Poster Session
PI | Title | Poster Session Presenter(s) |
Alessandro Acquisti (CMU) | Evolutionary Approaches to Privacy and Information Security | Alessandro Acquisti |
Bonnie Anderson (Brigham Young University) | Using Neuroscience to Explain User Responses to Malware Warnings | Bonnie Anderson |
Terrence August | A Comparative Analysis of Software Liability Policies | Terrence August |
Clark Barrett (New York University) | CVC4: A Tool for Automatically Reasoning About Programs and Systems | Clark Barrett |
Jim Basney (NCSA) | Distributed Web Security for Science Gateways | Jim Basney |
Elisa Bertino (Purdue University) | A Comprehensive Provenance Model | Elisa Bertino |
Alexandra Boldyreva (Georgia Institute of Technology) | Efficiently Searchable Symmetric Encryption | Alexandra Boldyreva |
Wayne P. Burleson (University of Massachusetts Amherst) | E-cash for Intelligent Public Transportation | Wayne P. Burleson |
Justin Cappos (NYU Poly) | Seattle: An Educational Platform For Systems Classes | Justin Cappos |
Sandra Carpenter (The University of Alabama in Huntsville) | Psychological Attacks and Mitigations | Sandra Carpenter |
Hao Chen (University of California, Davis) | Detecting Cloned Applications on Android Markets | Hao Chen |
Yan Chen (Northwestern University | Real-Time Private Information Leakage Detection on Android without System Modication | Yan Chen |
Yingying Cheng (Stevens Institute of Technology) | CAREER: EASE: Enhancing the Security of Pervasive Wireless Networks | Yingying Cheng |
Yu Cheng (Illinois Institute of Technology) | Intrusion Detection for Multimedia Communications over 802.11 Based Wireless Networks: An Analytical Approach | Yu Cheng |
Kimberly Claffy (CAIDA, UCSD) | Detection and Analysis of Large-Scale Internet Infrastructure Outages | Alberto Dainotti |
Chris Clifton | Generalizing Text to Protect Privacy | Chris Clifton |
Reza Curtmola (NJIT) | Remote Data Integrity Checking for Cloud Storage | Reza Curtmola |
Ram Dantu (University of North Texas) | Another Free App: Does It Have the Right Intentions? | Ram Dantu |
Yingfei Dong (University of Hawaii) | Experimental Study of Accountability in Existing Anonymous Networks | Yingfei Dong |
Wenliang Du (Syracuse University) | Web Security: Re-Designing the Web's Security Infrastructure | Wenliang Du |
Tudor Dumitras (Symantec Research Labs) | WINE: Data-Intensive Experiments in Security | Tudor Dumitras |
Shantanu Dutt (University of Illinois at Chicago) | Trusted FPGA Design using Non-Integrated and Fully-Integrated | Shantanu Dutt |
Sonia Fahmy (Purdue University) | Scaling Network Security Experiments | Sonia Fahmy |
Nelly Fazio (Graduate Center & City College of CUNY | Anonymous, Secure and Robust Multi-Recipient Communication | Nelly Fazio |
Wu-chang Feng (Portland State University) | kaPoW Web Plug-ins | Wu-Chang Feng |
Errin Fulp (Wake Forest University) | An Evolutionary-Inspired Approach for Moving Target Defenses | Errin Fulp |
Johannes Gehrke (Cornell University) | Controlling Disclosure in App Ecosystems | Johannes Gehrke |
Sharon Goldberg (Boston University) | A Strategy for Transitioning to BGP Security | Sharon Goldberg |
Luanne Goldrich (JHU APL) | DART3: DHS Assistant for R&D Tracking and Technology Transfer | Luanne Burns Goldrich,Christina Selby, Thomas Longstaff |
Luanne Goldrich (JHU APL) | SCORE-Sponsored Cyber Integrated Demonstrationsr | Luanne Goldrich, Tanner Allen |
Venu Govindaraju (SUNY Buffalo) | Integrating Privacy Preserving Biometric Templates and Efficient Indexing Methods | Venu Govindaraju |
Guofei Gu (Texas A&M University) | Using Enemies' Strength Against Them | Guofei Gu |
Mina Guirguis (Texas State University) | Securing Mobile CPSs Against Stealthy Attacks | Mina Guirguis |
Andreas Haeberlen (University of Pennsylvania) | Secure Network Provenance | Andreas Haeberlen |
