NDSS 2015 Accepted Posters
Quality, Reliability and Security Study of Vendor Customized Android Applications
Jingzheng Wu, Zhifei Wu, Mutian Yang, Tianyue Luo, Yanjun Wu and Yongji Wang
Outsourcing Secure Two-Party Computation as a Black Box
Henry Carter, Benjamin Mood, Patrick Traynor and Kevin Butler
Dereference Under the Influence (DUI) – You Can’t Afford It
Hong Hu, Zheng Leong Chua, Prateek Saxena and Zhenkai Liang
Korean Shellcode with ROP Based Decoding
Ji-Hyeon Yoon and Hae Young Lee
SIPD: A Practical SDN-based IP Spoofing Defense Method
Chen Li, Yu Ding, Tongxin Li, Jun Li and Xinhui Han
Chobham: Taming JIT-ROP Attacks
Ben Niu and Gang Tan
Effectiveness and Soundness of Commercial Password Strength Meters
Shukun Yang, Shouling Ji, Xin Hu and Raheem Beyah
Detecting Browser-Based Probing Attacks via Behavior Analysis
Yue Chen, Yaoqi Jia, Jian Mao and Zhenkai Liang