Posters > 2016
Assured Identity and Privacy
- Artifacts of WIN_JELLY Malware using GPU Forensics [C71-EC2]
- Building Bridges: Online Communities For Crisis Organizations [AA9-011]
- Checking, Increasing, and Confirming a Smart Home's IoT Security [FCE-711]
- Data Classification Using Anatomized Training Data [9E5-23C]
- Digital Security Breaches: Arming Crisis Organizations with New Insights [CAF-6A1]
- Enabling Privacy in IOU Settlement Networks [104-EB9]
- ErsatzPasswords - Ending Password Cracking [2E3-3E9]
- Leveraging Docker-based Containers to Teach Cybersecurity [F05-966]
- Local Differential Privacy Preserving in Social Networks [AEF-207]
- Risk Analysis of Layered Solutions [248-74D]
- Secure Collaborations with Additive Splits [754-C0A]
- Striking a Balance: Privacy and the Law for US Crisis Centers [ACE-A78]
- Systematic Attack Analysis and Adaptive Security in V2V Networks [EB7-A84]
- Using Frame Semantics In Authorship Attribution [A8C-8B4]
- Verifying End-Users’ Security & Privacy: Mobile Application Developer Software Trends [5CE-690]
- Windows 10 data leakage: A digital forensics project [AE9-4B2]
End System Security
- Anatomy of IoT Malware: A Practical Case Study [2AF-B80]
- Authentication of User’s Device and Browser for Data Access in Untrusted Cloud [998-DCA]
- Cryptographic Hardware Acceleration for Vehicular Internet of Things (IoT) [0D7-6D4]
- Deceptive Memory Systems – Countering Anti-Forensics with Deception [0C6-886]
- HexSafe: Efficient Memory Safety for C [F0B-45B]
- HexTaint: Ensuring Data Flow Integrity using Dynamic Taint Analysis [3BC-F38]
- Secure Data Dissemination in Vehicle-to-Vehicle Systems [14B-A99]
Human Centric Security
- Display of Major Risk Categories for Android Apps [CB1-B18]
- Do Users Attend to Highlighted Domains in Identifying Phishing Webpages? [04C-14B]
- Employing Model-Eliciting Activities in Cybersecurity Education [A86-A7A]
- Exploring Potential Correlation between Neuroticism and Anti-Phishing Behavior [2E0-301]
- Password Coping Mechanisms [D9B-8A6]
- Semantic Detection of Phishing Email [C20-474]
- Symbol-Based Visual Cryptographic Authentication Mechanisms: Attacks and New Constructions [213-ABF]
- The Big Idea! Developing the Cybersecurity Mindset Using Representational Fluency and Model-Eliciting Activities [CF5-996]
- Toward Semantic-based Identification of Fake Online Reviews [269-8E4]
Network Security
- A Survey of Malware Exploit Kits: Economic Influences of Exploit-as-a-Service [5BD-2D4]
- Analysis of Community Detection Algorithms for Large Scale Cyber Networks [92F-95E]
- Burning Bitcoins for Censorship Resistance [951-FF0]
- CGuard: Adaptive Defense Against DNS Cache Poisoning Attacks By Off-path Adversaries [190-A34]
- Insecure SSL Remote Desktop Protocol Traffic: snooPDR development [48D-52A]
- iSONG – Intrusion into Social Network Groups [429-992]
- RunLabs: Rapidly Create Virtual Labs Based on a Simple Configuration File [F45-171]
- Secure Cloud Infrastructure [E01-77B]
- Strategic Security Resource Allocation for Internet of Things [C4A-3AD]
- TCP Stream Splitting Moving Target Defense [D49-64B]
- The Cost of Deception [BD3-EE8]
- The Impact of Known Vulnerabilities on Layered Solutions [291-13E]
Policy, Law and Management
- Consumer's View on Payment Card Security [968-418]
- Detecting Malware Within OS X Systems [316-58E]
- Encryption Within Mac OS X [2F3-423]
- Exploring the Cellebrite Universal Forensic Evidence Device (UFED) File System Extraction Process [6F4-B24]
Prevention, Detection and Response
- A comparative analysis of exploit kits: How are exploit kits infecting machines? [01E-0E7]
- Assessing Secure Programming Knowledge with Pre- and Post-Surveys [706-725]
- Detecting Android Malware Before Reaching the User (WIP) [574-80D]
- Exploring Deception with Machine Learning and Data Mining [A5B-694]
- HexType: fast type safety for C++ programs [CD5-967]
- Secure Programming Clinic [CE4-D7C]
- Undergraduate Engagement with CERIAS Student Association [B65-D18]
- Using Link Analysis to Improve Advanced Persistent Threat Intelligence and Detection [DAA-785]