Accepted Posters
The following posters will be presented at the USENIX Security ’18 Poster Session and Happy Hour on Thursday, August 16, from 6:00 pm–7:30 pm in Grand Ballroom VI.
Electromagnetic Induction Attacks Against Actuators: Controlling Servo Engines Remotely
Gokcen Yilmaz Dayanikli, Virginia Tech; Jayaprakash Selvaraj and Neelam Prabhu Gaunkar, Iowa State University; Ryan M. Gerdes, Virginia Tech; Mani Mina, Iowa State University
Number-Theoretic Transforms in Lattice-Based Cryptography
Mark Daniel, Roberta Faux, Jeff Lataille, Paul Li, and John Wade, Envieta Systems, LLC
Hacking Compliance: A Study of Vulnerabilities within U.S. Federal Compliance Standards
Rock Stevens, University of Maryland; Josiah Dykstra, Independent security professional; Wendy Knox Everette, Leviathan Security Group; James Chapman, Garrett Bladow, and Alexander Farmer, Independent security professional; Michelle Mazurek, University of Maryland
TimeSeal: A Secure Time Architecture in Untrusted Operating Systems and Network
Fatima Anwar, UCLA
NetHide: Secure and Practical Network Topology Obfuscation
Roland Meier and Petar Tsankov, ETH Zurich; Vincent Lenders, armasuisse; Laurent Vanbever and Martin Vechev, ETH Zurich
PPSB: An Open and Flexible Platform for Privacy-Preserving Safe Browsing
Helei CUI, City University of Hong Kong; Yajin ZHOU, Zhejiang University; Cong WANG, Xinyu WANG, and Yuefeng DU, City University of Hong Kong; Qian WANG, Wuhan University
LADIDS: Lightning-authenticated Air-gapped Distributed Intrusion Detection System for the Power Grid
Tohid Shekari, Christian Bayens, Morris Cohen, Lukas Graber, and Raheem Beyah, School of ECE, Georgia Tech
Web Application for Privacy-Preserving Scheduling
Ágnes Kiss, Oliver Schick, and Thomas Schneider, TU Darmstadt
Measuring Security Advice Quality: First Steps
Elissa M. Redmiles and Emily Hwang, University of Maryland; Dhruv Kuchhal, Maharaja Agrasen Institute of Technology; Everest Liu and Lisa Maszkiewicz, JHU APL / University of Maryland; Miraida Morales, Rutgers University; Denis Peskov, Rock Stevens, and Michelle L. Mazurek, University of Maryland
Analyzing TLS Use on IoT Devices
Corentin Thomasset and David Barrera, Polytechnique Montréal
SPARCLE: Special Purpose, Algebraic Ring homomorphiC (Leveled) Encryption System
Russell A. Fink and David R. Zaret, Johns Hopkins Univ / Applied Physics Laboratory
Mitigating DNS Information Leakage in Tor with Distributed Hash Tables
Paul Balog and Henry Carter, Villanova University
Charm: Facilitating Dynamic Analysis of Device Drivers of Mobile Systems
Seyed Mohammadjavad Seyed Talebi and Hamid Tavakoli, University of California, Irvine; Hang Zhang and Zheng Zhang, University of California, Riverside; Ardalan Amiri Sani, University of California, Irvine; Zhiyun Qian, University of California, Riverside
Sensorless, Permissionless Information Exfiltration with Wi-Fi Micro-Jamming
Omer Shwartz, Rom Ogen, Kfir Zvi, and Yossi Oren, Ben Gurion University of the Negev
Security Analysis of Connected Vehicle Communication Protocol
Shengtuo Hu, University of Michigan; Qi Alfred Chen, University of California, Irvine; Yiheng Feng, Z. Morley Mao, and Henry X. Liu, University of Michigan
Challenges in Realizing Privacy-aware Cloud-based DDoS Mitigation Mechanism
Su-Chin Lin, Wei-Ning Chen, and Hsu-Chun Hsiao, National Taiwan University
Exploring how social media content feeds are manipulated
Janith Weerasinghe, Drexel University; Cynthia Gill, Springfield High School/Drexel University; Jaime Richards, Sterling High School/Drexel University; Damon McCoy, New York University; Rachel Greenstadt, Drexel University
GDPR-Compliant Data Processing: Improving Pseudonymization with Multi-Party Computation
Nathaniel Grevatt and David Evans, University of Virginia
IoT Boot Integrity Measuring and Reporting
Tom Brostrom, CPVI; John Zhu, Ryan Robucci, and Mohamed Younis, UMBC
Memory Safety Checking with Virtual Prototyping
Kai Cong, Zhenkun Yang, and Jiewen Yao, Intel Corporation
ACES: Automatic Compartments for Embedded Systems
Abraham A. Clements, Purdue University and Sandia National Labs; Naif Saleh Almakhdhub and Saurabh Bagchi, Purdue University; Mathias Payer, Purdue University
Deceiving Privacy Policy Classifiers with Adversarial Examples
Matthew Wallace, Parvesh Samayamanthula, and David Evans, University of Virginia
Analyzing HTTPS Adoption Hurdles for the Longtail
Ariana Mirian, UC San Diego; Chris Thompson, Google; Geoffrey M. Voelker and Stefan Savage, UC San Diego; Adrienne Porter Felt, Google
Towards Building a Support System for User Security Awareness
Faqia Iqbal, Saad Jamal, Shaarif Sajid, Shoaib Asif Qazi, and Mobin Javed, LUMS
Excavating TrustZone from Device Firmware
Joseph I. Choi and Kevin R. B. Butler, University of Florida
Adversarial Machine Learning on LIDAR-based Object Detection in Autonomous Driving: A First Study
Yulong Cao, University of Michigan; Qi Alfred Chen, University of California, Irvine; Z. Morley Mao, University of Michigan
Delegated Byzantine Fault Tolerance Using Trusted Execution Environment
Yongrae Jo and Chanik Park, Pohang University of Science and Technology
MinerGate: Mitigating Cryptocurrency Mining Attacks Based on Unique Traffic Features and Traffic Blocking
Guorui Yu, Peking University; Guangliang Yang, Texas A&M University; Tongxin Li and Xinhui Han, Peking University
How is GDPR Affecting Privacy Policies?
Guy Verrier, Haonan Chen, David Evans, and Yuan Tian, University of Virginia
Securing Access and Communication in Cloud-Enabled IoT
Smriti Bhatt, Farhan Patwa, and Ravi Sandhu, University of Texas at San Antonio
Confidence Assessment for Hybrid Software Defined Network Data Path
Scott Melton, Joshua Alcorn, and C. Edward Chow, University of Colorado Cold Springs