Poster: A Critical Analysis of Privacy Design Strategies
Michael Colesky*, Radboud University; Jaap-Henk Hoepman, Radboud University; Christiaan Hillen, Valori
Poster: A Logic Based Network Forensics Model for Evidence Analysis
Anoop Singhal*, National Institute of Standards and Technology; Changwei Liu, George Mason University; Duminda Wijesekera, George Mason University/National Institute of Standards and Technology
Poster: A Low-cost Detection Scheme on Fast-flux Malware Distribution
gang xiong*, Institute of Information Engineering_Chinese Academy of Sciences; zhen li, Institute of Information Engineering_Chinese Academy of Sciences; Haiqing Pan, Institute of Information Engineering_CAS; Zigang Cao, Institute of Information Engineering, CAS; Wenhao Liu, Institute of Information Engineering, CAS; Gaopeng Gou, Institute of Information Engineering, CAS
Poster: A Real-time Dataflow Process Platform for Network Forensics
Fei Xu, Law School, Renmin University of China; Gang Xiong, Zhen li, Junzheng Shi, Institute of Information Engineering, Chinese Academy of Sciences
Poster: A network flows visualization framework and API for network forensics and analytics in the web
Julio De la Cruz Natera*, Ian Davila, José R. Ortiz-Ubarri, University of Puerto Rico, Rio Piedras
Poster: A proposal for architecture of biometric authentication products
Asahiko Yamada*, National Institute of Advanced Industrial Science and Technology
Poster: Adaptive Data-Driven and Region-Aware Detection for Deceptive Advertising
Hsien-De Huang, Cheetah Mobile; Chia-Mu Yu*, Yuan Ze University
Poster: Analysis of User Privacy in Mobile Geo-location sharing: You are not Traveling Alone.
Siva Kumar Sudikonda*, University of Houston Clear Lake; Venkata N Inukollu, University of Houston Clear Lake
Poster: Atoms of Style: Identifying the Authors of Program Binaries
Chris McKnight*, University of Waterloo; Kritika Iyer, University of Waterloo; Ian Goldberg, University of Waterloo
Poster: Automated Anomaly Detection Within The Toa Network Flow Data Monitoring System
Jose Valles Salas*, University of Puerto Rico, R’o Piedras Campus
Poster: Barometer: Sizing Up Android Applications Through Statistical Evaluation
Santanu Dash*, Royal Holloway, University of London; Guillermo Suarez-Tangil, Royal Holloway, University of London; Johannes Kinder, Royal Holloway, University of London; Lorenzo Cavallaro, Royal Holloway University of London
Poster: Bitcoin Meets Collective Signing
Eleftherios Kokoris-Kogias*, EPFL; Philipp Jovanovic, EPFL; Nicolas Gailly, EPFL; Ismail Khoffi, EPFL; Linus Gasser, EPFL; Bryan Ford, EPFL
Poster: Blink: A moving-target approach to fingerprint diversification.
Pierre Laperdrix*, Inria; Walter Rudametkin, INRIA; Benoit Baudry, INRIA
Poster: Combining Data Loss Prevention and Detection
Elisa Costante, SecurityMatters; Davide Fauri*, TU Eindhoven; Sandro Etalle, TU Eindhoven; Jerry den Hartog, TU Eindhoven; Nicola Zannone, TU Eindhoven
Poster: DataTags, Data Handling Policy Spaces and the Tags Language
Michael Bar-Sinai*, BGU; Merc Crosas, Institute for Quantitative Social Science at Harvard University; Latanya Sweeney, Data Privacy Lab at Harvard University
Poster: Diversity or Concentration? HackersÕ Strategy for Working Across Multiple Bug Bounty Programs
Keman Huang*, Tianjin University, MIT; Michael Siegel, MIT; Stuart Madnick, MIT; Xiaohong Li, Tianjin University; Zhiyong Feng, Tianjin University
Poster: Effect of Cognitive Depletion on Password Choice
Thomas Gross*, Newcastle University; Kovila Coopamootoo, Newcastle University
Poster: Evading Web Malware Classifiers using Genetic Programming
Anant Kharkar*, University of Virginia
Poster: Evaluating the effectiveness of privacy tools using Information Flow Experiments
Amit Datta*, Carnegie Mellon University; Anupam Datta, Carnegie Mellon University; Lay Kuan Loh, Carnegie Mellon University; Michael Tschantz, International Computer Science Institute; Zheng Zong, Carnegie Mellon University
Poster: GeminiScope: An Efficient Solution for Detecting UI-Mimicking Android Applications
Jian Mao*, School of Electronic and Information Engineering, Beihang University; Hanjun Ma, National University of Singapore; Yaoqi Jia, National University of Singapore; Zhenkai Liang, National University of Singapore; Xuxian Jiang, Qihu 360 Technology
Poster: Global Security Risk Classification Method for Cloud Migration of Industrial Internet Apps
Rajika Tandon*, General Electric; Corey Jackson, General Electric
Poster: Learning Models of a Network Protocol using Neural Network Language Models
Bernhard Aichernig, Graz University of Technology; Roderick Bloem, Graz University of Technology; Franz Pernkopf, Graz University of Technology; Franz Ršck, Graz University of Technology; Tobias Schrank*, Graz University of Technology; Martin Tappler, Graz University of Technology
Poster: Malicious Service Discovery in Normal-Looking SSL/TLS Services
Zigang Cao*, Institute of Information Engineering, CAS; Mingxin Cui, Institute of Information Engineering, CAS; zhen li, Institute of Information Engineering_Chinese Academy of Sciences; Junzheng Shi, Institute of Information Engineering_Chinese Academy of Sciences; gang xiong, Institute of Information Engineering_Chinese Academy of Sciences
