Posters and Demos


  1. POSTER: Fast, Automatic iPhone Shoulder Surfing
  2. Federico Magg, Alberto Volpatto, Simone Gasparini, Giacomo Boracchi, Stefano Zanero

  3. POSTER: Protecting Information in Systems of Systems
  4. Daniel Trivellato, Nicola Zannone, Sandro Etalle

  5. POSTER: On Quantitative Information Flow Metrics
  6. Ji Zhu, Mudhakar Srivatsa

  7. POSTER: Privacy-Preserving Profile Similarity Computation in Online Social Networks
  8. Arjan Jeckman, Qiang Tan, Pieter Hartel

  9. POSTER: Mimicry Attacks against Wireless Link Signature
  10. Yao Liu, Peng Ning

  11. DEMO: Secure Computation in JavaScript
  12. Axel Schropfer, Florian Kerschbaum

  13. DEMO: The Ff Hardware Prototype for Privacy-Preserving RFID Authentication
  14. E.-O. Blass, K. Elkhiyaoui, R. Molva, O. Savry, C. Verilhac

  15. POSTER: Online Spam Filtering in Social Networks
  16. Hongyu Go, Kathy Lee, Diana Palsetia, Yan Chen, Alok Choudhary

  17. POSTER: Towards Detecting DMA Malware
  18. Patrick Stewin, Jean-Pierre Seifert, Collin Mulliner

  19. POSTER: DIEGO: A Fine-Grained Access Control for Web Browsers
  20. Ashar Javed

  21. POSTER:Towards Formal Verification of DIFC Policies
  22. Zhi Yang, Lihua Yin, Miyi Duan, Shuyuan Jin

  23. POSTER:Recoverable Botnets: A Hybrid C&C Approach
  24. Liao Peng, Cui Xiang, Li Shuhao, Liu Chaoge

  25. POSTER:CUD: Crowdsourcing for URL Spam Detection
  26. Jun Hu, Hongyu Gao, Zhichun Li, Yan Chen

  27. POSTER: An Implementation of the Fully Homomorphic Smart-Vercauteren Crypto-System
  28. Henning Perl, Michael Brenner, Matthew Smith

  29. POSTER: Applying Unsupervised Context-Based Analysis for Detecting Unauthorized Data Disclosure
  30. Ma'ayan Gafny, Asaf Shabtai, Lior Rokach, Yuval Elovici

  31. POSTER: A Certificateless Proxy Re-Encryption Scheme for Cloud-based Data Sharing
  32. Xiaoxin Wu, Lei Xu, Xinwen Zhang

  33. POSTER: Temporal Attribute Based Encryption in Clouds
  34. Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Huaixi Wang, Mengyang Yu

  35. POSTER: Inference Attacks against Searchable Encryption Protocols
  36. Mohammad Saiful, IslamMehmet Kuzu, Murat Kantarcioglu

  37. POSTER: Arbitrators in the Security Infrastructure, Supporting Positive Anonymity
  38. Shlomi Dolev, Niv Gilboa, Ofer Hermoni

  39. POSTER: Preliminary Analysis of Google+'s Privacy
  40. Shah Mahmood, Yvo Desmedt

  41. DEMO: A Comprehensive Framework Enabling Data-Minimizing Authentication
  42. Patrik Bichsel, Franz-Stefan Preiss

  43. POSTER: Making the Case for Intrinsic Personal Physical Unclonable Functions (IP-PUFs)
  44. Rishab Nithyanand, Radu Sion, John Solis

  45. POSTER: ESPOONERBAC: Enforcing Security Policies in Outsourced Environments with Encrypted RBAC
  46. Muhammad Rizwan, Giovanni Russello, Bruno Crispo

  47. POSTER: Towards Attribute Based Group Key Management
  48. Mohamed Nabeel, Elisa Bertino

  49. POSTER: LBMS: Load Balancing based on Multilateral Security in the Cloud
  50. Pengfei Sun, Ying Chen, Qingni Shen, Cong Zhang, Anbang Ruan, Liang Gu

  51. POSTER: Control-Flow Integrity for Smartphones
  52. Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nurberger, Ahmad-Rez Sadeghi

  53. POSTER: Trans-Organizational Role-Based Access Control
  54. Ramon Francisco Mejia, Yuichi Kaji, Hiroyuki Seki

  55. POSTER: The Quest for Security against Privilege Escalation Attacks on Android
  56. Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Amad-Reza Sadeghi, Bhargava Shastry

  57. POSTER: Attribute Based Broadcast Encryption with Permanent Revocations
  58. Schlomi Dolev, Niv Gilboa, Marina Kopeetsky

  59. POSTER: Can it Be More Practical?! Improving Mouse Dynamics Biometric Performance
  60. Chao Shen, Zhongmin Cai, Xiaohong Guan

  61. POSTER: A Path-cutting Approach to Blocking XSS Worms in Social Web Networks
  62. Yinzhi Cao, Vinod Yegneswaran, Pillip Porras, Yan Chen

  63. POSTER: Practical Embedded Remote Attestation using Physically Unclonable Functions
  64. Unal Kocabas, Amad-Reza Sadeghi, Steffen Shulz, Christian Wachsmann

  65. POSTER: SMURFEN: A Knowledge Sharing Collaborative Intrusion Detection Network
  66. Caro Fung, Quanyan Zhu, Raouf Boutaba, Tamer Basar

  67. POSTER: A Geometric Appraoch for Multicast Authentication in Adversarial Channels
  68. Seyed Ali Ahmadzadeh, Gordon B. Agnew

  69. POSTER: Shaping Network Topology for Privacy and Performance
  70. Nayantara Mallesh, Matthew Wright

  71. POSTER: On Trust Evaluation with Missing Information in Reputation Systems
  72. Xi Gong, Ting Yu, Adam J. Lee

  73. POSTER: Destabilizing BitTorrent's Clusters to Attach High Bandwidth Leechers
  74. Florian Adamsky, Hassan Khan, Mutukrishnan Rajarajan, Syed Ali Khayam, Rudolf Jager

  75. POSTER: Using Quantified Risk and Benefit to Strengthen the Security of Information Sharing
  76. Weili Han, Chengguang Shen, Yuliang Yin, Yun Gu, Chen Chen

  77. POSTER: Collaborative Policy Administration
  78. Weili Han, Zheran Fang, Weifeng Chen, Wenyuan Xu, Chang Lei

  79. POSTER: uPro: A Compartmentalization Tool Supporting Fine-Grained and Flexible Security Configuration
  80. Ben Niu, Gang Tan

Last modified: 2011-09-13 11:43:37 EDT