Title |
Speakers |
Summary |
Topic Types |
Dowsing for Over?ows. A Guided Fuzzer to Find Buffer Boundary Violations |
Istvan Haller
,
Asia Slowinska
,
Matthias Neugschwandtner
,
Herbert Bos
|
|
|
Traf?cking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse |
Kurt Thomas
,
Damon McCoy
,
Chris Grier
,
Alek Kolcz
,
Vern Paxson
|
|
|
Opening Remarks and Awards |
Sam King
|
N/A |
|
Dr. Felten Goes To Washington: Lessons from 18 Months in Government |
Edward W. Felten
|
This talk will describe the speaker's experience in government, where he served as the first ... |
|
Network Security |
Chris Grier
|
N/A |
|
Greystar: Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space |
Nan Jiang
,
Yu Jin
,
Ann Skudlark
,
Zhi-li Zhang
|
N/A |
|
Practical Comprehensive Bounds on Surreptitious Communication over DNS |
Douglas Lee Schales
,
Wietse Venema
,
Vern Paxson
,
Reiner Sailer
,
Mihai Christodorescu
,
Nicholas Weaver
,
Kurt Thomas
,
Mobin Javed
,
Josyula Rao
,
Marc Ph. Stoecklin
|
N/A |
|
Let Me Answer That for You: Exploiting Broadcast Information in Cellular Networks |
Nico Golde
,
Kevin Redon
,
Jean-pierre Seifert
|
N/A |
|
Potpourri |
David A. Wagner
|
N/A |
|
MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis |
Peng Ning
,
Ruowen Wang
,
Tao Xie
,
Quan Chen
|
N/A |
|
Towards Automatic Software Lineage Inference |
David Brumley
,
Jiyong Jang
,
Maverick Woo
|
N/A |
|
Mobile Security I |
Patrick Traynor
|
N/A |
|
Securing Embedded User Interfaces: Android and Beyond |
Tadayoshi Kohno
,
Franziska Roesner
|
N/A |
|
Automatic Mediation of Privacy-Sensitive Resource Access in Smartphone Applications |
Benjamin Livshits
,
Jaeyeon Jung
|
N/A |
|
Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies |
Sven Bugiel
,
Ahmad-reza Sadeghi
,
Stephan Heuser
|
N/A |
|
Windows 8 Security: Supporting User Confidence |
Crispin Cowan
|
Computing appliances should let users just use the device without having to having to “be ... |
|
Applied Crypto I |
Ian Goldberg
|
N/A |
|
Proactively Accountable Anonymous Messaging in Verdict |
Bryan Ford
,
Henry Corrigan-gibbs
,
David Isaac Wolinsky
|
N/A |
|
ZQL: A Compiler for Privacy-Preserving Data Processing |
Markulf Kohlweiss
,
Cedric Fournet
,
Zhengqin Luo
,
And George Danezis
|
N/A |
|
DupLESS: Server-Aided Encryption for Deduplicated Storage |
Thomas Ristenpart
,
Mihir Bellare
,
Sriram Keelveedhi
|
N/A |
|
Large-Scale Systems Security I |
Niels Provos
,
Google
|
N/A |
|
Impression Fraud in On-line Advertising via Pay-Per-View Networks |
Paul Barford
,
Kevin Springborn
|
N/A |
|
The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions |
Adam Pridgen
,
Jedidiah R. Crandall
,
Dan S. Wallach
,
Tao Zhu
,
David Phipps
|
N/A |
|
The White House's Priorities for Cybersecurity |
Andy Ozment
|
Andy Ozment will describe the view on cybersecurity from the White House, including the Administration's ... |
|
You Are How You Click: Clickstream Analysis for Sybil Detection |
Xiao sophia Wang
,
Gang Wang
,
Tristan Konolige
,
Christo Wilson
,
Haitao Zheng
,
Ben Y. Zhao
|
N/A |
|
Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness |
Adrienne porter Felt
,
Devdatta Akhawe
|
N/A |
|
An Empirical Study of Vulnerability Rewards Programs |
David A. Wagner
,
Devdatta Akhawe
,
Matthew Finifter
|
N/A |
|
Secure Outsourced Garbled Circuit Evaluation for Mobile Devices |
Patrick Traynor
,
Henry Carter
,
Kevin Butler
,
Benjamin Mood
|
N/A |
|
On the Security of RC4 in TLS |
Daniel J. Bernstein
,
Bertram Poettering
,
Kenneth g. Paterson
,
Nadhem Alfardan
,
Jacob C.n. Schuldt
|
N/A |
|
PCF: A Portable Circuit Format for Scalable Two-Party Secure Computation |
Kevin Butler
,
Benjamin Mood
,
Ben Kreuter
,
Abhi Shelat
|
N/A |
|
Protecting and Understanding Binaries |
Ben Livshits
|
N/A |
|
Control Flow Integrity for COTS Binaries |
R. Sekar
,
Mingwei Zhang
|
N/A |
|
Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring |
David Brumley
,
Edward J. Schwartz
,
Maverick Woo
,
