POSTER SESSION
Imperial Ballroom
Accepted Posters
The following posters will be presented during a happy hour on Wednesday, July 30, 2008, 6:00 p.m.7:30 p.m., in the Imperial Ballroom.
Improving Security Visualization with Exposure Map Filtering
David Barrera, Mansour Alsaleh, and P.C. van Oorschot,
Carleton University, Ottawa, Canada
Preventing Unicode Filtering Vulnerability Exploits
Sam Block and David Evans,
University of Virginia
Handling Identity Agent Compromise in User-Centric Identity Management
Systems
Daisuke Mashima and Mustaque Ahamad,
Georgia Institute of Technology
TLSConnector: A Proposal for Improving Performance of SSL-VPN Gateways
Nachi Ueno, Kei Karasawa, Shingo Orihara, and Kenji Takahashi,
NTT Information Sharing Platform Laboratories, Tokyo, Japan
Anonymity and Privacy for Micropayments
Yao Chen and Radu Sion,
Stony Brook University;
Bogdan Carbunar,
Motorola Labs
Using Synthesized Images for Better CAPTCHAs
Richard Hsu, Karsten Nohl, and David Evans,
University of Virginia
Ensemble: Unsupervised Collaborative Anomaly Detection for Popular
Applications
Feng Qian, Zhiyun Qian, and Z. Morley Mao,
University of Michigan
Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical
Device Security
Tamara Denning and Tadayoshi Kohno,
University of Washington;
Kevin Fu,
University of Massachusetts Amherst
PsycoTrace: Virtual and Transparent Monitoring of a Process Self
F. Baiardi, D. Maggiari, D. Sgandurra, and F. Tamberi,
Università di Pisa, Italy
Self Protecting Linux System
Ananth Chakravarthy,
India
PinUP: Pinning User Files to Known Applications
William Enck, Patrick McDaniel, and Trent Jaeger,
Pennsylvania State University
Security and Privacy for Implantable Medical Devices
Benjamin Ransford,
University of Massachusetts Amherst
Enforcing Authorization Policies Using Transactional Memory Introspection
Arnar Birgisson and Ulfar Erlingsson,
Reykjavik University;
Mohan Dhawan, Vinod Ganapathy, and Liviu Iftode,
Rutgers University
Retrofitting Programs for Information-Flow Security
Dave King and Trent Jaeger,
Pennsylvania State University
Automatic Inference and Enforcement of Kernel Data Structure Invariants
Arati Baliga, Vinod Ganapathy and Liviu Iftode,
Rutgers University
NetShield: Towards High Performance Network-based Vulnerability Signature
Matching
Zhichun Li, Ying He, and Yan Chen,
Northwestern University;
Gao Xia, Jian Chang, Yi Tang, and Bin Liu,
Tsinghua University, Beijing, China
RFIDs and Secret Handshakes: Defending Against Ghost-and-Leech Attacks and
Unauthorized Reads with Context-Aware Communications
Alexei Czeskis, Karl Koscher, and Tadayoshi Kohno,
University of Washington;
Joshua R. Smith,
Intel
A Novel Authentication Scheme for Binding Update in Mobile IPv6
Se-hwa Song and Hyoung-Kee Choi,
Sungkyunkwan University, Korea
CAV: A Composite Attribute Vector for Web Robot Detection
Dongkun Lee and Junsup Lee,
KAIST, Daejeon, Republic of Korea;
Sungdeok Cha,
Korea University, Seoul, Republic of Korea
|