CSH2016-poster-list
Below is a list of posters presented in the CSH 2016 poster session.
- The Pythia PRF Service
A. Everspaugh, R. Chatterjee, S. Scott, A. Juels, and T. Ristenpart - pASSWORD tYPOS and How to Correct Them Securely
R. Chatterjee, A. Athayle, D. Akhawe, A. Juels, and T. Ristenpart - Bohatei: Flexible and Elastic DDoS Defense
S. K. Fayaz, Y. Tobioka, V. Sekar, and M. Bailey - Stealing Machine Learning Models via Prediction APIs
F. Tramèr, F. Zhang, A. Juels, M. K. Reiter, and T. Ristenpart - Server-side Verification of Client Behavior in Cryptographic Protocols
A. Chi, R. Cochran, M. Nesfield, M. K. Reiter, and C. Sturton - A Software Approach to Defeating Side Channels in Last-Level Caches
Z. Zhou, M. K. Reiter, and Y. Zhang - Mitigating Side Channels Using Statistical Privacy Mechanisms
Q. Xiao, M. K. R., and Y. Zhang - Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration
S.-J. Moon, V. Sekar, and M. K. Reiter - Logical Trust: SAFE and STRONG
Q. Cao, J. Chase, and V. Thummala - CQSTR: Containing your Data in the Cloud
Y. Zhai, L. Yin, J. Chase, T. Ristenpart, and M. Swift - Secure Cooperative Analytics
Q. Cao and J. Chase - A Model for Securing Application Chains in a Cloud
D. Kim and M. A. Vouk - Education Modules for Cloud Computing and Cloud Security in Systems Courses
J. Aikat, A. Akella, J. Chase, A. Juels, M. K. Reiter, T. Ristenpart, V. Sekar, and M. Swift
