Accepted Posters/Demos

1 POSTER: Critique of the CISSP Common Body of Knowledge of Cryptography
Stephan Neuhaus (ETH Zurich), Gabriela Gheorghe (University of Luxembourg)
2 POSTER: Preserving Privacy and Accountability for Personal Devices
Gabriela Gheorghe (University of Luxembourg), Stephan Neuhaus (ETH Zurich)
3 POSTER: Caching Oblivious Memory Access – An Extension to the HCRYPT Virtual Machine
Michael Brenner (Leibniz Universität Hannover), Matthew Smith (Leibniz Universität Hannover)
4 POSTER: Data Quality Evaluation: Integrating Security and Accuracy
Leon Reznik (Rochester Institute of Technology), Elisa Bertino (Purdue University)
5 DEMO: Adjustably Encrypted In-Memory Column-Store
Florian Kerschbaum (SAP AG), Patrick Grofig (SAP AG), Isabelle Hang (SAP AG), Martin Härterich (SAP AG), Mathias Kohler (SAP AG), Andreas Schaad (SAP AG), Axel Schröpfer (SAP AG), Walter Tighzert (SAP AG)
6 POSTER: Graphical Password using Object-based Image Ranking
Cuong X. Nguyen (Ritsumeikan University), Huang Hung-Hsuan (Ritsumeikan University), Kawagoe Kyoji (Ritsumeikan University)
7 POSTER: A Semantic-Aware Approach to Reasoning the Relation of Network Traffic
Hao Zhang (Virginia Tech), Danfeng Yao (Virginia Tech), Naren Ramakrishnan (Virginia Tech)
8 POSTER: Detecting Malware through Temporal Function-Based Features
Eitan Menahem (Ben-Gurion University), Asaf Shabtai (Ben-Gurion University), Adi Levhar (Ben-Gurion University)
9 POSTER: Event-based Isolation of Critical Data in the Cloud
Sebastian Biedermann (TU Darmstadt), Stefan Katzenbeisser (TU Darmstadt)
10 POSTER: BotFlex: A Community-driven Tool for Botnet Detection
Sheharbano Khattak, Zaafar Ahmed (SysNet, National Univ. of Computer & Emerging Sciences, Pakistan), Affan A. Syed (SysNet, National Univ. of Computer & Emerging Sciences, Pakistan), Syed Ali Khayam (PLUMgrid, Inc.)
11 POSTER: Signal Anomaly Based Attack Detection in Wireless Sensor Networks
Jeton Bacaj (Rochester Institute of Technology), Leon Reznik (Rochester Institute of Technology)
12 DEMO: Demonstrating a Trust Framework for Evaluating GNSS Signal Integrity
Xihui Chen (University of Luxembourg), Carlo Harpes (itrust consulting), Gabriele Lenzini (University of Luxembourg), Miguel Martins (itrust consulting), Sjouke Mauw (University of Luxembourg), Jun Pang (University of Luxembourg)
13 POSTER: Enhanced Embedded Device Security by Combining Hardware-Based Trust Mechanisms
Martin Schramm (University of Applied Sciences Deggendorf), Karl Leidl (University of Applied Sciences Deggendorf), Andreas Grzemba (University of Applied Sciences Deggendorf), Nicolai Kuntze (Fraunhofer SIT)
14 DEMO: Inherent PUFs and Secure PRNGs on Commercial Off-the-Shelf Microcontrollers
Anthony Van Herrewege (KU Leuven), André Schaller (TU Darmstadt), Ingrid Verbauwhede (KU Leuven), Stefan Katzenbeisser (TU Darmstadt)
15 POSTER: On the Anonymity of Israel’s General Elections
Tomer Ashur (University of Haifa), Orr Dunkelman (University of Haifa)
16 POSTER: Secure Authentication from Facial Attributes with no Privacy Loss
Orr Dunkelman (University of Haifa), Margarita Osadchy (University of Haifa), Mahmood Sharif (University of Haifa)
17 POSTER: Performance Signatures of Mobile Phone Browsers
Bilal Shebaro (Purdue University), Di Jin (Purdue University), Elisa Bertino (Purdue University)
18 POSTER: A New Framework against Privilege Escalation Attacks on Android
Wenming Zhou (Xidian University), Yuqing Zhang (University of the Chinese Academy of Sciences), Xuefeng Liu (Xidian University)
19 POSTER: TRIPLEX: Verifying Data Minimisation in Communication Systems
Meilof Veeningen (TU Eindhoven), Mayla Brusò (TU Eindhoven), Jerry Den Hartog (TU Eindhoven), Nicola Zannone (TU Eindhoven)
20 POSTER: SHAMROCK: Self Contained Cryptography and Key Management Processor
Dan Utin (MIT Lincoln Laboratory), Roger Khazan (MIT Lincoln Laboratory), Michael Vai (MIT Lincoln Laboratory), David Whelihan (MIT Lincoln Laboratory)