Poster: Misleading Metrics: On Evaluating Machine Learning for Malware with Confidence
Roberto Jordaney*, Royal Holloway University of London; Zhi Wang, Royal Holloway University of London; Davide Papini, Royal Holloway University of London; Ilia Nouretdinov, Royal Holloway University of London; Kumar Sharad, Royal Holloway University of London; Lorenzo Cavallaro, Royal Holloway University of London
Poster: Mitigating OnionBots
Amirali Sanatinia*, Northeastern University; Guevara Noubir, NEU
Poster: Mobile Malware Detection using Multiple Detector Set Artificial Immune System
James Brown, North Carolina A&T State University; Mohd Anwar*, North Carolina A&T State University; Gerry Dozier, North Carolina A&T State University
Poster: Post-Intrusion Memory Forensics Analysis
Pengfei Sun*, Rutgers University; Rui Han, University of Miami; Saman Zonouz, Rutgers University
Poster: Privacy Harm Analysis: A Case Study on Smart Grids
Sourya De*, INRIA, France; Daniel Le MŽtayer, INRIA, France
Poster: Privacy Preserving Smart Meter Streaming Against Inference Attacks
Yuan Hong*, University at Albany, SUNY; Wen Ming Liu, Concordia University; Lingyu Wang, Concordia University
Poster: Privacy-Preserving String Search for Genome Sequences using Fully Homomorphic Encryption
Yu Ishimaki*, Waseda University; Kana Shimizu, Waseda University, National Institute of Advanced Industrial Science and Technology; Koji Nuida, National Institute of Advanced Industrial Science and Technology, Japan Science and Technology Agency (JST) PRESTO Researcher; Hayato Yamana, Waseda University
Poster: Re-thinking the Honeypot for Cyber-Physical Systems
Samuel Litchfield*, Georgia Institute of Technology; David Formby, Georgia Institute of Technology; Sakis Meliopoulos, Georgia Institute of Technology; Jonathan Rogers, Georgia Institute of Technology; Raheem Beyah, Georgia Institute of Technology
Poster: Secure Gale-Shapley: Efficient Stable Matching for Multi-Party Computation
Jack Doerner*, University of Virginia; David Evans, University of Virginia; abhi shelat, University of Virginia
Poster: Secure Multi-Party Computation as a Tool for Privacy-Preserving Data Analysis
Samuel Havron*, University of Virginia; David Evans, University of Virginia
Poster: Secure Multiparty Computations from XOR-based Secret Sharing Schemes
Yuji Suga*, Internet Initiative Japan Inc.
Poster: Secure VPN using Mobile IPv6 based Moving Target Defense
Vahid Heydari*, University of Alabama in Huntsville
Poster: Secure and Scalable Identity Management for the Aviation Industry
Panagiotis Kintis, Georgia Institute of Technology; Athanasios Kountouras, Georgia Institute of Technology; PITROPAKIS NIKOLAOS*, Georgia Institute of Technology; David Dagon, Georgia Institute of Technology; Manos Antonakakis, Georgia Institute of Technology; Christos Markou, International Air Transport Association; Pascal Buchner, International Air Transport Association
Poster: Security evaluation of a finger vein authentication algorithm against wolf attack
Akira Otsuka*, AIST; Tetsushi Ohki, AIST; Manabu Inuma, Josai University
Poster: Self-Defensible Storage Devices based on Flash memory against Ransomware
Joon-Young Paik*, Ajou University; Keuntae Shin, Samsung Electronics Co. ; Eun-Sun Cho, Chungnam National University, Korea
Poster: Solving Private Systems of Linear Equations with Garbled Circuits
Phillipp Schoppmann*, University of Edinburgh; Adria Gascon, University of Edinburgh; Borja Balle, Lancaster University
Poster: Static Malware Modeling and Detection using Topic Models
Shamik Bose, Florida State University; Shamik Bose*, Florida State University; Xiuwen Liu, Florida State University; Angela Gibbens, Florida State University
Poster: Steps Toward Automated Proof-Carrying Hardware Intellectual Property (PCHIP) Framework
Mohammad-Mahdi Bidmeshki*, The University of Texas at Dallas; Yiorgos Makris, The University of Texas at Dallas
Poster: Towards Understanding Health Information Leakage through Social Networks
Qinchen Gu*, Georgia Institute of Technology; Shouling Ji, Georgia Institute of Technology; Raheem Beyah, Georgia Institute of Technology
Poster: Towards a Malware Detection Framework Based on Power Consumption Monitoring
Jarilyn Hernandez Jimenez*, West Virginia University; Jeffrey Nichols, Oak Ridge National Laboratory; Robert Bridges, Oak Ridge National Laboratory; Katerina Goseva-Popstojanova, West Virginia University; Stacy Prowell, Oak Ridge National Laboratory
Poster: Using Implicit Calls to Improve Malware Dynamic Execution
Mourad Leslous*, Inria; ValŽrie Viet Triem Tong, CentraleSupŽlec; Jean-Franois Lalande, INSA CVL
Poster: VLC-based Authenticated Key Exchange
Ying-Shen Chen, National Taiwan University; Chung-Yi Lin, National Taiwan University; Hsu-Chun Hsiao*, National Taiwan University; Yueh-Hsun Lin, Samsung Research America; Hsin-Mu Tsai, National Taiwan University
Poster: Verifying Geographic Location Presence of Internet Clients
AbdelRahman Abdou*, Carleton University; Ashraf Matrawy, Carleton University; Paul van Oorschot, Carleton University
Poster: Who spams whom? Detecting Opinion Spammer Groups and Their Spam Targets
Euijin Choo*, Missouri University of Science and Technology