EE515/IS523 Paper Presentation Survey
This survey is needed to assign paper presenters in each class.
Please select at least three candidate papers which you want to present in the class and mark them 'Yes'.
What is your name? *
Your answer
What is your student ID number? *
Your answer
(9/24) R1 A. Whitten and J. D. Tygar. "Why Johnny can't encrypt: a usability evaluation of PGP 5.0", USENIX Sec'99
(9/24) R2 S. Clark, T. Goodspeed, P. Metzger, Z. Wasserman, K. Xu, M. Blaze,"Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System", Usenix Sec'11
(9/26) R1 T. Kohno, A. Stubblefield, A. Rubin and D. Wallach, "Analysis of an Electronic Voting System", S&P'04 (More Story)
(9/26) R2 A. Feldman, J. Halderman, and E. Felten, "Security Analysis of the Diebold AccuVote-TS Voting Machine", EVT'07
(10/10) R1 B. Nelson, M. Barreno, F. Chi, A. D. Joseph, B. Rubinstein, U. Saini, C. Sutton, J. D. Tygar, K. Xia. “Exploiting machine learning to subvert your spam filter.“, LEET'08
(10/10) R2 M. Barreno, P. Bartlett, F. Chi, A. Joseph, B. Nelson, B. Rubinstein, U. Saini, and J. D. Tygar. “Open Problems in the Security of Learning.” AISec'08
(10/15) R1 B. Rubinstein, B. Nelson, L. Huang, A. Joseph, S. Lau, N. Taft, and J. D. Tygar. “Evading Anomaly Detection through Variance Injection Attacks on PCA.” RAID'08
(10/15) R2 J. Mason, S. Small, F. Monrose, and G. MacManus. 2009. "English shellcode". CCS '09
(10/17) R1 J. R. Douceur. "The sybil attack". IPTPS '02
(10/17) R2 E. Chan-Tin, P. Wang, J. Tyra, T. Malchow, D. Foo Kune, N. Hopper, Y. Kim, "Attacking the Kad Network - Real World Evaluation and High Fidelity Simulation using DVN -", Wiley Security and Communication Networks 2009
(10/22) R E. ChanTin, V. Heorhiadi, Y. Kim, and N. Hopper, "The FrogBoiling Attack: Limitations of Secure Network Coordinate Systems", TISSEC 14(3), 2011
(10/24) R1 Z. Yang, C. Wilson, X. Wang, T. Gao, B. Y. Zhao, Y. Dai, "Uncovering Social Network Sybils in the Wild", IMC'11
(10/24) R2 G. Wang, C. Wilson, X. Zhao, Y. Zhu, M. Mohanlal, H. Zheng, B. Y. Zhao, "Serf and Turf: Crowdturfing for Fun and Profit", WWW'12
(10/29) R1 W. Enck, P. Traynor, P. McDaniel and T. La Porta, "Exploiting Open Functionality in SMS-Capable Cellular Networks", CCS'05
(10/29) R2 P. Traynor, P. McDaniel and T. La Porta, "On Attack Causality in Internet-Connected Cellular Networks", Usenix SEC'07
(10/31) R1 P. Traynor, M. Lin, M. Ongtang, V. Rao, T. Jaeger, T. La Porta and P. McDaniel, "On Cellular Botnets: Measuring the Impact of Malicious Devices on a Cellular Network Core", CCS'09
(10/31) R2 W. Enck, D. Octeau, P. McDaniel, S. Chaudhuri, "A Study of Android Application Security", Usenix Sec'11
(11/5) R1 D. Foo Kune, J. Koelndorfer, N. Hopper, Y. Kim, "Location leaks on the GSM air interface", NDSS'12
(11/5) R2 N. Golde, K. Redon, R. Borgaonkar, "Weaponizing Femtocells: The Effect of Rogue Devices on Mobile Telecommunications", NDSS'12
(11/7) R1 E. Stinson, J. C. Mitchell, "Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods", WOOT'08
(11/7) R2 A. Juels and T.-F. Yen, "Sherlock Holmes and the Case of the Advanced Persistent Threat", LEET'12
(11/12) R1 Z. Wu, Z. Xu, H. Wang, "Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud", Usenix Sec'12
(11/12) R2 S. Bugiel, S. Nnberger, T. Ppelmann, A.-R. Sadeghi, T. Schneider. "AmazonIA: when elasticity snaps back", CCS'11
(11/14) R1 M. Schuchard, E. Y. Vasserman, A. Mohaisen, D. Foo Kune, N. Hopper, Y. Kim, "Losing control of the Internet: Using the data plane to attack the control plane", NDSS'11
(11/14) R2 M. Schuchard, C. Thompson, N. Hopper, Y. Kim, "Taking Routers Off Their Meds: Unstable Routers and the Buggy BGP Implementations That Cause Them", UMN TR
(11/19) R1 D. Halperin, T. Heydt-Benjamin, B. Ransford, S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, W.Maisel, "Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses". S&P '08
(11/19) R2 S. Hanna, R. Rolles, A. Molina-Markham, P. Poosankam, K. Fu, D. Song, "Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical Devices", HealthSec'11 *
(11/21) R1 C. Li, A. Raghunathan, N. K. Jha, "Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system", IEEE Healthcom'11
(11/21) R2 W. Burleson, S. Clark, B. Ransford, K. Fu, "Design Challenges for Secure Implantable Medical Devices", DAC'12
(11/26) R1 K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage. "Experimental security analysis of a modern automobile", S&P'11
(11/26) R2 I. Rouf, R. Miller, H. Mustafa, T. Taylor, S. Oh, W. Xu, M. Gruteser, W. Trappe, and I. Seskar. "Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study". Usenix SEC'10
(11/28) R1 S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, T. Kohno, "Comprehensive Experimental Analyses of Automotive Attack Surfaces", Usenix Sec'11
(11/28) R2 R. Verdult, F. D. Garcia, J. Balasch, "Gone in 360 Seconds: Hijacking with Hitag2", Usenix SEC'12
(12/3) R1 N. Heninger, Z. Durumeric, E. Wustrow, J. A. Halderman, "Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices", Usenix SEC'12
(12/3) R2 B. Driessen, R. Hund, C. Willems, C. Paar, T. Holz, "Don't Trust Satellite Phones: A Security Analysis of Two Satphone Standards", S&P'12
(12/5) R1 C. Sturton, M. Hicks, D. Wagner, S. T. King. "Defeating UCI: Building Stealthy and Malicious Hardware", S&P'12
(12/5) R2 M. Heiderich, T. Frosch, M. Jensen, T. Holz, "Crouching tiger - hidden payload: security risks of scalable vectors graphics", CCS'11
(12/10) R1 L.-S. Huang, A. Moshchuk, H. J. Wang, S. Schechter, Co. Jackson, "Clickjacking: Attacks and Defenses", Usenix Sec'12
(12/10) R2 N. O. Tippenhauer, C. P�per, K. B. Rasmussen, S. Capkun, "On the Requirements for Successful GPS Spoofing Attacks", CCS'11
(12/12) R1 M. Enev, S. Gupta, T. Kohno, S. N. Patel. "Televisions, video privacy, and powerline electromagnetic interference", CCS'11
(12/12) R2 A. M. White, A. R. Matthews, K. Z. Snow, F. Monrose. "Hookt on Fon-iks: Phonotactic Reconstruction of Encrypted VoIP Conversations", S&P'11
Never submit passwords through Google Forms.
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service