Skip to main content
USENIX
  • Conferences
  • Students
Sign in
  • Overview
  • Symposium Organizers
  • At a Glance
  • Registration Information
    • Registration Discounts
    • Venue, Hotel, and Travel
  • Technical Sessions
  • Co-Located Workshops
  • Accepted Posters
  • Activities
    • Birds-of-a-Feather Sessions
    • Work-in-Progress Reports
  • Sponsorship
  • Students and Grants
  • Services
  • Questions?
  • Help Promote!
  • Flyer PDF
  • For Participants
  • Call for Papers
  • Past Symposia

sponsors

Gold Sponsor
Gold Sponsor
Gold Sponsor
Silver Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Industry Partner

twitter

Tweets by USENIXSecurity

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

You are here

Home » Accepted Posters
Tweet

connect with us

http://twitter.com/usenixsecurity
https://www.facebook.com/usenixassociation
http://www.linkedin.com/groups/USENIX-Association-49559/about
https://plus.google.com/108588319090208187909/posts
http://www.youtube.com/user/USENIXAssociation

Accepted Posters

The following posters will be presented during the Poster Session and Happy Hour on Thursday, August 21, 2014, 6:00 p.m.–7:30 p.m., in Harbor ABC and Corridor 1.

Twitter Covert Channel: How to Hide in Human Behavior
Nick Pantic, Jonathan Mansur, and Mohammad Husain California State Polytechnic University, Pomona

Hiding Shellcodes in Korean Texts
Ji-Hyeon Yoon and Hae Young Lee, Seoul Women's University

Profiling HTTP Requests to Detect Malware-infected Hosts
Daiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Kazufumi Aoki, and Takeo Hariu, NTT Secure Platform Laboratories

Extracting Redirect-Chain Variations in Drive-by Download Attacks Using Emulati on of Various Client Environments
Yuta Takata, Mitsuaki Akiyama, and Takeo Hariu, NTT Secure Platform Laboratories

Secrets in Public Repositories
Kyle McGuire, Hao Bai, and David Evans, University of Virginia

Prevent Malicious Controller in a Physical, Human and Cyber Triad
Depeng Li, University of Hawaii at Manoa

DeviceVeil: Lightweight and Tamperproof Hypervisor Which Hides Devices
Kuniyasu Suzaki, Toshiki Yagi, Michitaka Yoshimoto, Kazukuni Kobara, National Institute of Advanced Industrial Science and Technology

Password Cracking: A Large-Scale Empirical Study
Shouling Ji, Shukun Yang, Weiqing Li, and Xiaojing Liao, Georgia Institute of Technology; Xin Hu, IBM T. J. Watson Research Center; Raheem Beyah, Georgia Institute of Technology

Measuring Privacy Disclosures in URL Query Strings
Andrew G. West, Verisign Labs (Verisign, Inc.); Adam J. Aviv, U.S. Naval Academy

Ephemeral Biometrics
Sung Choi, Michael Bierma, Yung Ryn Choe, Margaret Todd, Jeffery Bigg, Shrinithi Narayanan and Vansh Gandhi, Sandia National Laboratories

Exploring Movement-Pattern Based Authentication for Mobile Platforms
Dustyn James Tubbs and Khandaker Abir Rahman, Saginaw Valley State University

iOS Clone Detection Analysis
Michael Bierma, University of California, Davis; Nicholas Ward, University of California, Berkeley; Kevin Wu, University of Illinois at Urbana–Champaign; Yung Ryn Choe, Sandia National Laboratories

A Software Plugin-based Malware Model
Li Zhiqiao and Liang Yu, Beijing University of Posts and Telecommunications and Chinese Academy of Sciences; Liu Chaoge, Chinese Academy of Sciences

Memory and Type Safety for Embedded Systems
Paul Soulier and Depeng Li, University of Hawaii, Manoa

Detection and Characterization of Unknown HTTP Botnets using Combined Packet- and Flow-level Information
Li Ke, Beijing University of Posts and Telecommunications and Chinese Academy of Sciences; Liu Chaoge and Cui Xiang, Chinese Academy of Sciences
(authors unable to attend to present poster)

Research on the Ecological Environment of Botnets
Li Ke and Dai Yumei, Beijing University of Posts and Telecommunications

PHPGate: A Practical White-Delimiter-Tracking Protection against SQL-Injection for PHP
Lihua Zhang and Yu Ding, Peking University; Chao Zhang, University of California, Berkeley; Lei Duan, Zhaofeng Chen, Tao Wei, and Xinhui Han, Peking University

Countering Sandbox-aware Malware by Hiding Sandbox's Fingerprints
Ke Liu, Chinese Academy of Sciences; Shuai Lu, Harbin University of Science and Technology; Chaoge Liu, Chinese Academy of Sciences
(authors unable to attend to present poster)

Collaborative DoS Attack against Cloud-hosted Web Services
Yunhan Jia, Yihua Guo, and Z. Morley Mao, University of Michigan; Sung-Ju Lee, Narus, Inc

URL Shortening Services: A Novel Stealthy and Resilient Message Transmission Channel
Li Dong, Beijing University of Posts and Telecommunications; Lu Shuai, Harbin University of Science and Technology; Liu Chaoge, Chinese Academy of Sciences
(authors unable to attend to present poster)

Detecting Anomalies in DNS Protocol Through Process Mining
Cecilia Saint-Pierre, Pontificia Universidad Católica de Chile; Javier Bustos-Jimenez, NIC Chile Research Labs

Coercion Resistant Authentication Systems (CRAS) using Physiological Responses to Chill Music
Max Wolotsky and Mohammad Husain California State Polytechnic University, Pomona

Using Near-Realtime Voice Data for Communication Authentication
Andreas Brauchli and Depeng Li, University of Hawaii at Manoa

Is It Possible to Overwhelm China's Great Firewall?
Benjamin Mixon-Baca and Jedidiah Crandall, University of New Mexico

SystemLeakalyzer: Systematically Detecting System Side-Channels
Qi Alfred Chen and Yunhan Jia, University of Michigan; Zhiyun Qian, NEC Labs America, Inc.; Z. Morley Mao, University of Michigan

Privacy Implications of Statistical Acoustic Analysis
Shishir Nagaraja, University of Birmingham

Gold Sponsors

Silver Sponsors

Bronze Sponsors

Media Sponsors & Industry Partners

© USENIX

  • Privacy Policy
  • Contact Us