ACM CCS 2015
	
	  
	
	  
22nd ACM Conference on Computer and Communications Security
	
	
	  
The Denver Marriot City Center, Denver, Colorado, USA
	
	    
	
	  
October 12-16, 2015
	
	  
	
     
    
    
    	
	
    
     
        
		  Accepted Posters/Demos
	  
	    - 
	    POSTER: A Logic Based Network Forensics Model for
	    Evidence Analysis
	    
	        Anoop Singhal (NIST); Changwei Liu (George Mason
        University); Duminda Wijesekera (George Mason University)
	    
- 
	    DEMO: Action Recommendation for Cyber Resilience
	    Luke Rodriguez (Pacific Northwest National Laboratory);
        Darren Curtis (Pacific Northwest National Laboratory);
        Sutanay Choudhury (Pacific Northwest National Laboratory);
        Kiri Oler (Pacific Northwest National Laboratory); Peter
        Nordquist (Pacific Northwest National Laboratory);  Pin-Yu
        Chen (University of Michigan); Indrajit Ray (Colorado State University)
	    
- 
	    POSTER: Dynamic Labelling for Analyzing Security Protocols
	    N.V.Narendra Kumar (Tata Institute of Fundamental
        Research); R.K.Shyamasundar (Tata Institute of Fundamental Research)
	    
- 
	    POSTER: Lightweight Streaming Authenticated Data Structures
	    Chia-Mu Yu (Yuan Ze University)
	    
- 
	    POSTER: Noise-Free Symmetric Fully Homomorphic Encryption Based on Non-Commutative Rings 
	    Jing Li(Beijing Univ. of Posts & Telecom.);Licheng Wang (Beijing Univ. of Posts & Telecom.)
	    
- 
	    POSTER: A Hardware Fingerprint Using GPU Core Frequency Variations 
	    Fengjun Li (University of Kansas);  Xin Fu (University of Houston); Bo Luo (University of Kansas)
	    
- 
	    POSTER: A Password-based Authentication by Splitting
	    Roles of User Interface 
	    JungSeung Lee (Samsung Electronics);
	    Han Park (Yonsei University); 
	    GyeongYong Bang (Yonsei University); 
	    JooSeok Song (Yonsei University)
	    
- 
	    
	    POSTER: biTheft: Stealing Your Secrets by Bidirectional Covert Channel Communication with Zero-Permission Android Application
	    
	    jingzheng wu (Institute of Software, The Chinese Academy of Science); Yanjun Wu (Institute of Software, The Chinese Academy of Science);  Mutian Yang (Institute of Software, The Chinese Academy of Science);  Zhifei Wu (Institute of Software, The Chinese Academy of Science); Tianyue Lu (Institute of Software, The Chinese Academy of Science); Yongji Wang (Institute of Software, The Chinese Academy of Science)
	    
- 
	    
	    POSTER: BlackboardBased Electronic Warfare System
	    
	    Jeremy Straub (University of North Dakota)
	    
- 
	    
	    POSTER: Cloud-based UEFI Terminal Security System
	    
Gongshen Liu (Shanghai Jiao Tong University); 
Kui Meng (Shanghai Jiao Tong University); 
Yichen Zhang (Shanghai Jiao Tong University); 
Erdong Fu (Shanghai Jiao Tong University);
Junjie Fu (Shanghai Jiao Tong University); 
Pengfei Mi (Shanghai Jiao Tong University);
Zhenquan Xu (Shanghai Jiao Tong University)
	    
- 
	    
	    POSTER: Computations on Encrypted Data in the Internet of Things Applications
	    
	    Laurynas Riliskis (Stanford University), Hossein Shafagh (ETZ), and Philip Levis (Stanford University)
	    
- 
	    
	    POSTER: Detecting Malicious Web Pages based on Structural Similarity of Redirection Chains
	    
	    Toshiki Shibahara; Takeshi Yagi; Mitsuaki Akiyama, Yuta Takata; Takeshi Yada (NTT Secure Platform Labratories)
	    
- 
	    
	    POSTER: Implementing and Testing a Novel Chaotic Cryptosystem for use in Small Satellites
	    
	    Samuel Jackson (Oklahoma State University); 
Scott Kerlin (University of North Dakota);
Jeremy Straub (University of North Dakota) 
	    
- 
	    
	    POSTER: In the Net of the Spider - Measuring the Anonymity-Impact of Network-level Adversaries Against Tor
	    
