{"id":44,"date":"2018-01-22T19:48:25","date_gmt":"2018-01-23T02:48:25","guid":{"rendered":"https:\/\/blogs.ubc.ca\/cybersecuritysummit\/?page_id=44"},"modified":"2018-05-10T00:32:08","modified_gmt":"2018-05-10T07:32:08","slug":"posters","status":"publish","type":"page","link":"https:\/\/blogs.ubc.ca\/cybersecuritysummit\/posters\/","title":{"rendered":"Posters"},"content":{"rendered":"<h1 style=\"text-align: left;\">Research Projects Featured at the Summit&#8217;s Poster Sessions<\/h1>\n<p style=\"text-align: left;\">(sorted by title)<\/p>\n<ul style=\"text-align: left;\">\n<li>&#8220;<strong>A Characterization of Canadian Teenagers\u2019 Perception of Safety, Online Concerns, and Channel Selection When Using Social Networking Sites<\/strong>&#8221;<br \/>\nby\u00a0Salma Kashani, Konstantin Beznosov, Matei Ripeanu, and Jennifer Shapka.\u00a0<a href=\"https:\/\/www.salmakashani.com\" target=\"_blank\" rel=\"noopener\">More info&#8230;<\/a><\/li>\n<li>&#8220;<strong>A Million Ways to DAO: Identifying and Preventing Smart Contract Security Risks<\/strong>&#8221;<br \/>\nby\u00a0Victoria Lemieux,\u00a0Stephen Pederson, Hudhaifah Zahid, Joe Thomas, Usman Mukaty and\u00a0Danielle Batista.\u00a0<a href=\"https:\/\/blockchainubc.ca\" target=\"_blank\" rel=\"noopener\">More info&#8230;<\/a><\/li>\n<li>&#8220;<strong>ARTINALI: Dynamic Invariant Detection for Cyber-Physical System Security<\/strong>&#8221; by\u00a0Maryam Raiyat Aliabadi and\u00a0Karthik Pattabiraman<\/li>\n<li>&#8220;<strong>Battle Testing Layer 2 of the Bitcoin Blockchain<\/strong>&#8221;<br \/>\nby\u00a0Chen Feng, Victoria Lemieux,\u00a0Yuwei Guo and Jinfeng Tong.\u00a0<a href=\"https:\/\/blockchainubc.ca\" target=\"_blank\" rel=\"noopener\">More info&#8230;<\/a><\/li>\n<li>&#8220;<strong>Beeswax: an end-to-end secure communication platform for web applications<\/strong>&#8221;<br \/>\nby\u00a0Jean-Sebastien Legare,\u00a0Robert Sumi, and William A. Aiello. <a href=\"https:\/\/github.com\/web-priv\/beeswax\" target=\"_blank\" rel=\"noopener\">More info&#8230;<\/a><\/li>\n<li>&#8220;<strong>Better late than never: Stopping web exploits right before they hit the DOM<\/strong>&#8221;<br \/>\nby\u00a0Jean-Sebastien Legare and\u00a0William A. Aiello<\/li>\n<li>&#8220;<strong>Biscotti: Decentralized Private Machine Learning on the Blockchain<\/strong>&#8220;. \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0(supported through <a href=\"http:\/\/www.nserc-crsng.gc.ca\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-105 size-full\" src=\"https:\/\/blogs.ubc.ca\/cybersecuritysummit\/files\/2018\/02\/research-nserc-logo-320x125-e1519409332879.png\" alt=\"\" width=\"50\" height=\"20\" \/><\/a> <a href=\"http:\/\/www.nserc-crsng.gc.ca\/Professors-Professeurs\/Grants-Subs\/DGIGP-PSIGP_eng.asp\" target=\"_blank\" rel=\"noopener\">Discovery<\/a>)<br \/>\nby\u00a0<a href=\"http:\/\/clementfung.github.io\/\" target=\"_blank\" rel=\"noopener\">Clement Fung<\/a>, Gleb Naumenko, Ivan Beschastnikh.\u00a0<a href=\"https:\/\/github.com\/DistributedML\/BlockML\" target=\"_blank\" rel=\"noopener\">More info&#8230;<\/a><\/li>\n<li>&#8220;<strong>Blockchain and Distributed Ledgers as Trusted Recordkeeping Systems An Archival Theoretic Evaluation Framework<\/strong>&#8221;<br \/>\nby\u00a0Victoria Lemieux,\u00a0Darra Hofman, Danielle Batista and\u00a0Alysha Joo.