USENIX Security '18 Poster Session and Happy Hour

Accepted Posters

The following posters will be presented at the USENIX Security ’18 Poster Session and Happy Hour on Thursday, August 16, from 6:00 pm–7:30 pm in Grand Ballroom VI.

Electromagnetic Induction Attacks Against Actuators: Controlling Servo Engines Remotely
Gokcen Yilmaz Dayanikli, Virginia Tech; Jayaprakash Selvaraj and Neelam Prabhu Gaunkar, Iowa State University; Ryan M. Gerdes, Virginia Tech; Mani Mina, Iowa State University

Number-Theoretic Transforms in Lattice-Based Cryptography
Mark Daniel, Roberta Faux, Jeff Lataille, Paul Li, and John Wade, Envieta Systems, LLC

Hacking Compliance: A Study of Vulnerabilities within U.S. Federal Compliance Standards
Rock Stevens, University of Maryland; Josiah Dykstra, Independent security professional; Wendy Knox Everette, Leviathan Security Group; James Chapman, Garrett Bladow, and Alexander Farmer, Independent security professional; Michelle Mazurek, University of Maryland

TimeSeal: A Secure Time Architecture in Untrusted Operating Systems and Network
Fatima Anwar, UCLA

NetHide: Secure and Practical Network Topology Obfuscation
Roland Meier and Petar Tsankov, ETH Zurich; Vincent Lenders, armasuisse; Laurent Vanbever and Martin Vechev, ETH Zurich

PPSB: An Open and Flexible Platform for Privacy-Preserving Safe Browsing
Helei CUI, City University of Hong Kong; Yajin ZHOU, Zhejiang University; Cong WANG, Xinyu WANG, and Yuefeng DU, City University of Hong Kong; Qian WANG, Wuhan University

LADIDS: Lightning-authenticated Air-gapped Distributed Intrusion Detection System for the Power Grid
Tohid Shekari, Christian Bayens, Morris Cohen, Lukas Graber, and Raheem Beyah, School of ECE, Georgia Tech

Web Application for Privacy-Preserving Scheduling
Ágnes Kiss, Oliver Schick, and Thomas Schneider, TU Darmstadt

Measuring Security Advice Quality: First Steps
Elissa M. Redmiles and Emily Hwang, University of Maryland; Dhruv Kuchhal, Maharaja Agrasen Institute of Technology; Everest Liu and Lisa Maszkiewicz, JHU APL / University of Maryland; Miraida Morales, Rutgers University; Denis Peskov, Rock Stevens, and Michelle L. Mazurek, University of Maryland

Analyzing TLS Use on IoT Devices
Corentin Thomasset and David Barrera, Polytechnique Montréal

SPARCLE: Special Purpose, Algebraic Ring homomorphiC (Leveled) Encryption System
Russell A. Fink and David R. Zaret, Johns Hopkins Univ / Applied Physics Laboratory

Mitigating DNS Information Leakage in Tor with Distributed Hash Tables
Paul Balog and Henry Carter, Villanova University

Charm: Facilitating Dynamic Analysis of Device Drivers of Mobile Systems
Seyed Mohammadjavad Seyed Talebi and Hamid Tavakoli, University of California, Irvine; Hang Zhang and Zheng Zhang, University of California, Riverside; Ardalan Amiri Sani, University of California, Irvine; Zhiyun Qian, University of California, Riverside

Sensorless, Permissionless Information Exfiltration with Wi-Fi Micro-Jamming
Omer Shwartz, Rom Ogen, Kfir Zvi, and Yossi Oren, Ben Gurion University of the Negev

Security Analysis of Connected Vehicle Communication Protocol
Shengtuo Hu, University of Michigan; Qi Alfred Chen, University of California, Irvine; Yiheng Feng, Z. Morley Mao, and Henry X. Liu, University of Michigan

Challenges in Realizing Privacy-aware Cloud-based DDoS Mitigation Mechanism
Su-Chin Lin, Wei-Ning Chen, and Hsu-Chun Hsiao, National Taiwan University

Exploring how social media content feeds are manipulated
Janith Weerasinghe, Drexel University; Cynthia Gill, Springfield High School/Drexel University; Jaime Richards, Sterling High School/Drexel University; Damon McCoy, New York University; Rachel Greenstadt, Drexel University

GDPR-Compliant Data Processing: Improving Pseudonymization with Multi-Party Computation
Nathaniel Grevatt and David Evans, University of Virginia

IoT Boot Integrity Measuring and Reporting
Tom Brostrom, CPVI; John Zhu, Ryan Robucci, and Mohamed Younis, UMBC

Memory Safety Checking with Virtual Prototyping
Kai Cong, Zhenkun Yang, and Jiewen Yao, Intel Corporation

ACES: Automatic Compartments for Embedded Systems
Abraham A. Clements, Purdue University and Sandia National Labs; Naif Saleh Almakhdhub and Saurabh Bagchi, Purdue University; Mathias Payer, Purdue University

Deceiving Privacy Policy Classifiers with Adversarial Examples
Matthew Wallace, Parvesh Samayamanthula, and David Evans, University of Virginia

Analyzing HTTPS Adoption Hurdles for the Longtail
Ariana Mirian, UC San Diego; Chris Thompson, Google; Geoffrey M. Voelker and Stefan Savage, UC San Diego; Adrienne Porter Felt, Google

Towards Building a Support System for User Security Awareness
Faqia Iqbal, Saad Jamal, Shaarif Sajid, Shoaib Asif Qazi, and Mobin Javed, LUMS

Excavating TrustZone from Device Firmware
Joseph I. Choi and Kevin R. B. Butler, University of Florida

Adversarial Machine Learning on LIDAR-based Object Detection in Autonomous Driving: A First Study
Yulong Cao, University of Michigan; Qi Alfred Chen, University of California, Irvine; Z. Morley Mao, University of Michigan

Delegated Byzantine Fault Tolerance Using Trusted Execution Environment
Yongrae Jo and Chanik Park, Pohang University of Science and Technology

MinerGate: Mitigating Cryptocurrency Mining Attacks Based on Unique Traffic Features and Traffic Blocking
Guorui Yu, Peking University; Guangliang Yang, Texas A&M University; Tongxin Li and Xinhui Han, Peking University

How is GDPR Affecting Privacy Policies?
Guy Verrier, Haonan Chen, David Evans, and Yuan Tian, University of Virginia

Securing Access and Communication in Cloud-Enabled IoT
Smriti Bhatt, Farhan Patwa, and Ravi Sandhu, University of Texas at San Antonio

Confidence Assessment for Hybrid Software Defined Network Data Path
Scott Melton, Joshua Alcorn, and C. Edward Chow, University of Colorado Cold Springs