Skip to main content
USENIX
  • Conferences
  • Students
Sign in
  • Home
  • Attend
    • Registration Information
    • Registration Discounts
    • Venue, Hotel, and Travel
    • Students and Grants
    • Co-located Workshops
  • Program
    • At a Glance
    • Technical Sessions
  • Activities
    • Birds-of-a-Feather Sessions
    • Poster Session
    • Work-in-Progress Reports (WiPs)
  • Sponsorship
  • Participate
    • Instructions for Authors and Speakers
    • Call for Papers
      • Important Dates
      • Symposium Organizers
      • Symposium Topics
      • Refereed Papers
      • Symposium Activities
      • Submitting Papers
  • About
    • Symposium Organizers
    • Questions
    • Services
    • Help Promote
    • Past Symposia
  • Home
  • Attend
  • Program
  • Activities
    • Birds-of-a-Feather Sessions
    • Poster Session
    • Work-in-Progress Reports (WiPs)
  • Sponsorship
  • Participate
  • About

sponsors

Platinum Sponsor
Gold Sponsor
Silver Sponsor
Silver Sponsor
Silver Sponsor
Silver Sponsor
Bronze Sponsor
Bronze Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Industry Partner
Industry Partner

help promote

USENIX Security '16 button

Get more
Help Promote graphics!

connect with usenix


  •  Twitter
  •  Facebook
  •  LinkedIn
  •  Google+
  •  YouTube

twitter

Tweets by USENIXSecurity

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

You are here

Home » Activities » Work-in-Progress Reports (WiPs)
Tweet

connect with us

Work-in-Progress Reports (WiPs)

The following Work-in-Progress Reports (WiPs) will be presented on Wednesday, August 10, 2016, 8:00 pm–10:00 pm, in Zilker Ballroom 2.

NSF Funding Opportunities in Cybersecurity
Deborah Shands, National Science Foundation

Certifying the Security of Android Applications with Cassandra
David Schneider, Technische Universität Darmstadt

ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels
Daniel Genkin, Technion and Tel Aviv University

Tor's Next-Generation Onion Services Design
Roger Dingledine, The Tor Project

Internet Jones and the Webs of Time
Ada Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, and Franziska Roesner, University of Washington

Efficient CPU Cache Prime and Probe Attack Adaptation
Daimeng Wang, University of California, Riverside

Flawed by Design: A Work in Progress, Security Scenario Generator (SecGen)
Z. Cliffe Schreuders, Leeds Beckett University

Towards Automatic Extraction and Synthesis of Cyber Attack Behavior Models
Shanchieh Jay Yang, Jake Saxton, Alexandra Harrison, and Stephen Moskal, Rochester Institute of Technology

Creating a TTP Ecosystem of Support for NSF SaTC PIs
Becky Bace, University of South Alabama

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Bronze Sponsors

Media Sponsors & Industry Partners

© USENIX

  • Privacy Policy
  • Contact Us