Annual Computer Security Applications Conference 2015

Full Program »

Poster Reception with light refreshments

Thursday, 10 December 2015
18:15 - 21:00

Sierra A

Chair: Thomas Moyer, MIT Lincoln Laboratory

  1. Security in Internet-of-Things for Smart Grids – from research to business, Heidi Tuiskula (NCE Smart Energy Markets/Smart Innovation Østfold AS, Norway)
  2. Breaking Card: Reverse-Engineering the Smart-Card Application Protocol Data Unit, Andriana Gkaniatsou(1), Fiona McNeill(2), Alan Bundy(1), Graham Steel(3) (1. University of Edinburgh UK, 2. Heriot Watt University UK, 3. Cryptosense France)
  3. REBOOT: Shrinking the Attack Window for Servers Under Load, Sherwin Doroudi(1), Thanassis Avgerinos(2), and Mor Harchol-Balter(1), (1. Carnegie Mellon University, 2. ForAllSecure, Inc.)
  4. Secure Healthcare Architecture: People, Process and Technology Principle, Yatin Wadhawan and Dr. Clifford Neuman (University of Southern California)
  5. Malware Classification based on Time Series of Network Behavior Using Deep Learning, Toshiki Shibahara, Takeshi Yagi, Mitsuaki Akiyama, Daiki Chiba, and Takeshi Yada (NTT Secure Platform Laboratories)
  6. Input Password with Only Two Keys, Akane Ito, Keisuke Shibata, Manabu Okamoto (Kanagawa Institute of Technology, Japan)
  7. Discovering Evasive Network Attack by Detecting Abnormal HTTP Behavior, Wenhao Liu, Haiqing Pan, Zigang Cao, Gang Xiong and Zhen Li (Institute of Information Engineering, Chinese Academy of Sciences, Beijing)
  8. Practical Considerations of Human-machine Authentication, Jun Wan  (Tsinghua University)
  9. Use of N-Gram and Frequency-Inverse Document Frequency in Extracting Features for Malware Classification, Matthew Fortenberry and Marc Boumedine (University of the Virgin Islands, St. Thomas Campus, U.S. Virgin Islands)
  10. Thwarting certificate auto-generation in malicious SSL/TLS services through attribute mining, Zigang Cao, Gang Xiong, Zhen Li, Yong Zhao, and Junzheng Shi (Institute of Information Engineering, Chinese Academy of Sciences, Beijing)
  11. Caution! The Pre-patched Open Source Software are in Danger, Mutian Yang, Yongbo Chen, Jingzheng Wu, Zhifei Wu, Tianyue Luo, Yanjun Wu (Institute of Software, Chinese Academy of Sciences)
  12. The Effects of HeartBleed on Certificate Change: Meh, Siyu Chen, Timothy Kelley(Neuroocrypto),  Zheng Dong (Microsoft),  and L. Jean Camp (Indiana University)
  13. How to Automatically Identify the Homology of Different APTs?,  Yanchen Qiao(1)(2)(3), Xiaochun Yun(1)(3), Yongzheng Zhang(3) (1. Institute of Computing Technology, Chinese Academy of Sciences, Beijing, 2. University of Chinese Academy of Sciences, Beijing, 3. Institute of Information Engineering, Chinese Academy of Sciences, Beijing)
  14. Discover Malware Families With Undisclosed Source Code Based on Timestamp Distribution,  Yanchen Qiao(1)(2)(3), Xiaochun Yun(1)(3), Yongzheng Zhang(3) (1. Institute of Computing Technology, Chinese Academy of Sciences, Beijing, 2. University of Chinese Academy of Sciences, Beijing, 3. Institute of Information Engineering, Chinese Academy of Sciences, Beijing)
  15. ShareSafe the Complete Collection of Tools for Graph Data Privacy Analysis, Weiqing Li, Shouling Ji, Raheem Beyah (Georgia Institute of Technology)
  16. A Secure and Trusted Lifecycle for Avionics Wireless Networks, Raja Naeem Akram (ISG, SCC, Royal Holloway, University of London)
  17. ExploitProtector: Protect unpatched systems from remote exploitation, Jiayi Ye (Peking University)
  18. Phonion: Frustrating Telephony Metadata Analysis, Bradley Reaves (University of Florida)
  19. TECHx: Autonomous Cyber Defense, David Melski (GrammaTech, Inc.)
  20. Automatic Patching of Vulnerabilities for the DARPA Cyber Grand Challenge, Jim Alves-Foss (Center for Secure and Dependable Systems University of Idaho)
  21. The Next Step in Mobile Roots of Trust, Adam Wick (Galois, Inc.)
  22. Shellphish and the DARPA Cyber Grand Challenge, Yan Shoshitaishvili, Antonio Bianchi, Andrew Dutcher, Fish Wang, Jacopo Corbetta, Aravind Machiry, Chris Salls, John Grosen, Nick Stephens, Amat Cama, Kevin Borgolte, Giovanni Vigna (UC Santa Barbara)
  23. The Frigate Compiler for Secure Computation, Benjamin Mood (University of Florida), Debayan Gupta (Yale), Henry Carter (Georgia Institute of Technology), Kevin Butler (University of Florida), Patrick Traynor (University of Florida)

 

Powered by OpenConf®
Copyright©2002-2015 Zakon Group LLC