MAY 18-20, 2015 AT THE FAIRMONT, SAN JOSE, CA
36th IEEE Symposium on
Security and Privacy
Poster: A Framework for Distributed Anonymous Data Collection and Feedback
Maxim Timchenko and Ari Trachtenberg
Poster: A Set of Privacy Preserving Requirements For Smart Home Control System Mobile Apps
Sophia Hannah, Jonathan Ganz, Andy Applebaum, Matt Bishop and Karl Levitt
Poster: A Symbolic Logic with Concrete Bounds for Cryptographic Protocols
Shayak Sen, Anupam Datta, Joseph Y. Halpern, John C. Mitchell and Arnab Roy
Poster: A general practitioner or a specialist for your infected smartphone?
Jelena Milosevic, Alberto Ferrante and Miroslaw Malek
Poster: An Automatic Multi-Step Attack Pattern Mining Approach for Massive WAF Alert Data
Yang Zhang, Tingwen Liu, Jinqiao Shi, Panpan Zhang, Haoliang Zhang and Jing Ya
Poster: An User Study of WhatsApp Privacy Settings Among Arab Users
Yasmeen Rashidi and Kami Vaniea
Poster: Apate: Anti-Phishing Analysing and Triaging Environment
Elmer Lastdrager, Pieter Hartel and Marianne Junger
Poster: Assessing the Effectiveness of Countermeasures Against Authorship Recognition
Michael Backes, Pascal Berrang and Praveen Manoharan
Poster: Assured deletion on Public Clouds
Kopo M. Ramokapane, Awais Rashid and Jose M. Such
Poster: Authentication by web browsing history
Chisa Kuroda, Mizuki Kobayashi, Mioko Watanabe and Manabu Okamoto
Poster: Authentication with Plural Servers in the Correct Order
Yuki Kumazawa, Akane Ito and Manabu Okamoto
Poster: Automatic Dissection of JavaScript Exploits through Dynamic JS-Binary Analysis
Xunchao Hu, Aravind Prakash, Jinghan Wang, Rundong Zhou and Heng Yin
Poster: Automatically Evading Classifiers: A Case Study on Structural Feature-based PDF Malware Classifiers
Weilin Xu, Yanjun Qi and David Evans
Poster: Blindspot: Indistinguishable Anonymous Communications
Joseph Gardiner and Shishir Nagaraja
Poster: Challenges for Assisted Audience Selection in OSN
Gaurav Misra and Jose Such
Poster: Classifying Downloaders
Yu Ding, Liang Guo, Chao Zhang, Yulong Zhang, Hui Xue, Tao Wei, Yuan Zhou and Xinhui Han
Poster: Comparative Evaluation of the Effectiveness of Constraint Solvers against Opaque Conditionals
Fabrizio Biondi, Sebastien Josse and Axel Legay
Poster: Contract Verification for Mobile Security
Hannah Gommerstadt, Frank Pfenning and Limin Jia
Poster: Cybersecurity Experimentation of the Future: Catalyzing a New Generation of Experimental Cybersecurity Research
David Balenson, Laura Tinnel and Terry Benzel
Poster: Data Confidentiality and Integrity
Scott Carr and Mathias Payer
Poster: Deep Learning for Zero-day Flash Malware Detection
Wookhyun Jung, Sangwon Kim and Sangyong Choi
Poster: Defining a Model for Defense-In-Depth
James Sullivan and Michael Locasto
Poster: Denial of Service Defence using Router Migration
Jonathan Weekes and Shishir Nagaraja
Poster: Differentially Private Decision Tree Learning from Distributed Data
Parisa Kaghazgaran and Hassan Takabi
Poster: Digital Inheritance: Third-party digital asset management
Anthony Xu and Depeng Li
Poster: Effort-based Detection of Comment Spammers
Acar Tamersoy, Hua Ouyang and Duen Horng Chau
Poster: FlowSitter - Labelling and Tracking Unidentified Flows in Cloud-based Network Testbed
Jia-Ning Ding, Peng Zhang, Rong Yang, Qing-Yun Liu and Li Guo
Poster: Forcing the Cloud to Forget by Attesting Data Deletion
Michael Backes and Fabian Bendun
Poster: Full Support for Reference Monitoring in Android's Application Framework
Michael Backes and Sven Bugiel
Poster: Full-fledged App Sandboxing for Stock Android
Michael Backes, Sven Bugiel, Christian Hammer, Oliver Schranz and Philipp von Styp-Rekowsky
Poster: Games Without Frontiers: Investigating Video Games as a Covert Channel
Bridger Hahn, Rishab Nithyanand, Phillipa Gill and Rob Johnson
Poster: Getting The Point(er): On Feasibility Of Attacks on Code-Pointer Integrity
Volodymyr Kuznetsov, László Szekeres, Mathias Payer, George Candea and Dawn Song
Poster: How well do you blend into the crowd? - d -convergence: A novel paradigm for quantifying privacy in the age of Big-Data
