Poster Session

Accepted Posters

The following posters will be presented during a happy hour on Thursday, August 9, 2012, 6:00 p.m.–7:30 p.m., in the Grand North Foyer.

User Interface Toolkit Mechanisms for Securing Interface Elements
Franziska Roesner, James Fogarty, and Tadayoshi Kohno,  University of Washington

Dismantling iClass and iClass Elite
Flavio D. Garcia, Gerhard de Koning, and Gans Roel Verdult, Radboud University Nijmegen, The Netherlands; Milosch Meriac, Bitmanufaktur GmbH

Kernel Level Sandbox of Application Processes with High Assurance
Hussain M. J. Almohri Danfeng (Daphne) Yao Dennis Kafura, Virginia Polytechnic Institute and State University

Verification with Small and Short Worlds
Rohit Sinha and Cynthia Sturton, University of California, Berkeley; Petros Maniatis, Intel Labs; Sanjit A. Seshia and David Wagner, University of California, Berkeley

MalCut: Malware-initiated Data Leakage Prevention System
Deok Jin Kim, Byung Jin Han, Young Han Choi, and Byung Chul Bae, The Attached Institute of ETRI, Republic of Korea 

Using Interactive Static Analysis for Early Detection of Software Vulnerabilities
Jun Zhu, Jing Xie, Bill Chu, and Heather Lipford, University of North Carolina at Charlotte

The Rise of the App-Net
Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, and Michalis Faloutsos, University of California, Riverside

Classification of UDP Traffic for DDoS Detection
Alexandru G. Bardas, Loai Zomlot, Sathya Chandran Sundaramurthy, and Xinming Ou, Kansas State University; S. Raj Rajagopalan, HP Labs; Marc R. Eisenbarth, HP TippingPoint

Identifying Anonymous Posts of Job Seekers
Tomotaka Okuno and Hiroshi Yoshiura, University of Electro-Communications, Tokyo, Japan

Transparent Probabilistic Packet Marking: Proposal and Development
Akira Kanaoka and Nasato Goto, University of Tsukuba; Masayuki Okada, Japan Network Information Center; Eiji Okamoto, University of Tsukuba

Virtualizing Secret-Shared Database System
Yutaka Nishiwaki and  Hiroshi Yoshiura, University of Electro-Communications, Tokyo, Japan

Secure Out-of-band Remote Management in Infrastructure as a Service
Tomohisa Egawa, Naoki Nishimura, and Kenichi Kourai, Kyushu Institute of Technology

Tracing Attacks on Advanced Persistent Threat in Networked Systems
Masahiko Kato, University of Tsukuba/Internet Initiative Japan Inc.; Takumi Matsunami, Kyushu Institute of Technology; Akira Kanaoka, University of Tsukuba; Hiroshi Koide, Kyushu Institute of Technology/Information-technology Promotion Agency, Japan; Eiji Okamoto, University of Tsukuba

Telerobotic Surgery Meets Information Security
Tamara Bonaci and Howard Jay Chizeck, University of Washington 

Exploiting URL Shortening Services for Botnet C&C
Cui Xiang, Institute of Computing Technology, Chinese Academy of Sciences; Dong Zhiqiang, Qianyun (Shenzhen) Network Technology Co., Ltd.; Liao Peng and Wang Shuai, Institute of Computing Technology, Chinese Academy of Sciences

FlexCOS: Enabling Academic Smartcard Research
Kristian Beilke and Volker Roth, Freie Universität Berlin

Program Structure-Based Feature Selection for Android Malware Analysis 
Andrew Walenstein, Luke Deshotels, and Arun Lakhotia, University of Louisiana

A DCF-Based Covert Timing Channel for IEEE 802.11 With Off-The-Shelf Wireless Cards
Sakthi V. Radhakrishnan, A. Selcuk Uluagac, and Raheem A. Beyah, Georgia Institute of Technology

Empirical Evaluation and Pushback of Malicious Web Advertisements
Robin E. Gonzalez V. and Michael E. Locasto, University of Calgary

A Security Aware Stream Data Processing on the Cloud
Katsuhiro Tomiyama, Hideyuki Kawashima, and Hiroyuki Kitagawa, University of Tsukuba

Aiding Malware Detection Using Large-Scale Machine Learning
Yazan Boshmaf, Matei Ripeanu, and Konstantin Beznosov, University of British Columbia; Kyle Zeeuwen, David Cornell, and Dmitry Samosseiko, Sophos Labs

Control-Alt-Hack: A Card Game for Computer Security Outreach, Education, and Fun
Tamara Denning and Tadayoshi Kohno, University of Washington; Adam Shostack, Microsoft

Computer Security and the Modern Home
Tamara Denning, Tadayoshi Kohno, and Henry M. Levy, University of Washington