- Security '12 Home
- Registration Information
- Registration Discounts
- Organizers
- At a Glance
- Calendar
- Technical Sessions
- Workshops
- Hotel & Travel Information
- Poster Session
- Rump Session
- Birds-of-a-Feather Sessions
- Sponsors
- Activities
- Students
- Questions?
- For Participants
- Help Promote
- Call for Papers
- Past Proceedings
sponsors
usenix conference policies
Poster Session
Accepted Posters
The following posters will be presented during a happy hour on Thursday, August 9, 2012, 6:00 p.m.–7:30 p.m., in the Grand North Foyer.
User Interface Toolkit Mechanisms for Securing Interface Elements
Franziska Roesner, James Fogarty, and Tadayoshi Kohno, University of Washington
Dismantling iClass and iClass Elite
Flavio D. Garcia, Gerhard de Koning, and Gans Roel Verdult, Radboud University Nijmegen, The Netherlands; Milosch Meriac, Bitmanufaktur GmbH
Kernel Level Sandbox of Application Processes with High Assurance
Hussain M. J. Almohri Danfeng (Daphne) Yao Dennis Kafura, Virginia Polytechnic Institute and State University
Verification with Small and Short Worlds
Rohit Sinha and Cynthia Sturton, University of California, Berkeley; Petros Maniatis, Intel Labs; Sanjit A. Seshia and David Wagner, University of California, Berkeley
MalCut: Malware-initiated Data Leakage Prevention System
Deok Jin Kim, Byung Jin Han, Young Han Choi, and Byung Chul Bae, The Attached Institute of ETRI, Republic of Korea
Using Interactive Static Analysis for Early Detection of Software Vulnerabilities
Jun Zhu, Jing Xie, Bill Chu, and Heather Lipford, University of North Carolina at Charlotte
The Rise of the App-Net
Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, and Michalis Faloutsos, University of California, Riverside
Classification of UDP Traffic for DDoS Detection
Alexandru G. Bardas, Loai Zomlot, Sathya Chandran Sundaramurthy, and Xinming Ou, Kansas State University; S. Raj Rajagopalan, HP Labs; Marc R. Eisenbarth, HP TippingPoint
Identifying Anonymous Posts of Job Seekers
Tomotaka Okuno and Hiroshi Yoshiura, University of Electro-Communications, Tokyo, Japan
Transparent Probabilistic Packet Marking: Proposal and Development
Akira Kanaoka and Nasato Goto, University of Tsukuba; Masayuki Okada, Japan Network Information Center; Eiji Okamoto, University of Tsukuba
Virtualizing Secret-Shared Database System
Yutaka Nishiwaki and Hiroshi Yoshiura, University of Electro-Communications, Tokyo, Japan
Secure Out-of-band Remote Management in Infrastructure as a Service
Tomohisa Egawa, Naoki Nishimura, and Kenichi Kourai, Kyushu Institute of Technology
Tracing Attacks on Advanced Persistent Threat in Networked Systems
Masahiko Kato, University of Tsukuba/Internet Initiative Japan Inc.; Takumi Matsunami, Kyushu Institute of Technology; Akira Kanaoka, University of Tsukuba; Hiroshi Koide, Kyushu Institute of Technology/Information-technology Promotion Agency, Japan; Eiji Okamoto, University of Tsukuba
Telerobotic Surgery Meets Information Security
Tamara Bonaci and Howard Jay Chizeck, University of Washington
Exploiting URL Shortening Services for Botnet C&C
Cui Xiang, Institute of Computing Technology, Chinese Academy of Sciences; Dong Zhiqiang, Qianyun (Shenzhen) Network Technology Co., Ltd.; Liao Peng and Wang Shuai, Institute of Computing Technology, Chinese Academy of Sciences
FlexCOS: Enabling Academic Smartcard Research
Kristian Beilke and Volker Roth, Freie Universität Berlin
Program Structure-Based Feature Selection for Android Malware Analysis
Andrew Walenstein, Luke Deshotels, and Arun Lakhotia, University of Louisiana
A DCF-Based Covert Timing Channel for IEEE 802.11 With Off-The-Shelf Wireless Cards
Sakthi V. Radhakrishnan, A. Selcuk Uluagac, and Raheem A. Beyah, Georgia Institute of Technology
Empirical Evaluation and Pushback of Malicious Web Advertisements
Robin E. Gonzalez V. and Michael E. Locasto, University of Calgary
A Security Aware Stream Data Processing on the Cloud
Katsuhiro Tomiyama, Hideyuki Kawashima, and Hiroyuki Kitagawa, University of Tsukuba
Aiding Malware Detection Using Large-Scale Machine Learning
Yazan Boshmaf, Matei Ripeanu, and Konstantin Beznosov, University of British Columbia; Kyle Zeeuwen, David Cornell, and Dmitry Samosseiko, Sophos Labs
Control-Alt-Hack: A Card Game for Computer Security Outreach, Education, and Fun
Tamara Denning and Tadayoshi Kohno, University of Washington; Adam Shostack, Microsoft
Computer Security and the Modern Home
Tamara Denning, Tadayoshi Kohno, and Henry M. Levy, University of Washington
connect with us