CSAW'16 Applied Research Winners

NYU Tandon winners:
First place: Hidden Voice Commands

Authors: Nicholas Carlini, Pratyush Mishra, and David Wagner, University of California, Berkeley; Yuankai Zhang, Micah Sherr, Clay Shields, Tavish Vaidya (presenter), and Wenchao Zhou, Georgetown University

Second place: Trusted Browsers for Uncertain Times

Authors: David Kohlbrenner (presenter), Hovav Shacham, University of California, San Diego

Third place: Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence

Authors: Raheem Beyah, Xiaojing Liao, Georgia Institute of Technology; Kan Yuan (presenter), Xiaofeng Wang, Luyi Xing, Indiana University, Bloomington; Zhou Li (ACM member)

NYU Abu Dhabi winners:
First Place: Post-Quantum Key Exchange – A New Hope

Author: Erdem Elkim, Ege University, Bornova/Izmir, Turkey

Second place: Sparse Polynomial Multiplication for Lattice-Based Cryptography with Small Complexity

Author: Sedat Akleylek, Ondokuz Mayis University, Atakum/Samsun, Turkey

Third place: Towards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in IoT

Author: Aafaf Ouaddah, Cadi Ayyad University, Marrakesh, Morocco

IIT Kanpur winners:
First place: Shuffling Across Rounds: A Lightweight Strategy to Counter Side-channel Attacks

Authors: Sikhar Patranabis, Debapriya Basu Roy, Praveen Kumar Vadnala, Debdeep Mukhopadhyay, Santosh Ghosh, IIT Kharagpur

Second place: Theory and Application of Delay Constraints in Arbiter PUF

Authors: Urbi Chatterjee, Rajat Subhra Chakraborty, Hitesh Kapoor, Debdeep Mukhopadhyay, IIT Kharagpur

Third place: Integrated Sensor: A Backdoor for Hardware Trojan Insertions?

Authors: Xuan Thuy Ngo, Zakaria Najm, Shivam Bhasin, Debapriya Basu Roy, Jean-Luc Danger, Sylvain Guilley, IIT Kharagpur

See Applied Research photos here

Applied Research winners:

First place: Hidden Voice Commands

Second place: Trusted Browsers for Uncertain Times

Third place: Acing the IOC Game


Other NYU Tandon Applied Research Finalists

APISan: Sanitizing API Usages through Semantic Cross-Checking

Authors: Insu Yun (presenter), Changwoo Min, Xujie Si, Yeongjin Jang, Taesoo Kim, and Mayur Naik

Measuring and Mitigating AS-level Adversaries Against Tor

Authors: Risah Nithyanand, Oleksii Starov (presenter), Adva Zair, Phillipa Gill, and Michael Schapira

One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation

Authors: Yuan Xiao (presenter), Xiaokuan Zhang, Yinqian Zhang, and Radu Teodorescu

A Principled Approach for ROP Defense

Authors: Rui Qiao (presenter), Mingwei Zhang, and R Sekar

SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks

Authors: Min Suk Kang, Virgil D. Gligor, and Vyas Sekar

Towards SDN-Defined Programmable BYOD (Bring Your Own Device) Security

Authors: Sungmin Hong (presenter), Robert Baykov, Lei Xu, Srinath Nadimpalli, and Guofei Gu

TrackMeOrNot: Enabling Flexible Control on Web Tracking

Authors: Wei Meng (presenter), Byoungyoung Lee, Xinyu Xing, and Wenke Lee