Seminar

Autumn 2018 Seminars:

Speaker

Title

Conference

September 29 Zhiyun Wang Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach CCS 2018
JiaYu Zhang Acquisitional Rule-based Engine for Discovering Internet-of-Thing Devices USENIX 2018
Ruiwen He BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid USENIX 2018
October 11 Guoming Zhang PrinTracker: Fingerprinting 3D Printers using Commodity Scanners CCS 2018
Chen Yan Fear the Reaper: Characterization and Fast Detection of Card Skimmers USENIX 2018
Bingjing Yan New issues
October 15 Yushi Cheng Fear the Reaper: Characterization and Fast Detection of Card Skimmers USENIX 2018
Taiming Zhang Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning USENIX 2018
Kai Wang New issues
October 22 Juchuan Zhang Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach CCS 2018
Zhou Zhuang
Ruochen Zhou New issues
October 29 Yanmiao Zhang Meltdown: Reading Kernel Memory from User Space USENIX 2018
Tianchen Zhang QSYM : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing USENIX 2018
Xinfeng Li New issues
November 19 Ruochen Zhou If This Then What? Controlling Flows in IoT Apps CCS 2018
Yanjie Li DOPING: Generative Data Augmentation for Unsupervised Anomaly Detection with GAN IEEE 2018
Jiangyi Deng Clock Around the Clock: Time-Based Device Fingerprinting CCS 2018
Tao Zhao DScreaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers CCS 2018
Zhiyun Wang New issues
November 29 Chaohao Li SoK: Security Evaluation of Home-Based IoT Deployments S&P 2019
Bingjing Yan Fp-Scanner: The Privacy Implications of Browser Fingerprint Inconsistencies USENIX 2018
Ruiwen He New issues
December 6 Ruiwen He Ohm's Law in Data Centers: A Voltage Side Channel for Timing Power Attacks CCS 2018
Jiayu Zhang HoMonit: Monitoring Smart Home Apps from Encrypted Traffic CCS 2018
Yanjie Li New issues
December 13 Zhiyun Wang PatternListener: Cracking Android Pattern Lock Using Acoustic Signals CCS 2018
Xuan Ouyang
Tao Zhao New issues
December 20 Chen Yan Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse CCS 2018
Guoming Zhang No Training Hurdles: Fast Training-Agnostic Atacks to Infer Your Typing CCS 2018
Bingjing Yan New issues
December 27 Yushi Cheng DeepMasterPrints: Generating Master Prints for Dictionary Attacks via Latent Variable Evolution CCS 2018
Taiming Zhang
Kai Wang RainbowLight: Towards Low Cost Ambient Light Positioning with Mobile Phones Mobicom
January 3 Juchuan Zhang ChromaCode: A Fully Imperceptible Screen-Camera Communication System CCS 2018
Zhou Zhuang
Xinfeng Li Continuous Authentication for Voice Assistants MobiCom 2017
January 10 Yanmiao Zhang FUZE:Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities USENIX 2018
Tianchen Zhang Inception: System-Wide Security Testing of Real-World Embedded Systems Software USENIX 2018
Ruochen Zhou New issues
January 17 Jiangyi Deng Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring USENIX 2018
Yanjie Li
Zhiyun Wang New issues

Autumn 2018 Workshop:

Speaker

Title

9:00 - 9:05 Workshop Openning
Session 1: Talks
9:05 - 9:25 Chaohao Li Person Identification
9:25 - 9:45 Xinyan Zhou Keylogging side channels
9:45 - 10:05 Jiayu Zhang Hiding Information in Noise: Fundamental Limits of Covert Wireless Communication
Session Break (10 min)
10:15 - 10:35 Yushi Cheng Becoming Supersonic: Writing Good Papers Fast!
Session 2: IoT Security
10:35-10:55 Tao Zhao BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid
10:55-11:15 Ruochen Zhou Rethinking Access Control and Authentication for the Home Internet of Things (IoT)
11:15-11:35 Guoming Zhang LipPass: Lip Reading-based User Authentication on Smartphones Leveraging Acoustic Signals
Lunch
Session 3-I
13:00-13:20 Yanmiao Zhang HEAPHOPPER: Bringing Bounded Model Checking to Heap Implementation Security
13:20-13:40 Jiangyi Deng One&Done: A Single-Decryption EM-Based Attack on OpenSSL’s Constant-Time Blinded RSA
13:40-14:00 Tianchen Zhang With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning
14:00-14:20 Binjing Yan Arbitrum: Scalable, private smart contracts
Session Break (10 min)
Session 3-II
14:30-14:50 Taimin Zhang AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning
14:50-15:10 Yanjie Li A4NT: Author Attribute Anonymity by Adversarial Training of Neural Machine Translation
15:10-15:30 Ruiwen He Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secrets
Session Break (10 min)
15:40-16:00 Chen Yan Tutorials from Chen Yan
Session 4: Sensor Attacks
16:00-16:20 Zhiyun Wang Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run, but can you hide?
16:20-16:40 Juchuan Zhang Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors

