- Overview
- Symposium Organizers
- Registration Information
- Registration Discounts
- At a Glance
- Calendar
- Technical Sessions
- Birds-of-a-Feather Sessions
- Poster Session
- Sponsorship
- Workshops
- Activities
- Hotel and Travel Information
- Services
- Students
- Questions
- Help Promote!
- Flyer PDF
- For Participants
- Call for Papers
- Past Symposia
sponsors
usenix conference policies
Poster Session
The following posters will be presented during the Poster Session and Happy Hour on Thursday, August 15, 2013, 6:00 p.m.–7:30 p.m., in Columbia ABC and Foyer.
An Automated System for Rapid and Secure Device Sanitization
Ralph LaBarge, Thomas A. Mazzuchi and Shahram Sarkani, George Washington University
Classify but Verify: Breaking the Closed-world Assumption in Stylometric Authorship Attribution
Ariel Stolerman, Rebekah Overdorf, Sadia Afroz, and Rachel Greenstadt, Drexel University
Towards Quantifying and Preventing the Leakage of Genomic Data Using Privacy-Enhancing Technologies
Erman Ayday, Jean Louis Raisaro, Mathias Humbert, and Jean-Pierre Hubaux, Ecole Polytechnique Fédérale de Lausanne (EPFL)
Whole Genome Sequencing: Innovation Dream or Privacy Nightmare?
Erman Ayday, Ecole Polytechnique Fédérale de Lausanne (EPFL); Emiliano De Cristofaro, Xerox PARC; Jean-Pierre Hubaux, Ecole Polytechnique Fédérale de Lausanne (EPFL); Gene Tsudik, University of California, Irvine
Protego: Practical Techniques to Obviate Setuid-to-Root Binaries
Bhushan Jain, Chia-Che Tsai, and Donald E. Porter, Stony Brook University
OS Lockdown on Industrial Control Systems with Process White List and Resource Access Control
Kuniyasu Suzaki, Toshiki Yagi, and Kazukuni Kobara, National Institute of Advanced Industrial Science and Technology; Yoshiaki Komoriya, Control System Security Center; Nobuko Inoue and Tomoyuki Kawade, SciencePark Corporation
When to Attack? Android UI Context Inference as an Attack Building Block
Qi Alfred Chen, University of Michigan; Zhiyun Qian, NEC Labs; Sanae Rosen, Yuanyuan Zhou, and Z. Morley Mao, University of Michigan
A Method to Make Securing Your Information on Mobile Device
Yun-kyung Lee, Jae-deok Lim, and Jeong-nyeo Kim, Electronics and Telecommunications Research Institute, Korea
The Effects of Developer-Specified Explanations for Smartphone Permission Requests
Christopher Thompson, Serge Egelman, and David Wagner, University of California, Berkeley
Anception: Hybrid Virtualization for Smartphone Applications
Earlence Fernandes, Ajit Aluri, Alex Crowell, and Atul Prakash, University of Michigan
Identifying Contextually-Driven Perceptions of Risk
James Cebula and Jennifer Cowley, Carnegie Mellon University
Fingerprint Me If You Can: Towards Effective Protection Against Browser Fingerprinting
Henning Perl, Sascha Fahl, and Matthew Smith, Distributed Computing & Security Group, Germany
Entropic Return-Oriented Exploit Detection
Caleb Smith and Adam J. Aviv, Swarthmore College
Parameterized Trace Scaling
John Sonchack, University of Pennsylvania; Adam J. Aviv, Swarthmore College; and Jonathan M. Smith, University of Pennsylvania
Security and Usability Perceptions of Android’s Password Patterns
Dane Fichter and Adam J. Aviv, Swarthmore College
Baton for Android: Key Agility without a Centralized Certificate Infrastructure
David Barrera, Daniel McCarney, Jeremy Clark, and P.C. van Oorschot, Carleton University
HunterBee: An Advanced ZigBee Vulnerability Analysis System
Yuseok Jeon, Incheol Shin, Sinkyu Kim, Sungho Kim, and Jungtaek Seo, The Attached Institute of ETRI, Korea
User-Intention Based Android Malware Detection
Karim O. Elish, Danfeng (Daphne) Yao, and Barbara G. Ryder, Virginia Polytechnic Institute and State University; and Xuxian Jiang, North Carolina State University
What's New with MCARTA?
C. Aaron Cois and Brady Tello, Carnegie Mellon University
A Survey of Fuzzy Hashing Algorithms for Malware Clustering
Jason Jones, Marc R. Eisenbarth, Michael Barr, and Alexandru G. Bardas, Arbor Networks
Android + Open Wi-Fis = Broken SSL?
Sascha Fahl, Henning Perl, Marian Harbach, and Matthew Smith, Leibniz University Hannover
An Empirical Survey of WPA-Enterprise Misconfigurations
Stuart Minshull and David Starobinski, Boston University
REM: A Robust and Efficient Decision Model for Collaborative Malware Detection
Carol J. Fung, Disney Y. Lam, and Raouf Boutaba, University of Waterloo
Ecology of Security: Brains, Bodies, and Environments
Timothy Kelley, Indiana University
connect with us