MAY 21-23, 2018 AT THE HYATT REGENCY, SAN FRANCISCO, CA

39th IEEE Symposium on
Security and Privacy

An Approach to Verifying Threat Intelligence Based on Graph Propagation
Xin Wang (UCAS); Zhigang Lu, Zhengwei Jiang, Qiang Li (unaffiliated)

Poster: A Model to Evaluate Cybersecurity Talents
Fangjiao Zhang (Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences); Xiang Cui (Cyberspace Institute of Advanced Technology, Guangzhou University; Institute of Information Engineering, Chinese Academy of Sciences); Di Wu, Qixu Liu (Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences)

Poster: A Novel Framework for User-Key Provisioning to Secure Enclaves on Intel SGX
Takanori Machida, Dai Yamamoto, Ikuya Morikawa, Hirotaka Kokubo, Hisashi Kojima (Fujitsu Laboratories Ltd.)

Poster: A Qualitative Study on Developers’ Security Library Decisions
Lea Theresa Groeber, Johanna Schrader (Leibniz University Hannover); Tamara Lopez (The Open University); Sascha Fahl (Ruhr-University Bochum); Yasemin Acar (Leibniz University Hannover)

Poster: A Web Server Identified Model based on Mean Shift
Junwei Su, Qixu Liu, Zhi Wang (Institute of Information Engineering, Chinese Academy of Sciences); Xiaoyun Li (Beijing University of Posts and Telecommunications)

Poster: AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation
Timon Gehr, Matthew Mirman, Dana Drachsler-Cohen, Petar Tsankov, Swarat Chaudhuri, Martin Vechev

Poster: Access Control Needs in Smart Cars
Maanak Gupta, Ravi Sandhu (Institute for Cyber Security, University of Texas at San Antonio)

Poster: Adversaries Don’t Care About Averages: Batch Attacks on Black-Box Classifiers
Fnu Suya, David Evans, Yuan Tian (University of Virginia)

Poster: An anonymity metric of anonymous network
Jinli Zhang, Zhi Wang

Poster: Anonymity Trilemma --- Strong Anonymity, Low Bandwidth Overhead, Low Latency --- Choose Two.
Debajyoti Das (Purdue University); Sebastian Meiser (University College London); Esfandiar Mohammadi (ETH Zurich); Aniket Kate (Purdue University)

Poster: Attack Surface Modelling in Trigger Action Platforms
Pubali Datta, Adam Bates (University of Illinois at Urbana- Champaign)

Poster: Autocompletion in Local Differential Privacy
Johnnie C-N. Chang, Abhradeep Guha Thakurta (University of California Santa Cruz)

Poster: Blue Note - How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems
Connor Bolton, Sara Rampazzi (University of Michigan); Chaohao Li (Zhejiang University); Andrew Kwong (University of Michigan); Wenyuan Xu (Zhejiang University); Kevin Fu (University of Michigan)

Poster: Botnet over Slack: The Abusing of APIs in Third-party Chat Platforms
Fangjiao Zhang (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences); Xiang Cui (Cyberspace Institute of Advanced Technology, Guangzhou University; (Institute of Information Engineering, Chinese Academy of Sciences); Di Wu (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences); Jianjun Zhao (Institute of Information Engineering, Chinese Academy of Sciences)

Poster: Clustering Malware from Creation Tools Using Code Clones
Christopher I. G. Lanclos (Mississippi State University); Dae Glendowne, Ph.D. (Stephen F. Austin State University); Christopher Archibald, Ph.D., John A. Hamilton, Ph.D. (Mississippi State University)

Poster: Construction of Botnet C&C Channel Based on Domain Fronting
Heyang Lv (Institute of Computing Technology, Chinese Academy of Sciences, Beijing China); Xiang Cui (Institute of Information Engineering, Chinese Academy of Sciences,)

Poster: DBDS: A Botnet Detection System Based on Deep Learning
Di Wu (Institute of Information Engineering, Chinese Academy of Sciences); Bingxing Fang, Xiang Cui (Cyberspace Institute of Advanced Technology, Guangzhou University)

Poster: DRDoS Based on XXE
Jianjun Zhao (Institute of Information Engineering, Chinese Academy of Sciences); Siqi Yang (School of information and software engineering, University of Electronic Science and Technology of China); Di Wu, Qixu Liu (Institute of Information Engineering, Chinese Academy of Sciences)

Poster: De-mixing Bitcoin Mixing Services
Younggee Hong, Hyunsoo Kwon, Sangtae Lee, Junbeom Hur (Korea University)