21 POSTER: Trend of Online Flash XSS Vulnerabilities
Qixu Liu (University of Chinese Academy of Sciences), Yuqing Zhang (University of Chinese Academy of Sciences), Huan Yang (Xidian University)
22 POSTER: Cross-Platform Malware: Write Once, Infect Everywhere
Martina Lindorfer (Vienna University of Technology), Matthias Neumayr (Vienna University of Technology), Juan Caballero (IMDEA Software Institute), Christian Platzer (Vienna University of Technology)
23 POSTER: Introducing Pathogen: A Real-Time Virtual Machine Introspection Framework
Anthony Roberts (University of the West of England), Richard McClatchey (University of the West of England), Saad Liaquat (University of the West of England), Nigel Edwards (HP Laboratories, Bristol), Mike Wray (HP Laboratories, Bristol)
24 POSTER: PnP: Improving Web Browsing Performance over Tor using Resource Prefetch-and-Push
Giang T. K. Nguyen (University of Illinois at Urbana-Champaign), Xun Gong (University of Illinois at Urbana-Champaign), Anupam Das (University of Illinois at Urbana-Champaign), Nikita Borisov (University of Illinois at Urbana-Champaign)
25 POSTER: Sniffing and Propagating Malwares through WPAD Deception in LANs
Dan Li (Beijing University of Posts and Telecommunications), Chaoge Liu (Chinese Academy of Sciences), Xu Cui (China Academy of Aerospace Aerodynamics), Xiang Cui (Chinese Academy of Sciences)
26 POSTER:  A Footprint of Third-Party Tracking on Mobile Web
Ashar Javed (Ruhr University Bochum)
27 POSTER: Dr. Watson provides data for post-breach analysis
Wasim Bhat (University of Kashmir), S. M. K. Quadri (University of Kashmir)
28 DEMO: An IDS framework for Internet of Things empowered by 6LoWPAN
Prabhakaran Kasinathan (Istituto Superiore Mario Boella), Gianfranco Costamagna (Istituto Superiore Mario Boella), Hussein Khaleel (Istituto Superiore Mario Boella), Claudio Pastrone, Maurizio A Spirito (Istituto Superiore Mario Boella)
29 DEMO: Secure and Customizable Web Development in the SAFE Activation Framework
Raphael M. Reischuk (Saarland University), Florian Schröder (Saarland University), Johannes Gehrke (Cornell University)
30 POSTER: Reflected Attacks Abusing Honeypots
Martin Husák (Masaryk University), Martin Vizváry (Masaryk University)
31 DEMO: Enabling Trusted Stores for Android
Yury Zhauniarovich (University of Trento), Olga Gadyatskaya (University of Trento), Bruno Crispo (University of Trento)
32 DEMO: Gradiant Asymmetric Encryption and Verification Systems and based on Handwritten Signature
Enrique Argones Rúa (Gradiant), Francisco Javier García Salomón (Gradiant), Luis Pérez Freire (Gradiant)
33 POSTER: TouchCtrl: Fine-grained Access Control for Collaborative Environments
Benjamin Güldenring (Freie Universität Berlin), Volker Roth (Freie Universität Berlin)
34 POSTER: CryptServer: Strong Data Protection in Commodity LAMP Servers
Zhaofeng Chen (Peking University), Xinshu Dong (National University of Singapore), Prateek Saxena (National University of Singapore), Zhenkai Liang (National University of Singapore)
35 DEMO: On the Real-time Masking of the Sound of Credit Cards using Hot Patching
Manish Shukla (Tata Consultancy Services), Purushotam Radadia (Tata Consultancy Services), Shirish Karande (Tata Consultancy Services), Sachin Lodha (Tata Consultancy Services)
36 POSTER: Identity-Based Steganography and Its Applications to Censorship Resistance
Tim Ruffing (Saarland University), Jonas Schneider (Saarland University), Aniket Kate (MMCI, Saarland University)
37 POSTER: Sechduler: A Security-Aware Kernel Scheduler
Parisa Haghani (University of Illinois), Saman Zonouz (University of Miami)
38 POSTER: Passwords on Flexible Display Devices
Sana Maqsood (Carleton University), Sonia Chiasson (Carleton University)
39 POSTER: Revisiting Anomaly Detection System Design Philosophy
Ayesha Ashfaq (National University of Sciences and Technology, Pakistan), Muhammad Qasim Ali (University of North Carolina at Charlotte), Ehab Al-Shaer (University of North Carolina at Charlotte)