Poster Session
The following posters will be presented at the USENIX Security '16 Poster Session and Happy Hour on Thursday, August 11, from 6:30 pm–8:00 pm in Zilker Ballroom 1.
Defeating Censorship with Perfectly Imitated Decoy Pages
Cecylia Bocovich and Ian Goldberg, University of Waterloo
Enforcing Privacy on Android Apps via On-Demand App Instrumentation
Aisha I. Ali-Gombe, Chitra Saini, and Golden G. Richard III, University of New Orleans
How to Phone Home with Someone Else’s Phone
Benyamin Farshteindiker, Nir Hasidim, Asaf Grosz, and Yossi Oren, Ben-Gurion University of the Negev
Arx: A Strongly Encrypted Database System
Rishabh Poddar, Tobias Boelter, and Raluca Ada Popa, University of California, Berkeley
Security in Web-Based Workflows
Thomas Bauereiß, German Research Center for Artificial Intelligence (DFKI); Abhishek Bichhawat, Saarland University; Iulia Boloşteanu, Max Planck Institute for Software Systems (MPI-SWS); Peter Faymonville and Bernd Finkbeiner, Saarland University; Deepak Garg, Max Planck Institute for Software Systems (MPI-SWS); Richard Gay, Technische Universität Darmstadt; Sergey Grebenshchikov, Technische Universität München; Christian Hammer, Saarland University; Dieter Hutter, German Research Center for Artificial Intelligence (DFKI); Ondřej Kunčar and Peter Lammich, Technische Universität München; Heiko Mantel, Technische Universität Darmstadt; Christian Müller, Technische Universität München; Andrei Popescu, Middlesex University; Markus Rabe, University of California, Berkeley; Vineet Rajani, Max Planck Institute for Software Systems (MPI-SWS); Helmut Seidl, Technische Universität München; Markus Tasch, Technische Universität Darmstadt; Leander Tentrup, Saarland University
How to Play Generalized Cut-and-Choose Games
Ruiyu Zhu and Yan Huang, Indiana University
SCREAM: Sensory Channel Remote Execution Attack Methods
Nicholas Brown, Nilesh Patel, Patrick Plenefisch, Ahmad Moghimi, Thomas Eisenbarth, Craig Shue, and Krishna Venkatasubramanian, Worcester Polytechnic Institute
WACA: Wearable-Assisted Continuous Authentication Framework with Motion Sensors
Abbas Acar, Hidayet Aksu, Kemal Akkaya, and A. Selcuk Uluagac, Florida International University
Software Security for Mobile Devices
Steven Arzt, Alexandre Bartel, Richard Gay, and Steffen Lortz, Technische Universität Darmstadt; Enrico Lovat, Technische Universität München; Heiko Mantel, Technische Universität Darmstadt; Martin Mohr, Karlsruhe Institute of Technology; Benedikt Nordhoff, University of Münster; Matthias Perner, Siegfried Rasthofer, and David Schneider, Technische Universität Darmstadt; Gregor Snelting, Karlsruhe Institute of Technology; Artem Starostin and Alexandra Weber, Technische Universität Darmstadt
FlashJaX: A Framework for Securing Mixed JavaScript/ActionScript Multi-Party Web Content
Phu H. Phung, University of Dayton; Maliheh Monshizadeh, University of Illinois at Chicago; Meera Sridhar, The University of North Carolina at Charlotte; Kevin W. Hamlen, University of Texas at Dallas; V.N. Venkatakrishnan, University of Illinois at Chicago
The Application of Identification Schemes for the Internal Vehicle Network
Leilani H. Gilpin, Massachusetts Institute of Technology
Expecting the Unexpected: Enhancing Privacy Notice for Android Apps
Le Yu, Xiapu Luo, Xule Liu, Wenjun Hu, and Manho Au, The Hong Kong Polytechnic University
FalseClick: Analyzing Social Engineering Campaigns and Content via Trick Ads
M. Zubair Rafique and Wouter Joosen, iMinds-DistriNet, Katholieke Universiteit Leuven
Security in E-Voting
Enrico Scapin, Tomasz Truderung, and Ralf Küsters, Univerität Trier; Daniel Bruns, Martin Mohr, Simon Greiner, Mihai Herda, and Bernhard Beckert, Karlsruhe Institute of Technology; Richard Gay, Huy Quoc Do, and Heiko Mantel, Technische Universität Darmstadt
A Client-Side Analysis of TLS Usage in Mobile Apps
Abbas Razaghpanah, Stony Brook University; Narseo Vallina-Rodriguez, International Computer Science Institute; Phillipa Gill, Stony Brook University
Insecure by Default? Authentication Services in Popular Web Frameworks
Hannah Li and David Evans, University of Virginia
EPA-RIMM: Extensible, Performance-Aware SMM Runtime Integrity Measurement
Brian Delgado and Karen L. Karavanic, Portland State University
Privacy-Preserving Context Sharing in Social Platforms
Yuan Tian and Eric Chen, Carnegie Mellon University; Joao Sa Sousa, École Polytechnique Fédérale de Lausanne (EPFL); Patrick Tague, Carnegie Mellon University; Helen J. Wang, Microsoft Research
GroupSense: Scalable Crowdsensing with Privacy and Accountability
Sazzadur Rahaman, Long Cheng, He Li, Danfeng (Daphne) Yao, and Jung-Min (Jerry) Park, Virginia Polytechnic Institute and State University
Measuring Profitability in Alternative Crypto-Currencies
Danny Yuxing Huang, Alex C. Snoeren, and Kirill Levchenko, University of California, San Diego
connect with us