Annual Computer Security Applications Conference (ACSAC) 2014

Full Program »

Poster Reception with light refreshments

Thursday, 11 December 2014
18:15 - 21:00

Lafitte AB

Chair: Raheem Beyah

  1. CipherSurveil: A Cipher Data based Security Surveillance System, Xiang Lu(1), Shichao Lv(1), Lei Pan(1), Mingwei Wang(1)(2), Qingchao Liu(2), and Limin Sun(2) (1. Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 2. Jiangsu R&D Center for Internet of Things, Wuxi)

  2. Developing Abuse Cases Using CAPEC Attack Patterns, Emmanuel Borkor Nuakoh and Xiaohong Yuan (North Carolina A&T State University)

  3. Assessing Vulnerabilities and Risk in Networked Medical Devices, James Cerkovnik, J. Todd McDonald, J. Harold Pardue, Mark Yampolskiy, and Mike Jacobs (University of South Alabama)

  4. The Case for Provenance as a First Class Citizen in the Linux Kernel, Adam Bates(1), Kevin R. B. Butler(1), and Thomas Moyer(2) (1. University of Oregon, 2. MIT Lincoln Laboratory)

  5. “Sequence-aware" IDSs: Modeling Message Sequences within Industrial Control Systems, Marco Caselli, Emmanuele Zambon, Jonathan Petit, and Frank Kargl (Department of Services, Cybersecurity and Safety - University of Twente Enschede, the Netherlands)

  6. Exploring Usability and Security Metrics for Passwords on Mobile Platforms, Kristen K. Greene and Joshua Franklin (National Institute of Standards and Technology)

  7. A Self-Report Survey of Android Unlock Passwords, Jeanne Lunning Prak(1) and Adam J. Aviv(2) (1. Broadneck High School, Annapolis, MD, 2. U.S. Naval Academy)

  8. A Hypervisor which Hides Devices to Protect Cyber Espionage, Kuniyasu Suzaki(1), Toshiki Yagi(1), Yuto Otsuki(2), Michitaka Yoshimoto(1), and Kazukuni Kobara(1) (1. National Institute of Advanced Industrial Science and Technology, 2. Ritsumeikan University)

  9. On the Potential for Mining Unstructured Public Data to Aid Network Intelligence, Robert Beverly and Lance Alt (Naval Postgraduate School)

  10. Attack and Defense the OAuth based SSO systems, Jianjun Ye, Yu Ding, Tongxin Li, Huilin Zhang, and Xinhui Han (Peking University)

  11. Runtime Integrity Measurement and Enforcement with Automated Whitelist Generation, Anna Kornfeld Simpson (University of Washington)

  12. Modelling-Resistant Physical Unclonable Functions, Jason Hamlet, Todd Bauer, and Lyndon Pierson (Sandia National Laboratories)

  13. Password Differences based on Language and Testing of Memory Recall, Jacob Abbott, Violeta Moreno, and L. Jean Camp (Indiana University Bloomington)

  14. Detecting Cellular Interconnect Bypass Fraud, Bradley Reaves(1), Ethan Shernan(1), and Patrick Traynor(2) (1. Georgia Institute of Technology, 2. University of Florida)

  15. Towards a Cloud Based Vulnerability Parsing Service to mitigate SQL Injection Attacks, Rohan Malcolm(1), Sean Thorpe(1), Julian Jarrett(1), Tyrone Grandison(2), and Leon Stenneth(3), (1. University of Technology, St. Andrew, Jamaica, 2. Proficiency Labs International, 3. Nokia Connected Driving)

  16. Structural Mining for Malware Detection, Masoud Narouei(1), Mansour Ahmadi(2), Hassan Takabi(1), Giorgio Giacinto(2) (1.University of North Texas, 2. University of Cagliari, Italy)

 

Powered by OpenConf®
Copyright©2002-2014 Zakon Group LLC