A Smart Home is No Castle:  Privacy Vulnerabilities of Encrypted IoT Traffic

Noah Apthorpe, Dillon Reisman, Nick Feamster

Securing Appified Autonomous Vehicles Platform with AVGUARD

Yunhan Jack Jia, Ding Zhao, Qi Alfred Chen, Z. Morley Mao

PPViBe:  Privacy Preserving Background Extractor via Secret Sharing in Multiple Cloud Servers

Xin Jin, Yaming Wu, Xiadong Li, Yuzhen Li, Geng Zhao, Kui Guo

CrowdZen:  Mobile Privacy-Preserving Crowdsourced Data Collection

Joshua Joy, Martin Verde, Keshav Tadimeti, Tyler Lindberg, Mario Gerla

Protecting Android Apps from Repackaging by Self-Protection Code

Fumihiro Kanei, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada

Analysis and Verification of Practical Password Strength Meters

Taku Sugai, Akira Kanaoka

Measuring Similarity of Binary Programs using Hungarian Algorithm

Yeongcheol Kim, Seokwoo Choi, Eun-Sun Cho

Fast Object Naming for Kernel Data Anomaly Detection

Hayoon Yi, Yeongpil Cho, Donghyun Kwon, Kwangmari Ko, Yunheung Paek

A Secure Control Plane with Dynamic Multi-NOS for SDN

Zhenping Lu, Fucai Chen, Jiangxing Wu, Guozhen Cheng

Fingerprinting Past the Front Page:  Identifying Keywords in Search Queries Over Tor

Se Eun Oh, Nicholas Hopper

Automatic Key Generation Using Motion Energy Harvesters

Qi Lin, Yesheng Cui, Shanqing Jiang, Tengyu Ma, Weitao Xu, Wen Hu

An IoT Data Communication Framework for Authenticity and Integrity

Xin Lin, Huazhe Wang, Ye Yu, Chen Qian

Lightweight Swarm Attestations:  a Tale of Two LISA-s

Xavier Carpent, Karim ElDefrawy, Norrathep Rattanvipanon, Gene Tsudik

AuthentiCall:  Efficient Identity and Content Authentication for Phone Calls

Bradley Reaves, Logan Blue, Hadi Abdullah, Luis Vargas, Patrick Traynor, Thomas Shrimpton

Can Edutainment Change Software Updating Behavior?

Elissa M. Redmiles, Angelisa Plane, Candice Schumann, Rock Stevens, Peter Sutor, Michelle L. Mazurek

ValueShuffle:  Mixing Confidential Transactions

Tim Ruffing, Pedro Moreno-Sanchez

Nyx:  Network Resilliency via Reactive Routing Decisions

Jared M. Smith, Max Schuchard

Exploiting UPnP Protocol for Botnet Propagation and Control

Di Wu, Binxing Fang, Xiang Cui, Chaoge Liu

CloudSkulk:  Design of a Nested Virtual Machine-based RITM Attack

Joseph Connelly, Haining Wang, Jidong Xia