Research Projects Featured at the Summit’s Poster Sessions
(sorted by title)
- “A Characterization of Canadian Teenagers’ Perception of Safety, Online Concerns, and Channel Selection When Using Social Networking Sites”
by Salma Kashani, Konstantin Beznosov, Matei Ripeanu, and Jennifer Shapka. More info… - “A Million Ways to DAO: Identifying and Preventing Smart Contract Security Risks”
by Victoria Lemieux, Stephen Pederson, Hudhaifah Zahid, Joe Thomas, Usman Mukaty and Danielle Batista. More info… - “ARTINALI: Dynamic Invariant Detection for Cyber-Physical System Security” by Maryam Raiyat Aliabadi and Karthik Pattabiraman
- “Battle Testing Layer 2 of the Bitcoin Blockchain”
by Chen Feng, Victoria Lemieux, Yuwei Guo and Jinfeng Tong. More info… - “Beeswax: an end-to-end secure communication platform for web applications”
by Jean-Sebastien Legare, Robert Sumi, and William A. Aiello. More info… - “Better late than never: Stopping web exploits right before they hit the DOM”
by Jean-Sebastien Legare and William A. Aiello - “Biscotti: Decentralized Private Machine Learning on the Blockchain“. (supported through Discovery)
by Clement Fung, Gleb Naumenko, Ivan Beschastnikh. More info… - “Blockchain and Distributed Ledgers as Trusted Recordkeeping Systems An Archival Theoretic Evaluation Framework”
by Victoria Lemieux, Darra Hofman, Danielle Batista and Alysha Joo. More info… - “Characterizing Social Insider Attacks on Facebook”
by Wali Usmani, Konstantin Beznosov, Ivan Beschastnikh, Diogo Marques, Tiago Guerreiro, and Luís Carriço - “Comprehensive Evaluation of Continuous Authentication Schemes for Smart Phones” by Masoud Mehrabi Koushki and Konstantin Beznosov
- “Contextuality behind Mobile Privacy”
by Primal Wijesekera, Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman, David Wagner, and Konstantin Beznosov - “Cross-platform Data Integrity and Confidentiality with Graduated Access Control” (supported through Discovery)
by Puneet Mehrotra, Amanda Carbonari, Peter Chen, Ivan Beshastnikh, and Andrew Warfield - “Dancing in the Dark: Private Multi-Party Machine Learning in an Untrusted Setting” (supported through Discovery)
by Clement Fung, Jamie Koerner, Stewart Grant, and Ivan Beschastnikh. More info… - “Distort: Secure, Anonymous Communication over Existing Infrastructure”
by Jose Carlos Pazos, Jean-Sébastien Légaré, Robert Reiss, Alex Ristich, and William Aiello. - “Dynamic Physical Invariants based Intrusion Detection System for Cyber-Physical Systems”
by Ekta Aggarwal, Prof. Karthik Pattabiraman, and Prof. Andre Ivanov - “DynPolAC: Dynamic Policy-based Access Control for IoT Systems”
by Mehdi Karimibiuki, Karthik Pattabiraman, and Andre Ivanov. More info… - “Estimating Vulnerability Scores To Augment Enterprise Security Systems”
by Hassan Halawa, Matei Ripeanu, Konstantin Beznosov, and Alex Loffler. More info … - “IT Risk Factor Disclosure and Stock Price Crash Risk”
by Victor Song, Hasan Cavusoglu, Gene Moo Lee, and Mary Li Zhi Ma - “Lock of Ages: Towards Understanding Age Influence on Smartphone Authentication” (supported through Engage)
by Lina Qiu, Ildar Muslukhov, Alexander De Luca, and Konstantin Beznosov - “On Dating Sites, Nobody Knows You’re a Dog: Towards Reducing the Risk of Sexual Assault for Users of Dating Sites”
by Borke Obada-Obieh, Yue Huang, Konstantin Beznosov - “Secure App-to-App IPC on Mobile Devices”
by Patrick Colp, William Aiello, Tim Deegan, and Andrew Warfield. - “Security Perception in the Cryptocurrency Domain” by Artemij Voskobojnikov, Yue Huang, Borke Obada-Obieh, Konstantin Beznosov
- “Source Attribution of Cryptographic API Misuse in Android Applications”
by Ildar Muslukhov, Yazan Boshmaf and Konstantin Besnosov - “Voice of IoT: Understanding of User Privacy Concerns and Expectations” by Yue Huang, Borke Obada-Obieh, Konstantin Beznosov