Poster Session

Visible to the public 

PI Title Poster Session Presenter(s)
Alessandro Acquisti (CMU) Evolutionary Approaches to Privacy and Information Security Alessandro Acquisti
Bonnie Anderson (Brigham Young University) Using Neuroscience to Explain User Responses to Malware Warnings Bonnie Anderson
Terrence August A Comparative Analysis of Software Liability Policies Terrence August
Clark Barrett (New York University) CVC4: A Tool for Automatically Reasoning About Programs and Systems Clark Barrett
Jim Basney (NCSA) Distributed Web Security for Science Gateways Jim Basney
Elisa Bertino (Purdue University) A Comprehensive Provenance Model Elisa Bertino
Alexandra Boldyreva (Georgia Institute of Technology) Efficiently Searchable Symmetric Encryption Alexandra Boldyreva
Wayne P. Burleson (University of Massachusetts Amherst) E-cash for Intelligent Public Transportation Wayne P. Burleson
Justin Cappos (NYU Poly) Seattle: An Educational Platform For Systems Classes Justin Cappos
Sandra Carpenter (The University of Alabama in Huntsville) Psychological Attacks and Mitigations Sandra Carpenter
Hao Chen (University of California, Davis) Detecting Cloned Applications on Android Markets Hao Chen
Yan Chen (Northwestern University Real-Time Private Information Leakage Detection on Android without System Modication Yan Chen
Yingying Cheng (Stevens Institute of Technology) CAREER: EASE: Enhancing the Security of Pervasive Wireless Networks Yingying Cheng
Yu Cheng (Illinois Institute of Technology) Intrusion Detection for Multimedia Communications over 802.11 Based Wireless Networks: An Analytical Approach Yu Cheng
Kimberly Claffy (CAIDA, UCSD) Detection and Analysis of Large-Scale Internet Infrastructure Outages Alberto Dainotti
Chris Clifton Generalizing Text to Protect Privacy Chris Clifton
Reza Curtmola (NJIT) Remote Data Integrity Checking for Cloud Storage Reza Curtmola
Ram Dantu (University of North Texas) Another Free App: Does It Have the Right Intentions? Ram Dantu
Yingfei Dong (University of Hawaii) Experimental Study of Accountability in Existing Anonymous Networks Yingfei Dong
Wenliang Du (Syracuse University) Web Security: Re-Designing the Web's Security Infrastructure Wenliang Du
Tudor Dumitras (Symantec Research Labs) WINE: Data-Intensive Experiments in Security Tudor Dumitras
Shantanu Dutt (University of Illinois at Chicago) Trusted FPGA Design using Non-Integrated and Fully-Integrated Shantanu Dutt
Sonia Fahmy (Purdue University) Scaling Network Security Experiments Sonia Fahmy
Nelly Fazio (Graduate Center & City College of CUNY Anonymous, Secure and Robust Multi-Recipient Communication Nelly Fazio
Wu-chang Feng (Portland State University) kaPoW Web Plug-ins Wu-Chang Feng
Errin Fulp (Wake Forest University) An Evolutionary-Inspired Approach for Moving Target Defenses Errin Fulp
Johannes Gehrke (Cornell University) Controlling Disclosure in App Ecosystems Johannes Gehrke
Sharon Goldberg (Boston University) A Strategy for Transitioning to BGP Security Sharon Goldberg
Luanne Goldrich (JHU APL) DART3: DHS Assistant for R&D Tracking and Technology Transfer Luanne Burns Goldrich,Christina Selby, Thomas Longstaff
Luanne Goldrich (JHU APL) SCORE-Sponsored Cyber Integrated Demonstrationsr Luanne Goldrich, Tanner Allen
Venu Govindaraju (SUNY Buffalo) Integrating Privacy Preserving Biometric Templates and Efficient Indexing Methods Venu Govindaraju
Guofei Gu (Texas A&M University) Using Enemies' Strength Against Them Guofei Gu
Mina Guirguis (Texas State University) Securing Mobile CPSs Against Stealthy Attacks Mina Guirguis
Andreas Haeberlen (University of Pennsylvania) Secure Network Provenance Andreas Haeberlen