Michael Backes, Pascal Berrang and Praveen Manoharan
Poster: Image Suitability for Graphical Passwords
Mohammad Alshehri, Heather Crawford and Liam Mayron
Poster: Incentivized Censorship Resistance with Payment Contracts
Cecylia Bocovich, John Doucette and Ian Goldberg
Poster: Information Flow Experiments to study News Personalization
Amit Datta, Anupam Datta, Suman Jana and Michael Carl Tschantz
Poster: Korean Vowel Based Passwords
Ji-Hyeon Yoon and Hae Young Lee
Poster: Lightweight Content-based Phishing Detection
Calvin Ardi and John Heidemann
Poster: Limitations and Improvement of Dynamic Analysis Environment for Malware Analysis
Homook Cho, Sangyong Choi, Kimoon Han and Kwansik Yoon
Poster: Man-in-the-Browser-Cache: Persisting HTTPS Attacks via Browser Cache Poisoning
Yaoqi Jia, Yue Chen, Xinshu Dong, Prateek Saxena, Jian Mao and Zhenkai Liang
Poster: Modeling of APT Attacks through Transforming Attack Scenarios into DEVS Models
Jiyeon Kim and Hyung-Jong Kim
Poster: Mongoose, A Novel Lightweight Cross-Platform Botnet Over TOR
Joshua Pritchett and Wei Lu
Poster: Obliv-C: a Fast, Lightweight Language for Garbled Circuits
Samee Zahur and David Evans
Poster: PodArch: Protecting Legacy Applications with a Purely Hardware TCB
Shweta Shinde, Shruti Tople, Deepak Kathayat and Prateek Saxena
Poster: Position Verification in Vehicular Platoons Using a Euclidean Distance Matrix
Tasnuva Tithi, Ryan Gerdes and Chris Winstead
Poster: Privacy-Preserving Offloading of Mobile App to the Public Cloud
Yue Duan, Mu Zhang, Heng Yin and Yuzhe Tang
Poster: R-DROID: In-depth Application Vetting for Android with Path-sensitive Value Analysis
Michael Backes, Sven Bugiel, Erik Derr, Sebastian Gerling and Christian Hammer
Poster: Resilience of the Internet: the Case of the BGP Backbone
Sylvain Frey, Awais Rashid, Yehia Elkhatib, Karolina Follis, John Vidler, Nick Race and Chris Edwards
Poster: Searching HIE with Differentiated Privacy Preservation
Yuzhe Tang and Ling Liu
Poster: Secure Computation of Fingerprint Alignment and Matching
Fattaneh Bayatbabolghani and Marina Blanton
Poster: Security in E-Voting
Daniel Bruns, Huy Quoc Do, Simon Greiner, Mihai Herda, Martin Mohr, Enrico Scapin, Tomasz Truderung, Bernhard Beckert, Ralf Küsters, Heiko Mantel and Richard Gay
Poster: Security in Web-Based Workflows
Thomas Bauereiss, Abhishek Bichhawat, Iulia Bolosteanu, Peter Faymonville, Bernd Finkbeiner, Deepak Garg, Richard Gay, Sergey Grebenshchikov, Christian Hammer, Dieter Hutter, Ondřej Kunčar, Peter Lammich, Heiko Mantel, Christian Müller, Andrei Popescu, Markus Rabe, Vineet Rajani, Helmut Seidl, Markus Tasch and Leander Tentrup
Poster: Social Spear-Phishing
Robin Gonzalez and Michael Locasto
Poster: Software Security for Mobile Devices
Steven Arzt, Alexandre Bartel, Richard Gay, Steffen Lortz, Enrico Lovat, Heiko Mantel, Martin Mohr, Benedikt Nordhoff, Matthias Perner, Siegfried Rasthofer, David Schneider, Gregor Snelting, Artem Starostin and Alexandra Weber
Poster: Sonar Phishing - Pinpointing Highly Vulnerable Victims for Social Engineering Attacks
Robert Larson, Matthew Edwards, Alistair Baron and Awais Rashid
Poster: Spotting Suspicious Reviews via (Quasi-)clique Extraction
Paras Jain, Shang-Tse Chen, Mozhgan Azimpourkivi, Duen Horng Chau and Bogdan Carbunar
Poster: Syntactic Element Similarity for Phishing Detection
Gilchan Park and Julia Taylor
Poster: System thinking of the Software Vulnerability Market via Complex Network Theory
Keman Huang, Zhiyong Feng, Jianqiang Li and Xiaohong Li
Poster: Toward a Secure Controller Framework for Flight in Physical, Human and Cyber Triad
Depeng Li
Poster: WESHARE: A Coercion-Resistant and Scalable Storage Cloud
Hoon Wei Lim, Loi Luu, Shruti Tople and Prateek Saxena
Poster: Web Change Analysis Approach for Malicious Website Detection
Sangyong Choi, Homook Cho, Kimoon Han and Jaekyung Park
Poster: Zero-Knowledge Authenticated Order Queries and Applications
Esha Ghosh, Michael Goodrich, Olga Ohrimenko and Roberto Tamassia
Poster:An Efficient and Scalable Cyberlocker Traffic Tracking Method
Chao Zheng, Peng Zhang, Shu Li, Qingyun Liu and Jianlong Tan