Jonghyup Lee
|
N/A |
|
Strato: A Retargetable Framework for Low-Level Inlined-Reference Monitors |
Gang Tan
,
Bin Zeng
,
Ulfar Erlingsson
|
N/A |
|
Confessions of a "Recovering" Data Broker: Responsible Innovation in the Age of Big Data, Big Brother, and the Coming Skynet Terminators |
Jim Adler
|
It's been said that the human brain is comprised of 300 million pattern matchers fed ... |
|
Current and Future Systems Security |
Adrienne porter Felt
|
N/A |
|
On the Security of Picture Gesture Authentication |
Gail-joon Ahn
,
Ziming Zhao
,
Jeong-jin Seo
,
Hongxin Hu
|
N/A |
|
Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization |
David Evans
,
Rui Wang
,
Shuo Chen
,
Yuri Gurevich
,
Yuchen Zhou
,
Shaz Qadeer
|
N/A |
|
Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers |
David Molnar
,
Benjamin Livshits
,
Helen J. Wang
,
Alexander Moshchuk
,
Suman Jana
,
Alan Dunn
,
Eyal Ofek
|
N/A |
|
CacheAudit: A Tool for the Static Analysis of Cache Side Channels |
Goran Doychev
,
Dominik Feld
,
Boris Köpf
,
Laurent Mauborgne
,
Jan Reineke
|
N/A |
|
Transparent ROP Exploit Mitigation Using Indirect Branch Tracing |
Angelos D. Keromytis
,
Michalis Polychronakis
,
Vasilis Pappas
|
N/A |
|
FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution |
Drew Davidson
,
Somesh Jha
,
Thomas Ristenpart
,
Benjamin Moench
|
N/A |
|
Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base |
Bart Preneel
,
Ingrid Verbauwhede
,
Christophe Huygens
,
Pieter Agten
,
Raoul Strackx
,
Frank Piessens
,
Anthony van Herrewege
,
Job Noorman
,
Wilfried Daniels
,
Ku Leuven
|
N/A |
|
Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation |
Mahesh v. Tripunitara
,
Frank Imeson
,
Ariq Emtenan
,
Siddharth Garg
|
N/A |
|
KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object |
Brent ByungHoon Kang
,
Hojoon Lee
,
Hyungon Moon
,
Daehee Jang
,
Kihwan Kim
,
Jihoon Lee
,
Yunheung Paek
|
N/A |
|
Security Team 2.0 |
Chris Evans
|
The Chrome Security Team was founded in 2009 and has adopted a different approach and ... |
|
WHYPER: Towards Automating Risk Assessment of Mobile Applications |
William Enck
,
Rahul Pandita
,
Tao Xie
,
Xusheng Xiao
,
Wei Yang
|
N/A |
|
Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis |
Patrick Mcdaniel
,
Somesh Jha
,
Damien Octeau
,
Alexandre Bartel
,
Eric Bodden
,
Jacques Klein
,
Yves Le Traon
|
N/A |
|
Jekyll on iOS: When Benign Apps Become Evil |
Wenke Lee
,
Long Lu
,
Tielei Wang
,
Kangjie Lu
,
Simon Chung
|
N/A |
|
Measuring the Practical Impact of DNSSEC Deployment |
Hovav Shacham
,
Stefan Savage
,
Eric Rescorla
,
Wilson Lian
|
N/A |
|
ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates |
Roberto Perdisci
,
Terry Nelms
,
Mustaque Ahamad
|
N/A |
|
ZMap: Fast Internet-wide Scanning and Its Security Applications |
J. Alex Halderman
,
Eric Wustrow
,
Zakir Durumeric
|
N/A |
|
Eradicating DNS Rebinding with the Extended Same-origin Policy |
Martin Johns
,
Ben Stock
,
Sebastian Lekies
|
N/A |
|
Revolver: An Automated Approach to the Detection of Evasive Web-based Malware |
Christopher Kruegel
,
Giovanni Vigna
,
Marco Cova
,
Alexandros Kapravelos
,
Yan Shoshitaishvili
|
N/A |
|
Language-based Defenses Against Untrusted Browser Origins |
Karthikeyan Bhargavan
,
Sergio Maffeis
,
Antoine Delignat-lavaud
|
N/A |
|
Building Securable Infrastructure: Open-Source Private Clouds |
Pravir Chandra
|
Using an open-sourced stack from bottom to top, this presentation will discuss the practical challenges ... |
|
Tracking the Casino Computer Wars: Who’s Winning—the Casino or the Cheat? |
Richard Marcus
|
The talk will open with an entertaining demonstration of what is widely considered the best ... |
|
Take This Personally: Pollution Attacks on Personalized Services |
Wenke Lee
,
Nick Feamster
,
Wei Meng
,
Alex c. Snoeren
,
Xinyu Xing
,
Dan Doozan
|
N/A |
|
Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services |
Christopher Kruegel
,
Giovanni Vigna
,
Ruoyu Wang
,
Yan Shoshitaishvili
|
N/A |
|