Spring 2018 Seminars:

Speaker

Title

Conference

March 26 Zhiyun Wang ABC:Enabling Smartphone Authentication with Built-in Camera NDSS 2018
Xuan OuYang Feature Squeezing:Detecting Adversarial Examples in Deep Neural Networks NDSS 2018
Yan Long New Sensor
April 2 Guoming Zhang Inaudible Voice Commands: The Long-range Attack and Defense NSDI 2018
Chen Yan rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System NDSS 2018
Weizhao Jin New Sensor
April 9 Jvchuan Zhang EyeTell: Video-Assisted Touchscreen Keystroke Inference from Eye Movements S&P 2018
Jiangyi Deng Classifiers and their Metrics Quantified Molecular Informatics[J](2018)
Xingdong Cao New Sensor
April 16 Chaohao Li IoT Seminar Big Four
Taimin Zhang Stealing Hyperparameters in Machine Learning S&P 2018
Ruiwen He New Sensor
April 23 Zhou Zhuang Privacy Risks with Facebook’s PII-based Targeting: Auditing a Data Broker’s Advertising Interface S&P 2018
Zhiyun Wang
Jiangyi Deng New Sensor
April 30 Labor day break    
May 7 Yanmiao Zhang Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance CCS 2017
Tianchen Zhang VulDeepecker: A Deep Learning-Based System for Vulnerability Dectection NDSS 2018
Chuer Yu New Sensor
May 14 Spring break    
May 21 Xinyan Zhou Device Pairing at the Touch of an Electrode NDSS 2018
Yushi Cheng ABC: Enabling Smartphone Authentication with Built-in Camera NDSS 2018
Jiayu Zhang New Sensor
May 28 Jiayu Zhang FPGA-Based Remote Power Side-Channel Attacks S&P 2018
Ruiwen He IoT Goes Nuclear: Creating a ZigBee Chain Reaction S&P 2017
Zhiyun Wang New Sensor
June 4 ASIACCS 2018 break    
June 11 Zhiyun Wang FP-STALKER: Tracking Browser Fingerprint Evolutions Along Time S&P 2018
Xuan Ouyang Automated Website Fingerprinting through Deep Learning NDSS 2018
Zhuo Zhang New Sensor
June 19 Chen Yan When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across Contexts S&P 2018
Guoming Zhang Walls: have ears traffic-based side-channel attack in video streaming INFOCOM2018
Yan Long New Sensor
June 25 Taimin Zhang MAGIK: An Efficient Key Extraction Mechanism Based on Dynamic Geomagnetic Field INFOCOM2018
Yushi Cheng Detecting Wireless Spy Cameras Via Stimulating and Probing Mobisys 2018
Weizhao Jin New Sensor
July 2 Jvchuan Zhang Trojaning Attack on Neural Networks NDSS 2018
Zhou Zhuang All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems USENIX 2018
Xingdong Cao New Sensor
July 9 Tianchen Zhang    
Yanmiao Zhang CollAFL: Path Sensitive Fuzzing S&P 2018
Bingjing Yan New Sensor
July 16 Xinyan Zhou Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections NDSS 2018
Chaohao Li Do You Feel What I Hear? Enabling Autonomous IoT Device Pairing using Different Sensor Types S&P 2018
Jiayu Zhang New Sensor
July 23 Ruiwen He    
Jiayu Zhang    
Zhiyun Wang New Sensor