
"Q: Exploit Hardening Made Easy"
Edward Schwartz, Carnegie Mellon University
"Silencing Hardware Backdoors"
Adam Waksman, Columbia University
"Exploiting Smart-Phone USB Connectivity For Fun And Profit"
Zhaohui Wang, George Mason University
"Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection"
Brendan Dolan-Gavitt, Georgia Institute of Technology
"Secure In-Band Wireless Pairing"
Shyamnath Gollakota, MIT
"SURF: Detecting and Measuring Search Poisoning"
Long Lu, Georgia Institute of Technology
"Automated Analysis of Security-Critical JavaScript APIs"
Ankur Taly, Stanford University
"Comprehensive Experimental Analyses of Automotive Attack Surfaces"
Stephen Checkoway, UC San Diego
"Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on fon-iks"
Andrew White, University of North Carolina at Chapel Hill
"Faster Secure Two-Party Computation Using Garbled Circuits"
Yan Huang, University of Virginia
NoTamper: Automated Blackbox Detection of Parameter Tampering Opportunities in Web Applications
Large-Scale Malware Indexing Using Function-Call Graphs
Protecting Browsers from Cross-Origin CSS Attacks
Mobile Location Tracking in Metropolitan Areas: malnets and others
Survivable Key Compromise in Software Update Systems
A Symbolic Execution Framework for JavaScript
Automatic Discovery of Parasitic Malware
Tamper Evident Microprocessors
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
I Know Where You Are: Tracking IP mobility on a Massive Scale
Name |
School |
Paper | Poster (click links to download pdfs) |
|
1st Place |
Baris Coskun | NYU-Poly | Friends of An Enemy: Identifying Local Members of Peer-to-Peer Botnets Using Mutual Contacts | poster |
2nd Place |
Mike Ter Louw | University of Illinois at Chicago | BLUEPRINT: Robust Prevention of Cross-site Scripting Attacks for Existing Browsers| poster |
3rd Place |
Sriram Lakshmanan | Georgia Institute of Technology | Securing Wireless Data Networks against Eavesdropping using Smart Antennas |poster |
Honorable Mention |
Patrick Gage Kelley | Carnegie Mellon University | A “Nutrition Label” for Privacy | poster |
Honorable Mention |
Daniela Alvim Seabra de Oliveira | University of California Davis | Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System | poster |
1st Place - Suhas Mathur, Rutgers University
2nd Place - Randy Smith, University of Wisconsin
3rd Place - Michael Toomim, University of Washington
Honorable Mention - Sarvjeet Singh, Purdue University
Honorable Mention - Basak Oztan, University of Rochester
A. Emir Diri, Polytechnic Institute of NYU
Yagiz Sutcu, Polytechnic Institute of NYU
Basak Oztan, University of Rochester
Sarvjeet Singh, Purdue University
Newton Campbell Jr., State University of New York at Buffalo
Peter Williams, Stony Brook University
Randy Smith, University of Wisconsin, Maryland
Liu Yang, Stevens Institute of Technology
Michael Toomim, University of Washington
Orhan Bulan, University of Rochester
HeeChang Shin, Rutgers, The State University of New Jersey
Xiuyuan Zheng, Stevens Institute of Technology
Qi Guo, Rutgers, The State University of New Jersey
Suhas Mathur, Rutgers, The State University of New Jersey