Accepted Posters/Demos
1 | POSTER: Critique of the CISSP Common Body of Knowledge of Cryptography | |
Stephan Neuhaus (ETH Zurich), Gabriela Gheorghe (University of Luxembourg) | ||
2 | POSTER: Preserving Privacy and Accountability for Personal Devices | |
Gabriela Gheorghe (University of Luxembourg), Stephan Neuhaus (ETH Zurich) | ||
3 | POSTER: Caching Oblivious Memory Access – An Extension to the HCRYPT Virtual Machine | |
Michael Brenner (Leibniz Universität Hannover), Matthew Smith (Leibniz Universität Hannover) | ||
4 | POSTER: Data Quality Evaluation: Integrating Security and Accuracy | |
Leon Reznik (Rochester Institute of Technology), Elisa Bertino (Purdue University) | ||
5 | DEMO: Adjustably Encrypted In-Memory Column-Store | |
Florian Kerschbaum (SAP AG), Patrick Grofig (SAP AG), Isabelle Hang (SAP AG), Martin Härterich (SAP AG), Mathias Kohler (SAP AG), Andreas Schaad (SAP AG), Axel Schröpfer (SAP AG), Walter Tighzert (SAP AG) | ||
6 | POSTER: Graphical Password using Object-based Image Ranking | |
Cuong X. Nguyen (Ritsumeikan University), Huang Hung-Hsuan (Ritsumeikan University), Kawagoe Kyoji (Ritsumeikan University) | ||
7 | POSTER: A Semantic-Aware Approach to Reasoning the Relation of Network Traffic | |
Hao Zhang (Virginia Tech), Danfeng Yao (Virginia Tech), Naren Ramakrishnan (Virginia Tech) | ||
8 | POSTER: Detecting Malware through Temporal Function-Based Features | |
Eitan Menahem (Ben-Gurion University), Asaf Shabtai (Ben-Gurion University), Adi Levhar (Ben-Gurion University) | ||
9 | POSTER: Event-based Isolation of Critical Data in the Cloud | |
Sebastian Biedermann (TU Darmstadt), Stefan Katzenbeisser (TU Darmstadt) | ||
10 | POSTER: BotFlex: A Community-driven Tool for Botnet Detection | |
Sheharbano Khattak, Zaafar Ahmed (SysNet, National Univ. of Computer & Emerging Sciences, Pakistan), Affan A. Syed (SysNet, National Univ. of Computer & Emerging Sciences, Pakistan), Syed Ali Khayam (PLUMgrid, Inc.) | ||
11 | POSTER: Signal Anomaly Based Attack Detection in Wireless Sensor Networks | |
Jeton Bacaj (Rochester Institute of Technology), Leon Reznik (Rochester Institute of Technology) | ||
12 | DEMO: Demonstrating a Trust Framework for Evaluating GNSS Signal Integrity | |
Xihui Chen (University of Luxembourg), Carlo Harpes (itrust consulting), Gabriele Lenzini (University of Luxembourg), Miguel Martins (itrust consulting), Sjouke Mauw (University of Luxembourg), Jun Pang (University of Luxembourg) | ||
13 | POSTER: Enhanced Embedded Device Security by Combining Hardware-Based Trust Mechanisms | |
Martin Schramm (University of Applied Sciences Deggendorf), Karl Leidl (University of Applied Sciences Deggendorf), Andreas Grzemba (University of Applied Sciences Deggendorf), Nicolai Kuntze (Fraunhofer SIT) | ||
14 | DEMO: Inherent PUFs and Secure PRNGs on Commercial Off-the-Shelf Microcontrollers | |
Anthony Van Herrewege (KU Leuven), André Schaller (TU Darmstadt), Ingrid Verbauwhede (KU Leuven), Stefan Katzenbeisser (TU Darmstadt) | ||
15 | POSTER: On the Anonymity of Israel’s General Elections | |
Tomer Ashur (University of Haifa), Orr Dunkelman (University of Haifa) | ||
16 | POSTER: Secure Authentication from Facial Attributes with no Privacy Loss | |
Orr Dunkelman (University of Haifa), Margarita Osadchy (University of Haifa), Mahmood Sharif (University of Haifa) | ||
17 | POSTER: Performance Signatures of Mobile Phone Browsers | |
Bilal Shebaro (Purdue University), Di Jin (Purdue University), Elisa Bertino (Purdue University) | ||
18 | POSTER: A New Framework against Privilege Escalation Attacks on Android | |
Wenming Zhou (Xidian University), Yuqing Zhang (University of the Chinese Academy of Sciences), Xuefeng Liu (Xidian University) | ||
19 | POSTER: TRIPLEX: Verifying Data Minimisation in Communication Systems | |
Meilof Veeningen (TU Eindhoven), Mayla Brusò (TU Eindhoven), Jerry Den Hartog (TU Eindhoven), Nicola Zannone (TU Eindhoven) | ||
20 | POSTER: SHAMROCK: Self Contained Cryptography and Key Management Processor | |
Dan Utin (MIT Lincoln Laboratory), Roger Khazan (MIT Lincoln Laboratory), Michael Vai (MIT Lincoln Laboratory), David Whelihan (MIT Lincoln Laboratory) | ||
