ACM CCS 2015

22nd ACM Conference on Computer and Communications Security

The Denver Marriot City Center, Denver, Colorado, USA

October 12-16, 2015

  • Aspens
  • Pikes Peak
  • Denver Skyline
  • Welcome to Colorado
  • Denver Museum of Nature and Science
  • Denver Zoo
  • Garden of the Gods
  • Rocky Mountain National Park

Accepted Posters/Demos

  • POSTER: A Logic Based Network Forensics Model for Evidence Analysis
    Anoop Singhal (NIST); Changwei Liu (George Mason University); Duminda Wijesekera (George Mason University)

  • DEMO: Action Recommendation for Cyber Resilience
    Luke Rodriguez (Pacific Northwest National Laboratory); Darren Curtis (Pacific Northwest National Laboratory); Sutanay Choudhury (Pacific Northwest National Laboratory); Kiri Oler (Pacific Northwest National Laboratory); Peter Nordquist (Pacific Northwest National Laboratory); Pin-Yu Chen (University of Michigan); Indrajit Ray (Colorado State University)

  • POSTER: Dynamic Labelling for Analyzing Security Protocols
    N.V.Narendra Kumar (Tata Institute of Fundamental Research); R.K.Shyamasundar (Tata Institute of Fundamental Research)

  • POSTER: Lightweight Streaming Authenticated Data Structures
    Chia-Mu Yu (Yuan Ze University)

  • POSTER: Noise-Free Symmetric Fully Homomorphic Encryption Based on Non-Commutative Rings
    Jing Li(Beijing Univ. of Posts & Telecom.);Licheng Wang (Beijing Univ. of Posts & Telecom.)

  • POSTER: A Hardware Fingerprint Using GPU Core Frequency Variations
    Fengjun Li (University of Kansas); Xin Fu (University of Houston); Bo Luo (University of Kansas)

  • POSTER: A Password-based Authentication by Splitting Roles of User Interface
    JungSeung Lee (Samsung Electronics); Han Park (Yonsei University); GyeongYong Bang (Yonsei University); JooSeok Song (Yonsei University)

  • POSTER: biTheft: Stealing Your Secrets by Bidirectional Covert Channel Communication with Zero-Permission Android Application
    jingzheng wu (Institute of Software, The Chinese Academy of Science); Yanjun Wu (Institute of Software, The Chinese Academy of Science); Mutian Yang (Institute of Software, The Chinese Academy of Science); Zhifei Wu (Institute of Software, The Chinese Academy of Science); Tianyue Lu (Institute of Software, The Chinese Academy of Science); Yongji Wang (Institute of Software, The Chinese Academy of Science)

  • POSTER: Blackboard­Based Electronic Warfare System
    Jeremy Straub (University of North Dakota)

  • POSTER: Cloud-based UEFI Terminal Security System
    Gongshen Liu (Shanghai Jiao Tong University); Kui Meng (Shanghai Jiao Tong University); Yichen Zhang (Shanghai Jiao Tong University); Erdong Fu (Shanghai Jiao Tong University); Junjie Fu (Shanghai Jiao Tong University); Pengfei Mi (Shanghai Jiao Tong University); Zhenquan Xu (Shanghai Jiao Tong University)

  • POSTER: Computations on Encrypted Data in the Internet of Things Applications
    Laurynas Riliskis (Stanford University), Hossein Shafagh (ETZ), and Philip Levis (Stanford University)

  • POSTER: Detecting Malicious Web Pages based on Structural Similarity of Redirection Chains
    Toshiki Shibahara; Takeshi Yagi; Mitsuaki Akiyama, Yuta Takata; Takeshi Yada (NTT Secure Platform Labratories)

  • POSTER: Implementing and Testing a Novel Chaotic Cryptosystem for use in Small Satellites
    Samuel Jackson (Oklahoma State University); Scott Kerlin (University of North Dakota); Jeremy Straub (University of North Dakota)

