Sched.com Conference Mobile Apps
25th USENIX Security Symposium has ended
Create Your Own Event
25th USENIX Security Symposium
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Sponsors
Exhibitors
Attendees
Map
Search
or browse by date + venue
ASE '16
BoFs
CSET '16
FOCI '16
HotSec '16
Security '16
Social
WOOT '16
Popular
Sign up
or
log in
to bookmark your favorites and sync them to your phone or calendar.
menu
Menu
Log in
Sign up
Schedule
Speakers
Sponsors
Exhibitors
Attendees
Map
Search
tune
Filter sessions
Simple
Expanded
Grid
By Venue
Monday
, August 8
TBA
8:00pm •
Birds-of-a-Feather Sessions (BoFs)
Texas Ballroom 1
9:00am •
Retelling the Retail Security Story
10:30am •
Acceleration Attacks on PBKDF2: Or, What Is inside the Black-Box of oclHashcat?
11:00am •
Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
11:30am •
How to Break Microsoft Rights Management Services
12:00pm •
Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness
12:30pm •
Eavesdropping One-Time Tokens Over Magnetic Secure Transmission in Samsung Pay
2:00pm •
How to Phone Home with Someone Else’s Phone: Information Exfiltration Using Intentional Sound Noise on Gyroscopic Sensors
2:30pm •
Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic
3:00pm •
Hardware-Assisted Rootkits: Abusing Performance Counters on the ARM and x86 Architectures
4:00pm •
AVLeak: Fingerprinting Antivirus Emulators through Black-Box Testing
4:30pm •
malWASH: Washing Malware to Evade Dynamic Analysis
5:00pm •
Non-Deterministic Timers for Hardware Trojan Activation (or How a Little Randomness Can Go the Wrong Way)
Texas Ballroom 2–3
9:00am •
Welcome
9:15am •
Large-Scale Automated Vulnerability Addition and the Search for Truth
11:00am •
Can Knowledge of Technical Debt Help Identify Software Vulnerabilities?
11:30am •
Chappie Swarm: Persona-Driven Web Corpus Generation
12:00pm •
Honey Sheets: What Happens to Leaked Google Spreadsheets?
2:00pm •
Evaluating Malware Mitigation by Android Market Operators
2:30pm •
A Cybersecurity Test and Evaluation Facility for the Next Generation Air Transportation System (NextGen)
3:00pm •
Providing SCADA Network Data Sets for Intrusion Detection Research
4:00pm •
Automated Security Experimentation
Texas Ballroom 5-7
9:30am •
Keynote Address
11:00am •
DNS-sly: Avoiding Censorship through Network Complexity
11:30am •
Matryoshka: Hiding Secret Communication in Plain Sight
12:00pm •
GhostPost: Seamless Restoration of Censored Social Media Posts
2:00pm •
Censors’ Delay in Blocking Circumvention Proxies
2:30pm •
The Politics of Routing: Investigating the Relationship between AS Connectivity and Internet Freedom
3:30pm •
Adblocking and Counter Blocking: A Slice of the Arms Race
4:00pm •
Privacy and Security Issues in BAT Web Browsers
4:45pm •
Rump Session and Closing Remarks
Texas Ballroom Foyer
8:00am •
Continental Breakfast
9:00am •
Opening Remarks
10:00am •
Break with Refreshments
10:30am •
Break with Refreshments
3:00pm •
Break with Refreshments
3:30pm •
Break with Refreshments
3:35pm •
Break with Refreshments
4:30pm •
Mini Break
Zilker Ballroom 1 and Foyer
12:30pm •
Lunch
1:00pm •
Lunch
Tuesday
, August 9
Hill Country Ballroom
7:00pm •
Student Social and Networking Event
9:00pm •
Board Game Night
TBA
8:00pm •
Birds-of-a-Feather Sessions (BoFs)
Texas Ballroom 1
9:00am •
Stagefright: An Android Exploitation Case Study
10:00am •
Fillory of PHY: Toward a Periodic Table of Signal Corruption Exploits and Polyglots in Digital Radio
10:30am •
SoK: XML Parser Vulnerabilities
11:30am •
Abusing Public Third-Party Services for EDoS Attacks
12:00pm •
DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work
2:00pm •
A Rising Tide: Design Exploits in Industrial Control Systems
2:30pm •
This Ain't Your Dose: Sensor Spoofing Attack on Medical Infusion Pump
3:00pm •
Sampling Race: Bypassing Timing-Based Analog Active Sensor Spoofing Detection on Analog-Digital Systems
4:00pm •
Truck Hacking: An Experimental Analysis of the SAE J1939 Standard
4:30pm •
Controlling UAVs with Sensor Input Spoofing Attacks
5:00pm •
A Security Analysis of an In-Vehicle Infotainment and App Platform
Texas Ballroom 2–3
8:45am •
Welcome and Discussion Format
9:00am •
Exciting Research Directions in User Authentication Online
10:30am •
Implications of Adversarial Learning for Security and Privacy
11:30am •
Security and Privacy for Augmented Reality
2:00pm •
New Challenges in Usable Security
3:30pm •
Everything You Wanted to Know about Privacy Law (but Were Afraid to Ask)
4:30pm •
Wrap-Up
Texas Ballroom 5-7
9:00am •
Learning From Others’ Mistakes: Penetration Testing IoT Devices in the Classroom
9:25am •
A Tool for Teaching Reverse Engineering
10:10am •
On the Design of Security Games: From Frustrating to Engaging Learning
10:10am •
Teaching Data-Driven Security: A Course on Security Analytics
11:00am •
Panel: Mentorship of Women in Computer Security
12:15pm •
SATC Transition to Practice Perspective: Why and How?
2:00pm •
Self-Efficacy in Cybersecurity Tasks and Its Relationship with Cybersecurity Competition and Work-Related Outcomes
2:25pm •
Development of Peer Instruction Questions for Cybersecurity Education
2:50pm •
Finding the Balance Between Guidance and Independence in Cybersecurity Exercises
3:10pm •
Gamification for Teaching and Learning Computer Security in Higher Education
4:00pm •
Teaching Computer Science With Cybersecurity Education Built-in
4:20pm •
A "Divergent"-Themed CTF and Urban Race for Introducing Security and Cryptography
4:40pm •
Mentoring Talent in IT Security–A Case Study
5:00pm •
The Use of Cyber-Defense Exercises in Undergraduate Computing Education
5:10pm •
Scalable and Lightweight CTF Infrastructures Using Application Containers (Pre-recorded Presentation)
Texas Ballroom Foyer
8:00am •
Continental Breakfast
10:00am •
Break with Refreshments
10:30am •
Break with Refreshments
11:00am •
Break with Refreshments
3:00pm •
Break with Refreshments
3:30pm •
Break with Refreshments
6:00pm •
Welcome Happy Hour
Zilker Ballroom 1 and Foyer
12:30pm •
Lunch
Wednesday
, August 10
Hill Country Ballroom
12:30pm •
Networking Luncheon for Women in Advanced Computing (WiAC)
TBA
12:30pm •
Lunch (on your own)
8:00pm •
Birds-of-a-Feather Sessions (BoFs)
Zilker Ballroom 1
6:30pm •
USENIX Security '16 Symposium Reception
6:30pm •
USENIX Security '16 Reception
Zilker Ballroom 2
11:00am •
Flip Feng Shui: Hammering a Needle in the Software Stack
11:30am •
One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation
12:00pm •
PIkit: A New Kernel-Independent Processor-Interconnect Rootkit
2:00pm •
Undermining Information Hiding (and What to Do about It)
2:30pm •
Poking Holes in Information Hiding
3:00pm •
What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of JIT-ROP Defenses
4:00pm •
Off-Path TCP Exploits: Global Rate Limit Considered Dangerous
4:30pm •
Website-Targeted False Content Injection by Network Operators
5:00pm •
The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEO
5:30pm •
A Comprehensive Measurement Study of Domain Generating Malware
8:00pm •
USENIX Security '16 Work-in-Progress Reports (WiPs)
Zilker Ballroom 2–4
8:25am •
Daily Lightning Talks
8:45am •
Opening Remarks and Awards
9:00am •
