ACM CCS 2015
22nd ACM Conference on Computer and Communications Security
The Denver Marriot City Center, Denver, Colorado, USA
October 12-16, 2015
Accepted Posters/Demos
-
POSTER: A Logic Based Network Forensics Model for
Evidence Analysis
Anoop Singhal (NIST); Changwei Liu (George Mason
University); Duminda Wijesekera (George Mason University)
-
DEMO: Action Recommendation for Cyber Resilience
Luke Rodriguez (Pacific Northwest National Laboratory);
Darren Curtis (Pacific Northwest National Laboratory);
Sutanay Choudhury (Pacific Northwest National Laboratory);
Kiri Oler (Pacific Northwest National Laboratory); Peter
Nordquist (Pacific Northwest National Laboratory); Pin-Yu
Chen (University of Michigan); Indrajit Ray (Colorado State University)
-
POSTER: Dynamic Labelling for Analyzing Security Protocols
N.V.Narendra Kumar (Tata Institute of Fundamental
Research); R.K.Shyamasundar (Tata Institute of Fundamental Research)
-
POSTER: Lightweight Streaming Authenticated Data Structures
Chia-Mu Yu (Yuan Ze University)
-
POSTER: Noise-Free Symmetric Fully Homomorphic Encryption Based on Non-Commutative Rings
Jing Li(Beijing Univ. of Posts & Telecom.);Licheng Wang (Beijing Univ. of Posts & Telecom.)
-
POSTER: A Hardware Fingerprint Using GPU Core Frequency Variations
Fengjun Li (University of Kansas); Xin Fu (University of Houston); Bo Luo (University of Kansas)
-
POSTER: A Password-based Authentication by Splitting
Roles of User Interface
JungSeung Lee (Samsung Electronics);
Han Park (Yonsei University);
GyeongYong Bang (Yonsei University);
JooSeok Song (Yonsei University)
-
POSTER: biTheft: Stealing Your Secrets by Bidirectional Covert Channel Communication with Zero-Permission Android Application
jingzheng wu (Institute of Software, The Chinese Academy of Science); Yanjun Wu (Institute of Software, The Chinese Academy of Science); Mutian Yang (Institute of Software, The Chinese Academy of Science); Zhifei Wu (Institute of Software, The Chinese Academy of Science); Tianyue Lu (Institute of Software, The Chinese Academy of Science); Yongji Wang (Institute of Software, The Chinese Academy of Science)
-
POSTER: BlackboardBased Electronic Warfare System
Jeremy Straub (University of North Dakota)
-
POSTER: Cloud-based UEFI Terminal Security System
Gongshen Liu (Shanghai Jiao Tong University);
Kui Meng (Shanghai Jiao Tong University);
Yichen Zhang (Shanghai Jiao Tong University);
Erdong Fu (Shanghai Jiao Tong University);
Junjie Fu (Shanghai Jiao Tong University);
Pengfei Mi (Shanghai Jiao Tong University);
Zhenquan Xu (Shanghai Jiao Tong University)
-
POSTER: Computations on Encrypted Data in the Internet of Things Applications
Laurynas Riliskis (Stanford University), Hossein Shafagh (ETZ), and Philip Levis (Stanford University)
-
POSTER: Detecting Malicious Web Pages based on Structural Similarity of Redirection Chains
Toshiki Shibahara; Takeshi Yagi; Mitsuaki Akiyama, Yuta Takata; Takeshi Yada (NTT Secure Platform Labratories)
-
POSTER: Implementing and Testing a Novel Chaotic Cryptosystem for use in Small Satellites
Samuel Jackson (Oklahoma State University);
Scott Kerlin (University of North Dakota);
Jeremy Straub (University of North Dakota)
-
POSTER: In the Net of the Spider - Measuring the Anonymity-Impact of Network-level Adversaries Against Tor
Michael Backes (CISPA, Saarland University, MPI-SWS); Simon Koch (CISPA, Saarland University); Sebastian Meiser (CISPA, Saarland University); Esfandiar Mohammadi (CISPA, Saarland University); Christian Rossow (CISPA, Saarland University)
-
POSTER: iPKI Identity-based Private Key Infrastructure for Securing BGP Protocol
Peixin Chen (National University of Defense Technology) ;
Xiaofeng Wang (National University of Defense Technology);
Yilun Wu (National University of Defense Technology);
Jinshu Su (State Key Laboratory of High Performance Computing);
Huan Zhou (National University of Defense Technology)
-
POSTER: Mobile Device Identification by Leveraging Built-in Capacitive Signature
Manh Huynh (University of Colorado Denver); Phuc Nguyen (University of Colorado Denver); Marco Gruteser (Rutgers University); Tam Vu (University of Colorado Denver)
-
POSTER: OFX: Enabling OpenFlow Extensions for Switch-Level Security Applications
John Sonchack (University of Pennsylvania); Adam J. Aviv (United States Naval Academy); Eric Keller (University of Colorado); Jonathan M. Smith (University of Pennsylvania)
-
POSTER: Page Table Manipulation Attack
JungSeung Lee (Samsung Electronics); HyoungMin Ha (Yonsei University); InHwan Kim (Yonsei University); JooSeok Song (Yonsei University)
-
POSTER: PatchGen: Towards Automated Patch Detection and Generation for 1-Day Vulnerabilities
Tianyue Luo (Institute of Software, The Chinese Academy of Science); Jingzheng Wu (Institute of Software, The Chinese Academy of Science)
-
POSTER: PRINCESS: A Secure Cloud File Storage System for Managing Data with Hierarchical Levels of Sensitivity
Lihua Wang (NICT); Takuya Hayashi (NICT); Sachiko Kanamori (NICT); Atsushi Waseda (NICT); Ryo Nojima (NICT); and Shiho Moriai (NICT)
-
POSTER: Pseduonymizing Client as a PrivacyPreserving
Service: A Case Study of CDN
Zheng Wang (National Institute of Standards and Technology)
-
POSTER: PsychoRithm: A Framework for Studying How Human Traits Affect User Response to Security Situations
Subhojeet Mukherjee (Colorado State University); Sachini Weerawardhana(Colorado State University); Chancey Dunn (Colorado State University); Indrajit Ray; Adele Howe (Colorado State University)
-
POSTER: Secure Chat for the Masses? User-centered Security to the Rescue
Ruba Abu-Salma (University Colleg London); M. Angela Sasse (University College London); Joseph Bonneau (Stanford University/EFF)
-
POSTER: The Popular Apps in Your Pocket are Leaking your Privacy
Xing Liu (Beijing Jiaotong University); Wei Wang (Beijing Jiaotong University); Jiqiang Liu (Beijing Jiaotong University)
-
Poster: Toward Energy-Wasting Misbehavior Detection Platform with Privacy Preservation in Building Energy Use
Depeng Li (University of Hawaii at Manoa); Sachin Shetty (Tennessee State University)
-
POSTER: Towards Compiler-Assisted Taint Tracking on the Android Runtime (ART)
Michael Backes (CISPA, Saarland University & MPI-SWS); Oliver Schranz (CISPA, Saarland University); Philipp von Styp-Rekowsky (CISPA, Saarland University)
-
POSTER: Using Unit Testing to Detect Sanitization Flaws
Mahmoud Mohammadi, Bill Chu, and Heather Richter Lipford (University of North Carolina at Charlotte Charlotte, NC, USA)
-
POSTER: WinOver Enterprise Dark Data
Manish Shukla, Sumesh Manjunath, Rohit Saxena, Sutapa Mondal, and Sachin Lodha (TCS Innovation Labs - Pune)