NDSS Symposium 2015 Accepted Posters

Quality, Reliability and Security Study of Vendor Customized Android Applications

Jingzheng Wu, Zhifei Wu, Mutian Yang, Tianyue Luo, Yanjun Wu and Yongji Wang

Outsourcing Secure Two-Party Computation as a Black Box

Henry Carter, Benjamin Mood, Patrick Traynor and Kevin Butler

Dereference Under the Influence (DUI) – You Can’t Afford It

Hong Hu, Zheng Leong Chua, Prateek Saxena and Zhenkai Liang

Korean Shellcode with ROP Based Decoding

Ji-Hyeon Yoon and Hae Young Lee

SIPD: A Practical SDN-based IP Spoofing Defense Method

Chen Li, Yu Ding, Tongxin Li, Jun Li and Xinhui Han

Chobham: Taming JIT-ROP Attacks

Ben Niu and Gang Tan

Effectiveness and Soundness of Commercial Password Strength Meters

Shukun Yang, Shouling Ji, Xin Hu and Raheem Beyah

Detecting Browser-Based Probing Attacks via Behavior Analysis

Yue Chen, Yaoqi Jia, Jian Mao and Zhenkai Liang