JavaScript isn't enabled in your browser, so this file can't be opened. Enable and reload.
EE515/IS523 Paper Presentation/News Posting Survey
This survey is needed to assign paper presenters in each class.
Please select at least three candidate papers which you want to present in the class and mark them 'Yes'.
Sign in to Google
to save your progress.
Learn more
* Indicates required question
What is your name?
*
Your answer
What is your student ID number?
*
Your answer
When is your preferred dates for news posting/presentation?
Choose
9/2/2015
9/7/2015
9/9/2015
9/14/2015
9/16/2015
9/21/2015
9/23/2015
9/30/2015
10/5/2015
10/7/2015
10/12/2015
10/14/2015
10/26/2015
10/28/2015
11/2/2015
11/4/2015
11/9/2015
11/11/2015
11/16/2015
11/18/2015
11/23/2015
11/25/2015
11/30/2015
12/2/2015
12/7/2015
12/9/2015
(9/14) "Why Johnny can't encrypt: a usability evaluation of PGP 5.0"
Choose
No
Yes
(9/14) "TapLogger: Inferring User Inputs On Smartphone Touchscreens Using On-board Motion Sensors"
Choose
No
Yes
(9/16) "Security Analysis of the Diebold AccuVote-TS Voting Machine"
Choose
No
Yes
(9/21) "Security Analysis of a Full-Body Scanner"
Choose
No
Yes
(9/21) "When Firmware Modifications Attack: A Case Study of Embedded Exploitation"
Choose
No
Yes
(9/23) "Comprehensive Experimental Analyses of Automotive Attack Surfaces"
Choose
No
Yes
(9/23) "Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study"
Choose
No
Yes
(9/30) "Attacking the Kad Network - Real World Evaluation and High Fidelity Simulation using DVN"
Choose
No
Yes
(9/30) "Eclipse Attacks on Bitcoin's Peer-to-Peer Network"
Choose
No
Yes
(10/5) "Losing control of the Internet: Using the data plane to attack the control plane"
Choose
No
Yes
(10/5) "Taking Routers Off Their Meds: Unstable Routers and the Buggy BGP Implementations That Cause Them"
Choose
No
Yes
(10/7) "Uncovering Social Network Sybils in the Wild"
Choose
No
Yes
(10/7) "Serf and Turf: Crowdturfing for Fun and Profit"
Choose
No
Yes
(10/12) "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds"
Choose
No
Yes
(10/12) "A Placement Vulnerability Study in Multi-Tenant Public Clouds"
Choose
No
Yes
(10/14) "Location leaks on the GSM air interface"
Choose
No
Yes
(10/14) "Let Me Answer That For You: Exploiting Broadcast Information in Cellular Networks"
Choose
No
Yes
(10/26) "Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks"
Choose
No
Yes
(10/26) "SMS of Death: From Analyzing to Attacking Mobile Phones on a Large Scale"
Choose
No
Yes
(10/28) "Gaining Control of Cellular Traffic Accounting by Spurious TCP Retransmission"
Choose
No
Yes
(10/28) "Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations"
Choose
No
Yes
(11/2) "Off-Path TCP Sequence Number Inference Attack How Firewall Middleboxes Reduce Security"
Choose
No
Yes
(11/2) "Weaponizing Femtocells: The Effect of Rogue Devices on Mobile Telecommunications"
Choose
No
Yes
(11/4) "Exploiting Open Functionality in SMS-Capable Cellular Networks"
Choose
No
Yes
(11/4) "Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices"
Choose
No
Yes
(11/9) "Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices"
Choose
No
Yes
(11/9) "Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations"
*
Choose
No
Yes
(11/11) "Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors"
Choose
No
Yes
(11/11) "On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces"
Choose
No
Yes
(11/16) "Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses"
Choose
No
Yes
(11/16) "On Limitations of Friendly Jamming for Confidentiality"
Choose
No
Yes
(11/18) "GPS Software Attacks"
Choose
No
Yes
(11/18) "On the Requirements for Successful GPS Spoofing Attacks"
Choose
No
Yes
(11/23) "Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors"
Choose
No
Yes
(11/23) "Non-invasive Spoofing Attacks for Anti-lock Braking Systems"
Choose
No
Yes
(11/25) "Robust De-anonymization of Large Sparse Datasets"
Choose
No
Yes
(11/25) "De-anonymizing Programmers via Code Stylometry"
Choose
No
Yes
(11/30) "Defeating UCI: Building Stealthy and Malicious Hardware"
Choose
No
Yes
(11/30) "Breaking and Entering through the Silicon"
Choose
No
Yes
(12/2) "Compromising Electromagnetic Emanations of Wired and Wireless Keyboards"
Choose
No
Yes
(12/2) "Televisions, video privacy, and powerline electromagnetic interference"
Choose
No
Yes
(12/7) "Stealing webpages rendered on your browser by exploiting GPU vulnerabilities"
Choose
No
Yes
(12/7) "GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies"
Choose
No
Yes
(12/9) "MACTANS: Injecting Malware into iOS Devices via Malicious Chargers"
Choose
No
Yes
(12/9) "Your Online Interests? Pwned! A Pollution Attack Against Targeted Advertising"
Choose
No
Yes
Submit
Clear form
Never submit passwords through Google Forms.
This content is neither created nor endorsed by Google. -
Terms of Service
-
Privacy Policy
Does this form look suspicious?
Report
Forms
Help and feedback
Help Forms improve
Report