Crashing Drones and Hijacked Cameras: CyberTrust Meets CyberPhysical
Zilker Ballroom 3
11:00am •
Verifying Constant-Time Implementations
11:30am •
Secure, Precise, and Fast Floating-Point Operations on x86 Processors
12:00pm •
überSpark: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor
2:00pm •
zxcvbn: Low-Budget Password Strength Estimation
2:30pm •
Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks
3:00pm •
An Empirical Study of Textual Key-Fingerprint Representations
4:00pm •
Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing
4:30pm •
Faster Malicious 2-Party Secure Computation with Online/Offline Dual Execution
5:00pm •
Egalitarian Computing
5:30pm •
Post-quantum Key Exchange—A New Hope
Zilker Ballroom 4
11:00am •
2016 Test of Time Award Panel
2:00pm •
Making HTTPS the Default in the World's Largest Bureaucracy
4:00pm •
When Governments Attack: Malware Targeting Activists, Lawyers, and Journalists
Zilker Ballroom Foyer
7:30am •
Continental Breakfast
10:30am •
Break with Refreshments
3:30pm •
Break with Refreshments
Thursday
, August 11
TBA
12:30pm •
Lunch (on your own)
8:00pm •
Birds-of-a-Feather Sessions (BoFs)
Zilker Ballroom 1
6:30pm •
USENIX Security '16 Poster Session and Happy Hour
Zilker Ballroom 2
9:00am •
Automatically Detecting Error Handling Bugs Using Error Specifications
9:30am •
APISan: Sanitizing API Usages through Semantic Cross-Checking
10:00am •
On Omitting Commits and Committing Omissions: Preventing Git Metadata Tampering That (Re)introduces Software Vulnerabilities
11:00am •
Request and Conquer: Exposing Cross-Origin Resource Size
11:30am •
Trusted Browsers for Uncertain Times
12:00pm •
Tracing Information Flows Between Ad Exchanges Using Retargeted Ads
2:00pm •
ARMageddon: Cache Attacks on Mobile Devices
2:30pm •
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks
3:00pm •
An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries
4:00pm •
Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage
4:30pm •
Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys
5:00pm •
DROWN: Breaking TLS Using SSLv2
5:30pm •
All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption
8:00pm •
USENIX Security '16 Doctoral Colloquium
Zilker Ballroom 2–4
8:30am •
Daily Lightning Talks
Zilker Ballroom 3
9:00am •
Defending against Malicious Peripherals with Cinch
9:30am •
Making USB Great Again with USBFILTER
10:00am •
Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks
11:00am •
Virtual U: Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos
11:30am •
Hidden Voice Commands
12:00pm •
FlowFence: Practical Data Protection for Emerging IoT Application Frameworks
2:00pm •
Stealing Machine Learning Models via Prediction APIs
2:30pm •
Oblivious Multi-Party Machine Learning on Trusted Processors
3:00pm •
Thoth: Comprehensive Policy Compliance in Data Retrieval Systems
4:00pm •
Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software
4:00pm •
Teaching Computer Security: Thoughts from the Field
4:30pm •
Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services
5:00pm •
UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware
5:30pm •
Towards Measuring and Mitigating Social Engineering Software Download Attacks
Zilker Ballroom 4
9:00am •
The Moral Character of Cryptographic Work
11:00am •
Privacy and Threat in Practice: Mobile Messaging by Low-Income New Yorkers
2:00pm •
The Unfalsifiability of Security Claims
Zilker Ballroom Foyer
7:30am •
Continental Breakfast
10:30am •
Break with Refreshments
3:30pm •
Break with Refreshments
Friday
, August 12
TBA
12:30pm •
Lunch (on your own)
Zilker Ballroom 2
9:00am •
