NDSS 2018 Accepted Posters
Do Users Make Rational Security Decisions?
Elissa Redmiles, Michelle Mazurek and John Dickerson
HybridGuard: A Principal-based Permission and Fine-Grained Policy Enforcement Framework for Web-based Mobile Applications
Phu H. Phung, Abhinav Mohanty, Rahul Rachapalli and Meera Sridhar
CFIXX Object Type Integrity for C++
Nathan Burow, Derrick McKee, Scott A. Carr and Mathias Payer
Trust-based Light-weight Association Protocol for 802.11 Networks
Vineeta Jain, Vijay Laxmi, Manoj Singh Gaur and Mohamed Mosbah
The Petri Dish Attack – Guessing Secrets Based on Bacterial Growth
Katharina Krombholz, Adrian Dabrowski, Peter Purgathofer and Edgar Weippl
Stylometry of Author-Specific and Country-Specific Style Features in JavaScript
Dennis Röllke, Aviel Stein, Edwin Dauber, Mosfiqur Rahman, Michael Weisman, Gregory Shearer, Frederica Nelson, Aylin Caliskan, Richard Harang and Rachel Greenstadt
Towards Scaling Privacy Strength
Joshua Joy and Mario Gerla
TinPal: An Enhanced Interface for Pattern Locks
Harshal Tupsamudre, Sukanya Vaddepalli, Vijayanand Banahatti and Sachin Lodha
Practicing a Science of Security: A Philosophy of Science Perspective
Jonathan M Spring, Tyler Moore and David Pym
Machine Learning-Based Fingerprinting of Network Traffic Using Programmable Forwarding Engines
Greg Cusack, Oliver Michel and Eric Keller
On Predicting BGP Anomalous Incidents: A Bayesian Approach
Clint McElroy, Pablo Moriano and Jean Camp
Sonification in Security Operations Centres: What do Security Practitioners Think?
Louise Axon, Bushra Alahmadi, Jason Nurse, Michael Goldsmith and Sadie Creese
Data Protection of IoT End Device
Jinseong Kim, Chang-O Eun and Im Jung
Community Engagement for Cybersecurity Experimentation of the Future
David Balenson, Laura Tinnel and Terry Benzel
Exploring Family Features for Classification and Lineage Inference of Packed Malware
Leo Hyun Park, Jungbeen Yu and Taekyoung Kwon
Towards Reverse Engineering FPGA Bitstreams for Static Hardware Trojan Detection
Yezee Seo, Junghwan Yoon, Jaedong Jang, Mingi Cho, Hoon-Kyu Kim and Taekyoung Kwon
Risks of Transferring Knowledge from Deep Models
Bolun Wang, Yuanshun Yao, Bimal Viswanath, Heather Zheng and Ben Y. Zhao
DDoS Detection at an ISP
Rajat Tandon and Jelena Mirkovic