Zheng, The Hong Kong Polytechnic University
Smart City Security
Guy Verrier, University of Virginia; Yuyi Taylor, University of Virginia; Earlence Fernandes and Tadayoshi Kohno, University of Washington; Yuan Tian, University of Virginia
Program analysis of IoT implementations
Z. Berkay Celik, Penn State University
Awarded Most Amusing!
A(nother) case for research on secure robot apps
Sam King, UC Davis
Fear The Hacked IoT Medical Devices: the apocalypse is already happening, and no one noticed?
Sara Rampazzi, University of Michigan
9:50 am–10:10 am
Sensors, IOT, and Car Talks Discussion
10:10 am–10:30 am
Break with Refreshments
Grand Ballroom Foyer
10:30 am–11:10 am
Authentication, Audit, Usability, and Privacy
Enhancing privacy protection for Aadhaar-like biometric authentication
Junbum Shin, Samsung Electronics
Privacy-preserving electronic ID on smart phones
Rene Mayrhofer, Google
Audit for access policy
Geetanjali Sampemane, Google
Usable TLS client authentication
Daniel Zappala, Brigham Young University
Revocation Checking - why is this still so hard?
Kevin Bock, University of Maryland
Science of security or (Science of security, is it delicious and can I have some of it?)
Janne Lindqvist, Rutgers University
Awarded Most Engaging!
How can we evolve cyber physical security policies to automatically manage changing threats?
Joseph Hallett, University of Bristol
11:10 am–12:30 pm
Authentication, Audit, Usability, and Privacy Discussion
12:30 pm–2:00 pm
Tuesday Luncheon
Grand Ballroom VI
2:00 pm–2:35 pm
Security Techniques
The State of Physical Attacks on Deep Learning Systems
Earlence Fernandes, University of Washington
Stale time is a security threat
Fatima Anwar, UCLA
Memory Tagging and how it improves C/C++ memory safety
Kostya Serebryany, Google
The Algorithmic Bug Bounty
Amit Elazari, Berkeley Law, CLTC
Learning about protecting distributed infrastructure from behavioral economists
Saurabh Bagchi, Purdue University
Gb/s true RNG using commodity parts
James Hughes, UCSC
Awarded Most Surprising!
2:35 pm–3:30 pm
Security Techniques Discussion
3:30 pm–4:00 pm
Break with Refreshments
Grand Ballroom Foyer
4:00 pm–4:40pm
Research and Practice
Account security is broken
Elena O'Curry, Uber
Awareness programs are designed to fail, aka, Behind every stupid user is a stupider security professional.
Ira Winkler, Secure Mentem
Security metrics: is this even possible?
Xenia Mountrouidou, College of Charleston
Fielding and securing autonomous combat units
JM Pelletier, Rochester Institute of Technology
Awarded Most Controversial!
A case for research on digital identities
Sam King, UC Davis
4:40 pm–5:15 pm
Research and Practice Discussion
5:15 pm–5:30 pm
Awards and Wrap Up
Program Co-Chairs: David Brumley, ForAllSecure, and Parisa Tabriz, Google