Specification Mining for Intrusion Detection in Networked Control Systems
9:30am •
Optimized Invariant Representation of Network Traffic for Detecting Unseen Malware Variants
10:00am •
Authenticated Network Time Synchronization
11:00am •
The Million-Key Question—Investigating the Origins of RSA Public Keys
11:30am •
Fingerprinting Electronic Control Units for Vehicle Intrusion Detection
12:00pm •
Lock It and Still Lose It —on the (In)Security of Automotive Remote Keyless Entry Systems
2:00pm •
Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016
2:30pm •
Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification
3:00pm •
You've Got Vulnerability: Exploring Effective Vulnerability Notifications
4:00pm •
On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis
4:30pm •
Practical DIFC Enforcement on Android
5:00pm •
Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images
5:30pm •
Harvesting Inconsistent Security Configurations in Custom Android ROMs via Differential Analysis
Zilker Ballroom 2–4
8:30am •
Daily Lightning Talks
Zilker Ballroom 3
9:00am •
fTPM: A Software-Only Implementation of a TPM Chip
9:30am •
Sanctum: Minimal Hardware Extensions for Strong Software Isolation
10:00am •
Ariadne: A Minimal Approach to State Continuity
11:00am •
OblivP2P: An Oblivious Peer-to-Peer Content Sharing System
11:30am •
AuthLoop: End-to-End Cryptographic Authentication for Telephony over Voice Channels
12:00pm •
You Are Who You Know and How You Behave: Attribute Inference Attacks via Users' Social Friends and Behaviors
2:00pm •
Mirror: Enabling Proofs of Data Replication and Retrievability in the Cloud
2:30pm •
ZKBoo: Faster Zero-Knowledge for Boolean Circuits
3:00pm •
The Cut-and-Choose Game and Its Application to Cryptographic Protocols
4:00pm •
Identifying and Characterizing Sybils in the Tor Network
4:30pm •
k-fingerprinting: A Robust Scalable Website Fingerprinting Technique
5:00pm •
Protecting Privacy of BLE Device Users
5:30pm •
Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles
Zilker Ballroom 4
9:00am •
Finding and Fixing Security Bugs in Flash
11:00am •
Report from the Field: A CDN's Role in Repelling Attacks against Banking Industry Web Sites
2:00pm •
AMD x86 Memory Encryption Technologies
4:00pm •
Security Competitions
Zilker Ballroom Foyer
7:30am •
Continental Breakfast
10:30am •
Break with Refreshments
3:30pm •
Break with Refreshments
Timezone
25th USENIX Security Symposium
America/Los Angeles
Filter By Date
25th USENIX Security Symposium
Aug 8
-
12, 2016
Monday
, August 8
Tuesday
, August 9
Wednesday
, August 10
Thursday
, August 11
Friday
, August 12
Filter By Venue
Venues
Sort schedule by Venue
Hill Country Ballroom
TBA
Texas Ballroom 1
Texas Ballroom 2–3
Texas Ballroom 5-7
Texas Ballroom Foyer
Zilker Ballroom 1
Zilker Ballroom 1 and Foyer
Zilker Ballroom 2
Zilker Ballroom 2–4
Zilker Ballroom 3
Zilker Ballroom 4
Zilker Ballroom Foyer
Filter By Type
ASE '16
BoFs
CSET '16
FOCI '16
HotSec '16
Security '16
Social
WOOT '16
Popular
Recently Active Attendees
nacalvas
AG
Arnold Gatilao
Jamie
Brian R
Ionut Ilie
H
harmenjonker
R
richandrews
PK
Peter Karbaliotis
More →
Filter sessions
Apply filters to sessions.
close
Dates
Monday
, August 8
Tuesday
, August 9
Wednesday
, August 10
Thursday
, August 11
Friday
, August 12
Venue
Hill Country Ballroom
TBA
Texas Ballroom 1
Texas Ballroom 2–3
Texas Ballroom 5-7
Texas Ballroom Foyer
Zilker Ballroom 1
Zilker Ballroom 1 and Foyer
Zilker Ballroom 2
Zilker Ballroom 2–4
Zilker Ballroom 3
Zilker Ballroom 4
Zilker Ballroom Foyer
Session Type
ASE '16
BoFs
CSET '16
FOCI '16
HotSec '16
Security '16
Social
WOOT '16
Other Filters
Popular