JavaScript isn't enabled in your browser, so this file can't be opened. Enable and reload.
2018 EE515/IS523 Paper Presentation Survey
This survey is needed to assign paper presenters in each class.
Please select at least three candidate papers which you want to present in the class and mark them 'Yes'.
Sign in to Google
to save your progress.
Learn more
* Indicates required question
What is your name?
*
Your answer
What is your student ID number?
*
Your answer
(9/13) "Dolphin Attack: Inaudible Voice Commands"
Choose
No
Yes
(9/18) "Security Analysis of the Diebold AccuVote-TS Voting Machine"
Choose
No
Yes
(9/18) "Comprehensive Experimental Analyses of Automotive Attack Surfaces"
Choose
No
Yes
(9/20) "Error Handling of In-vehicle Networks Makes Them Vulnerable"
Choose
No
Yes
(9/20) "How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles"
Choose
No
Yes
(9/27) "Hijacking Bitcoin: Routing Attacks on Cryptocurrencies "
Choose
No
Yes
(10/11) "On Limitations of Friendly Jamming for Confidentiality"
Choose
No
Yes
(10/11) "On the Requirements for Successful GPS Spoofing Attacks"
Choose
No
Yes
(11/6) "Lest We Remember: Cold Boot Attacks on Encryption Keys"
Choose
No
Yes
(11/6) "Exploiting the DRAM rowhammer bug to gain kernel privileges"
Choose
No
Yes
(11/8) "Exploiting open functionality in SMS-capable cellular networks"
Choose
No
Yes
(11/8) "Location leaks on the GSM air interface"
Choose
No
Yes
(11/8) "Gaining Control of Cellular Traffic Accounting by Spurious TCP Retransmission"
Choose
No
Yes
(11/13) "Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks"
Choose
No
Yes
(11/13) "Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations"
Choose
No
Yes
(11/13) "Let Me Answer That For You: Exploiting Broadcast Information in Cellular Networks"
Choose
No
Yes
(11/15) "Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices"
Choose
No
Yes
(11/15) "Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations"
Choose
No
Yes
(11/15) "A Rising Tide: Design Exploits in Industrial Control Systems"
Choose
No
Yes
(11/20) "Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses"
Choose
No
Yes
(11/20) "On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces"
Choose
No
Yes
(11/20) "This Ain't Your Dose: Sensor Spoofing Attack on Medical Infusion Pump"
Choose
No
Yes
(11/22) "Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors"
Choose
No
Yes
(11/22) "Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors"
Choose
No
Yes
(11/27) "Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications "
Choose
No
Yes
(11/27) "WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks "
Choose
No
Yes
(11/29) "The Limitations of Deep Learning in Adversarial Settings"
Choose
No
Yes
(11/29) "Deep Neural Networks are Easily Fooled: High Confidence Predictions for Unrecognizable Images"
Choose
No
Yes
(12/4) "Robust De-anonymization of Large Sparse Datasets"
Choose
No
Yes
(12/4) "De-anonymizing Programmers via Code Stylometry"
Choose
No
Yes
(12/6) "AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones using Radio Frequencies"
Choose
No
Yes
(12/6) "GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies"
Choose
No
Yes
Submit
Clear form
Never submit passwords through Google Forms.
This content is neither created nor endorsed by Google.
Report Abuse
-
Terms of Service
-
Privacy Policy
Forms