Poster: Enhancing Adversarial Example Defenses Using Internal Layers
Mainuddin Ahmad Jonas, David Evans (University of Virginia)

Poster: Framework for Security Verification of Secure Processor Architectures
Shuwen Deng (Yale University); Doguhan Gumusoglu (Yeditepe University); Wenjie Xiong (Yale University); Sercan Sari, Onur Demir (Yeditepe University); Jakub Szefer (Yale University)

Poster: Grand Pwning Unit: Remote GPU-accelerated Microarchitectural Attacks
Pietro Frigo, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi (Vrije Universiteit Amsterdam)

Poster: IRSF: a Billion $ Fraud Abusing International Premium Rate Numbers
Merve Sahin, Aurélien Francillon (EURECOM)

Poster: Introducing MassBrowser: A Censorship Circumvention System Run by the Masses
Milad Nasr (UMass); Anonymous (Anonymous); Amir Houmansadr (UMass)

Poster: Locally Differentially Private Frequent Itemset Mining
Tianhao Wang, Ninghui Li (Purdue University); Somesh Jha (University of Wisconsin-Madison)

Poster: MBeacon: Privacy-preserving Beacons for DNA Methylation Data
Inken Hagestedt, Yang Zhang, Pascal Berrang (CISPA, Saarland University); Mathias Humbert (Swiss Data Science Center, ETH Zurich/EPFL); Haixu Tang, Xiaofeng Wang (Indiana University Bloomington); Michael Backes (CISPA Helmholtz Center i.G.)

Poster: On the Effect of Security Warnings on Cryptographic API Misuse
Peter Leo Gorski, Luigi Lo Iacono (Cologne University of Applied Sciences); Yasemin Acar (Leibniz University Hannover); Sebastian Moeller (Technische Universitaet Berlin); Christian Stransky (Leibniz University Hannover), Sascha Fahl (Ruhr-University Bochum)

Poster: Online Tracking of Kids and Teens: Gaming Sites Not as Bad as Others
Natalija Vlajic (York University)

Poster: PT-DBG: Automatically anti-debugging bypassing based on Intel Processor Trace
Guancheng Li (Peking University); Yongheng Chen (Nanjing University); Tianyi Li, Tongxin Li, Xinfeng Wu (Peking University); Chao Zhang (Tsinghua University); Xinhui Han (Peking University)

Poster: REMIX: Mitigating Adversarial Perturbation by Reforming, Masking and Inpainting
Kang-Cheng Chen (Yuan Ze University); Pin-Yu Chen (IBM Thomas J. Watson Research Center); Chia-Mu Yu (National Chung Hsing University)

Poster: Strengthening User Verification Using Browser Fingerprint and Cyber Deception
Xiaoyun Li, Xiang Cui (Beijing University of Posts and Telecommunications); Chaoge Liu (Institute of Information Engineering, Chinese Academy of Sciences)

Poster: The Secure Socket API
Mark O'Neill, Scott Heidbrink, Kent Seamons, Daniel Zappala (Brigham Young University)

Poster: The Side Channel Menagerie
John V. Monaco (U.S. Army Research Laboratory)

Poster: User Comfort with Android Background Resource Accesses in Different Contexts
Daniel Votipka, Seth M. Rabin (University of Maryland); Kristopher Micinski (Haverford College); Thomas Gilray, Michelle L. Mazurek, Jeffrey S. Foster (University of Maryland)

Poster: Using Avatars to Safeguard Privacy during Online Registrations
Gaurav Misra, Nicholas Micallef (University of New South Wales)

Poster: Using Packet Timing in Website Fingerprinting
Mohammad Saidur Rahman, Kantha Girish Gangadhara, Payap Sirinam, Matthew Wright (Rochester Institute of Technology)

Poster: Visual Content Privacy Leaks on Social Media Networks
Jasmine DeHart, Christan Grant (University of Oklahoma)

Poster: Web Beacon Based Detection of Data Leakage for Android
GyeongRyun Bae (Seoul Women’s University); Hae Young Lee (DuDu IT)

Poster: Website Fingerprinting Attacks with Timing-based Features using Capsule Networks
Payap Sirinam, Mohammad Saidur Rahman, Kantha Girish Gangadhara, Matthew Wright (Rochester Institute of Technology)

Poster: When is a Tree Really a Truck? Exploring Mental Models of Encryption
Justin Wu, Daniel Zappala (Brigham Young University)