Skip to main content
USENIX
  • Conferences
  • Students
Sign in
  • Home
  • Attend
    • Registration Information
    • Registration Discounts
    • Venue, Hotel, and Travel
    • Students and Grants
    • Co-located Workshops
  • Program
    • At a Glance
    • Technical Sessions
  • Activities
    • Birds-of-a-Feather Sessions
    • Poster Session
    • Work-in-Progress Reports (WiPs)
  • Sponsorship
  • Participate
    • Instructions for Authors and Speakers
    • Call for Papers
      • Important Dates
      • Symposium Organizers
      • Symposium Topics
      • Refereed Papers
      • Symposium Activities
      • Submitting Papers
  • About
    • Symposium Organizers
    • Questions
    • Services
    • Help Promote
    • Past Symposia
  • Home
  • Attend
  • Program
  • Activities
    • Birds-of-a-Feather Sessions
    • Poster Session
    • Work-in-Progress Reports (WiPs)
  • Sponsorship
  • Participate
  • About

sponsors

Platinum Sponsor
Gold Sponsor
Silver Sponsor
Silver Sponsor
Silver Sponsor
Silver Sponsor
Bronze Sponsor
Bronze Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Industry Partner
Industry Partner

help promote

USENIX Security '16 button

Get more
Help Promote graphics!

connect with usenix


  •  Twitter
  •  Facebook
  •  LinkedIn
  •  Google+
  •  YouTube

twitter

Tweets by USENIXSecurity

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

You are here

Home » Activities » Poster Session
Tweet

connect with us

Poster Session

The following posters will be presented at the USENIX Security '16 Poster Session and Happy Hour on Thursday, August 11, from 6:30 pm–8:00 pm in Zilker Ballroom 1.

Defeating Censorship with Perfectly Imitated Decoy Pages
Cecylia Bocovich and Ian Goldberg, University of Waterloo

Enforcing Privacy on Android Apps via On-Demand App Instrumentation
Aisha I. Ali-Gombe, Chitra Saini, and Golden G. Richard III, University of New Orleans

How to Phone Home with Someone Else’s Phone
Benyamin Farshteindiker, Nir Hasidim, Asaf Grosz, and Yossi Oren, Ben-Gurion University of the Negev

Arx: A Strongly Encrypted Database System
Rishabh Poddar, Tobias Boelter, and Raluca Ada Popa, University of California, Berkeley

Security in Web-Based Workflows
Thomas Bauereiß, German Research Center for Artificial Intelligence (DFKI); Abhishek Bichhawat, Saarland University; Iulia Boloşteanu, Max Planck Institute for Software Systems (MPI-SWS); Peter Faymonville and Bernd Finkbeiner, Saarland University; Deepak Garg, Max Planck Institute for Software Systems (MPI-SWS); Richard Gay, Technische Universität Darmstadt; Sergey Grebenshchikov, Technische Universität München; Christian Hammer, Saarland University; Dieter Hutter, German Research Center for Artificial Intelligence (DFKI); Ondřej Kunčar and Peter Lammich, Technische Universität München; Heiko Mantel, Technische Universität Darmstadt; Christian Müller, Technische Universität München; Andrei Popescu, Middlesex University; Markus Rabe, University of California, Berkeley; Vineet Rajani, Max Planck Institute for Software Systems (MPI-SWS); Helmut Seidl, Technische Universität München; Markus Tasch, Technische Universität Darmstadt; Leander Tentrup, Saarland University

How to Play Generalized Cut-and-Choose Games
Ruiyu Zhu and Yan Huang, Indiana University

SCREAM: Sensory Channel Remote Execution Attack Methods
Nicholas Brown, Nilesh Patel, Patrick Plenefisch, Ahmad Moghimi, Thomas Eisenbarth, Craig Shue, and Krishna Venkatasubramanian, Worcester Polytechnic Institute

WACA: Wearable-Assisted Continuous Authentication Framework with Motion Sensors
Abbas Acar, Hidayet Aksu, Kemal Akkaya, and A. Selcuk Uluagac, Florida International University

Software Security for Mobile Devices
Steven Arzt, Alexandre Bartel, Richard Gay, and Steffen Lortz, Technische Universität Darmstadt; Enrico Lovat, Technische Universität München; Heiko Mantel, Technische Universität Darmstadt; Martin Mohr, Karlsruhe Institute of Technology; Benedikt Nordhoff, University of Münster; Matthias Perner, Siegfried Rasthofer, and David Schneider, Technische Universität Darmstadt; Gregor Snelting, Karlsruhe Institute of Technology; Artem Starostin and Alexandra Weber, Technische Universität Darmstadt

FlashJaX: A Framework for Securing Mixed JavaScript/ActionScript Multi-Party Web Content
Phu H. Phung, University of Dayton; Maliheh Monshizadeh, University of Illinois at Chicago; Meera Sridhar, The University of North Carolina at Charlotte; Kevin W. Hamlen, University of Texas at Dallas; V.N. Venkatakrishnan, University of Illinois at Chicago

The Application of Identification Schemes for the Internal Vehicle Network
Leilani H. Gilpin, Massachusetts Institute of Technology

Expecting the Unexpected: Enhancing Privacy Notice for Android Apps
Le Yu, Xiapu Luo, Xule Liu, Wenjun Hu, and Manho Au, The Hong Kong Polytechnic University

FalseClick: Analyzing Social Engineering Campaigns and Content via Trick Ads
M. Zubair Rafique and Wouter Joosen, iMinds-DistriNet, Katholieke Universiteit Leuven

Security in E-Voting
Enrico Scapin, Tomasz Truderung, and Ralf Küsters, Univerität Trier; Daniel Bruns, Martin Mohr, Simon Greiner, Mihai Herda, and Bernhard Beckert, Karlsruhe Institute of Technology; Richard Gay, Huy Quoc Do, and Heiko Mantel, Technische Universität Darmstadt

A Client-Side Analysis of TLS Usage in Mobile Apps
Abbas Razaghpanah, Stony Brook University; Narseo Vallina-Rodriguez, International Computer Science Institute; Phillipa Gill, Stony Brook University

Insecure by Default? Authentication Services in Popular Web Frameworks
Hannah Li and David Evans, University of Virginia

EPA-RIMM: Extensible, Performance-Aware SMM Runtime Integrity Measurement
Brian Delgado and Karen L. Karavanic, Portland State University

Privacy-Preserving Context Sharing in Social Platforms
Yuan Tian and Eric Chen, Carnegie Mellon University; Joao Sa Sousa, École Polytechnique Fédérale de Lausanne (EPFL); Patrick Tague, Carnegie Mellon University; Helen J. Wang, Microsoft Research

GroupSense: Scalable Crowdsensing with Privacy and Accountability
Sazzadur Rahaman, Long Cheng, He Li, Danfeng (Daphne) Yao, and Jung-Min (Jerry) Park, Virginia Polytechnic Institute and State University

Measuring Profitability in Alternative Crypto-Currencies
Danny Yuxing Huang, Alex C. Snoeren, and Kirill Levchenko, University of California, San Diego

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Bronze Sponsors

Media Sponsors & Industry Partners

© USENIX

  • Privacy Policy
  • Contact Us