NDSS 2017 Posters
A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic
Noah Apthorpe, Dillon Reisman and Nick Feamster
Securing Appified Autonomous Vehicles Platform with AVGUARD
Yunhan Jack Jia, Ding Zhao, Qi Alfred Chen and Z. Morley Mao
PPViBe: Privacy Preserving Background Extractor via Secret Sharing in Multiple Cloud Servers
Xin Jin, Yaming Wu, Xiadong Li, Yuzhen Li, Geng Zhao and Kui Guo
CrowdZen: Mobile Privacy-Preserving Crowdsourced Data Collection
Joshua Joy, Martin Verde, Keshav Tadimeti, Tyler Lindberg and Mario Gerla
Protecting Android Apps from Repackaging by Self-Protection Code
Fumihiro Kanei, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi and Takeshi Yada
Analysis and Verification of Practical Password Strength Meters
Taku Sugai and Akira Kanaoka
Measuring Similarity of Binary Programs using Hungarian Algorithm
Yeongcheol Kim, Seokwoo Choi and Eun-Sun Cho
Fast Object Naming for Kernel Data Anomaly Detection
Hayoon Yi, Yeongpil Cho, Donghyun Kwon, Kwangmari Ko and Yunheung Paek
A Secure Control Plane with Dynamic Multi-NOS for SDN
Zhenping Lu, Fucai Chen, Jiangxing Wu and Guozhen Cheng
Fingerprinting Past the Front Page: Identifying Keywords in Search Queries Over Tor
Se Eun Oh and Nicholas Hopper
Automatic Key Generation Using Motion Energy Harvesters
Qi Lin, Yesheng Cui, Shanqing Jiang, Tengyu Ma, Weitao Xu and Wen Hu
An IoT Data Communication Framework for Authenticity and Integrity
Xin Lin, Huazhe Wang, Ye Yu and Chen Qian
Lightweight Swarm Attestations: a Tale of Two LISA-s
Xavier Carpent, Karim ElDefrawy, Norrathep Rattanvipanon and Gene Tsudik
AuthentiCall: Efficient Identity and Content Authentication for Phone Calls
Bradley Reaves, Logan Blue, Hadi Abdullah, Luis Vargas, Patrick Traynor and Thomas Shrimpton
Can Edutainment Change Software Updating Behavior?
Elissa M. Redmiles, Angelisa Plane, Candice Schumann, Rock Stevens, Peter Sutor and Michelle L. Mazurek
ValueShuffle: Mixing Confidential Transactions
Tim Ruffing and Pedro Moreno-Sanchez
Nyx: Network Resilliency via Reactive Routing Decisions
Jared M. Smith and Max Schuchard
Exploiting UPnP Protocol for Botnet Propagation and Control
Di Wu, Binxing Fang, Xiang Cui and Chaoge Liu
CloudSkulk: Design of a Nested Virtual Machine-based RITM Attack
Joseph Connelly, Haining Wang and Jidong Xia