POSTER SESSION
Accepted Posters
The following posters will be presented during a pizza party on Thursday, August 11, 2011, 6:00 p.m.7:30 p.m., in California East/West.
Robust Watermarking Using Hidden Markov Models
Mausami Mungale and Mark Stamp, San Jose State University
AdSentry: Comprehensive and Flexible Confinement of JavaScript-based Advertisements
Xinshu Dong, National University of Singapore; Minh Tran, North Carolina State University; Zhenkai Liang, National University of Singapore; Xuxian Jiang, North Carolina State University
IMD Shield: Securing Implantable Medical Devices
Shyamnath Gollakota and Haitham Al Hassanieh, Massachusetts Institute of Technology; Benjamin Ransford, University of Massachusetts Amherst; Dina Katabi, Massachusetts Institute of Technology; Kevin Fu, University of Massachusetts Amherst
Hybrid Channels for Enhancing the Performance of Anonymous Networks
Jong Chun Park and Jedidiah R. Crandall, University of New Mexico
Using GPUs for OS Kernel Security
Weibin Sun and Robert Ricci, University of Utah
The Socialbot Network: When Bots Socialize for Fame and Money
Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, and Matei Ripeanu, University of British Columbia
Is Browsing Internet on Your Mobile Phone Secure? (An Evaluation of Display Security in Mobile and Traditional Web Browsers)
Chaitrali Amrutkar and Patrick Traynor, Georgia Institute of Technology
A Pollution-Resilient Hybrid P2P Botnet
Cui Xiang, Fang Binxing, Hao Zhiyu, Zhang Zhiqi, and Liu Chaoge, Institute of Computing Technology, Chinese Academy of Sciences
The Art of War Applied to Intrusion Detection in Wireless Ad-Hoc Networks
Stefan Stafrace and Bogdan Vrusias, University of Surrey
A Digital Forensics System Using a Virtual Machine Monitor Integrated with an ID Management Mechanism
Manabu Hirano and Hiromu Ogawa, Toyota National College of Technology, Japan; Takeshi Okuda, Nara Institute of Science and Technology (NAIST), Japan; Eiji Kawai, National Institute of Information and Communications Technology (NICT), Japan; Youki Kadobayashi and Suguru Yamaguchi, Nara Institute of Science and Technology (NAIST), Japan
Detecting Suspicious URLs in Twitter Stream
Sangho Lee and Jong Kim, POSTECH, Korea
Reining in the Web with Security Style Sheets
Ashar Javed, Hamburg University of Technology (TUHH), Germany
Worm Propagation across Heterogeneous Network
Zhai Lidong, Institute of Computing Technology, Chinese Academy of Sciences; Wei Guo, Beijing University of Posts and Telecommunications; Li Guo, Institute of Computing Technology, Chinese Academy of Sciences
Privacy Preserving Smart Metering: On the Feasibility on Low Cost, Ultra-Low Power Devices
Andres Molina-Markham, Kevin Fu, and Prashant Shenoy, University of Massachusetts Amherst
More Efficient Secure Computation on Smartphones
Sang Koo, Yan Huang, Peter Chapman, and David Evans, University of Virginia
Automated Model-based Security Management of Web Services
Rajat Mehrotra and Qian Chen, Mississippi State University; Abhishek Dubey, Institute for Software Integrated Systems, Vanderbilt University; Sherif Abdelwahed, Mississippi State University; Krisa Rowland, US Army Engineer Research and Development Center
NotiSense: An Urban Sensing Notification System to Improve Bystander Privacy
Rob Smits, Sarah Pidcock, Ian Goldberg, and Urs Hengartner, University of Waterloo
Secure Computation with Neural Networks
Brittany Harris and Jiamin Chen, University of Virginia
Information Content of a Privilege Elevation Prompt
Sara Motiee, University of British Columbia; Kirstie Hawkey, Dalhousie University; Konstantin Beznosov, University of British Columbia
SPATor: Improving Tor Bridges with Single Packet Authorization
Rob Smits, Divam Jain, Sarah Pidcock, Ian Goldberg, and Urs Hengartner, University of Waterloo
Automated Election Auditing from DRE Logs
Ana Maria Quevedo, Miami Dade College; Anne Edmundson, Cornell University; Keishla Ortiz, University of Puerto Rico at Arecibo; Samuel Rodriguez, University of Puerto Rico at Mayaguez; Patrick Baxter, Clemson University
Vulnerabilities in Google Chrome Extensions
Nicholas Carlini, Adrienne Felt, Prateek Saxena, and David Wagner, University of California, Berkeley
DETER Testbed: New Capabilities for Cyber Security Researchers
Terry Benzel, John Wroclawski, Bob Braden, Jennifer Chen, Young Cho, Ted Faber, Greg Finn, John Hickey, Jelena Mirkovic, Cliff Neuman, Mike Ryan, Arun Viswanathan, Alefiya Hussain, and Stephen Schwab, USC Information Sciences Institute (ISI); Brett Wilson, Cobham, Inc.; Anthony Joseph and Keith Sklower, University of California, Berkeley
New Approaches to Characterizing Scam-Hosting Connectivity
Le Nolan, Robert Beverly, and Joel Young, Naval Postgraduate School
Unifying Data Policies across the Server and Client
Jonathan Burket, Jenny Cha, Austin DeVinney, Casey Mihaloew, Yuchen Zhou, and David Evans, University of Virginia
An Analysis of Chinese Search Engine Filtering
Tao Zhu, Independent Researcher; Christopher Bronk and Dan S. Wallach, Rice University
Exploiting Public Inputs to Optimize Circuits Used in Secure Computation Protocols
Samee Zahur, University of Virginia
Improved XSS Protection for Web Browsers
Riccardo Pelizzi and R. Sekar, Stony Brook University
Challenges in Deployment and Ongoing Management of Identity Management Systems
Pooya Jaferian, University of British Columbia; Kirstie Hawkey, Dalhousie University; Konstantin Beznosov, University of British Columbia
An Arithmetic Operation Implementation Strategy for Privacy-Aware Role-Based Access Control
Yoonjeong Kim, Hyun-Hea Na, and Ji-Youn Lee, Seoul Women's University; Eunjee Song, Baylor University
Efficient Mobile Oblivious Computation (EMOC)
Henry Carter, Chaitrali Amrutkar, Italo Dacosta, and Patrick Traynor, Georgia Institute of Technology
|