MAY 18-20, 2015 AT THE FAIRMONT, SAN JOSE, CA

36th IEEE Symposium on
Security and Privacy

Click the Acrobat icon to the right of any poster to view its abstract.

Poster: A Framework for Distributed Anonymous Data Collection and Feedback
Maxim Timchenko and Ari Trachtenberg

Poster: A Set of Privacy Preserving Requirements For Smart Home Control System Mobile Apps
Sophia Hannah, Jonathan Ganz, Andy Applebaum, Matt Bishop and Karl Levitt

Poster: A Symbolic Logic with Concrete Bounds for Cryptographic Protocols
Shayak Sen, Anupam Datta, Joseph Y. Halpern, John C. Mitchell and Arnab Roy

Poster: A general practitioner or a specialist for your infected smartphone?
Jelena Milosevic, Alberto Ferrante and Miroslaw Malek

Poster: An Automatic Multi-Step Attack Pattern Mining Approach for Massive WAF Alert Data
Yang Zhang, Tingwen Liu, Jinqiao Shi, Panpan Zhang, Haoliang Zhang and Jing Ya

Poster: An User Study of WhatsApp Privacy Settings Among Arab Users
Yasmeen Rashidi and Kami Vaniea

Poster: Apate: Anti-Phishing Analysing and Triaging Environment
Elmer Lastdrager, Pieter Hartel and Marianne Junger

Poster: Assessing the Effectiveness of Countermeasures Against Authorship Recognition
Michael Backes, Pascal Berrang and Praveen Manoharan

Poster: Assured deletion on Public Clouds
Kopo M. Ramokapane, Awais Rashid and Jose M. Such

Poster: Authentication by web browsing history
Chisa Kuroda, Mizuki Kobayashi, Mioko Watanabe and Manabu Okamoto

Poster: Authentication with Plural Servers in the Correct Order
Yuki Kumazawa, Akane Ito and Manabu Okamoto

Poster: Automatic Dissection of JavaScript Exploits through Dynamic JS-Binary Analysis
Xunchao Hu, Aravind Prakash, Jinghan Wang, Rundong Zhou and Heng Yin

Poster: Automatically Evading Classifiers: A Case Study on Structural Feature-based PDF Malware Classifiers
Weilin Xu, Yanjun Qi and David Evans

Poster: Blindspot: Indistinguishable Anonymous Communications
Joseph Gardiner and Shishir Nagaraja

Poster: Challenges for Assisted Audience Selection in OSN
Gaurav Misra and Jose Such

Poster: Classifying Downloaders
Yu Ding, Liang Guo, Chao Zhang, Yulong Zhang, Hui Xue, Tao Wei, Yuan Zhou and Xinhui Han

Poster: Comparative Evaluation of the Effectiveness of Constraint Solvers against Opaque Conditionals
Fabrizio Biondi, Sebastien Josse and Axel Legay

Poster: Contract Verification for Mobile Security
Hannah Gommerstadt, Frank Pfenning and Limin Jia

Poster: Cybersecurity Experimentation of the Future: Catalyzing a New Generation of Experimental Cybersecurity Research
David Balenson, Laura Tinnel and Terry Benzel

Poster: Data Confidentiality and Integrity
Scott Carr and Mathias Payer

Poster: Deep Learning for Zero-day Flash Malware Detection
Wookhyun Jung, Sangwon Kim and Sangyong Choi

Poster: Defining a Model for Defense-In-Depth
James Sullivan and Michael Locasto

Poster: Denial of Service Defence using Router Migration
Jonathan Weekes and Shishir Nagaraja

Poster: Differentially Private Decision Tree Learning from Distributed Data
Parisa Kaghazgaran and Hassan Takabi

Poster: Digital Inheritance: Third-party digital asset management
Anthony Xu and Depeng Li

Poster: Effort-based Detection of Comment Spammers
Acar Tamersoy, Hua Ouyang and Duen Horng Chau

Poster: FlowSitter - Labelling and Tracking Unidentified Flows in Cloud-based Network Testbed
Jia-Ning Ding, Peng Zhang, Rong Yang, Qing-Yun Liu and Li Guo

Poster: Forcing the Cloud to Forget by Attesting Data Deletion
Michael Backes and Fabian Bendun

Poster: Full Support for Reference Monitoring in Android's Application Framework
Michael Backes and Sven Bugiel

Poster: Full-fledged App Sandboxing for Stock Android
Michael Backes, Sven Bugiel, Christian Hammer, Oliver Schranz and Philipp von Styp-Rekowsky

Poster: Games Without Frontiers: Investigating Video Games as a Covert Channel
Bridger Hahn, Rishab Nithyanand, Phillipa Gill and Rob Johnson

Poster: Getting The Point(er): On Feasibility Of Attacks on Code-Pointer Integrity
Volodymyr Kuznetsov, László Szekeres, Mathias Payer, George Candea and Dawn Song

Poster: How well do you blend into the crowd? - d -convergence: A novel paradigm for quantifying privacy in the age of Big-Data
Michael Backes, Pascal Berrang and Praveen Manoharan

Poster: Image Suitability for Graphical Passwords
Mohammad Alshehri, Heather Crawford and Liam Mayron

