Posters > 2018
Assured Identity and Privacy
- AB-Graph: An Authenticated-Blocked Graph [FE0-B50]
- Distribution-Aware Password Throttling Mechanisms [76A-BDC]
- Flexible Signatures: Authentication for Real-Time Environments [7A7-001]
- Lightweight, Scalable and Secure Computations for Engineering Design [FBC-F7B]
- Privacy-preserving Autonomous Aggregate Data Analytics in Untrusted Cloud [B88-055]
- Recall of Survival-Relevant Passwords [EED-983]
End System Security
- ALEXKIDD-FUZZER: Kernel Fuzzing Guided by Symbolic Information [829-D1B]
- Blockhub: Blockchain-based Secure Cross-domain Software Development System [051-405]
- Double Trouble: Fuzzing Kernel Modules [F37-C47]
- Evaluating the effects of KAISER on operating system performance. [57F-A6F]
- Fafnir: Type Inference Based Static Rewriting [1BB-572]
- FirmFuzz : Automated IoT Firmware Introspection and Analysis [FF6-1A5]
- Secure Data Communication in Autonomous V2X systems [A72-5E8]
Human Centric Security
- Determining System Requirements for Human-Machine Integration in Computer Security Incident Response [611-1EB]
- From Monte Carlo to Las Vegas: Understanding if Undirected Neural Networks can Really Generate Fake Images [F9C-724]
- Phishing Susceptibility: An Investigation Into Human Information Processing of Spear-Phishing [AC7-6DA]
- Private Preserving Credit System with Cryptographic Currency [F04-BEB]
- Security Vulnerabilites for Large Venues [ED0-F06]
- The Economics of Offline Password Cracking [40C-8B8]
- Towards a triage model for online predator type prediction [CBB-6BE]
Network Security
- Automated Resilience for Distributed Coordination in Large-scale Networks [932-624]
- Botnet Attacks: A Case Study of Qbot Botnet Monitoring and Victims [5BF-3B5]
- LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE [F00-993]
- Noise Detection of the Physical Data layer in EVs [2BD-3D3]
- Subgraph Pattern Neural Networks for High-Order Graph Evolution Prediction [677-5B6]
Policy, Law and Management
Prevention, Detection and Response
- A Deep Learning Based Anomaly Detection Approach for Intelligent Autonomous Systems [F16-68D]
- A Model-based Cyber Attack Detection and Identification for Networked Vehicle Systems [E9F-913]
- Adaptive Threat Management Tool for Cyber-based Systems [747-21D]
- Adversarial Attacks to Distributed Voltage Control in Power Distribution Networks with DERs [BF0-B7A]
- Agent Based Modeling: Effectiveness of Unarmed Response to Active Shooter Incidents [CAA-72B]
- Analyzing Response Mitigation Communication Methods by Simulation Modeling [B38-A8E]
- Automated Penalization of Data Leakage using Crypto-augmented Smart Contracts [492-656]
- CAM2 - Analysis of Visual Data from World Wide Network Cameras [DB5-4E5]
- Graceful Degradations in Autonomous Systems Through Combinatorial Designs [DE4-397]
- HexCFI: Fully Context Sensitive Control-Flow Integrity [294-594]
- Leveraging Memory Forensics To Decrypt iOS Backups [44D-25B]
- Mitigating Counterfeiting in Supply Chains using Blockchain Technology [12B-B4F]
- PoachNet: An Embedded System to Detect Theft [AA6-3A7]
- Security Perimeters for Large Events [534-E8B]