Skip to main content
USENIX
  • Conferences
  • Students
Sign in
  • Overview
  • Symposium Organizers
  • Registration Information
  • Registration Discounts
  • At a Glance
  • Calendar
  • Technical Sessions
  • Birds-of-a-Feather Sessions
  • Poster Session
  • Sponsorship
  • Workshops
  • Activities
  • Hotel and Travel Information
  • Services
  • Students
  • Questions
  • Help Promote!
  • Flyer PDF
  • For Participants
  • Call for Papers
  • Past Symposia

sponsors

Silver Sponsor
Silver Sponsor
Silver Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Industry Partner

twitter

Tweets by USENIXSecurity

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

You are here

Home » Poster Session
Tweet

connect with us

http://twitter.com/usenixsecurity
https://www.facebook.com/usenixassociation
http://www.linkedin.com/groups/USENIX-Association-49559/about
https://plus.google.com/108588319090208187909/posts
http://www.youtube.com/user/USENIXAssociation

Poster Session

The following posters will be presented during the Poster Session and Happy Hour on Thursday, August 15, 2013, 6:00 p.m.–7:30 p.m., in Columbia ABC and Foyer.

An Automated System for Rapid and Secure Device Sanitization
Ralph LaBarge, Thomas A. Mazzuchi and Shahram Sarkani, George Washington University

Classify but Verify: Breaking the Closed-world Assumption in Stylometric Authorship Attribution
Ariel Stolerman, Rebekah Overdorf, Sadia Afroz, and Rachel Greenstadt, Drexel University

Towards Quantifying and Preventing the Leakage of Genomic Data Using Privacy-Enhancing Technologies
Erman Ayday, Jean Louis Raisaro, Mathias Humbert, and Jean-Pierre Hubaux, Ecole Polytechnique Fédérale de Lausanne (EPFL)

Whole Genome Sequencing: Innovation Dream or Privacy Nightmare?
Erman Ayday, Ecole Polytechnique Fédérale de Lausanne (EPFL); Emiliano De Cristofaro, Xerox PARC; Jean-Pierre Hubaux, Ecole Polytechnique Fédérale de Lausanne (EPFL); Gene Tsudik, University of California, Irvine

Protego: Practical Techniques to Obviate Setuid-to-Root Binaries
Bhushan Jain, Chia-Che Tsai, and Donald E. Porter, Stony Brook University

OS Lockdown on Industrial Control Systems with Process White List and Resource Access Control
Kuniyasu Suzaki, Toshiki Yagi, and Kazukuni Kobara, National Institute of Advanced Industrial Science and Technology; Yoshiaki Komoriya, Control System Security Center; Nobuko Inoue and Tomoyuki Kawade, SciencePark Corporation

When to Attack? Android UI Context Inference as an Attack Building Block
Qi Alfred Chen, University of Michigan; Zhiyun Qian, NEC Labs; Sanae Rosen, Yuanyuan Zhou, and Z. Morley Mao, University of Michigan

A Method to Make Securing Your Information on Mobile Device
Yun-kyung Lee, Jae-deok Lim, and Jeong-nyeo Kim, Electronics and Telecommunications Research Institute, Korea

The Effects of Developer-Specified Explanations for Smartphone Permission Requests
Christopher Thompson, Serge Egelman, and David Wagner, University of California, Berkeley

Anception: Hybrid Virtualization for Smartphone Applications
Earlence Fernandes, Ajit Aluri, Alex Crowell, and Atul Prakash, University of Michigan

Identifying Contextually-Driven Perceptions of Risk
James Cebula and Jennifer Cowley, Carnegie Mellon University

Fingerprint Me If You Can: Towards Effective Protection Against Browser Fingerprinting
Henning Perl, Sascha Fahl, and Matthew Smith, Distributed Computing & Security Group, Germany

Entropic Return-Oriented Exploit Detection
Caleb Smith and Adam J. Aviv, Swarthmore College

Parameterized Trace Scaling
John Sonchack, University of Pennsylvania; Adam J. Aviv, Swarthmore College; and Jonathan M. Smith, University of Pennsylvania

Security and Usability Perceptions of Android’s Password Patterns
Dane Fichter and Adam J. Aviv, Swarthmore College

Baton for Android: Key Agility without a Centralized Certificate Infrastructure
David Barrera, Daniel McCarney, Jeremy Clark, and P.C. van Oorschot, Carleton University

HunterBee: An Advanced ZigBee Vulnerability Analysis System
Yuseok Jeon, Incheol Shin, Sinkyu Kim, Sungho Kim, and Jungtaek Seo, The Attached Institute of ETRI, Korea

User-Intention Based Android Malware Detection
Karim O. Elish, Danfeng (Daphne) Yao, and Barbara G. Ryder, Virginia Polytechnic Institute and State University; and Xuxian Jiang, North Carolina State University

What's New with MCARTA?
C. Aaron Cois and Brady Tello, Carnegie Mellon University

A Survey of Fuzzy Hashing Algorithms for Malware Clustering
Jason Jones, Marc R. Eisenbarth, Michael Barr, and Alexandru G. Bardas, Arbor Networks

Android + Open Wi-Fis = Broken SSL?
Sascha Fahl, Henning Perl, Marian Harbach, and Matthew Smith, Leibniz University Hannover

An Empirical Survey of WPA-Enterprise Misconfigurations
Stuart Minshull and David Starobinski, Boston University

REM: A Robust and Efficient Decision Model for Collaborative Malware Detection
Carol J. Fung, Disney Y. Lam, and Raouf Boutaba, University of Waterloo

Ecology of Security: Brains, Bodies, and Environments
Timothy Kelley, Indiana University

Silver Sponsors

Bronze Sponsors

Media Sponsors & Industry Partners

© USENIX

  • Privacy Policy
  • Contact Us