NDSS 2015 Accepted Posters

Quality, Reliability and Security Study of Vendor Customized Android Applications

Jingzheng Wu, Zhifei Wu, Mutian Yang, Tianyue Luo, Yanjun Wu and Yongji Wang

Outsourcing Secure Two-Party Computation as a Black Box

Henry Carter, Benjamin Mood, Patrick Traynor and Kevin Butler

Dereference Under the Influence (DUI) – You Can’t Afford It

Hong Hu, Zheng Leong Chua, Prateek Saxena and Zhenkai Liang

Korean Shellcode with ROP Based Decoding

Ji-Hyeon Yoon and Hae Young Lee

SIPD: A Practical SDN-based IP Spoofing Defense Method

Chen Li, Yu Ding, Tongxin Li, Jun Li and Xinhui Han

Chobham: Taming JIT-ROP Attacks

Ben Niu and Gang Tan

Effectiveness and Soundness of Commercial Password Strength Meters

Shukun Yang, Shouling Ji, Xin Hu and Raheem Beyah

Detecting Browser-Based Probing Attacks via Behavior Analysis

Yue Chen, Yaoqi Jia, Jian Mao and Zhenkai Liang