Drew Hamilton (Auburn University) A Digital Forensics Cyberinfrastructure Workforce Training Initiative for America's Veterans Drew Hamilton
Matthew Hashim (University of Arizona) Collaboration, Interdependency, and Transfer Pricing Matthew Hashim
Haibo He (University of Rhode Island) Secure the Electrical Power Grid: Smart Grid versus Smart Attacks Haibo He
Raquel Hill (Indiana University) Privacy Risks in Social Science Datasets Raquel Hill
Shuyuan Mary Ho (Florida State University) Organic Social Firewall: A Human-Computational Study of Trustworhty Communications Shuyuan Mary Ho
Adele Howe (Colorado State University) Computer Security for the Home User Adele Howe
Ted Huffmire (Naval Postgraduate School) 3Dsec: Trustworthy System Security through 3D Integrated Hardware Ted Huffmire
Trent Jaeger (Pennsylvania State University) Comprehensive System Verification in Cloud Computing Environments Trent Jaeger
Niraj Jha (Princeton University) Enhancing the Safety and Trustworthiness of Medical Devices Niraj K. Jha and Anand Raghunathan
Ping Ji (City University of New York (CUNY) - John Jay College) Security Monitoring for Wireless Network Forensics Ping Ji
Murat Kantarcioglu (University of Texas at Dallas) Efficient Similarity Search over Encrypted Data Murat Kantarcioglu
Sang Wu Kim (Iowa State University) Securing Wireless Network Coding against Pollution Attack at the Physical Layer Sand Wu Kim
David Kotz (Dartmouth College) Trustworthy Information Systems in Healthcare Denise Anthony
Adam Lee (University of Pittsburgh) Foundations of Application-Sensitive Access Control Evaluation Adam J. Lee
Janne Lindqvist (Rutgers University) Redesigning Mobile Privacy Janne Lindqvist
Anna Lysyankskaya (Brown University) Reconciling Privacy and Accountability Anna Lysyanskaya
Dan Massey (Colorado State University) BGP Monitoring and Security Dan Massey
Nasir Memon (Polytechnic Institute of New York University) Investigating Multi-touch Gestures as a Novel Biometric Modality Nasir Memon
Jelena Mirkovic (USC/ISI) Critter@home: Content-Rich Traffic Trace Repository from Real-Time, Anonymous, User Contributions Jelena Mirkovic
Antonio Nicolosi (Stevens Institute of Technology) Provable Security from Group Theory and Applications Antonio R. Nicolosi
Leon Osterweil (University of Massachusetts Amherst) Process Model-Based Continuous Improvement of Election Process Quality and Robustness Leon Osterweil
Xinming Ou (Kansas State University) Classification of UDP Traffic for DDoS Detection Alexandru G Bardas
Xinming Ou (Kansas State University) Prioritizing Intrusion Analysis Using Dempster-Shafer Theory Loai Zomlot
Roberto Perdisci (University of Georgia) Malware Defense via Download Provenance Classification Roberto Perdisci
Corin Pitcher (DePaul University) Compositional Declarative Forensics Corin Pitcher
Donald Porter (Stony Brook University) Hardware Isolation from an Untrustworthy OS Donald Porter
Michael Pozmantier (DHS S&T Cyber Security Division) Transition to Practice Michael Pozmantier
Atul Prakash (University of Michigan) Information Confinement on Commodity Systems Atul Prakash
Lisa PytlikZillig (University of Nebraska Public Policy Center) Designing Cyber-Spaces & Promoting Cyber-Cultures to Reduce SPEC-Inspired Hacktivism Lisa M. PytlikZillig (PI), Tonya K. Bernadt, Michael J. Hayes, Ashok Samal, Leen-Kiat Soh, Alan J. Tomkins, Shiyuan Wang
H. Raghav Rao (University of Buffalo) Distrust of the Internet in Older Adults H. Raghav Rao
Narasimha Reddy (Texas A&M University) Detecting Spammers on Twitter Narasimha Reddy