Poster: Incentivized Censorship Resistance with Payment Contracts
Cecylia Bocovich, John Doucette and Ian Goldberg

Poster: Information Flow Experiments to study News Personalization
Amit Datta, Anupam Datta, Suman Jana and Michael Carl Tschantz

Poster: Korean Vowel Based Passwords
Ji-Hyeon Yoon and Hae Young Lee

Poster: Lightweight Content-based Phishing Detection
Calvin Ardi and John Heidemann

Poster: Limitations and Improvement of Dynamic Analysis Environment for Malware Analysis
Homook Cho, Sangyong Choi, Kimoon Han and Kwansik Yoon

Poster: Man-in-the-Browser-Cache: Persisting HTTPS Attacks via Browser Cache Poisoning
Yaoqi Jia, Yue Chen, Xinshu Dong, Prateek Saxena, Jian Mao and Zhenkai Liang

Poster: Modeling of APT Attacks through Transforming Attack Scenarios into DEVS Models
Jiyeon Kim and Hyung-Jong Kim

Poster: Mongoose, A Novel Lightweight Cross-Platform Botnet Over TOR
Joshua Pritchett and Wei Lu

Poster: Obliv-C: a Fast, Lightweight Language for Garbled Circuits
Samee Zahur and David Evans

Poster: PodArch: Protecting Legacy Applications with a Purely Hardware TCB
Shweta Shinde, Shruti Tople, Deepak Kathayat and Prateek Saxena

Poster: Position Verification in Vehicular Platoons Using a Euclidean Distance Matrix
Tasnuva Tithi, Ryan Gerdes and Chris Winstead

Poster: Privacy-Preserving Offloading of Mobile App to the Public Cloud
Yue Duan, Mu Zhang, Heng Yin and Yuzhe Tang

Poster: R-DROID: In-depth Application Vetting for Android with Path-sensitive Value Analysis
Michael Backes, Sven Bugiel, Erik Derr, Sebastian Gerling and Christian Hammer

Poster: Resilience of the Internet: the Case of the BGP Backbone
Sylvain Frey, Awais Rashid, Yehia Elkhatib, Karolina Follis, John Vidler, Nick Race and Chris Edwards

Poster: Searching HIE with Differentiated Privacy Preservation
Yuzhe Tang and Ling Liu

Poster: Secure Computation of Fingerprint Alignment and Matching
Fattaneh Bayatbabolghani and Marina Blanton

Poster: Security in E-Voting
Daniel Bruns, Huy Quoc Do, Simon Greiner, Mihai Herda, Martin Mohr, Enrico Scapin, Tomasz Truderung, Bernhard Beckert, Ralf Küsters, Heiko Mantel and Richard Gay

Poster: Security in Web-Based Workflows
Thomas Bauereiss, Abhishek Bichhawat, Iulia Bolosteanu, Peter Faymonville, Bernd Finkbeiner, Deepak Garg, Richard Gay, Sergey Grebenshchikov, Christian Hammer, Dieter Hutter, Ondřej Kunčar, Peter Lammich, Heiko Mantel, Christian Müller, Andrei Popescu, Markus Rabe, Vineet Rajani, Helmut Seidl, Markus Tasch and Leander Tentrup

Poster: Social Spear-Phishing
Robin Gonzalez and Michael Locasto

Poster: Software Security for Mobile Devices
Steven Arzt, Alexandre Bartel, Richard Gay, Steffen Lortz, Enrico Lovat, Heiko Mantel, Martin Mohr, Benedikt Nordhoff, Matthias Perner, Siegfried Rasthofer, David Schneider, Gregor Snelting, Artem Starostin and Alexandra Weber

Poster: Sonar Phishing - Pinpointing Highly Vulnerable Victims for Social Engineering Attacks
Robert Larson, Matthew Edwards, Alistair Baron and Awais Rashid

Poster: Spotting Suspicious Reviews via (Quasi-)clique Extraction
Paras Jain, Shang-Tse Chen, Mozhgan Azimpourkivi, Duen Horng Chau and Bogdan Carbunar

Poster: Syntactic Element Similarity for Phishing Detection
Gilchan Park and Julia Taylor

Poster: System thinking of the Software Vulnerability Market via Complex Network Theory
Keman Huang, Zhiyong Feng, Jianqiang Li and Xiaohong Li

Poster: Toward a Secure Controller Framework for Flight in Physical, Human and Cyber Triad
Depeng Li

Poster: WESHARE: A Coercion-Resistant and Scalable Storage Cloud
Hoon Wei Lim, Loi Luu, Shruti Tople and Prateek Saxena

Poster: Web Change Analysis Approach for Malicious Website Detection
Sangyong Choi, Homook Cho, Kimoon Han and Jaekyung Park

Poster: Zero-Knowledge Authenticated Order Queries and Applications
Esha Ghosh, Michael Goodrich, Olga Ohrimenko and Roberto Tamassia

Poster:An Efficient and Scalable Cyberlocker Traffic Tracking Method
Chao Zheng, Peng Zhang, Shu Li, Qingyun Liu and Jianlong Tan