Session Chair: Hassan TakabiEvaluating the Flexibility of the Java SandboxZack Coker, Carnegie Mellon University; Michael Maass, Carnegie Mellon University; Tianyuan Ding, Carnegie Mellon University; Claire Le Goues, Carnegie Mellon University; Joshua Sunshine, Carnegie Mellon UniversityEmerging Image Game CAPTCHAs for Resisting Automated and Human-Solver Relay AttacksSong Gao, University of Alabama at Birmingham; Manar Mohamed, University of Alabama at Birmingham; Nitesh Saxena, University of Alabama at Birmingham; Chengcui Zhang, University of Alabama at BirminghamOn the Security and Usability of Crypto PhonesMaliheh Shirvanian, University of Alabama at Birmingham; Nitesh Saxena, University of Alabama at Birmingham
Session Chair: Adam AvivVulnerability Assessment of OAuth Implementations in Android ApplicationsHui Wang, Shanghai Jiao Tong University; Yuanyuan Zhang, Shanghai Jiao Tong University; Juanru Li, Shanghai Jiao Tong University; Hui Liu, Shanghai Jiao Tong University; Wenbo Yang, Shanghai Jiao Tong University; Bodong Li, Shanghai Jiao Tong University; Dawu Gu, Shanghai Jiao Tong UniversityBareDroid: Large-Scale Analysis of Android Apps on Real DevicesSimone Mutti, Università degli Studi di Bergamo; Yanick Fratantonio, UC Santa Barbara; Antonio Bianchi, UC Santa Barbara; Luca Invernizzi, UC Santa Barbara; Jacopo Corbetta, UC Santa Barbara; Dhilung Kirat, IBM Research T.J. Watson; Christopher Kruegel, UC Santa Barbara; Giovanni Vigna, UC Santa BarbaraExperimental Study with Real-world Data for Android App Security Analysis using Machine LearningSankardas Roy, Bowling Green State University; Jordan DeLoach, Kansas State University; Yuping Li, University of South Florida; Doina Caragea, Kansas State University; Xinming Ou, University of South Florida; Nicolae Herndon, Kansas State University; Venkatesh Ranganath, Kansas State University; HongMin Li, Kansas State University; Nicolais Guevara, Kansas State University
Benjamin Price and Michael Zhivich, Cyber Security and Information Sciences Division, MIT Lincoln Laboratory
Cyber Grand Challenge Infrastructure Team Members
10:00am-10:30am
(Sierra Foyer)
10:30am-12:00pm
Club Room
Sierra B
Sierra C
Sierra D
Invited Speaker: Ron Ross, NIST
Session Chair: Chris WacekAuDroid: Preventing Attacks on Audio Channels in Mobile DevicesGiuseppe Petracca, Penn State University; Yuqiong Sun, Penn State University; Ahmad Atamli, University of Oxford; Trent Jaeger, Penn State UniversityOn the Robustness of Mobile Device FingerprintingThomas Hupperich, Horst Görtz Institute for IT-Security, Ruhr-University Bochum; Davide Maiorca, Department of Electrical and Electronic Engineering, University of Cagliari; Marc Kührer, Horst Görtz Institute for IT-Security, Ruhr-University Bochum; Giorgio Giacinto, Department of Electrical and Electronic Engineering, University of Cagliari; Thorsten Holz, Horst Görtz Institute for IT-Security, Ruhr-University BochumGrab 'n Run: Secure and Practical Dynamic Code Loading for Android ApplicationsLuca Falsina, Politecnico di Milano; Yanick Fratantonio, UC Santa Barbara; Stefano Zanero, Politecnico di Milano; Christopher Kruegel, UC Santa Barbara; Giovanni Vigna, UC Santa Barbara; Federico Maggi, Politecnico di Milano
Session Chair: Dongyan XuProvenance based Integrity Protection for WindowsWai Kit Sze, Stony Brook University; R. Sekar, Stony Brook UniversityMOSE: Live Migration Based On-the-Fly Software EmulationJinpeng Wei, Florida International University; Lok Yan, AFRL/RI, Rome, NY; Muhammad Hakim, Florida International UniversityPrivacy-preserving Virtual MachineTianlin Li, State University of New York at Binghamton; Yaohui Hu, State University of New York at Binghamton; Ping Yang, State University of New York at Binghamton; Kartik Gopalan, State University of New York at Binghamton
Session Chair: Mike Yoder
Panelists:
Eddie Garcia, Cloudera
Andy Purtell, Salesforce and Apache HBase, Apache Software Foundation
Bhavani Thuraisingham, UT Dallas
12:00pm-1:30pm
(Sierra A)
1:30pm-3:00pm
Club Room
Sierra B
Sierra C
Sierra D
