NDSS 2018 Accepted Posters

Do Users Make Rational Security Decisions?

Elissa Redmiles, Michelle Mazurek and John Dickerson

HybridGuard: A Principal-based Permission and Fine-Grained Policy Enforcement Framework for Web-based Mobile Applications

Phu H. Phung, Abhinav Mohanty, Rahul Rachapalli and Meera Sridhar

CFIXX Object Type Integrity for C++

Nathan Burow, Derrick McKee, Scott A. Carr and Mathias Payer

Trust-based Light-weight Association Protocol for 802.11 Networks

Vineeta Jain, Vijay Laxmi, Manoj Singh Gaur and Mohamed Mosbah

The Petri Dish Attack – Guessing Secrets Based on Bacterial Growth

Katharina Krombholz, Adrian Dabrowski, Peter Purgathofer and Edgar Weippl

Stylometry of Author-Specific and Country-Specific Style Features in JavaScript

Dennis Röllke, Aviel Stein, Edwin Dauber, Mosfiqur Rahman, Michael Weisman, Gregory Shearer, Frederica Nelson, Aylin Caliskan, Richard Harang and Rachel Greenstadt

Towards Scaling Privacy Strength

Joshua Joy and Mario Gerla

TinPal: An Enhanced Interface for Pattern Locks

Harshal Tupsamudre, Sukanya Vaddepalli, Vijayanand Banahatti and Sachin Lodha

Practicing a Science of Security: A Philosophy of Science Perspective

Jonathan M Spring, Tyler Moore and David Pym

Machine Learning-Based Fingerprinting of Network Traffic Using Programmable Forwarding Engines

Greg Cusack, Oliver Michel and Eric Keller

On Predicting BGP Anomalous Incidents: A Bayesian Approach

Clint McElroy, Pablo Moriano and Jean Camp

Sonification in Security Operations Centres: What do Security Practitioners Think?

Louise Axon, Bushra Alahmadi, Jason Nurse, Michael Goldsmith and Sadie Creese

Data Protection of IoT End Device

Jinseong Kim, Chang-O Eun and Im Jung

Community Engagement for Cybersecurity Experimentation of the Future

David Balenson, Laura Tinnel and Terry Benzel

Exploring Family Features for Classification and Lineage Inference of Packed Malware

Leo Hyun Park, Jungbeen Yu and Taekyoung Kwon

Towards Reverse Engineering FPGA Bitstreams for Static Hardware Trojan Detection

Yezee Seo, Junghwan Yoon, Jaedong Jang, Mingi Cho, Hoon-Kyu Kim and Taekyoung Kwon

Risks of Transferring Knowledge from Deep Models

Bolun Wang, Yuanshun Yao, Bimal Viswanath, Heather Zheng and Ben Y. Zhao

DDoS Detection at an ISP

Rajat Tandon and Jelena Mirkovic