ACCEPTED POSTERS & DEMOS

ACM CCS 2020 - November 9-13, 2020

LPET: Mining MS-Windows Software Privilege Escalation Vulnerabilities by Monitoring Interactive Behavior

Can Huang (Peking University); Xinhui Han (Peking University); Guorui Yu (Peking University)

Towards Using Source Code Repositories to Identify Software Supply Chain Attacks

Duc Ly Vu (University of Trento, Italy); Ivan Pashchenko (University of Trento, Italy); Fabio Massacci (University of Trento, Italy); Henrik Plate (SAP Security Research, France); Antonino Sabetta (SAP Security Research, France)

Cybersecurity Research and Training for Power Distribution Grids: A Blueprint

Martin Henze (Fraunhofer FKIE); Lennart Bader (Fraunhofer FKIE); Julian Filter (RWTH Aachen University); Olav Lamberts (Fraunhofer FKIE / RWTH Aachen University); Simon Ofner (Fraunhofer FKIE); Dennis van der Velde (Fraunhofer FIT)

Continuous and Multiregional Monitoring of Malicious Hosts

Shota Fujii (Hitachi, Ltd.); Takayuki Sato (Hitachi, Ltd.); Sho Aoki (Hitachi, Ltd.); Yu Tsuda (National Institute of Information and Communications Technology); Yusuke Okano (FFRI Security, Inc.); Tomohiro Shigemoto (Hitachi, Ltd.); Nobutaka Kawaguchi (Hitachi, Ltd.); Masato Terada (Hitachi, Ltd.)

Facilitating Protocol-independent Industrial Intrusion Detection Systems

Konrad Wolsing (Fraunhofer FKIE / RWTH Aachen University); Eric Wagner (Fraunhofer FKIE); Martin Henze (Fraunhofer FKIE)

Bento: Bringing Network Function Virtualization to Tor

Michael Reininger (University of Maryland); Arushi Arora (Purdue University); Stephen Herwig (University of Maryland); Nicholas Francino (University of Maryland); Christina Garman (Purdue University); Dave Levin (University of Maryland)

RIPT: An Efficient Multi-Core Record-Replay System

Jiashuo Liang (Peking University); Guancheng Li (Peking University); Chao Zhang (Institute for Network Science and Cyberspace of Tsinghua University); Ming Yuan (Tsinghua University); Xingman Chen (Institute for Network Science and Cyberspace, Tsinghua University); Xinhui Han (Peking University)

Demonstration: Benchmarking Label Dynamics of VirusTotal Engines

Shuofei Zhu (Pennsylvania State University); Ziyi Zhang (University of Science and Technology of China); Limin Yang (University of Illinois at Urbana-Champaign); Linhai Song (Pennsylvania State University); Gang Wang (University of Illinois at Urbana-Champaign)

Impact of Energy Consumption Attacks on LoRaWAN-Enabled Devices in Industrial Context

Muhammad Nouman Nafees (Cardiff University, UK); Neetesh Saxena (Cardiff University, UK); Pete Burnap (Cardiff University, UK); Bong Jun Choi (Soongsil University, Seoul, South Korea)

Multi-phased Multi-faceted IoT Honeypot Ecosystem

Armin Ziaie Tabari (University of South Florida); Xinming Ou (University of South Florida)

VRLifeTime: An IDE Tool to Avoid Concurrency and MemoryBugs in Rust

Ziyi Zhang (USTC, Pennsylvania State University); Boqin Qin (BUPT, Pennsylvania State University); Yilun Chen (HoneycombData Inc); Linhai Song (Pennsylvania State University); Yiying Zhang (University of California, San Diego)

Voice-Indistinguishability: Protecting Voiceprint with Differential Privacy under an Untrusted Server

Yaowei Han (Department of Social Informatics, Kyoto University); Yang Cao (Department of Social Informatics, Kyoto University); Sheng Li (National Institute of Information and Communications Technology); Qiang Ma (Department of Social Informatics, Kyoto University); Masatoshi Yoshikawa (Department of Social Informatics, Kyoto University)

rProfiler-- Assessing Insider Influence on the Enterprise Assets

Manish Shukla (TCS Research Lab); Sachin Lodha (TCS Research Lab)

PhishBench 2.0: A Versatile and Extendable Benchmarking Framework for Phishing

Victor Zeng (University of Houston); Xin Zhou (University of Houston); Shahryar Baki (University of Houston); Rakesh Verma (University of Houston)