Full Program »
Poster Reception with light refreshments
Thursday, 8 December 2016
18:15 - 21:00
Sierra A
Chair: Thomas Moyer, MIT Lincoln Laboratory
- Time/Space Cache Isolation against Side Channel Attacks for Consolidated VMs. Woomin Hwang, National Security Research Institute, Sung-Jin Kim, National Security Research Institute, Hyoung-Chun Kim, National Security Research Institute, Eungki Park, National Security Research Institute
- A Sensitivity-Aware Browser Partitioning for Web-based Workplaces. Taeho Nam, National Security Research Institute, Hayoung Lee, National Security Research Institute, Wook Shin, National Security Research Institute, Hyoung-Chun Kim, National Security Research Institute
- Comprehensive and configurable privacy protection for a location-based service. Xiaojie zhu, University of Oslo, Abhishek Singh, University of Oslo, Roman Vitenberg, University of Oslo
- A New Secure Android Model Based on Privilege. Tao Zhang, Ocean University of China
- Classification of Private Tweets Using Tweet Content. Qiaozhi Wang, The University of Kansas, Jaisneet Bhandal, The University of Kansas, Shu Huang, Microsoft, Bo Luo, The University of Kansas
- Security Analysis of Software-defined Internet of Things. Mengmeng Ge, University of Canterbury, New Zealand, Dong Seong Kim, University of Canterbury, New Zealand
- Novel Test in SQL Injection. Donghong Zhang, State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Chenghong Wang, Syracuse University
- HoneyDedup: Provably Secure Deduplication with Practical Data Outsourcing in Untrusted Remote Storage. Dongyoung Koo, Korea University, Youngjoo Shin, National Security Research Institute, Junbeom Hur, Korea University
- CASCADES: Modeling and Simulation of Cyber Attacker Behaviors for Network Threat Analysis. Stephen Moskal, Rochester Institute Of Technology, Michael Kuhl, Rochester Institute Of Technology, Shanchieh Yang, Rochester Institute Of Technology
- SSFDetector: Detecting Stepping Stones Using Netflow. Yijing Ding, Peking University, Shuang Wei, Peking University, Yu Ding, Peking University, ShuaiFu Dai, Changan Communication Technology Co., Changling Zhou, Peking University, Xinhui Han, Peking University
- IOT: Securely Retrofitting Door Locks for Cheap Control through Mobile Devices. Read Sprabery, University of Illinois at Urbana-Champaign, Güliz Seray Tuncay, University of Illinois at Urbana-Champaign, Carl Gunter, University of Illinois at Urbana-Champaign, Roy Campbell, University of Illinois at Urbana-Champaign
- The Bourne Security: Your Wearable Device Can Leak Your Sensitive Data in Locked States. Wonseok Yang, Yonsei University, Youngjoo Lee, Yonsei University, Taekyoung Kwon, Yonsei University
- Communication with Partial Noisy Feedback. Gang Wang, University of Connecticut
- Deep Learning Based Real-Time DNS DDoS Detection System. Inhyuk Seo, Korea University, Ki-Taek Lee, Korea University, Jinhyun Yu, Korea University, Seungjoo Kim, Korea University
- Towards Non-interactive Secret Sharing Hopping. Hanshen Xiao, Department of Mathematics, Tsinghua University & CSAIL MIT, Yufeng Huang, Department of Electrical Engineering, Tsinghua University
- A Revised Fuzz Testing Method for Effective SQL injection Vulnerability Detection. Chenghong Wang, Syracuse University, Donghong Zhang, Institute of Software, Chinese Academy of Sciences, Jing Zhao, Harbin Engineering University, Zhenyu Zhang, Institute of Software, Chinese Academy of Sciences
- A Real-Time Detection System for Malicious Web From Network Traffic. Zhipeng Chen, Institute of Information Engineering, Chinese Academy of Sciences
- The NSF TTP Ecosystem. Alec Yasinsac, University of South Alabama, Becky Bace, University of South Alabama
- Pinpointing SQL Injection in Network Traffic. Gaopeng Gou, Institute of Information and Engineering, Chinese Academy of Sciences, Gang Xiong, Institute of Information and Engineering, Chinese Academy of Sciences, Zigang Cao, Institute of Information and Engineering, Chinese Academy of Sciences, Yangyang Guan, Institute of Information and Engineering, Chinese Academy of Sciences, Peipei Fu, Institute of Information and Engineering, Chinese Academy of Sciences
- SCANNER: Sequence Clustering of Android Resource Accesses. Neil Wong Hon Chan, Intel Corporation, Shanchieh Jay Yang, Department of Computer Engineering, Rochester Institute of Technology
- On The Cost-Effectiveness of Jamming LLC based Side Channels on Both ARM and X86. Naiwei Liu, UTSA, Wanyu Zang, TAMUSA, Meng Yu, UTSA
- CryptoDL: Towards Deep Learning over Encrypted Data. Ehsan Hesamifard, Department of Computer Science and Engineering, University of North Texas, Hassan Takabi, Department of Computer Science and Engineering, University of North Texas, Mehdi Ghasemi, Department of Mathematics and Statistics, University of Saskatchewan
- A Resilient Power System Oscillation Modes Estimation Algorithm. Arezoo Rajabi, Oregon State University, Rakesh Bobba, Oregon State University
- Defense in Depth for Virtual Appliances Built on Event Based Probing of Untrusted Guests. Read Sprabery, University of Illinois at Urbana-Champaign, Zak Estrada, University of Illinois at Urbana-Champaign, Zbigniew Kalbarczyk, University of Illinois at Urbana-Champaign, Ravishankar Iyer, University of Illinois at Urbana-Champaign, Rakesh Bobba, Oregon State University, Roy Campbell, University of Illinois at Urbana-Champaign
- ACSAC poster Smart Similarity Search Based on Simhash over Compressed Data in Cloud Computing. Bin Zhang, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, Rong Yang, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, Peng Zhang, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, Qingyun Liu, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, Wei Yang, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
- The Malware Identity: Toward Efficient Identification of Malware Mutants. JungBin Yu, Yonsei University, MinSik Shin, Yonsei University, Taejin Lee, Korea Internet and Security Agency (KISA), Hong-Koo Kang, Korea Internet and Security Agency (KISA), Taekyoung Kwon, Yonsei University