	    Michael Backes (CISPA, Saarland University, MPI-SWS); Simon Koch (CISPA, Saarland University); Sebastian Meiser (CISPA, Saarland University);  Esfandiar Mohammadi (CISPA, Saarland University); Christian Rossow (CISPA, Saarland University)
	    
- 
	    
	    POSTER: iPKI Identity-based Private Key Infrastructure for Securing BGP Protocol
	    
	    Peixin Chen (National University of Defense Technology) ;
Xiaofeng Wang (National University of Defense Technology); 
Yilun Wu (National University of Defense Technology);
Jinshu Su (State Key Laboratory of High Performance Computing);
Huan Zhou (National University of Defense Technology)
	    
- 
	    
	    POSTER: Mobile Device Identification by Leveraging Built-in Capacitive Signature
	    
	    Manh Huynh  (University of Colorado Denver); Phuc Nguyen  (University of Colorado Denver); Marco Gruteser (Rutgers University); Tam Vu (University of Colorado Denver)
	    
- 
	    
	    POSTER: OFX: Enabling OpenFlow Extensions for Switch-Level Security Applications 
	    
	    John Sonchack (University of Pennsylvania);  Adam J. Aviv (United States Naval Academy); Eric Keller (University of Colorado); Jonathan M. Smith (University of Pennsylvania)
	    
- 
	    
	    POSTER: Page Table Manipulation Attack
	    
	    JungSeung Lee (Samsung Electronics); HyoungMin Ha (Yonsei University);  InHwan Kim (Yonsei University); JooSeok Song (Yonsei University)
	    
- 
	    
	    POSTER: PatchGen: Towards Automated Patch Detection and Generation for 1-Day Vulnerabilities
	    
	    Tianyue Luo (Institute of Software, The Chinese Academy of Science);  Jingzheng Wu (Institute of Software, The Chinese Academy of Science)
	    
- 
	    
	    POSTER: PRINCESS: A Secure Cloud File Storage System for Managing Data with Hierarchical Levels of Sensitivity
	    
	    Lihua Wang  (NICT); Takuya Hayashi  (NICT); Sachiko Kanamori (NICT); Atsushi Waseda  (NICT); Ryo Nojima  (NICT); and Shiho Moriai (NICT)
	    
- 
	    
	    POSTER: Pseduonymizing Client as a PrivacyPreserving
Service: A Case Study of CDN
	    
	    Zheng Wang (National Institute of Standards and Technology)
	    
- 
	    
	    POSTER: PsychoRithm: A Framework for Studying How Human Traits Affect User Response to Security Situations
	    
	    Subhojeet Mukherjee  (Colorado State University);  Sachini Weerawardhana(Colorado State University); Chancey Dunn  (Colorado State University);  Indrajit Ray; Adele Howe (Colorado State University)
	    
- 
	    
	    POSTER: Secure Chat for the Masses? User-centered Security to the Rescue
	    
	    Ruba Abu-Salma (University Colleg London); M. Angela Sasse (University College London); Joseph Bonneau (Stanford University/EFF)
	    
- 
	    
	    POSTER: The Popular Apps in Your Pocket are Leaking your Privacy
	    
	    Xing Liu (Beijing Jiaotong University);  Wei Wang (Beijing Jiaotong University);  Jiqiang Liu (Beijing Jiaotong University)
	    
- 
	    
	    Poster: Toward Energy-Wasting Misbehavior Detection Platform with Privacy Preservation in Building Energy Use
	    
	    Depeng Li (University of Hawaii at Manoa); Sachin Shetty (Tennessee State University) 
	    
- 
	    
	    POSTER: Towards Compiler-Assisted Taint Tracking on the Android Runtime (ART)
	    
	    Michael Backes (CISPA, Saarland University & MPI-SWS); Oliver Schranz (CISPA, Saarland University);  Philipp von Styp-Rekowsky (CISPA, Saarland University)
	    
- 
	    
	    POSTER: Using Unit Testing to Detect Sanitization Flaws
	    
	    Mahmoud Mohammadi, Bill Chu, and Heather Richter Lipford (University of North Carolina at Charlotte Charlotte, NC, USA)
	    
- 
	    
	    POSTER: WinOver Enterprise Dark Data
	    
	    Manish Shukla, Sumesh Manjunath, Rohit Saxena, Sutapa Mondal, and Sachin Lodha (TCS Innovation Labs - Pune)