Drew Hamilton (Auburn University) | A Digital Forensics Cyberinfrastructure Workforce Training Initiative for America's Veterans | Drew Hamilton |
Matthew Hashim (University of Arizona) | Collaboration, Interdependency, and Transfer Pricing | Matthew Hashim |
Haibo He (University of Rhode Island) | Secure the Electrical Power Grid: Smart Grid versus Smart Attacks | Haibo He |
Raquel Hill (Indiana University) | Privacy Risks in Social Science Datasets | Raquel Hill |
Shuyuan Mary Ho (Florida State University) | Organic Social Firewall: A Human-Computational Study of Trustworhty Communications | Shuyuan Mary Ho |
Adele Howe (Colorado State University) | Computer Security for the Home User | Adele Howe |
Ted Huffmire (Naval Postgraduate School) | 3Dsec: Trustworthy System Security through 3D Integrated Hardware | Ted Huffmire |
Trent Jaeger (Pennsylvania State University) | Comprehensive System Verification in Cloud Computing Environments | Trent Jaeger |
Niraj Jha (Princeton University) | Enhancing the Safety and Trustworthiness of Medical Devices | Niraj K. Jha and Anand Raghunathan |
Ping Ji (City University of New York (CUNY) - John Jay College) | Security Monitoring for Wireless Network Forensics | Ping Ji |
Murat Kantarcioglu (University of Texas at Dallas) | Efficient Similarity Search over Encrypted Data | Murat Kantarcioglu |
Sang Wu Kim (Iowa State University) | Securing Wireless Network Coding against Pollution Attack at the Physical Layer | Sand Wu Kim |
David Kotz (Dartmouth College) | Trustworthy Information Systems in Healthcare | Denise Anthony |
Adam Lee (University of Pittsburgh) | Foundations of Application-Sensitive Access Control Evaluation | Adam J. Lee |
Janne Lindqvist (Rutgers University) | Redesigning Mobile Privacy | Janne Lindqvist |
Anna Lysyankskaya (Brown University) | Reconciling Privacy and Accountability | Anna Lysyanskaya |
Dan Massey (Colorado State University) | BGP Monitoring and Security | Dan Massey |
Nasir Memon (Polytechnic Institute of New York University) | Investigating Multi-touch Gestures as a Novel Biometric Modality | Nasir Memon |
Jelena Mirkovic (USC/ISI) | Critter@home: Content-Rich Traffic Trace Repository from Real-Time, Anonymous, User Contributions | Jelena Mirkovic |
Antonio Nicolosi (Stevens Institute of Technology) | Provable Security from Group Theory and Applications | Antonio R. Nicolosi |
Leon Osterweil (University of Massachusetts Amherst) | Process Model-Based Continuous Improvement of Election Process Quality and Robustness | Leon Osterweil |
Xinming Ou (Kansas State University) | Classification of UDP Traffic for DDoS Detection | Alexandru G Bardas |
Xinming Ou (Kansas State University) | Prioritizing Intrusion Analysis Using Dempster-Shafer Theory | Loai Zomlot |
Roberto Perdisci (University of Georgia) | Malware Defense via Download Provenance Classification | Roberto Perdisci |
Corin Pitcher (DePaul University) | Compositional Declarative Forensics | Corin Pitcher |
Donald Porter (Stony Brook University) | Hardware Isolation from an Untrustworthy OS | Donald Porter |
Michael Pozmantier (DHS S&T Cyber Security Division) | Transition to Practice | Michael Pozmantier |
Atul Prakash (University of Michigan) | Information Confinement on Commodity Systems | Atul Prakash |
Lisa PytlikZillig (University of Nebraska Public Policy Center) | Designing Cyber-Spaces & Promoting Cyber-Cultures to Reduce SPEC-Inspired Hacktivism | Lisa M. PytlikZillig (PI), Tonya K. Bernadt, Michael J. Hayes, Ashok Samal, Leen-Kiat Soh, Alan J. Tomkins, Shiyuan Wang |
H. Raghav Rao (University of Buffalo) | Distrust of the Internet in Older Adults | H. Raghav Rao |
Narasimha Reddy (Texas A&M University) | Detecting Spammers on Twitter | Narasimha Reddy |
