Team | Title of paper | PPT |
1
| Daniel J Mathew, Eldhose Peter
| All your iFRAMEs point to us
| ppt
|
2
| Neeraj, Sidhartha Gupta
| Abusing Social Networks for Automated User Profiling
| ppt
|
3
| Gaurav, Vineet
| Persuasive Cued Click-Points
| ppt
|
4
| Anuj Kalia, Shashank Gupta
| Detecting Forged TCP Reset Packets
| ppt
|
5
| Jagmeet Bali, Agastya Nanda
| Using Cloud Storage as Attack Vector and Online Slack Space
| ppt
|
6
| Siddharth Bora, Salik Jamal Warsi
| Visual Cryptography
| ppt
|
7
| Ravee, Rahul
| Clickjacking: Attacks and Defenses
| ppt
|
8
| Alankrit, Nikita Gupta
| Detecting Spammers on Social Networks
| ppt
|
9
| Faisal, Vigya
| Detecting Spammers on Social Networks
| ppt
|
10
| Abhishek Gangwal, Rohan Sharma
| Leaking Browser History
| ppt
|
11
| Jatin Kumar, Ankush Jindal
| Detecting Return-to-libc Buffer Overflow Attacks Using Network Intrusion Detection Systems
| ppt
|
12
| Parth, Abhinn
| A combinatorial approach to detecting buffer overflow vulnerabilities
| ppt
|
13
| Shehbaz Jaffer, Anshuj Garg
| How unique is your web browser
| ppt
|
14
| Ashutosh, Chandra Prakash
| SybilInfer: Detecting Sybil Nodes using Social Networks
| ppt
|
15
| Rahul, Aswin
| Design and Evaluation of a Real-Time URL Spam Filtering Service
| ppt
|
16
| Siddhant, Deepak
| Privacy-Preserving Social Plug-ins
| ppt
|
17
| Rajat, Parikshit
| Aurasium: Practical Policy Enforcement for Android Applications
| ppt
|
18
| Björn Holm, Pasi Saarinen
| Pwning Random Number Generators
| ppt
|
19
| Jwala N Rao, Deepika M
| Defense against Rubber hose attacks
| ppt
|
20
| Kritarth, Arunim samat
| Dissent: Accountable Anonymous Group Messaging
| ppt
|
21
| Manav, Jagjeet
| These Aren’t the Droids You’re Looking For
| ppt
|
22
| Abhinav, Hitesh
| Protecting Browsers from Cross-Origin CSS Attacks
| ppt
|