Session Chair: Saman ZonouzSoteria: Offline Software Protection within Low-cost Embedded DevicesJohannes Götzfried, FAU Erlangen-Nuremberg; Tilo Müller, FAU Erlangen-Nuremberg; Ruan de Clercq, KU Leuven; Pieter Maene, KU Leuven; Felix Freiling, FAU Erlangen-Nuremberg; Ingrid Verbauwhede, KU LeuvenPIE: Parser Identification in Embedded SystemsLucian Cojocar, Vrije Universiteit Amsterdam; Jonas Zaddach, EURECOM; Roel Verdult, Radboud Universiteit Nijmegen; Herbert Bos, Vrije Universiteit Amsterdam; Davide Balzarotti, EURECOM; Aurélien Francillon, EURECOMDefending Against Malicious USB Firmware with GoodUSBDave (Jing) Tian, University of Florida; Adam Bates, University of Florida; Kevin Butler, University of Florida
Session Chair: Stephen McCamantBinary Code Continent: Finer-Grained Control Flow Integrity for Stripped BinariesMinghua Wang, Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences, Department of EECS, Syracuse University; Heng Yin, Department of EECS, Syracuse University; Abhishek vasisht bhaskar, Department of EECS, Syracuse University; Purui Su, Trusted Computing and Information Assurance Laboratory, State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences; Dengguo Feng, Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of SciencesShrinkWrap: VTable protection without loose endsIstvan Haller, Vrije Universiteit Amsterdam; Enes Göktaş, Vrije Universiteit Amsterdam; Elias Athanasopoulos, FORTH-ICS; Georgios Portokalidis, Stevens Institute of Technology; Herbert Bos, Vrije Universiteit AmsterdamDynaGuard: Armoring Canary-based Protections against Brute-force AttacksTheofilos Petsios, Columbia University; Vasileios P. Kemerlis, Brown University; Michalis Polychronakis, Stony Brook University; Angelos D. Keromytis, Columbia University
Session Chair: Art Friedman
Republic Of Korea's Efforts for Enhanced Software Assurance, Lee Sang Geol, KISA (Korea Internet & Security Agency)
Secure Identity Management for Future Networks, Hassane Aissaoui-Mehrez, IMT-TELECOM-ParisTech
Lessons Learned from Applying Continuous Diagnostics and Mitigation Tools in an Information Technology R&D Laboratory, Joe Veoni, MITRE's Center for Advanced Aviation System Development
5:15pm-6:00pm
(Sierra C)Session Chair: Thomas Moyer
6:15pm-9:00pm
(Sierra A)Session Chair: Thomas Moyer
Friday, 11 December 2015
7:30am-8:30am
(Sierra A)
8:30am-10:00am
Club Room
Sierra B
Sierra C
Invited Speaker: Daniel Faigin, Aerospace Corporation
Session Chair: Adam BatesAnalyzing and Modeling Longitudinal Security Data: Promise and PitfallsBenjamin Edwards, University of New Mexico; Steven Hofmeyr, Lawrence Berkeley National Laboratory; Stephanie Forrest, University of New Mexico / Santa Fe Institute; Michel van Eeten, Delft University of TechnologyAccurate, Low Cost and Instrumentation-Free Security Audit Logging for WindowsShiqing Ma, Purdue University; Kyuhyung Lee, University of Georgia; Chunghwan Kim, Purdue University; Junghwan Rhee, NEC Laboratories America; Xiangyu Zhang, Purdue University; Dongyan Xu, Purdue UniversitySeSQLite: Security Enhanced SQLiteSimone Mutti, Università degli Studi di Bergamo; Enrico Bacis, Università degli Studi di Bergamo; Stefano Paraboschi, Università degli Studi di Bergamo
Session Chair: Ariel FeldmanGetting to know your card: Reverse-Engineering the Smart-Card Application Protocol Data UnitAndriana Gkaniatsou, University of Edinburgh; Fiona McNeill, Heriot-Watt University; Alan Bundy, University of Edinburgh; Graham Steel , CryptosenseLogical Partitions on Many-Core PlatformsRamya Jayaram Masti, Institute of Information Security, ETH Zurich; Claudio Marforio, Institute of Information Security, ETH Zurich; Kari Kostiainen, Institute of Information Security, ETH Zurich; Claudio Soriente, Institute of Information Security, ETH Zurich; Srdjan Capkun, Institute of Information Security, ETH ZurichHardware-assisted memory tracing on new SoCs embedding FPGA fabricsLetitia W. Li, Institut Mines-Télécom / Télécom ParisTech / CNRS LTCI; Guillaume Duc, Institut Mines-Télécom / Télécom ParisTech / CNRS LTCI; Renaud Pacalet, Institut Mines-Télécom / Télécom ParisTech / CNRS LTCI