Research Projects Featured at the Summit’s Poster Sessions
(sorted by title)
- “Access Control for Smart Home Data Sharing” by Yue Huang, Borke Obada, and Konstantin Beznosov. More info…
- “Amazon vs. My Brother: How Users of Shared Smart Speakers Perceive and Cope with Privacy Risks” by Yue Huang, Borke Obada, and Konstantin Beznosov. More info…
- “An Empirical Analysis of the Role of Miscalibration in Information Security” by Amir Fard Bahreini, Hasan Cavusoglu, and Ronald T. Cenfetelli. More info…
- “ARTINALI++: A Dynamic Specification Mining Approach for Complex Cyber-Physical System Security” by Maryam Raiyat Aliabadi, Mojtaba Vahidi Asl, and Ramak Ghavamizadeh. More info…
- “Authorization and Authentication in IoT Systems” by Mehdi Karimibiuki, Karthik Pattabiraman, and Andre Ivanov. More info…
- “Comparative Investigation of Users’ Perception of Facial Recognition Technology in North America and China” by Yue Huang, Borke Obada, and Konstantin Beznosov. More info…
- “Drip and Plumber: Vulnerabilities and Defenses on Main Memory Systems using Memory Controllers” by Bolin Wang, Peter Deutsch, Mieszko Lis, and Prashant Nair. More info…
- “Dynamic Detection and Mitigation of Speculative Execution Attacks” by Peter Deutsch, Mieszko Lis, and Prashant Nair. More info…
- “Fostering privacy-sensitive Interactions Through Voice Assisted Technologies (VATs)” by Julian H Benavides and Konstantin Beznosov. More info…
- “Guidelines for Coin Management Tools” by Artemij Voskobojnikov, Oliver Wiese, and Konstantin Beznosov. More info…
- “Guidelines for Crypto-Asset Tools” by Artemij Voskobojnikov, Svetlana Abramova, Rainer Böhme, and Konstantin Beznosov. More info…
- “How Blockchain Could Prevent Future Data Breaches” by Victoria Lemieux, Hoda Hamouda, Danielle Batista, and Darra Hofman. More info…
- “How Effective are Smart Contract Security Analysis Tools? Evaluating Smart Contract Static Analysis Tools Using Bug Injection” by Asem Ghaleb and Karthik Pattabiraman. More info…
- “Human and Organizational Aspects of Trustworthy Software Engineering” by Azadeh Mokhberi and Konstantin Beznosov. More info…
- “Intelligent and Resilient Attack Detection for Robotic Vehicles” by Pritam Dash and Karthik Pattabiraman. More info…
- “LEAP: Large-scale Federated and Privacy Preserving Evaluation and Analysis Platform” by Matheus Stolet, Chris Yoon, Paul Yong, Aline Talhouk, and Ivan Beschastnikh. More info…
- “On Smartphone Users’ Perception of Smart Lock for Android” by Masoud Mehrabi Koushki, Borke Obada, Jun Ho Huh, and Konstantin Beznosov. More info…
- “ReLUSyn: Synthesizing Stealthy Attacks for Deep Neural Network-Based Safety-Critical Cyber-Physical Systems” by Aarti Kashyap and Karthik Pattabiraman. More info…
- “Silicon Photonics Enabling Quantum Cryptography” by Abdelrahman Afifi, Sudip Shekhar, Jeff Young, and Lukas Chrostowski. More info…
- “Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non)Users” by Artemij Voskobojnikov, Borke Obada, Yue Huang, and Konstantin Beznosov. More info…
- “The Burden of Ending Online Account Sharing” by Borke Obada, Yue Huang, and Konstantin Beznosov. More info…
- “To Trust or Not to Trust? Digital Archives, IT Security and Trust in the Cyber Age” by Victoria Lemieux, Hasan Pakir, Julia Alforde, Francesca Magnoni, Arika Kaneko, Rhiannon Wallace, Frances Chen, Julia Zhu, and Cheng Zhou and Victoria Luchka. More info…
- “Towards Developing Trust in Online Third-Party Reporting Systems for Survivors of Sexual Assault” by Borke Obada, Lucrezia Spagnolo, and Konstantin Beznosov. More info…
- “Trusting the Faceless and Decentralized? An Exploration of Trust Among Cryptocurrency Users and Non-Users” by Artemij Voskobojnikov, Borke Obada, Yue Huang, and Konstantin Beznosov. More info…