NDSS 2017 Posters

A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic

Noah Apthorpe, Dillon Reisman and Nick Feamster

Securing Appified Autonomous Vehicles Platform with AVGUARD

Yunhan Jack Jia, Ding Zhao, Qi Alfred Chen and Z. Morley Mao

PPViBe: Privacy Preserving Background Extractor via Secret Sharing in Multiple Cloud Servers

Xin Jin, Yaming Wu, Xiadong Li, Yuzhen Li, Geng Zhao and Kui Guo

CrowdZen: Mobile Privacy-Preserving Crowdsourced Data Collection

Joshua Joy, Martin Verde, Keshav Tadimeti, Tyler Lindberg and Mario Gerla

Protecting Android Apps from Repackaging by Self-Protection Code

Fumihiro Kanei, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi and Takeshi Yada

Analysis and Verification of Practical Password Strength Meters

Taku Sugai and Akira Kanaoka

Measuring Similarity of Binary Programs using Hungarian Algorithm

Yeongcheol Kim, Seokwoo Choi and Eun-Sun Cho

Fast Object Naming for Kernel Data Anomaly Detection

Hayoon Yi, Yeongpil Cho, Donghyun Kwon, Kwangmari Ko and Yunheung Paek

A Secure Control Plane with Dynamic Multi-NOS for SDN

Zhenping Lu, Fucai Chen, Jiangxing Wu and Guozhen Cheng

Fingerprinting Past the Front Page: Identifying Keywords in Search Queries Over Tor

Se Eun Oh and Nicholas Hopper

Automatic Key Generation Using Motion Energy Harvesters

Qi Lin, Yesheng Cui, Shanqing Jiang, Tengyu Ma, Weitao Xu and Wen Hu

An IoT Data Communication Framework for Authenticity and Integrity

Xin Lin, Huazhe Wang, Ye Yu and Chen Qian

Lightweight Swarm Attestations: a Tale of Two LISA-s

Xavier Carpent, Karim ElDefrawy, Norrathep Rattanvipanon and Gene Tsudik

AuthentiCall: Efficient Identity and Content Authentication for Phone Calls

Bradley Reaves, Logan Blue, Hadi Abdullah, Luis Vargas, Patrick Traynor and Thomas Shrimpton

Can Edutainment Change Software Updating Behavior?

Elissa M. Redmiles, Angelisa Plane, Candice Schumann, Rock Stevens, Peter Sutor and Michelle L. Mazurek

ValueShuffle: Mixing Confidential Transactions

Tim Ruffing and Pedro Moreno-Sanchez

Nyx: Network Resilliency via Reactive Routing Decisions

Jared M. Smith and Max Schuchard

Exploiting UPnP Protocol for Botnet Propagation and Control

Di Wu, Binxing Fang, Xiang Cui and Chaoge Liu

CloudSkulk: Design of a Nested Virtual Machine-based RITM Attack

Joseph Connelly, Haining Wang and Jidong Xia