EE515/IS523 Paper Presentation
This survey is needed to assign papers for presentation in each class.
Please mark your preference.
0 means that you cannot present this paper.
1 means that if avoidable, you don't want to present this paper.
5 means that you really want to present this paper.
In other words, the smaller the value is, the less you want to present this paper.
You should select AT LEAST FIVE (>=5) candidate papers with positive score. (i.e. 1-5)
What is your name? *
Your answer
What is your student ID number? *
Your answer
(9/20) Dolphin Attack: Inaudible Voice Commands *
(9/20) Security Analysis of the Diebold AccuVote-TS Voting Machine *
(9/27) Error Handling of In-vehicle Networks Makes Them Vulnerable *
(9/27) How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles *
(10/4) Bamboozling Certificate Authorities with BGP *
(10/25) Exploiting open functionality in SMS-capable cellular networks *
(10/25) Breaking LTE on Layer Two *
(10/25) Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks *
(11/1) Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices *
(11/1) Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations *
(11/1) A Rising Tide: Design Exploits in Industrial Control Systems *
(11/8) Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses *
(11/8) On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces *
(11/8) This Ain't Your Dose: Sensor Spoofing Attack on Medical Infusion Pump *
(11/15) Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors *
(11/15) Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems *
(11/15) Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications *
(11/22) On the Requirements for Successful GPS Spoofing Attacks *
(11/22) Lest We Remember: Cold Boot Attacks on Encryption Keys *
(11/22) Exploiting the DRAM rowhammer bug to gain kernel privileges *
(11/29) Hijacking Bitcoin: Routing Attacks on Cryptocurrencies *
(11/29) teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts *
Submit
Never submit passwords through Google Forms.
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service - Additional Terms