Posters > 2017
Assured Identity and Privacy
- Differentially Private Heavy Hitter Problem [AF0-79B]
- Finding Ransomware Encryption Keys in Volatile Memory [DE5-8C5]
- Forgetting the Forgotten with Letheia: Concealing Content Deletions in Presence of Persistent Observers [C3F-592]
- Fulgor: Concurrent and Privacy Preserving Transactions with Payment-Channel Networks [29E-35E]
- Information Leakage in a Cisco VPN Stream [4C3-799]
- INSuRE Training Course Effect on Students' Research Self-efficacy [0DC-C8F]
- Just In Time Hashing [FC5-2E4]
- Permissions Displays for Android apps [8AC-0A8]
- Public-Key Authentication Using Dessins d'Enfants [06C-CA2]
- Secure Distributed State Estimation for Large-Scale Systems [49E-144]
- SmartNDA: Realizing Unilateral Non Disclosure Agreements using a Bitcoin Penalty [F07-107]
- Statistical Learning Theory Approach for Data Classification with l-diversity [290-A75]
End System Security
- An MTD-based Self-Adaptive Resilience Approach for Cloud Systems [508-5B5]
- AnyLogic Modeling Cybersecurity Defense Effectiveness and Costs [C27-22C]
- Data Leakage Detection and Privacy [3F3-7F3]
- DUST-BT: Detection of Unauthorized Supply Chain Tampering using Blockchain Technology [E39-665]
- EPOXY - Enabling Robust Protections for Bare-Metal Systems [81F-BE1]
- Ghost Patches: Faux Patches for Faux Vulnerabilities [62A-3F4]
- HexFuzz: Bug Finding through combined fault injection and fuzzing at library boundaries [622-2E8]
- HexVASAN: A Variadic Function Sanitizer [566-B4A]
- Software Target-Focused Flow Analysis [AD4-5EF]
Human Centric Security
- Effects of Safety Priming and Security Framing on App Selection [AED-18F]
- Heuristic Decision-making for App Selection [450-6E5]
- Measuring Cryptography Learning using fMRI [227-14B]
Network Security
- An Automated and Principled Security Analysis Framework for Bluetooth LE Implementations [6F6-D33]
- Computational and Behavioral Aspects of Network Security Games [43B-D30]
- Content Distribution and UAV Assistance in Vehicular Network [8FA-57E]
- Distributed Algorithms for Solving Linear Equations [196-A0C]
- How Much High Level Utility in Anonymized Social Networks? [CEC-FBF]
- Improving Protocol Vulnerability Discovery via Semantic Interpretation of Textual Specifications [59F-A52]
- Internet of Things Mobility Forensics [E30-545]
- SymCerts: Practical Symbolic Execution For Exposing Noncompliance in X.509 Certificate Validation Implementations [120-E5C]
Policy, Law and Management
- A Benchmark of Anti-Memory Forensics Tools [Q3A-78T]
- Accelerating Cyber Security Improvements for Critical Infrastructure Control Systems [258-A91]
- Artifact Integrity in Forensic Acquisitions of iPhones using Jailbreak Preprocessing [8F2-795]
- Establishing Forensic Acquisition Procedures for the Apple Fusion Drive [E3D-7ED]
- Evaluating the Memory Footprint of Random Access Memory Acquisition Software [A0B-574]
- Investment in IT Security: Do we Reap as Much as we Sow? [4F5-640]
- Memory Forensics of Windows Kernel and User mode Rootkits(WIP) [9D6-A94]
- Preservation and Acquisition of a Locked iPhone Using Access Point Name Hijacking to Back up to iCloud [D8E-3E1]
Prevention, Detection and Response
- Analyze Visual Data from Worldwide Network Cameras [6D2-E42]
- Development of Malware Analysis Techniques [F14-4D8]
- Differentiating Remote Access initiated Network Traffic from Locally Induced Packets [8C8-C9B]
- Exploring Memory Forensics of Android Banking Trojan [A3B-F95]
- Exploring Memory Forensics on iOS Devices [869-D6E]
- Fileless Malware: The Phantom Menace [16B-1BD]
- Malware Examination on Gnu/Linux: Wirenet Case Study [861-AB8]
- Malware Privilege Level vs. Infection Strength on Windows 7 [7A2-72B]
- PEA: PE Analyzer-Detecting PE malware Using Machine Learning Algorithms [732-AGG]
- Protecting Data with Forensics Just-in-Time (FoJiT) [921-2C0]
- The Efficacy of Anti-Malware on Android [BD3-A40]