sponsors
usenix conference policies
Accepted Posters
The following posters will be presented during the Poster Session and Happy Hour on Thursday, August 21, 2014, 6:00 p.m.–7:30 p.m., in Harbor ABC and Corridor 1.
Twitter Covert Channel: How to Hide in Human Behavior
Nick Pantic, Jonathan Mansur, and Mohammad Husain California State Polytechnic University, Pomona
Hiding Shellcodes in Korean Texts
Ji-Hyeon Yoon and Hae Young Lee, Seoul Women's University
Profiling HTTP Requests to Detect Malware-infected Hosts
Daiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Kazufumi Aoki, and Takeo Hariu, NTT Secure Platform Laboratories
Extracting Redirect-Chain Variations in Drive-by Download Attacks Using Emulati
on of Various Client Environments
Yuta Takata, Mitsuaki Akiyama, and Takeo Hariu, NTT Secure Platform Laboratories
Secrets in Public Repositories
Kyle McGuire, Hao Bai, and David Evans, University of Virginia
Prevent Malicious Controller in a Physical, Human and Cyber Triad
Depeng Li, University of Hawaii at Manoa
DeviceVeil: Lightweight and Tamperproof Hypervisor Which Hides Devices
Kuniyasu Suzaki, Toshiki Yagi, Michitaka Yoshimoto, Kazukuni Kobara, National Institute of Advanced Industrial Science and Technology
Password Cracking: A Large-Scale Empirical Study
Shouling Ji, Shukun Yang, Weiqing Li, and Xiaojing Liao, Georgia Institute of Technology; Xin Hu, IBM T. J. Watson Research Center; Raheem Beyah, Georgia Institute of Technology
Measuring Privacy Disclosures in URL Query Strings
Andrew G. West, Verisign Labs (Verisign, Inc.); Adam J. Aviv, U.S. Naval Academy
Ephemeral Biometrics
Sung Choi, Michael Bierma, Yung Ryn Choe, Margaret Todd, Jeffery Bigg, Shrinithi Narayanan and Vansh Gandhi, Sandia National Laboratories
Exploring Movement-Pattern Based Authentication for Mobile Platforms
Dustyn James Tubbs and Khandaker Abir Rahman, Saginaw Valley State University
iOS Clone Detection Analysis
Michael Bierma, University of California, Davis; Nicholas Ward, University of California, Berkeley; Kevin Wu, University of Illinois at Urbana–Champaign; Yung Ryn Choe, Sandia National Laboratories
A Software Plugin-based Malware Model
Li Zhiqiao and Liang Yu, Beijing University of Posts and Telecommunications and Chinese Academy of Sciences; Liu Chaoge, Chinese Academy of Sciences
Memory and Type Safety for Embedded Systems
Paul Soulier and Depeng Li, University of Hawaii, Manoa
Detection and Characterization of Unknown HTTP Botnets using Combined Packet- and Flow-level Information
Li Ke, Beijing University of Posts and Telecommunications and Chinese Academy of Sciences; Liu Chaoge and Cui Xiang, Chinese Academy of Sciences
(authors unable to attend to present poster)
Research on the Ecological Environment of Botnets
Li Ke and Dai Yumei, Beijing University of Posts and Telecommunications
PHPGate: A Practical White-Delimiter-Tracking Protection against SQL-Injection for PHP
Lihua Zhang and Yu Ding, Peking University; Chao Zhang, University of California, Berkeley; Lei Duan, Zhaofeng Chen, Tao Wei, and Xinhui Han, Peking University
Countering Sandbox-aware Malware by Hiding Sandbox's Fingerprints
Ke Liu, Chinese Academy of Sciences; Shuai Lu, Harbin University of Science and Technology; Chaoge Liu, Chinese Academy of Sciences
(authors unable to attend to present poster)
Collaborative DoS Attack against Cloud-hosted Web Services
Yunhan Jia, Yihua Guo, and Z. Morley Mao, University of Michigan; Sung-Ju Lee, Narus, Inc
URL Shortening Services: A Novel Stealthy and Resilient Message Transmission Channel
Li Dong, Beijing University of Posts and Telecommunications; Lu Shuai, Harbin University of Science and Technology; Liu Chaoge, Chinese Academy of Sciences
(authors unable to attend to present poster)
Detecting Anomalies in DNS Protocol Through Process Mining
Cecilia Saint-Pierre, Pontificia Universidad Católica de Chile; Javier Bustos-Jimenez, NIC Chile Research Labs
Coercion Resistant Authentication Systems (CRAS) using Physiological Responses to Chill Music
Max Wolotsky and Mohammad Husain California State Polytechnic University, Pomona
Using Near-Realtime Voice Data for Communication Authentication
Andreas Brauchli and Depeng Li, University of Hawaii at Manoa
Is It Possible to Overwhelm China's Great Firewall?
Benjamin Mixon-Baca and Jedidiah Crandall, University of New Mexico
SystemLeakalyzer: Systematically Detecting System Side-Channels
Qi Alfred Chen and Yunhan Jia, University of Michigan; Zhiyun Qian, NEC Labs America, Inc.; Z. Morley Mao, University of Michigan
Privacy Implications of Statistical Acoustic Analysis
Shishir Nagaraja, University of Birmingham
connect with us