NDSS 2017 Poster Session
A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic
Noah Apthorpe, Dillon Reisman, Nick Feamster
Securing Appified Autonomous Vehicles Platform with AVGUARD
Yunhan Jack Jia, Ding Zhao, Qi Alfred Chen, Z. Morley Mao
PPViBe: Privacy Preserving Background Extractor via Secret Sharing in Multiple Cloud Servers
Xin Jin, Yaming Wu, Xiadong Li, Yuzhen Li, Geng Zhao, Kui Guo
CrowdZen: Mobile Privacy-Preserving Crowdsourced Data Collection
Joshua Joy, Martin Verde, Keshav Tadimeti, Tyler Lindberg, Mario Gerla
Protecting Android Apps from Repackaging by Self-Protection Code
Fumihiro Kanei, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada
Analysis and Verification of Practical Password Strength Meters
Taku Sugai, Akira Kanaoka
Measuring Similarity of Binary Programs using Hungarian Algorithm
Yeongcheol Kim, Seokwoo Choi, Eun-Sun Cho
Fast Object Naming for Kernel Data Anomaly Detection
Hayoon Yi, Yeongpil Cho, Donghyun Kwon, Kwangmari Ko, Yunheung Paek
A Secure Control Plane with Dynamic Multi-NOS for SDN
Zhenping Lu, Fucai Chen, Jiangxing Wu, Guozhen Cheng
Fingerprinting Past the Front Page: Identifying Keywords in Search Queries Over Tor
Se Eun Oh, Nicholas Hopper
Automatic Key Generation Using Motion Energy Harvesters
Qi Lin, Yesheng Cui, Shanqing Jiang, Tengyu Ma, Weitao Xu, Wen Hu
An IoT Data Communication Framework for Authenticity and Integrity
Xin Lin, Huazhe Wang, Ye Yu, Chen Qian
Lightweight Swarm Attestations: a Tale of Two LISA-s
Xavier Carpent, Karim ElDefrawy, Norrathep Rattanvipanon, Gene Tsudik
AuthentiCall: Efficient Identity and Content Authentication for Phone Calls
Bradley Reaves, Logan Blue, Hadi Abdullah, Luis Vargas, Patrick Traynor, Thomas Shrimpton
Can Edutainment Change Software Updating Behavior?
Elissa M. Redmiles, Angelisa Plane, Candice Schumann, Rock Stevens, Peter Sutor, Michelle L. Mazurek
ValueShuffle: Mixing Confidential Transactions
Tim Ruffing, Pedro Moreno-Sanchez
Nyx: Network Resilliency via Reactive Routing Decisions
Jared M. Smith, Max Schuchard
Exploiting UPnP Protocol for Botnet Propagation and Control
Di Wu, Binxing Fang, Xiang Cui, Chaoge Liu
CloudSkulk: Design of a Nested Virtual Machine-based RITM Attack
Joseph Connelly, Haining Wang, Jidong Xia