Accepted Posters
The following posters will be presented at the USENIX Security ’19 Poster Session and Happy Hour on Thursday, August 15, from 6:00 pm–7:30 pm.
Software Forensic Archaeology for Cyber Attribution
Matthew Elder, William La Cholter, and Tony Johnson, JHU/APL; Kathleen Carley, Carnegie Mellon University
Building Secure Decentralized Applications the DECENT Way
Haofan Zheng, Xiaowei Chu, and Owen Arden, University of California, Santa Cruz
Deep Learning Aided Runtime Opcode Based Malware Detection
Enes Sinan Parildi, Yuri Lawryshyn, and Dimitris Hatzinakos, University of Toronto
Mitigating potential Spearphishing with Deep Learning: An Enterprise Study
Matthew Wong, University of Toronto; Cathal Smyth and Kory Fong, RBC Research Institute; Yuri Lawryshyn, University of Toronto
Multi-Layer Perceptron Artificial Neural Network Based IoT Botnet Traffic Classification
Navid Rajabi and Yousra Javed, Illinois State University
Brand Validation: User Interfaces to Better Indicate Website Identity
Tetsuya Okuda, Naoko Chiba, Mitsuaki Akiyama, Toshinori Fukunaga, and Ryohei Suzuki, NTT Secure Platform Laboratories; Masayuki Kanda, Information-technology Promotion Agency
Finding Social Engineering Attacks across User-generated Content Platforms
Hiroki Nakano, Daiki Chiba, Takashi Koide, and Mitsuaki Akiyama, NTT Secure Platform Laboratories
Cheaters Chat: A Measurement of Computer Game Cheating in Online Underground Forums
Panicos Karkallis and Jorge Blasco, Royal Holloway University of London; Guillermo Suarez-Tangil, King's College London; Sergio Pastrana, Universidad Carlos III de Madrid
Realistic Adversarial ML Attacks in the Problem-Space
Fabio Pierazzi, King's College London; Feargus Pendlebury, King's College London & Royal Holloway University of London; Jacopo Cortellazzi and Lorenzo Cavallaro, King's College London
POSTER: Scalable Zero-Knowledge Proofs of Vector “One-Hotness”
William Black and Ryan Henry, University of Calgary
Detecting Anomalies in Industrial Control Systems using Time-Sampled Sensor and Actuator Values
Hoda Mehrpouyan, Subin Sapkota, and A K M Nuhil Mehdy, Boise State University
A Reference Framework for Incorporating GDPR into Social Login
Tharindu Edirisinghe and Nalin Arachchilage, La Trobe University, Australia
Deep Learning based PowerShell Analysis with the Abstract Syntax Tree
Jihyeon Song, University of Science and Technology; Jungtae Kim, Youngsoo Kim, Jonghyun Kim, and Ikkyun Kim, Electronics and Telecommunications Research Institute; Sunoh Choi, Honam University
Security Analysis of Multi-Sensor Fusion based Localization in Autonomous Vehicles
Junjie Shen and Jun Yeon Won, University of California, Irvine; Shinan Liu, University of Electronic Science and Technology of China; Qi Alfred Chen and Alexander Veidenbaum, University of California, Irvine
Cyber Security Risk as an Experimental Discipline: A Proposal Building upon Capture the Flags
Giorgio Di Tizio and Fabio Massacci, University of Trento, Italy; Luca Allodi, Eindhoven University of Technology; Stanislav Dashevskyi, SnT, University of Luxembourg; Jelena Mirkovic, USC Information Sciences Institute (ISI)
Secure and Efficient Network Side-Channel Mitigation
Aastha Mehta, Mohamed Alzayat, Roberta De Viti, Björn B Brandenburg, Peter Druschel, and Deepak Garg, MPI-SWS
Automated Attack Discovery in Data Plane Systems
