Annual Computer Security Applications Conference (ACSAC) 2016

Full Program »

Poster Reception with light refreshments

Thursday, 8 December 2016
18:15 - 21:00

Sierra A

Chair: Thomas Moyer, MIT Lincoln Laboratory

  1. Time/Space Cache Isolation against Side Channel Attacks for Consolidated VMs. Woomin Hwang, National Security Research Institute, Sung-Jin Kim, National Security Research Institute, Hyoung-Chun Kim, National Security Research Institute, Eungki Park, National Security Research Institute
  2. A Sensitivity-Aware Browser Partitioning for Web-based Workplaces. Taeho Nam, National Security Research Institute, Hayoung Lee, National Security Research Institute, Wook Shin, National Security Research Institute, Hyoung-Chun Kim, National Security Research Institute
  3. Comprehensive and configurable privacy protection for a location-based service. Xiaojie zhu, University of Oslo, Abhishek Singh, University of Oslo, Roman Vitenberg, University of Oslo
  4. A New Secure Android Model Based on Privilege. Tao Zhang, Ocean University of China
  5. Classification of Private Tweets Using Tweet Content. Qiaozhi Wang, The University of Kansas, Jaisneet Bhandal, The University of Kansas, Shu Huang, Microsoft, Bo Luo, The University of Kansas
  6. Security Analysis of Software-defined Internet of Things. Mengmeng Ge, University of Canterbury, New Zealand, Dong Seong Kim, University of Canterbury, New Zealand
  7. Novel Test in SQL Injection. Donghong Zhang, State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Chenghong Wang, Syracuse University
  8. HoneyDedup: Provably Secure Deduplication with Practical Data Outsourcing in Untrusted Remote Storage. Dongyoung Koo, Korea University, Youngjoo Shin, National Security Research Institute, Junbeom Hur, Korea University
  9. CASCADES: Modeling and Simulation of Cyber Attacker Behaviors for Network Threat Analysis. Stephen Moskal, Rochester Institute Of Technology, Michael Kuhl, Rochester Institute Of Technology, Shanchieh Yang, Rochester Institute Of Technology
  10. SSFDetector: Detecting Stepping Stones Using Netflow. Yijing Ding, Peking University, Shuang Wei, Peking University, Yu Ding, Peking University, ShuaiFu Dai, Changan Communication Technology Co., Changling Zhou, Peking University, Xinhui Han, Peking University
  11. IOT: Securely Retrofitting Door Locks for Cheap Control through Mobile Devices. Read Sprabery, University of Illinois at Urbana-Champaign, Güliz Seray Tuncay, University of Illinois at Urbana-Champaign, Carl Gunter, University of Illinois at Urbana-Champaign, Roy Campbell, University of Illinois at Urbana-Champaign
  12. The Bourne Security: Your Wearable Device Can Leak Your Sensitive Data in Locked States. Wonseok Yang, Yonsei University, Youngjoo Lee, Yonsei University, Taekyoung Kwon, Yonsei University
  13. Communication with Partial Noisy Feedback. Gang Wang, University of Connecticut
  14. Deep Learning Based Real-Time DNS DDoS Detection System. Inhyuk Seo, Korea University, Ki-Taek Lee, Korea University, Jinhyun Yu, Korea University, Seungjoo Kim, Korea University
  15. Towards Non-interactive Secret Sharing Hopping. Hanshen Xiao, Department of Mathematics, Tsinghua University & CSAIL MIT, Yufeng Huang, Department of Electrical Engineering, Tsinghua University
  16. A Revised Fuzz Testing Method for Effective SQL injection Vulnerability Detection. Chenghong Wang, Syracuse University, Donghong Zhang, Institute of Software, Chinese Academy of Sciences, Jing Zhao, Harbin Engineering University, Zhenyu Zhang, Institute of Software, Chinese Academy of Sciences
  17. A Real-Time Detection System for Malicious Web From Network Traffic. Zhipeng Chen, Institute of Information Engineering, Chinese Academy of Sciences
  18. The NSF TTP Ecosystem. Alec Yasinsac, University of South Alabama, Becky Bace, University of South Alabama
  19. Pinpointing SQL Injection in Network Traffic. Gaopeng Gou, Institute of Information and Engineering, Chinese Academy of Sciences, Gang Xiong, Institute of Information and Engineering, Chinese Academy of Sciences, Zigang Cao, Institute of Information and Engineering, Chinese Academy of Sciences, Yangyang Guan, Institute of Information and Engineering, Chinese Academy of Sciences, Peipei Fu, Institute of Information and Engineering, Chinese Academy of Sciences
  20. SCANNER: Sequence Clustering of Android Resource Accesses. Neil Wong Hon Chan, Intel Corporation, Shanchieh Jay Yang, Department of Computer Engineering, Rochester Institute of Technology
  21. On The Cost-Effectiveness of Jamming LLC based Side Channels on Both ARM and X86. Naiwei Liu, UTSA, Wanyu Zang, TAMUSA, Meng Yu, UTSA
  22. CryptoDL: Towards Deep Learning over Encrypted Data. Ehsan Hesamifard, Department of Computer Science and Engineering, University of North Texas, Hassan Takabi, Department of Computer Science and Engineering, University of North Texas, Mehdi Ghasemi, Department of Mathematics and Statistics, University of Saskatchewan
  23. A Resilient Power System Oscillation Modes Estimation Algorithm. Arezoo Rajabi, Oregon State University, Rakesh Bobba, Oregon State University
  24. Defense in Depth for Virtual Appliances Built on Event Based Probing of Untrusted Guests. Read Sprabery, University of Illinois at Urbana-Champaign, Zak Estrada, University of Illinois at Urbana-Champaign, Zbigniew Kalbarczyk, University of Illinois at Urbana-Champaign, Ravishankar Iyer, University of Illinois at Urbana-Champaign, Rakesh Bobba, Oregon State University, Roy Campbell, University of Illinois at Urbana-Champaign
  25. ACSAC poster Smart Similarity Search Based on Simhash over Compressed Data in Cloud Computing. Bin Zhang, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, Rong Yang, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, Peng Zhang, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, Qingyun Liu, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, Wei Yang, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
  26. The Malware Identity: Toward Efficient Identification of Malware Mutants. JungBin Yu, Yonsei University, MinSik Shin, Yonsei University, Taejin Lee, Korea Internet and Security Agency (KISA), Hong-Koo Kang, Korea Internet and Security Agency (KISA), Taekyoung Kwon, Yonsei University

 

Powered by OpenConf®
Copyright©2002-2016 Zakon Group LLC