Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Home
Archive
Call for Papers
Registration
Program Agenda
WIP at HoTSoS
Program Committee
Presenter Guidance
Past Events
Files
CPS-VO
»
Science of Security VO
»
Symposium on the Science of Security (HotSoS)
» POSTERS
Posters
file
Type-Specific Languages to Fight Injection Attacks (poster)
Submitted by JonathanAldrich on Wed, 06/04/2014 - 9:43am. Contributors:
Darya Kurilova
Cyrus Omar
Ligia Nistor
Benjamin Chung
Alex Potanin
Jonathan Aldrich
Slides of this poster are available
here
.
cross-site scripting
injection attack
SQL injection
TSL
type-specific language
XSS
HotSoS 2014
Academia
Poster
Posters
Posters
file
Securing Hadoop in Cloud (poster)
Submitted by vouk on Wed, 06/04/2014 - 9:43am. Contributors:
Xianqing Yu
Peng Ning
Mladen A. Vouk
cloud
Hadoop
lack of fine-grained access control
overloaded authentication key
HotSoS 2014
Academia
Poster
Posters
Posters
Access Control
file
Secure-by-Construction Composable Componentry for Network Processing (poster)
Submitted by Heather Lucas on Wed, 06/04/2014 - 9:43am. Contributors:
Lisa Durbeck
Peter Athanas
Nicholas Macias
100 Gbps
hardware-software co-design
network processor
secure-by-construction
stream processing
HotSoS 2014
Academia
Poster
Posters
Posters
Embedded Systems Security
Security in Hardware
file
Personalized Password Guessing: a New Security Threat (poster)
Submitted by Heather Lucas on Wed, 06/04/2014 - 9:43am. Contributor:
Phuong Cao
HotSoS 2014
Academia
Poster
Posters
Posters
file
Preemptive Intrusion Detection (poster)
Submitted by Heather Lucas on Wed, 06/04/2014 - 9:43am. Contributors:
Phuong Cao
Adam J. Slagell
Key-whan Chung
Zbigniew Kalbarczyk
Ravishankar Iyer
HotSoS 2014
Academia
Poster
Posters
Posters
Intrusion/Anomaly Detection and Malware Mitigation
file
Limiting Recertification in Highly Configurable Systems: Analyzing Interactions and Isolation among Configuration Options (poster)
Submitted by Pfeffer Juergen on Wed, 06/04/2014 - 9:43am. Contributors:
Christian Kästner
Jürgen Pfeffer
Slides of this poster are available
here
.
configuration options
network analysis
HotSoS 2014
Academia
Poster
Posters
Posters
Security Metrics
Security Certification
file
Modeling and Sensing Risky User Behavior on Mobile Devices (poster)
Submitted by enck on Wed, 06/04/2014 - 9:43am. Contributors:
Qian Liu
Juhee Bae
Benjamin Watson
Anne McLaughlin
William Enck
Modeling
mobile devices
HotSoS 2014
Academia
Poster
Posters
Posters
file
Integration of Security Pattern Selection Practices with Pattern Storage (poster)
Submitted by Heather Lucas on Wed, 06/04/2014 - 9:43am. Contributors:
Jean-Michel Lehker
Rocky Slavin
Jianwei Niu
Slides of this poster are available
here
.
Experimentation
Management
Patterns
Repository
HotSoS 2014
Academia
Poster
Posters
Posters
Security Requirements
file
InViz: Instant Visualization of Security Attacks (poster)
Submitted by Heather Lucas on Wed, 06/04/2014 - 9:43am. Contributors:
Lucas Layman
Nico Zazworka
Slides of this poster are available
here
.
Forensics
Human Factors
log
situational awareness
visualization
HotSoS 2014
Academia
Poster
Posters
Posters
Human and Societal Aspects of Security and Privacy
file
Improving Mobile Application Security via Bridging User Expectations and Application Behaviors (poster)
Submitted by taoxie on Wed, 06/04/2014 - 9:43am. Contributors:
Wei Yang
Xusheng Xiao
Rahul Pandita
William Enck
Tao Xie
Slides of this poster are available
here
.
natural language processing
Privacy Control
HotSoS 2014
Academia
Poster
Posters
Posters
Usable Privacy
Usable Security
1
2
next ›
last »