NDSS Symposium 2015 Accepted Posters
Quality, Reliability and Security Study of Vendor Customized Android Applications
Jingzheng Wu, Zhifei Wu, Mutian Yang, Tianyue Luo, Yanjun Wu and Yongji Wang
Outsourcing Secure Two-Party Computation as a Black Box
Henry Carter, Benjamin Mood, Patrick Traynor and Kevin Butler
Dereference Under the Influence (DUI) – You Can’t Afford It
Hong Hu, Zheng Leong Chua, Prateek Saxena and Zhenkai Liang
Korean Shellcode with ROP Based Decoding
Ji-Hyeon Yoon and Hae Young Lee
SIPD: A Practical SDN-based IP Spoofing Defense Method
Chen Li, Yu Ding, Tongxin Li, Jun Li and Xinhui Han
Chobham: Taming JIT-ROP Attacks
Ben Niu and Gang Tan
Effectiveness and Soundness of Commercial Password Strength Meters
Shukun Yang, Shouling Ji, Xin Hu and Raheem Beyah
Detecting Browser-Based Probing Attacks via Behavior Analysis
Yue Chen, Yaoqi Jia, Jian Mao and Zhenkai Liang