Poster Session
The following posters will be presented at the USENIX Security '15 Poster Session and Happy Hour on Thursday, August 13, from 6:00 pm–7:30 pm in the Columbia Ballroom.
Robust Hardware Security for Cloud Computing
Nevrus Kaja, and Adnan Shaout, University of Michigan-Dearborn
An Optimization Approach for Improving the Security in Large Networks
Hussain M. J. Almohri, Kuwait University; Layne T. Watson and Daphne Yao, Virginia Polytechnic Institute and State University; Xinming Ou, Kansas State University
Bridging the Gap between Modern Cryptography and Real World Applications
Muhammad Naveed, University of Illinois at Urbana-Champaign
The Frigate Compiler for Secure Computation
Benjamin Mood, University of Florida; Debayan Gupta, Yale University; Henry Carter, Georgia Institute of Technology; Kevin Butler and Patrick Traynor, University of Florida
Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework
Yuru Shao, University of Michigan; Jason Ott, University of California, Riverside; Qi Alfred Chen, University of Michigan; Zhiyun Qian, University of California, Riverside; Z. Morley Mao, University of Michigan
PacketGuardian: Systematic Detection of Packet Injection Vulnerabilities using Precise Static Analysis
Qi Alfred Chen, University of Michigan; Zhiyun Qian, University of California, Riverside; Yunhan Jia, Yuru Shao, and Z. Morley Mao, University of Michigan
Securing Organizations from Advanced Cyber Threats
Ajeet Kumar Singh, Deloitte
Computing on Encrypted Data for IoT Applications
Laurynas Riliskis, Stanford University; Hossein Shafagh, ETH Zürich; Philip Levis, Stanford University
Elastic Pathing 2.0: Your Speed is Enough to Track You Revisited
Xianyi Gao, Bernhard Firner, Shridatt Sugrim, Victor Kaiser-Pendergrast, Yulong Yang, and Janne Lindqvist, Rutgers University
Hmax: Cryptographic Password Proxy for Strong Authentication
Ahmed Bahjat, Paul Ammann, and Duminda Wijesekera, George Mason University
VoLTE Data Free-Ride Attack: A Case of Exploiting the Unprotected Voice Channel
Yunhan Jack Jia, Qi Alfred Chen, and Z. Morley Mao, University of Michigan; Alex Yoon, Jie Hui, Salvador Mendoza, Samson Kwong, Kevin Lau, and Kranthi Sontineni, T-Mobile USA Inc.
StorXCrypt: An Architecture for Multi App Multi Device Cryptographic Support for Android and its Implementation
Daisuke Moriyama, NICT; Akira Kanaoka, NICT and Toho University; Ryo Takeuchi, Toho University; Moti Yung, Google and Columbia University
Outsourcing Secure Two-Party Computation as a Black Box
Henry Carter, Georgia Institute of Technology; Benjamin Mood, Patrick Traynor, and Kevin Butler, University of Florida
Secure Binding Update without IPsec in Host-based Distributed Mobility Management
Se-Yeong Lee, Sungkyunkwan University; Jong-Hyouk Lee, Sangmyoung University; Hyoung-Kee Choi, Sungkyunkwan University
Aligning Research Ethics and Security Studies in Transnational Environments
John Murray, SRI International
Studying the Pervasiveness of Internet Interception with Honey{POP,SMTP,Telnet}
Tavish Vaidya, Eric Burger, Micah Sherr, and Clay Shields, Georgetown University
Set-based Classification of Android Malware from Behavioral Abstractions
Santanu Kumar Dash, Kimberly Tam, Johannes Kinder, and Lorenzo Cavallaro, Royal Holloway, University of London
Don't Lie: Statistical Metrics for a Truthful Machine Learning Evaluation
Roberto Jordaney, Zhi Wang, Davide Papini, Ilia Nouretdinov, and Lorenzo Cavallaro, Royal Holloway, University of London
Towards Secure and Usable Smartphone Authentication
Gradeigh D. Clark, Janice Gu, and Janne Lindqvist, Rutgers University
Application level Moving Target IPv6 Defense
Dileep Basam, Chris Morrell, Reese Moore, Randy Marchany, and Joseph G. Tront, Virginia Tech
Bohatei: Flexible and Elastic DDoS Defense
Seyed K. Fayaz, Yoshiaki Tobioka, and Vyas Sekar, Carnegie Mellon University; Michael Bailey, University of Illinois at Urbana-Champaign
Inference Attacks on Encrypted Databases
Muhammad Naveed, University of Illinois at Urbana-Champaign; Seny Kamara, Microsoft Research; Charles Wright, Portland State University
Scredent—Scalable Real-time Anomalies Detection and Notification of Targeted Malware in Smartphones
Paul McNeil, Sachin Shetty, Divya Naga Devi Guntu, and Gauree Barve, Tennessee State University
connect with us