Posters

  • POSTER: A Cost-Effective Anomaly Detection System Using In-DRAM Working Set of Active Flows Table
    Rhongho Jang: University of Central Florida; Seongkwang Moon: Inha University; Youngtae Noh: Inha University; Aziz Mohaisen:University of Central Florida; DaeHun Nyang: Inha University
  • Poster: Analyzing Endpoints in the Internet of Things Malware
    Jinchun Choi: University of Central Florida & Inha University; Afsah Anwar: University of Central Florida; Hisham Alasmary: University of Central Florida; Jeffrey Spaulding: Niagara University; DaeHun Nyang: Inha University; Aziz Mohaisen: University of Central Florida
  • POSTER: Breaking Graph-based IoT Malware Detection Systems Using Adversarial Examples
    Ahmed Abusnaina: University of Central Florida; Aminollah Khormali: University of Central Florida; Hisham Alasmary: University of Central Florida; Jeman Park: University of Central Florida; Afsah Anwar: University of Central Florida; Ulku Meteriz: University of Central Florida; Aziz Mohaisen: University of Central Florida
  • Poster: SurFi: Detecting Surveillance Camera Looping Attacks with Wi-Fi Channel State Information
    Nitya Lakshmanan: National University of Singapore; Inkyu Bang: National University of Singapore; Min Suk Kang: National University of Singapore; Jun Han: National University of Singapore; Jong Taek Lee: Electronics and Telecommunications Research Institute
  • Poster: deWristified: Handwriting Inference Using Wrist-Based Motion Sensors Revisited
    Raveen Wijewickrama:University of Texas at San Antonio; Anindya Maiti: University of Texas at San Antonio; Murtuza Jadliwala: University of Texas at San Antonio
  • POSTER: A Deep Learning Method for Fraud Detection in Financial Systems
    Serif Bahtiyar: Istanbul Technical University; Mahmut Ogrek: Istanbul Technical University; Eyup Ogrek: Istanbul Technical University
  • Poster: RF Based Entropy Sources for Jamming Resilience
    Jay Prakash: Singapore University of Technology and Design; Chenxi Lui: Singapore University of Technology and Design; Jemin Lee: DGIST; Tony Q.S. Quek: Singapore University of Technology and Design
  • Poster: Ensemble Malware Analysis for Evaluating the Integrity of Mission Critical Devices
    Robert Heras: Florida International University Student; Alexander Perez-Pons: Florida International University Faculty
  • Poster: Biometric Data Transformation for Cryptographic Domains and its Application
    Shoukat Ali: Florida Atlantic University; Koray Karabina: Florida Atlantic University; Emrah Karagoz: Florida Atlantic University
  • Poster: Cardiac Biometrics for Continuous and Non-contact Mobile Authentication
    Chen Song: University at Buffalo SUNY; Zhengxiong Li: The State University of New York at Buffalo; Wenyao Xu: SUNY Buffalo
  • POSTER: Are you secure in your car?
    Ilaria Matteucci: IIT-CNR; Giampaolo Bella: Dipartimento di Matematica e Informatica
  • POSTER: Secure THz Communication with Multiplexed Orbital Angular Momentum Beams
    SHUBHENDU BHARDWAJ: Shubhendu Bhardwaj
  • POSTER: Enclave-Based Privacy-Preserving Localization
    Joseph I. Choi: University of Florida; Dave (Jing) Tian: University of Florida; Tyler Ward: University of Florida; Kevin R. B. Butler: University of Florida; Patrick Traynor: University of Florida; John M. Shea: University of Florida; Tan F. Wong: University of Florida
  • Poster: Deep learning approach to detect malicious attacks at system level
    Jayesh Soni: Florida International University; Nagarajan Prabakar: Florida International University; Himanshu Upadhyay: Florida International University
  • POSTER: Privacy Preserving Distributed Matching for Device-to-Device IoT Communications
    Eyuphan Bulut: Virginia Commonwealth University; Ismail Guvenc: North Carolina State University; Kemal Akkaya: Florida International University
