Annual Computer Security Applications Conference (ACSAC) 2018

Full Program »

Poster Reception with Light Refreshments

Thursday, 6 December 2018
18:30 - 20:30

Royal Ballroom Foyer

Chair: Adam Aviv, United States Naval Academy

Recommendation Systems Meet PIR, Adithya Vadapalli (Indiana University), Fattaneh Bayatbabolghani (University of California, Berkeley), Ryan Henry (University of Calgary)  POSTER

CyNER: Cybersecurity Named Entity Recognition System for Efficient Intelligence Analysis, Shota Fujii (Hitachi, Ltd. Research & Development Group), Tetsuro Kito (Hitachi, Ltd. Research & Development Group), Tomohiro Shigemoto (Hitachi, Ltd. Research & Development Group), Yasuhiro Fujii (Hitachi, Ltd. Research & Development Group)  POSTER

A Decentralized Secure Framework for Mitigating RPL Attacks in Smart Environment, Jaspreet Kaur (IIT Jodhpur)  POSTER

Statistical Learning of APT TTP Chains from MITRE ATT&CK, Rawan Al-Shaer (University of North Carolina at Charlotte), Mohiuddin Ahmed (University of North Carolina at Charlotte), Ehab Al-Shaer (University of North Carolina at Charlotte)

An Ontology for Reliability and Security Assessment of Energy Delivery Systems, Ken Keefe (University of Illinois at Urbana-Champaign), Alfonso Valdes (University of Illinois at Urbana-Champaign)  POSTER

Multi-Agent System for CyPhy Network Security, William Stout (Sandia National Laboratories)  POSTER

AIMED: Genetic Programming to Evade Static Malware Detection, Raphael Labaca Castro (Universität der Bundeswehr München), Corinna Schmitt (Universität der Bundeswehr München), Gabi Dreo Rodosek (Universität der Bundeswehr München)  POSTER

Memorability and Security of Image and Text Integrated Authentication System, Simon Woo (SUNY, Korea), Joon Kuy Han (SUNY, Korea)

Development of a Risk Analysis Framework for Cryptocurrency Wallets, Junhyoung Oh (Korea University), Hyochang Baek (Korea University), Changyeon Kim (Korea University), Kyungho Lee (Korea University)  POSTER

Efficient and Effective Ransomware Detection in Databases, Christoph Hagen (University of Würzburg), Alexandra Dmitrienko (University of Würzburg), Lukas Iffländer (University of Würzburg), Michael Jobst (University of Würzburg), Samuel Kounev (University of Würzburg)  POSTER

Boosting Virtualization Obfuscation with Return Oriented Programming, Pietro Borrello (Sapienza University of Rome), Emilio Coppa (Sapienza University of Rome), Daniele Cono D'Elia (Sapienza University of Rome), Camil Demetrescu (Sapienza University of Rome)  POSTER

Open and Secure Vehicle Data Collection Standard, Abdulrahman Alaraj (University of Colorado Boulder), Jinpeng Miao (University of Colorado Boulder), Dwight Browne (University of Colorado Boulder), Peter Borrell (University of Colorado Boulder), Dhwani Khatter (University of Colorado Boulder, Glenn Atkinson (Geotab Inc.), Daniel Massey (University of Colorado Boulder)

Deep Obfuscation: Precise Masking of Sensitive Information to Protect Against Machine Learning Adversaries, Yuan Gong (University of Notre Dame), Christian Poellabauer (University of Notre Dame)  POSTER

Engaging Students in Cybersecurity Education: Challenges in Designing and Tuning a Host-Based Intrusion Detection System, Miguel Mark (Boston University), Marc Boumedine (University of the Virgin Islands)

 



Powered by OpenConf®
Copyright©2002-2018 Zakon Group LLC