\u00a0<a href=\"https:\/\/blockchainubc.ca\" target=\"_blank\" rel=\"noopener\">More info&#8230;<\/a><\/li>\n<li>&#8220;<strong>Characterizing Social Insider Attacks on Facebook<\/strong>&#8221;<br \/>\nby\u00a0Wali Usmani,\u00a0Konstantin Beznosov, Ivan Beschastnikh, Diogo Marques, Tiago Guerreiro, and Lu\u00eds Carri\u00e7o<\/li>\n<li>&#8220;<strong>Comprehensive Evaluation of Continuous Authentication Schemes for Smart Phones<\/strong>&#8221; \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 by\u00a0Masoud Mehrabi Koushki and\u00a0Konstantin Beznosov<\/li>\n<li>&#8220;<strong>Contextuality behind Mobile Privacy<\/strong>&#8221;<br \/>\nby\u00a0Primal Wijesekera,\u00a0Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman, David Wagner, and Konstantin Beznosov<\/li>\n<li>&#8220;<strong>Cross-platform Data Integrity and Confidentiality with Graduated Access Control<\/strong>&#8221; (supported through <a href=\"http:\/\/www.nserc-crsng.gc.ca\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-105 size-full\" src=\"https:\/\/blogs.ubc.ca\/cybersecuritysummit\/files\/2018\/02\/research-nserc-logo-320x125-e1519409332879.png\" alt=\"\" width=\"50\" height=\"20\" \/><\/a> <a href=\"http:\/\/www.nserc-crsng.gc.ca\/Professors-Professeurs\/Grants-Subs\/DGIGP-PSIGP_eng.asp\" target=\"_blank\" rel=\"noopener\">Discovery<\/a>)<br \/>\nby\u00a0Puneet Mehrotra, Amanda Carbonari, Peter Chen, Ivan Beshastnikh, and Andrew Warfield<\/li>\n<li>&#8220;<strong>Dancing in the Dark: Private Multi-Party Machine Learning in an Untrusted Setting<\/strong>&#8221; \u00a0(supported through <a href=\"http:\/\/www.nserc-crsng.gc.ca\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-105 size-full\" src=\"https:\/\/blogs.ubc.ca\/cybersecuritysummit\/files\/2018\/02\/research-nserc-logo-320x125-e1519409332879.png\" alt=\"\" width=\"50\" height=\"20\" \/><\/a> <a href=\"http:\/\/www.nserc-crsng.gc.ca\/Professors-Professeurs\/Grants-Subs\/DGIGP-PSIGP_eng.asp\" target=\"_blank\" rel=\"noopener\">Discovery<\/a>)<br \/>\nby\u00a0<a href=\"http:\/\/clementfung.github.io\/\" target=\"_blank\" rel=\"noopener\">Clement Fung<\/a>,\u00a0Jamie Koerner, Stewart Grant, and Ivan Beschastnikh. \u00a0<a href=\"https:\/\/github.com\/DistributedML\/TorML\" target=\"_blank\" rel=\"noopener\">More info&#8230;\u00a0<\/a><\/li>\n<li>&#8220;<strong>Distort: Secure, Anonymous Communication over Existing Infrastructure<\/strong>&#8221;<br \/>\nby\u00a0Jose Carlos Pazos, Jean-S\u00e9bastien L\u00e9gar\u00e9, Robert Reiss, Alex Ristich, and William Aiello.<\/li>\n<li>&#8220;<strong>Dynamic Physical Invariants based Intrusion Detection System for Cyber-Physical Systems<\/strong>&#8221;<br \/>\nby\u00a0Ekta Aggarwal,\u00a0Prof. Karthik Pattabiraman, and Prof. Andre Ivanov<\/li>\n<li>&#8220;<strong>DynPolAC: Dynamic Policy-based Access Control for IoT Systems<\/strong>&#8221;<br \/>\nby\u00a0Mehdi Karimibiuki, Karthik Pattabiraman, and Andre Ivanov. <a href=\"http:\/\/www.ece.ubc.ca\/~mkarimib\/\" target=\"_blank\" rel=\"noopener\">More info&#8230;<\/a><\/li>\n<li>&#8220;<strong>Estimating Vulnerability Scores To Augment Enterprise Security Systems<\/strong>&#8221;<br \/>\nby <span style=\"color: #333333;\"><a style=\"color: #333333;\" href=\"http:\/\/ece.ubc.ca\/~hhalawa\/\" target=\"_blank\" rel=\"noopener\">Hassan Halawa<\/a><\/span>,\u00a0Matei Ripeanu, Konstantin Beznosov, and Alex Loffler. <a href=\"http:\/\/netsyslab.ece.ubc.ca\/wiki\/index.php\/Artemis\" target=\"_blank\" rel=\"noopener\">More info &#8230;<\/a><\/li>\n<li>&#8220;<strong>IT Risk Factor Disclosure and Stock Price Crash Risk<\/strong>&#8221;<br \/>\nby Victor Song,\u00a0Hasan Cavusoglu, Gene Moo Lee, and Mary Li Zhi Ma<\/li>\n<li>&#8220;<strong><b>Lock of