Qiao Kang, Jiarong Xing, and Ang Chen, Rice University
Towards Understanding the WhatsApp Dilemma
Christian Stransky, Dominik Wermke, Johanna Schrader, Nicolas Huaman, and Anna Lena Fehlhaber, Leibniz University Hannover; Yasemin Acar and Sascha Fahl, University of Hannover
The Tracking Ecosystem of Over-the-Top TV Streaming Devices
Hooman Mohajeri Moghaddam, Gunes Acar, Arunesh Mathur, Danny Y. Huang, Ben Burgess, Nick Feamster, Edward W. Felten, Prateek Mittal, and Arvind Narayanan, Princeton University
Entropy-Shield: Side-Channel Entropy Minimization for Timing-based Side-Channel Attacks
Abhijitt Dhavlle, Setareh Rafatirad, Dr. Houman Homayoun, and Sai Manoj Pudukotai Dinakarrao, George Mason University
A Game Theoretic Analysis of Improvements to Tor’s Resilience to Entry-Exit & End-to-End Attacks
Krisztian Gado, Alexander Lotero, and Jens Mache, Lewis & Clark College
Poster: Towards Robust Semantic Reverse Engineering of Control System Binaries
Pengfei Sun, Shape Security; Luis Garcia, University of California, Los Angeles; Saman Zonouz, Rutgers University
The Lattigo Lattice-based Cryptographic Library
Jean-Philippe Bossuat, Christian Mouchet, Juan Ramon Troncoso-Pastoriza and Jean-Pierre Hubaux, École Polytechnique Fédérale de Lausanne (EPFL)
Reviewing the Use of IP addresses in Abuse Prevention
Anushah Hossain, UC Berkeley, Energy and Resources Group; Sadia Afroz, ICSI; Sivaramakrishnan Satyamangalam Ramanathan, University of Southern California
ProXray: Protocol Model Learning and Guided Firmware Analysis
Farhaan Fowze, Dave Tian, Kevin Butler, Grant Hernandez, and Tuba Yavuz, University of Florida
Investigating Run-time Memory Towards Defeating IoT Malware Obfuscation
Afsah Anwar, Muhammad Saad, and Aziz Mohaisen, University of Central Florida
Link-flooding defense entirely on the data plane
Jiarong Xing, Wenqing Wu, and Ang Chen, Rice University
Protect Your Voiceprint From Identity Theft: Fast Acoustic Digital Watermarking Against Spoofing
Xuping HUANG, Advanced Institute of Industrial Technology
That which we call private
Ulfar Erlingsson, Ilya Mironov, Ananth Raghunathan, and Shuang Song, Google Research, Brain
Privacy Implications of Elder Care Devices
Ankit Bansal, School of Information, UC Berkeley; Alisa Frik, Primal Wijesekera, and Serge Egelman, International Computer Science Institute, UC Berkeley
Leveraging AS-level diversity against network-level adversaries in Tor Network
Shinyoung Cho, Stony Brook University; Arun Dunna, U. Mass Amherst; Romain Fontugne, IIJ Research Lab; Phillipa Gill, U. Mass Amherst
Security and Privacy Enabled Smart Ecosystem: Smart Parking as a Service (SPaaS)
Pankaj Chhetri, Prairie View A&M University; Paras Bhatt, University of Texas at San Antonio; Smriti Bhatt, Texas A&M University-San Antonio; Cajetan Akujuobi, Prairie View A&M University
The 1-Byte Constant Attack against JIT Compilers
Takahiro Shinagawa, Yuki Suzuki, Tomoyuki Nakayama, and Masanori Misono, The University of Tokyo
Crafting Adversarial Examples on Sensor Fusion Models
Won Park and Z. Morley Mao, University of Michigan
Proving Equivalence of iptables and BPF programs
Mark Santolucito and Ruzica Piskac, Yale University
Faster Optimal-rate Many-server Private Information Retrieval (PIR)
Syed Mahbub Hafiz, Indiana University Bloomington; Ryan Henry, University of Calgary