  • POSTER: In the Net of the Spider - Measuring the Anonymity-Impact of Network-level Adversaries Against Tor
    Michael Backes (CISPA, Saarland University, MPI-SWS); Simon Koch (CISPA, Saarland University); Sebastian Meiser (CISPA, Saarland University); Esfandiar Mohammadi (CISPA, Saarland University); Christian Rossow (CISPA, Saarland University)

  • POSTER: iPKI Identity-based Private Key Infrastructure for Securing BGP Protocol
    Peixin Chen (National University of Defense Technology) ; Xiaofeng Wang (National University of Defense Technology); Yilun Wu (National University of Defense Technology); Jinshu Su (State Key Laboratory of High Performance Computing); Huan Zhou (National University of Defense Technology)

  • POSTER: Mobile Device Identification by Leveraging Built-in Capacitive Signature
    Manh Huynh  (University of Colorado Denver); Phuc Nguyen  (University of Colorado Denver); Marco Gruteser (Rutgers University); Tam Vu (University of Colorado Denver)

  • POSTER: OFX: Enabling OpenFlow Extensions for Switch-Level Security Applications 
    John Sonchack (University of Pennsylvania); Adam J. Aviv (United States Naval Academy); Eric Keller (University of Colorado); Jonathan M. Smith (University of Pennsylvania)

  • POSTER: Page Table Manipulation Attack
    JungSeung Lee (Samsung Electronics); HyoungMin Ha (Yonsei University); InHwan Kim (Yonsei University); JooSeok Song (Yonsei University)

  • POSTER: PatchGen: Towards Automated Patch Detection and Generation for 1-Day Vulnerabilities
    Tianyue Luo (Institute of Software, The Chinese Academy of Science); Jingzheng Wu (Institute of Software, The Chinese Academy of Science)

  • POSTER: PRINCESS: A Secure Cloud File Storage System for Managing Data with Hierarchical Levels of Sensitivity
    Lihua Wang  (NICT); Takuya Hayashi  (NICT); Sachiko Kanamori (NICT); Atsushi Waseda  (NICT); Ryo Nojima  (NICT); and Shiho Moriai (NICT)

  • POSTER: Pseduonymizing Client as a Privacy­Preserving Service: A Case Study of CDN
    Zheng Wang (National Institute of Standards and Technology)

  • POSTER: PsychoRithm: A Framework for Studying How Human Traits Affect User Response to Security Situations
    Subhojeet Mukherjee  (Colorado State University); Sachini Weerawardhana(Colorado State University); Chancey Dunn  (Colorado State University); Indrajit Ray; Adele Howe (Colorado State University)

  • POSTER: Secure Chat for the Masses? User-centered Security to the Rescue
    Ruba Abu-Salma (University Colleg London); M. Angela Sasse (University College London); Joseph Bonneau (Stanford University/EFF)

  • POSTER: The Popular Apps in Your Pocket are Leaking your Privacy
    Xing Liu (Beijing Jiaotong University); Wei Wang (Beijing Jiaotong University); Jiqiang Liu (Beijing Jiaotong University)

  • Poster: Toward Energy-Wasting Misbehavior Detection Platform with Privacy Preservation in Building Energy Use
    Depeng Li (University of Hawaii at Manoa); Sachin Shetty (Tennessee State University) 

  • POSTER: Towards Compiler-Assisted Taint Tracking on the Android Runtime (ART)
    Michael Backes (CISPA, Saarland University & MPI-SWS); Oliver Schranz (CISPA, Saarland University); Philipp von Styp-Rekowsky (CISPA, Saarland University)

  • POSTER: Using Unit Testing to Detect Sanitization Flaws
    Mahmoud Mohammadi, Bill Chu, and Heather Richter Lipford (University of North Carolina at Charlotte Charlotte, NC, USA)

  • POSTER: WinOver Enterprise Dark Data
    Manish Shukla, Sumesh Manjunath, Rohit Saxena, Sutapa Mondal, and Sachin Lodha (TCS Innovation Labs - Pune)