  • POSTER: Basebads: Automated Security Analysis of Baseband Firmware
    Grant Hernandez: University of Florida; Kevin Butler: University of Florida
  • POSTER: Deep-Evasion: Turn Deep Neural Network into Evasive Self-Contained Cyber-Physical Malware
    Tao Liu: Florida International University; Wujie Wen: Florida International University
  • POSTER: Security, Privacy, and Ethical Concerns on Human Radio-Frequency Identification (RFID) Implants
    Zhanel Tucker: Hampton University; Chutima Boonthum-Denecke: Hampton University
  • Poster: Exposing the Location of Anonymous Solar-powered Homes
    Qi Li: Florida International University; Dong Chen: Florida International University
  • POSTER: Attacking HDMI Distribution Networks
    Luis Puche Rondon: Florida International University; Leonardo Babun: Florida International University; Kemal Akkaya: Florida International University; Selcuk Uluagac:Florida International University
  • POSTER: Dynamically Detecting USB Attacks in Hardware
    Kyle Denney: Florida International University; Enes Erdin: Florida International University; Leonardo Babun: Florida International University; Selcuk Uluagac: Florida International University
  • Poster: Investigation of Cookie Vulnerabilities
    Marjani Peterson: Hampton University; Chutima Boonthum: Hampton University; Chutima Boonthum-Denecke: Hampton University
  • POSTER: A Digital Forensics Framework for Smart Settings
    Leonardo Babun: Florida International University; Amit Kumar Sikder: Florida International University; Abbas Acar: Florida International University; A. Selcuk Uluagac: Florida International University
  • POSTER: Performance Evaluation of Key Management Schemes for Wireless Legacy Smart Grid Environments
    Mumin Cebe: Florida International University; Kemal Akkaya: Florida International University
  • POSTER: Preserving Privacy of Drone Videos using Proxy Re-encryption Technique
    Vashish Baboolal: Florida International University; Kemal Akkaya: Florida International University; Nico Saputro: Florida International University; Khaled Rabieh: Sam Houston State University
  • Poster: IoT Devices Discovery and Identification Using Network Traffic Data
    Yuzhou Feng: Florida International University; Liangdong Deng:Florida International University; Dong Chen: Florida International University
  • Poster: False Data Injection Attacks against Contingency Analysis in Power Grids
    Mohammad Ashiqur Rahman: Florida International University; Md Hasan Shahriar: Florida International University; Rahat Masum: Tennessee Technological University
  • POSTER: Analysis and Parsing of Unstructured Cyber-Security Incident Data
    Armando J Ochoa: Florida International University; Mark Finlayson: Florida International University
  • POSTER: On the Overhead of Using Zero-Knowledge Proofs for Electric Vehicle Authentication
    David Gabay: Florida International University; Mumin Cebe: Florida International University; Kemal Akkaya: Florida International University

Demos

  • DEMO: Himiko: A Human Interface for Monitoring and Inferring Knowledge on Bluetooth-Low-Energy Objects
    Guillaume Celosia: Univ Lyon
  • DEMO: Inside Job: Diagnosing Bluetooth Lower Layers Using Off-the-Shelf Devices
    Jiska Classen: TU Darmstadt, Secure Mobile Networking Lab; Matthias Hollick: TU Darmstadt, Secure Mobile Networking Lab
  • DEMO: Wireless Attacks on Aircraft Landing Systems
    Harshad Sathaye: Northeastern University; Domien Schepers: Northeastern University; Aanjhan Ranganathan: Northeastern University; Guevara Noubir: Northeastern University
  • DEMO: Using Bluetooth Low Energy Spoofing to Dispute Device Details
    Christopher Hensler: Carnegie Mellon University; Patrick Tague: Carnegie Mellon University