Check out the new USENIX Web site.
USENIX Security '11 Banner

POSTER SESSION

Accepted Posters

The following posters will be presented during a pizza party on Thursday, August 11, 2011, 6:00 p.m.–7:30 p.m., in California East/West.

Robust Watermarking Using Hidden Markov Models
Mausami Mungale and Mark Stamp, San Jose State University

AdSentry: Comprehensive and Flexible Confinement of JavaScript-based Advertisements
Xinshu Dong, National University of Singapore; Minh Tran, North Carolina State University; Zhenkai Liang, National University of Singapore; Xuxian Jiang, North Carolina State University

IMD Shield: Securing Implantable Medical Devices
Shyamnath Gollakota and Haitham Al Hassanieh, Massachusetts Institute of Technology; Benjamin Ransford, University of Massachusetts Amherst; Dina Katabi, Massachusetts Institute of Technology; Kevin Fu, University of Massachusetts Amherst

Hybrid Channels for Enhancing the Performance of Anonymous Networks
Jong Chun Park and Jedidiah R. Crandall, University of New Mexico

Using GPUs for OS Kernel Security
Weibin Sun and Robert Ricci, University of Utah

The Socialbot Network: When Bots Socialize for Fame and Money
Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, and Matei Ripeanu, University of British Columbia

Is Browsing Internet on Your Mobile Phone Secure? (An Evaluation of Display Security in Mobile and Traditional Web Browsers)
Chaitrali Amrutkar and Patrick Traynor, Georgia Institute of Technology

A Pollution-Resilient Hybrid P2P Botnet
Cui Xiang, Fang Binxing, Hao Zhiyu, Zhang Zhiqi, and Liu Chaoge, Institute of Computing Technology, Chinese Academy of Sciences

The Art of War Applied to Intrusion Detection in Wireless Ad-Hoc Networks
Stefan Stafrace and Bogdan Vrusias, University of Surrey

A Digital Forensics System Using a Virtual Machine Monitor Integrated with an ID Management Mechanism
Manabu Hirano and Hiromu Ogawa, Toyota National College of Technology, Japan; Takeshi Okuda, Nara Institute of Science and Technology (NAIST), Japan; Eiji Kawai, National Institute of Information and Communications Technology (NICT), Japan; Youki Kadobayashi and Suguru Yamaguchi, Nara Institute of Science and Technology (NAIST), Japan

Detecting Suspicious URLs in Twitter Stream
Sangho Lee and Jong Kim, POSTECH, Korea

Reining in the Web with Security Style Sheets
Ashar Javed, Hamburg University of Technology (TUHH), Germany

Worm Propagation across Heterogeneous Network
Zhai Lidong, Institute of Computing Technology, Chinese Academy of Sciences; Wei Guo, Beijing University of Posts and Telecommunications; Li Guo, Institute of Computing Technology, Chinese Academy of Sciences

Privacy Preserving Smart Metering: On the Feasibility on Low Cost, Ultra-Low Power Devices
Andres Molina-Markham, Kevin Fu, and Prashant Shenoy, University of Massachusetts Amherst

More Efficient Secure Computation on Smartphones
Sang Koo, Yan Huang, Peter Chapman, and David Evans, University of Virginia

Automated Model-based Security Management of Web Services
Rajat Mehrotra and Qian Chen, Mississippi State University; Abhishek Dubey, Institute for Software Integrated Systems, Vanderbilt University; Sherif Abdelwahed, Mississippi State University; Krisa Rowland, US Army Engineer Research and Development Center

NotiSense: An Urban Sensing Notification System to Improve Bystander Privacy
Rob Smits, Sarah Pidcock, Ian Goldberg, and Urs Hengartner, University of Waterloo

Secure Computation with Neural Networks
Brittany Harris and Jiamin Chen, University of Virginia

Information Content of a Privilege Elevation Prompt
Sara Motiee, University of British Columbia; Kirstie Hawkey, Dalhousie University; Konstantin Beznosov, University of British Columbia

SPATor: Improving Tor Bridges with Single Packet Authorization
Rob Smits, Divam Jain, Sarah Pidcock, Ian Goldberg, and Urs Hengartner, University of Waterloo

Automated Election Auditing from DRE Logs
Ana Maria Quevedo, Miami Dade College; Anne Edmundson, Cornell University; Keishla Ortiz, University of Puerto Rico at Arecibo; Samuel Rodriguez, University of Puerto Rico at Mayaguez; Patrick Baxter, Clemson University

Vulnerabilities in Google Chrome Extensions
Nicholas Carlini, Adrienne Felt, Prateek Saxena, and David Wagner, University of California, Berkeley

DETER Testbed: New Capabilities for Cyber Security Researchers
Terry Benzel, John Wroclawski, Bob Braden, Jennifer Chen, Young Cho, Ted Faber, Greg Finn, John Hickey, Jelena Mirkovic, Cliff Neuman, Mike Ryan, Arun Viswanathan, Alefiya Hussain, and Stephen Schwab, USC Information Sciences Institute (ISI); Brett Wilson, Cobham, Inc.; Anthony Joseph and Keith Sklower, University of California, Berkeley

New Approaches to Characterizing Scam-Hosting Connectivity
Le Nolan, Robert Beverly, and Joel Young, Naval Postgraduate School

Unifying Data Policies across the Server and Client
Jonathan Burket, Jenny Cha, Austin DeVinney, Casey Mihaloew, Yuchen Zhou, and David Evans, University of Virginia

An Analysis of Chinese Search Engine Filtering
Tao Zhu, Independent Researcher; Christopher Bronk and Dan S. Wallach, Rice University

Exploiting Public Inputs to Optimize Circuits Used in Secure Computation Protocols
Samee Zahur, University of Virginia

Improved XSS Protection for Web Browsers
Riccardo Pelizzi and R. Sekar, Stony Brook University

Challenges in Deployment and Ongoing Management of Identity Management Systems
Pooya Jaferian, University of British Columbia; Kirstie Hawkey, Dalhousie University; Konstantin Beznosov, University of British Columbia

An Arithmetic Operation Implementation Strategy for Privacy-Aware Role-Based Access Control
Yoonjeong Kim, Hyun-Hea Na, and Ji-Youn Lee, Seoul Women's University; Eunjee Song, Baylor University

Efficient Mobile Oblivious Computation (EMOC)
Henry Carter, Chaitrali Amrutkar, Italo Dacosta, and Patrick Traynor, Georgia Institute of Technology

?Need help? Use our Contacts page.

Last changed: 12 August 2011 jp