Kui Ren (State University of New York at Buffalo) Privacy-preserving Search and Computation for Cloud Data Kui Ren
Norman Sadeh (Carnegie Mellon University) User-Controllable Learning of Security and Privacy Policies Norman Sadeh
Andre Scedrov (University of Pennsylvania) Declarative Privacy Policy: Finite Models and Attribute-Based Encryption Andre Scedrov
Andre Scedrov (University of Pennsylvania) Towards an Automated Assistant for Clinical Investigations Andre Scedrov
Patrick Schaumont (Virginia Tech) Foundations for Future On-chip Fingerprints Patrick Schaumont
Simha Sethumadhavan (Columbia University) Trustworthy Hardware from Untrustworthy Hardware Simha Sethumdhavan
Zhong Shao (Yale University) Making OS Kernels Crash-Proof by Design and Certification Zhong Shao
Radu Sion (Stony Brook University) NFSv4: An Extensible Security Layer for Network Storage Radu Sion
Adam Smith (Pennsylvania State University) Analyzing Graphs with Node-level Differential Privacy Adam Smith
Jon Solworth (University of Illinois at Chicago) Why Johnny's Application Is Not Secure Jon Solworth
Gary Stoneburner (JHU/APL) New Journal for Non-Public Cybersecurity Research Gary Stoneburner
Aaron Striegel (University of Notre Dame) On Cell Phones and Punishment: Encouraging Secure Mobile Behavior Through Morality Aaron Striegel
Berk Sunar (Worcester Polytechnic Institute) Homomorphic Encryption for Cloud Privacy Berk Sunar
Patrick Tague (Carnegie Mellon University) Constrainted Adaptive Jamming and Anti-Jamming Patrick Tague
Gang Tan (Lehigh University) Rocksalt: A Formally Verified Machine Code Security Checker Gang Tan
Shambhu Upadhyaya (University at Buffalo) Designing Mission Survivable Systems Using Proactive Schemes Shambhu Upadhyaya
Joseph Urban (Texas Tech University) An Innovative Interdisciplinary Cybersecurity Education Program for Protecting Critical Infrastructure Vittal Rao
Anthony Vance (Brigham Young University) Deterring Unauthorized Access by Insiders: Raising Perceptions of Accountability in End Users Through User Interface Artifacts Anthony Vance
Weichao Wang (UNC Charlotte) Exploring the Security Capabilities of Physical Layer Network Coding (PNC) in Wireless Networks Weichao Wang
Susanne Wetzel (Stevens Institute of Technology) Privacy-preserving Reconciliation Protocols on Ordered Sets Susanne Wetzel
Tilman Wolf (University of Massachusetts Amherst) Securing the Router Infrastructure of the Internet Tilman Wolf
Matthew Wright (University of Texas at Arlington) Persea: A Sybil-Resistant Social DHT Matthew Wright
Rebecca Wright (Rutgers University) Accountability and Identifiability Aaron Jaggard and Rebecca Wright
Li Xiong (Emory University) Real-time Aggregate Monitoring with Differential Privacy Li Xiong
Heng Xu (Pennsylvania State University) Privacy-by-ReDesign: Alleviating Users' Privacy Concerns for Third-Party Applications Heng Xu
Yuan Xue (ISIS/Vanderbilt University) iSEE: Integrated Simulation and Emulation Platform for Cyber-Physical System Security Experimentation Yuan Xue
Yaling Yang (Virginia Tech) SDR Spectrum Monitoring Through Power Finger Printing Yaling Yang
Danfeng (Daphne) Yao (Virginia Tech) Storytelling Security: Semantic and Structural Causal Analysis Danfeng (Daphne) Yao
Ben Zhao (UC Santa Barbara) Social Turing Tests: Crowdsourcing Sybil Detection Ben Zhao
Huiyang Zhou (North Carolina State University) Architecting Against Software Cache-Based Side Channel Attacks Huiyang Zhou
Lina Zhou (University of Maryland Baltimore County) Online Deception Behavior and its Automatic Detection Lina Zhou
Heng Yin (Syracuse University) Virtualization and Binary Centric Approach to Malware Analysis Heng Yin