Ages: Towards Understanding Age Influence on Smartphone Authentication<\/b><\/strong>&#8221; (supported through <a href=\"http:\/\/www.nserc-crsng.gc.ca\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-105 size-full\" src=\"https:\/\/blogs.ubc.ca\/cybersecuritysummit\/files\/2018\/02\/research-nserc-logo-320x125-e1519409332879.png\" alt=\"\" width=\"50\" height=\"20\" \/><\/a> <a href=\"http:\/\/www.nserc-crsng.gc.ca\/Professors-Professeurs\/RPP-PP\/Engage-Engagement_eng.asp\" target=\"_blank\" rel=\"noopener\">Engage<\/a>)<br \/>\nby\u00a0<span style=\"color: #333333;\"><a style=\"color: #333333;\" href=\"https:\/\/www.linkedin.com\/in\/lina-qiu\/\" target=\"_blank\" rel=\"noopener\">Lina Qiu<\/a><\/span>,\u00a0Ildar Muslukhov, Alexander De Luca, and Konstantin Beznosov<\/li>\n<li>&#8220;<b>On Dating Sites, Nobody Knows You&#8217;re a Dog: Towards Reducing\u00a0the Risk of Sexual Assault for Users of Dating Sites<\/b>&#8221;<br \/>\nby <span style=\"color: #333333;\"><a style=\"color: #333333;\" href=\"http:\/\/www.ece.ubc.ca\/~borke\/?\" target=\"_blank\" rel=\"noopener\">Borke Obada-Obieh<\/a><\/span>, Yue Huang, Konstantin Beznosov<\/li>\n<li>&#8220;<strong>Secure App-to-App IPC on Mobile Devices<\/strong>&#8221;<br \/>\nby Patrick Colp,\u00a0William Aiello, Tim Deegan, and Andrew Warfield.<\/li>\n<li>&#8220;<strong>Security Perception in the Cryptocurrency Domain<\/strong>&#8221; \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 by\u00a0Artemij Voskobojnikov,\u00a0Yue Huang, Borke Obada-Obieh, Konstantin Beznosov<\/li>\n<li>&#8220;<strong>Source Attribution of Cryptographic API Misuse in Android Applications<\/strong>&#8221;<br \/>\nby Ildar Muslukhov,\u00a0Yazan Boshmaf and Konstantin Besnosov<\/li>\n<li>&#8220;<strong>Voice of IoT: Understanding of User Privacy Concerns and Expectations<\/strong>&#8221; \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 by\u00a0Yue Huang,\u00a0Borke Obada-Obieh, Konstantin Beznosov<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Research Projects Featured at the Summit&#8217;s Poster Sessions (sorted by title) &#8220;A Characterization of Canadian Teenagers\u2019 Perception of Safety, Online Concerns, and Channel Selection When Using Social Networking Sites&#8221; by\u00a0Salma Kashani, Konstantin Beznosov, Matei Ripeanu, and Jennifer Shapka.\u00a0More info&#8230; &#8220;A Million Ways to DAO: Identifying and Preventing Smart Contract Security Risks&#8221; by\u00a0Victoria Lemieux,\u00a0Stephen Pederson, Hudhaifah [&hellip;]<\/p>\n","protected":false},"author":5422,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-44","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/blogs.ubc.ca\/cybersecuritysummit\/wp-json\/wp\/v2\/pages\/44","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.ubc.ca\/cybersecuritysummit\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.ubc.ca\/cybersecuritysummit\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.ubc.ca\/cybersecuritysummit\/wp-json\/wp\/v2\/users\/5422"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.ubc.ca\/cybersecuritysummit\/wp-json\/wp\/v2\/comments?post=44"}],"version-history":[{"count":40,"href":"https:\/\/blogs.ubc.ca\/cybersecuritysummit\/wp-json\/wp\/v2\/pages\/44\/revisions"}],"predecessor-version":[{"id":220,"href":"https:\/\/blogs.ubc.ca\/cybersecuritysummit\/wp-json\/wp\/v2\/pages\/44\/revisions\/220"}],"wp:attachment":[{"href":"https:\/\/blogs.ubc.ca\/cybersecuritysummit\/wp-json\/wp\/v2\/media?parent=44"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}