USENIX Security '19 Poster Session

Accepted Posters

The following posters will be presented at the USENIX Security ’19 Poster Session and Happy Hour on Thursday, August 15, from 6:00 pm–7:30 pm.

Software Forensic Archaeology for Cyber Attribution
Matthew Elder, William La Cholter, and Tony Johnson, JHU/APL; Kathleen Carley, Carnegie Mellon University

Building Secure Decentralized Applications the DECENT Way
Haofan Zheng, Xiaowei Chu, and Owen Arden, University of California, Santa Cruz

Deep Learning Aided Runtime Opcode Based Malware Detection
Enes Sinan Parildi, Yuri Lawryshyn, and Dimitris Hatzinakos, University of Toronto

Mitigating potential Spearphishing with Deep Learning: An Enterprise Study
Matthew Wong, University of Toronto; Cathal Smyth and Kory Fong, RBC Research Institute; Yuri Lawryshyn, University of Toronto

Multi-Layer Perceptron Artificial Neural Network Based IoT Botnet Traffic Classification
Navid Rajabi and Yousra Javed, Illinois State University

Brand Validation: User Interfaces to Better Indicate Website Identity
Tetsuya Okuda, Naoko Chiba, Mitsuaki Akiyama, Toshinori Fukunaga, and Ryohei Suzuki, NTT Secure Platform Laboratories; Masayuki Kanda, Information-technology Promotion Agency

Finding Social Engineering Attacks across User-generated Content Platforms
Hiroki Nakano, Daiki Chiba, Takashi Koide, and Mitsuaki Akiyama, NTT Secure Platform Laboratories

Cheaters Chat: A Measurement of Computer Game Cheating in Online Underground Forums
Panicos Karkallis and Jorge Blasco, Royal Holloway University of London; Guillermo Suarez-Tangil, King's College London; Sergio Pastrana, Universidad Carlos III de Madrid

Realistic Adversarial ML Attacks in the Problem-Space
Fabio Pierazzi, King's College London; Feargus Pendlebury, King's College London & Royal Holloway University of London; Jacopo Cortellazzi and Lorenzo Cavallaro, King's College London

POSTER: Scalable Zero-Knowledge Proofs of Vector “One-Hotness”
William Black and Ryan Henry, University of Calgary

Detecting Anomalies in Industrial Control Systems using Time-Sampled Sensor and Actuator Values
Hoda Mehrpouyan, Subin Sapkota, and A K M Nuhil Mehdy, Boise State University

A Reference Framework for Incorporating GDPR into Social Login
Tharindu Edirisinghe and Nalin Arachchilage, La Trobe University, Australia

Deep Learning based PowerShell Analysis with the Abstract Syntax Tree
Jihyeon Song, University of Science and Technology; Jungtae Kim, Youngsoo Kim, Jonghyun Kim, and Ikkyun Kim, Electronics and Telecommunications Research Institute; Sunoh Choi, Honam University

Security Analysis of Multi-Sensor Fusion based Localization in Autonomous Vehicles
Junjie Shen and Jun Yeon Won, University of California, Irvine; Shinan Liu, University of Electronic Science and Technology of China; Qi Alfred Chen and Alexander Veidenbaum, University of California, Irvine

Cyber Security Risk as an Experimental Discipline: A Proposal Building upon Capture the Flags
Giorgio Di Tizio and Fabio Massacci, University of Trento, Italy; Luca Allodi, Eindhoven University of Technology; Stanislav Dashevskyi, SnT, University of Luxembourg; Jelena Mirkovic, USC Information Sciences Institute (ISI)

Secure and Efficient Network Side-Channel Mitigation
Aastha Mehta, Mohamed Alzayat, Roberta De Viti, Björn B Brandenburg, Peter Druschel, and Deepak Garg, MPI-SWS

Automated Attack Discovery in Data Plane Systems
Qiao Kang, Jiarong Xing, and Ang Chen, Rice University

Towards Understanding the WhatsApp Dilemma
Christian Stransky, Dominik Wermke, Johanna Schrader, Nicolas Huaman, and Anna Lena Fehlhaber, Leibniz University Hannover; Yasemin Acar and Sascha Fahl, University of Hannover

The Tracking Ecosystem of Over-the-Top TV Streaming Devices
Hooman Mohajeri Moghaddam, Gunes Acar, Arunesh Mathur, Danny Y. Huang, Ben Burgess, Nick Feamster, Edward W. Felten, Prateek Mittal, and Arvind Narayanan, Princeton University

Entropy-Shield: Side-Channel Entropy Minimization for Timing-based Side-Channel Attacks
Abhijitt Dhavlle, Setareh Rafatirad, Dr. Houman Homayoun, and Sai Manoj Pudukotai Dinakarrao, George Mason University

A Game Theoretic Analysis of Improvements to Tor’s Resilience to Entry-Exit & End-to-End Attacks
Krisztian Gado, Alexander Lotero, and Jens Mache, Lewis & Clark College

Poster: Towards Robust Semantic Reverse Engineering of Control System Binaries
Pengfei Sun, Shape Security; Luis Garcia, University of California, Los Angeles; Saman Zonouz, Rutgers University

The Lattigo Lattice-based Cryptographic Library
Jean-Philippe Bossuat, Christian Mouchet, Juan Ramon Troncoso-Pastoriza and Jean-Pierre Hubaux, École Polytechnique Fédérale de Lausanne (EPFL)

Reviewing the Use of IP addresses in Abuse Prevention
Anushah Hossain, UC Berkeley, Energy and Resources Group; Sadia Afroz, ICSI; Sivaramakrishnan Satyamangalam Ramanathan, University of Southern California

ProXray: Protocol Model Learning and Guided Firmware Analysis
Farhaan Fowze, Dave Tian, Kevin Butler, Grant Hernandez, and Tuba Yavuz, University of Florida

Investigating Run-time Memory Towards Defeating IoT Malware Obfuscation
Afsah Anwar, Muhammad Saad, and Aziz Mohaisen, University of Central Florida

Link-flooding defense entirely on the data plane
Jiarong Xing, Wenqing Wu, and Ang Chen, Rice University

Protect Your Voiceprint From Identity Theft: Fast Acoustic Digital Watermarking Against Spoofing
Xuping HUANG, Advanced Institute of Industrial Technology

That which we call private
Ulfar Erlingsson, Ilya Mironov, Ananth Raghunathan, and Shuang Song, Google Research, Brain

Privacy Implications of Elder Care Devices
Ankit Bansal, School of Information, UC Berkeley; Alisa Frik, Primal Wijesekera, and Serge Egelman, International Computer Science Institute, UC Berkeley

Leveraging AS-level diversity against network-level adversaries in Tor Network
Shinyoung Cho, Stony Brook University; Arun Dunna, U. Mass Amherst; Romain Fontugne, IIJ Research Lab; Phillipa Gill, U. Mass Amherst

Security and Privacy Enabled Smart Ecosystem: Smart Parking as a Service (SPaaS)
Pankaj Chhetri, Prairie View A&M University; Paras Bhatt, University of Texas at San Antonio; Smriti Bhatt, Texas A&M University-San Antonio; Cajetan Akujuobi, Prairie View A&M University

The 1-Byte Constant Attack against JIT Compilers
Takahiro Shinagawa, Yuki Suzuki, Tomoyuki Nakayama, and Masanori Misono, The University of Tokyo

Crafting Adversarial Examples on Sensor Fusion Models
Won Park and Z. Morley Mao, University of Michigan

Proving Equivalence of iptables and BPF programs
Mark Santolucito and Ruzica Piskac, Yale University

Faster Optimal-rate Many-server Private Information Retrieval (PIR)
Syed Mahbub Hafiz, Indiana University Bloomington; Ryan Henry, University of Calgary