Kui Ren (State University of New York at Buffalo) | Privacy-preserving Search and Computation for Cloud Data | Kui Ren |
Norman Sadeh (Carnegie Mellon University) | User-Controllable Learning of Security and Privacy Policies | Norman Sadeh |
Andre Scedrov (University of Pennsylvania) | Declarative Privacy Policy: Finite Models and Attribute-Based Encryption | Andre Scedrov |
Andre Scedrov (University of Pennsylvania) | Towards an Automated Assistant for Clinical Investigations | Andre Scedrov |
Patrick Schaumont (Virginia Tech) | Foundations for Future On-chip Fingerprints | Patrick Schaumont |
Simha Sethumadhavan (Columbia University) | Trustworthy Hardware from Untrustworthy Hardware | Simha Sethumdhavan |
Zhong Shao (Yale University) | Making OS Kernels Crash-Proof by Design and Certification | Zhong Shao |
Radu Sion (Stony Brook University) | NFSv4: An Extensible Security Layer for Network Storage | Radu Sion |
Adam Smith (Pennsylvania State University) | Analyzing Graphs with Node-level Differential Privacy | Adam Smith |
Jon Solworth (University of Illinois at Chicago) | Why Johnny's Application Is Not Secure | Jon Solworth |
Gary Stoneburner (JHU/APL) | New Journal for Non-Public Cybersecurity Research | Gary Stoneburner |
Aaron Striegel (University of Notre Dame) | On Cell Phones and Punishment: Encouraging Secure Mobile Behavior Through Morality | Aaron Striegel |
Berk Sunar (Worcester Polytechnic Institute) | Homomorphic Encryption for Cloud Privacy | Berk Sunar |
Patrick Tague (Carnegie Mellon University) | Constrainted Adaptive Jamming and Anti-Jamming | Patrick Tague |
Gang Tan (Lehigh University) | Rocksalt: A Formally Verified Machine Code Security Checker | Gang Tan |
Shambhu Upadhyaya (University at Buffalo) | Designing Mission Survivable Systems Using Proactive Schemes | Shambhu Upadhyaya |
Joseph Urban (Texas Tech University) | An Innovative Interdisciplinary Cybersecurity Education Program for Protecting Critical Infrastructure | Vittal Rao |
Anthony Vance (Brigham Young University) | Deterring Unauthorized Access by Insiders: Raising Perceptions of Accountability in End Users Through User Interface Artifacts | Anthony Vance |
Weichao Wang (UNC Charlotte) | Exploring the Security Capabilities of Physical Layer Network Coding (PNC) in Wireless Networks | Weichao Wang |
Susanne Wetzel (Stevens Institute of Technology) | Privacy-preserving Reconciliation Protocols on Ordered Sets | Susanne Wetzel |
Tilman Wolf (University of Massachusetts Amherst) | Securing the Router Infrastructure of the Internet | Tilman Wolf |
Matthew Wright (University of Texas at Arlington) | Persea: A Sybil-Resistant Social DHT | Matthew Wright |
Rebecca Wright (Rutgers University) | Accountability and Identifiability | Aaron Jaggard and Rebecca Wright |
Li Xiong (Emory University) | Real-time Aggregate Monitoring with Differential Privacy | Li Xiong |
Heng Xu (Pennsylvania State University) | Privacy-by-ReDesign: Alleviating Users' Privacy Concerns for Third-Party Applications | Heng Xu |
Yuan Xue (ISIS/Vanderbilt University) | iSEE: Integrated Simulation and Emulation Platform for Cyber-Physical System Security Experimentation | Yuan Xue |
Yaling Yang (Virginia Tech) | SDR Spectrum Monitoring Through Power Finger Printing | Yaling Yang |
Danfeng (Daphne) Yao (Virginia Tech) | Storytelling Security: Semantic and Structural Causal Analysis | Danfeng (Daphne) Yao |
Ben Zhao (UC Santa Barbara) | Social Turing Tests: Crowdsourcing Sybil Detection | Ben Zhao |
Huiyang Zhou (North Carolina State University) | Architecting Against Software Cache-Based Side Channel Attacks | Huiyang Zhou |
Lina Zhou (University of Maryland Baltimore County) | Online Deception Behavior and its Automatic Detection | Lina Zhou |
Heng Yin (Syracuse University) | Virtualization and Binary Centric Approach to Malware Analysis | Heng Yin |