Program Overview

Program will be published soon.

Accepted Papers

A Stealth, Selective, Link-layer Denial-of-Service Attack Against Automotive Networks
Andrea Palanca (Politecnico di Milano), Eric Evenchick (Linklayer Labs), Federico Maggi (Trend Micro, Inc.), Stefano Zanero (Politecnico di Milano)

BinShape: Scalable and Robust Binary Library Function Identification Using Diverse Features
Paria Shirani, Lingyu Wang, Mourad Debbabi (Concordia University)

Deep Ground Truth Analysis of Current Android Malware
Fengguo Wei, Yuping Li (University of South Florida), Sankardas Roy (Bowling Green State University), Xinming Ou (University of South Florida), Wu Zhou (FireEye, Inc.)

DynODet: Detecting Dynamic Obfuscation in Malware
Danny Kim (University of Maryland), Julien Roy (SecondWrite LLC), Amir Majlesi-Kupaei (University of Maryland), Kapil Anand, Khaled Wazeer (SecondWrite LLC), Daniel Buetner (Laboratory of Telecommunication Sciences), Rajeev Barua (University of Maryland)

Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage
George D. Webster, Bojan Kolosnjaji, Christian von Pentz, Julian Kirsch (Technical University of Munich), Zachary D. Hanif (unaffiliated), Apostolis Zarras, Claudia Eckert (Technical University of Munich)

HumIDIFy: A Tool for Hidden Functionality Detection in Firmware
Sam Thomas, Flavio D. Garcia, Tom Chothia (University of Birmingham)

Last Line of Defense: A Novel IDS Approach Against Advanced Threats in Industrial Control Systems
M. Luchs, C. Doerr (Delft University of Technology)

LED-it-GO: Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED
Mordechai Guri, Boriz Zadov, Yuval Elovici (Ben-Gurion University of the Negev)

Malware Guard Extension: Using SGX to Conceal Cache Attacks
Michael Schwarz, Samuel Weiser, Daniel Gruss, Clémentine Maurice, Stefan Mangard (Graz University of Technology)

Measuring and Defeating Anti-Instrumentation-Equipped Malware
Mario Polino, Andrea Continella, Sebastiano Mariani, Stefano D'Alessio, Lorenzo Fontana, Fabio Gritti, Stefano Zanero (Politecnico di Milano)

Measuring Network Reputation In The Ad-Bidding Process
Yizheng Chen, Yacin Nadji, Rosa Romero-Gomez, Manos Antonakakis, David Dagon (Georgia Institute of Technology)

MemPatrol: Reliable Sideline Integrity Monitoring for High-performance Systems
Myoung Jin Nam (Secure Software Development Research Centre, Korea University, Seoul, S. Korea), Wonhong Nam (Dept. of Internet & Multimedia Eng., KonKuk University, Seoul, S. Korea), Jin-Young Choi (Secure Software Development Research Centre, Korea University, Seoul, S. Korea), Periklis Akritidis (Niometrics, Singapore)

On the privacy impacts of leaked password databases
Olivier Heen, Christoph Neumann (Technicolor)

On the Trade-Offs in Oblivious Execution Techniques
Shruti Tople, Prateek Saxena (National University of Singapore)

Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps
Thomas Barabosch, Niklas Bergmann, Adrian Dombeck, Elmar Padilla (Fraunhofer FKIE)

SCVD: A New Semantics-Based Approach for Cloned Vulnerable Code Detection
Deqing Zou, Hanchao Qi (Huazhong University of Science and Technology), Zhen Li (Huazhong University of Science and Technology, Hebei University), Song Wu, Hai Jin, Sujuan Wang, Yuyi Zhong (Huazhong University of Science and Technology)

SPEAKER: Split-Phase Execution of Application Containers
Lingguang Lei (Institute of Information Engineering, Chinese Academy of Sciences, George Mason University), Jianhua Sun (College of William and Mary), Kun Sun (George Mason University), Chris Shenefiel (Cisco Systems, Inc.), Rui Ma, Yuewu Wang (Institute of Information Engineering, Chinese Academy of Sciences), Qi Li (Tsinghua University)

Unsupervised Detection of APT C&C Channels using Web Request Graphs
Pavlos Lamprakis, Ruggiero Dargenio, David Gugelmann (ETH Zurich), Vincent Lenders (Armasuisse), Markus Happe, Laurent Vanbever (ETH Zurich)