21 | POSTER: Trend of Online Flash XSS Vulnerabilities | |
Qixu Liu (University of Chinese Academy of Sciences), Yuqing Zhang (University of Chinese Academy of Sciences), Huan Yang (Xidian University) | ||
22 | POSTER: Cross-Platform Malware: Write Once, Infect Everywhere | |
Martina Lindorfer (Vienna University of Technology), Matthias Neumayr (Vienna University of Technology), Juan Caballero (IMDEA Software Institute), Christian Platzer (Vienna University of Technology) | ||
23 | POSTER: Introducing Pathogen: A Real-Time Virtual Machine Introspection Framework | |
Anthony Roberts (University of the West of England), Richard McClatchey (University of the West of England), Saad Liaquat (University of the West of England), Nigel Edwards (HP Laboratories, Bristol), Mike Wray (HP Laboratories, Bristol) | ||
24 | POSTER: PnP: Improving Web Browsing Performance over Tor using Resource Prefetch-and-Push | |
Giang T. K. Nguyen (University of Illinois at Urbana-Champaign), Xun Gong (University of Illinois at Urbana-Champaign), Anupam Das (University of Illinois at Urbana-Champaign), Nikita Borisov (University of Illinois at Urbana-Champaign) | ||
25 | POSTER: Sniffing and Propagating Malwares through WPAD Deception in LANs | |
Dan Li (Beijing University of Posts and Telecommunications), Chaoge Liu (Chinese Academy of Sciences), Xu Cui (China Academy of Aerospace Aerodynamics), Xiang Cui (Chinese Academy of Sciences) | ||
26 | POSTER: A Footprint of Third-Party Tracking on Mobile Web | |
Ashar Javed (Ruhr University Bochum) | ||
27 | POSTER: Dr. Watson provides data for post-breach analysis | |
Wasim Bhat (University of Kashmir), S. M. K. Quadri (University of Kashmir) | ||
28 | DEMO: An IDS framework for Internet of Things empowered by 6LoWPAN | |
Prabhakaran Kasinathan (Istituto Superiore Mario Boella), Gianfranco Costamagna (Istituto Superiore Mario Boella), Hussein Khaleel (Istituto Superiore Mario Boella), Claudio Pastrone, Maurizio A Spirito (Istituto Superiore Mario Boella) | ||
29 | DEMO: Secure and Customizable Web Development in the SAFE Activation Framework | |
Raphael M. Reischuk (Saarland University), Florian Schröder (Saarland University), Johannes Gehrke (Cornell University) | ||
30 | POSTER: Reflected Attacks Abusing Honeypots | |
Martin Husák (Masaryk University), Martin Vizváry (Masaryk University) | ||
31 | DEMO: Enabling Trusted Stores for Android | |
Yury Zhauniarovich (University of Trento), Olga Gadyatskaya (University of Trento), Bruno Crispo (University of Trento) | ||
32 | DEMO: Gradiant Asymmetric Encryption and Verification Systems and based on Handwritten Signature | |
Enrique Argones Rúa (Gradiant), Francisco Javier García Salomón (Gradiant), Luis Pérez Freire (Gradiant) | ||
33 | POSTER: TouchCtrl: Fine-grained Access Control for Collaborative Environments | |
Benjamin Güldenring (Freie Universität Berlin), Volker Roth (Freie Universität Berlin) | ||
34 | POSTER: CryptServer: Strong Data Protection in Commodity LAMP Servers | |
Zhaofeng Chen (Peking University), Xinshu Dong (National University of Singapore), Prateek Saxena (National University of Singapore), Zhenkai Liang (National University of Singapore) | ||
35 | DEMO: On the Real-time Masking of the Sound of Credit Cards using Hot Patching | |
Manish Shukla (Tata Consultancy Services), Purushotam Radadia (Tata Consultancy Services), Shirish Karande (Tata Consultancy Services), Sachin Lodha (Tata Consultancy Services) | ||
36 | POSTER: Identity-Based Steganography and Its Applications to Censorship Resistance | |
Tim Ruffing (Saarland University), Jonas Schneider (Saarland University), Aniket Kate (MMCI, Saarland University) | ||
37 | POSTER: Sechduler: A Security-Aware Kernel Scheduler | |
Parisa Haghani (University of Illinois), Saman Zonouz (University of Miami) | ||
38 | POSTER: Passwords on Flexible Display Devices | |
Sana Maqsood (Carleton University), Sonia Chiasson (Carleton University) | ||
39 | POSTER: Revisiting Anomaly Detection System Design Philosophy | |
Ayesha Ashfaq (National University of Sciences and Technology, Pakistan), Muhammad Qasim Ali (University of North Carolina at Charlotte), Ehab Al-Shaer (University of North Carolina at Charlotte) |

Recently updated pages: