Skip to main content
USENIX
  • Conferences
  • Students
Sign in
  • Home
  • Attend
    • Venue, Hotel, and Travel
    • Students and Grants
    • Co-Located Workshops
  • Program
    • At a Glance
    • Technical Sessions
    • Poster Session
  • Activities
    • Birds-of-a-Feather Sessions
    • Poster Session
    • WiPs
  • Participate
    • Call for Papers
      • Important Dates
      • Symposium Organizers
      • Symposium Topics
      • Refereed Papers
      • Shadow PC
      • Symposium Activities
      • Submitting Papers
    • Instructions for Participants
  • Sponsorship
  • About
    • Symposium Organizers
    • Services
    • Questions
    • Help Promote!
    • Past Symposia
  • Home
  • Attend
    • Venue, Hotel, and Travel
    • Students and Grants
    • Co-Located Workshops
  • Program
    • At a Glance
    • Technical Sessions
    • Poster Session
  • Activities
  • Participate
    • Call for Papers
    • Instructions for Participants
  • Sponsorship
  • About
    • Symposium Organizers
    • Services
    • Questions
    • Help Promote!
    • Past Symposia

sponsors

Platinum Sponsor
Gold Sponsor
Gold Sponsor
Silver Sponsor
Silver Sponsor
Silver Sponsor
Bronze Sponsor
Bronze Sponsor
General Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Industry Partner
Industry Partner

help promote

USENIX Security '16 button

Get more
Help Promote graphics!

connect with usenix


  •  Twitter
  •  Facebook
  •  LinkedIn
  •  Google+
  •  YouTube

twitter

Tweets by USENIXSecurity

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

You are here

Home » Program » Poster Session
Tweet

connect with us

Poster Session

The following posters will be presented at the USENIX Security '15 Poster Session and Happy Hour on Thursday, August 13, from 6:00 pm–7:30 pm in the Columbia Ballroom.

Robust Hardware Security for Cloud Computing
Nevrus Kaja, and Adnan Shaout, University of Michigan-Dearborn

An Optimization Approach for Improving the Security in Large Networks
Hussain M. J. Almohri, Kuwait University; Layne T. Watson and Daphne Yao, Virginia Polytechnic Institute and State University; Xinming Ou, Kansas State University

Bridging the Gap between Modern Cryptography and Real World Applications
Muhammad Naveed, University of Illinois at Urbana-Champaign

The Frigate Compiler for Secure Computation
Benjamin Mood, University of Florida; Debayan Gupta, Yale University; Henry Carter, Georgia Institute of Technology; Kevin Butler and Patrick Traynor, University of Florida

Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework
Yuru Shao, University of Michigan; Jason Ott, University of California, Riverside; Qi Alfred Chen, University of Michigan; Zhiyun Qian, University of California, Riverside; Z. Morley Mao, University of Michigan

PacketGuardian: Systematic Detection of Packet Injection Vulnerabilities using Precise Static Analysis
Qi Alfred Chen, University of Michigan; Zhiyun Qian, University of California, Riverside; Yunhan Jia, Yuru Shao, and Z. Morley Mao, University of Michigan

Securing Organizations from Advanced Cyber Threats
Ajeet Kumar Singh, Deloitte

Computing on Encrypted Data for IoT Applications
Laurynas Riliskis, Stanford University; Hossein Shafagh, ETH Zürich; Philip Levis, Stanford University

Elastic Pathing 2.0: Your Speed is Enough to Track You Revisited
Xianyi Gao, Bernhard Firner, Shridatt Sugrim, Victor Kaiser-Pendergrast, Yulong Yang, and Janne Lindqvist, Rutgers University

Hmax: Cryptographic Password Proxy for Strong Authentication
Ahmed Bahjat, Paul Ammann, and Duminda Wijesekera, George Mason University

VoLTE Data Free-Ride Attack: A Case of Exploiting the Unprotected Voice Channel
Yunhan Jack Jia, Qi Alfred Chen, and Z. Morley Mao, University of Michigan; Alex Yoon, Jie Hui, Salvador Mendoza, Samson Kwong, Kevin Lau, and Kranthi Sontineni, T-Mobile USA Inc.

StorXCrypt: An Architecture for Multi App Multi Device Cryptographic Support for Android and its Implementation
Daisuke Moriyama, NICT; Akira Kanaoka, NICT and Toho University; Ryo Takeuchi, Toho University; Moti Yung, Google and Columbia University

Outsourcing Secure Two-Party Computation as a Black Box
Henry Carter, Georgia Institute of Technology; Benjamin Mood, Patrick Traynor, and Kevin Butler, University of Florida

Secure Binding Update without IPsec in Host-based Distributed Mobility Management
Se-Yeong Lee, Sungkyunkwan University; Jong-Hyouk Lee, Sangmyoung University; Hyoung-Kee Choi, Sungkyunkwan University

Aligning Research Ethics and Security Studies in Transnational Environments
John Murray, SRI International

Studying the Pervasiveness of Internet Interception with Honey{POP,SMTP,Telnet}
Tavish Vaidya, Eric Burger, Micah Sherr, and Clay Shields, Georgetown University

Set-based Classification of Android Malware from Behavioral Abstractions
Santanu Kumar Dash, Kimberly Tam, Johannes Kinder, and Lorenzo Cavallaro, Royal Holloway, University of London

Don't Lie: Statistical Metrics for a Truthful Machine Learning Evaluation
Roberto Jordaney, Zhi Wang, Davide Papini, Ilia Nouretdinov, and Lorenzo Cavallaro, Royal Holloway, University of London

Towards Secure and Usable Smartphone Authentication
Gradeigh D. Clark, Janice Gu, and Janne Lindqvist, Rutgers University

Application level Moving Target IPv6 Defense
Dileep Basam, Chris Morrell, Reese Moore, Randy Marchany, and Joseph G. Tront, Virginia Tech

Bohatei: Flexible and Elastic DDoS Defense
Seyed K. Fayaz, Yoshiaki Tobioka, and Vyas Sekar, Carnegie Mellon University; Michael Bailey, University of Illinois at Urbana-Champaign

Inference Attacks on Encrypted Databases
Muhammad Naveed, University of Illinois at Urbana-Champaign; Seny Kamara, Microsoft Research; Charles Wright, Portland State University

Scredent—Scalable Real-time Anomalies Detection and Notification of Targeted Malware in Smartphones
Paul McNeil, Sachin Shetty, Divya Naga Devi Guntu, and Gauree Barve, Tennessee State University

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Bronze Sponsors

General Sponsors

Media Sponsors & Industry Partners

Open Access Publishing Partner

© USENIX

  • Privacy Policy
  • Contact Us