ABCDEFGHIJKLMNOPQRSTUVWXYZ
1
Schedule
2
TimeLocationTopicPresenter
3
1 Feb @ 1:00AVW3460Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat IntelligenceOctavian Suciu
4
8 Feb @ 1:00AVW3460You’ve Got Vulnerability: Exploring Effective Vulnerability NotificationsDan Votipka
5
15 Feb @ 1:00AVW3460User Interaction and Permission Use on AndroidDan Votipka
6
22 Feb @ 1:00AVW3460Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User StudyKris Micinski
7
3 Mar @ 11:00AVW3460Information Flow Security in Practical SystemsLimin Jia
8
8 Mar @ 1:00AVW3460
9
15 Mar @ 1:00AVW3460When SIGNAL hits the Fan: On the Usability and Security of State-of-the-Art Secure Mobile MessagingWei Bai
10
22 Mar @ 1:00AVW3460SPRING BREAK
11
29 Mar @ 1:00AVW3460Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install ServicesZiyun Zhu
12
5 Apr @ 1:00AVW3460HotSoS 2017
13
12 Apr @ 1:00AVW3460Driller: Augmenting Fuzzing Through Selective Symbolic ExecutionWillem Wyndam
14
19 Apr @ 1:00AVW3460Cryptographically Protected Database SearchBenjamin Fuller
15
26 Apr @ 1:00AVW3460Addressing the Digital Divide in Security: Measuring and Intervening in User Security BehaviorElissa Redmiles
16
3 May @ 1:00AVW3460pASSWORD tYPOS and How to Correct Them SecurelyAishwarya
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100