Research Papers as well as ppt for them
| Team | Title of paper | PPT |
| 1 | Daniel J Mathew, Eldhose Peter | All your iFRAMEs point to us | ppt |
| 2 | Neeraj, Sidhartha Gupta | Abusing Social Networks for Automated User Profiling | ppt |
| 3 | Gaurav, Vineet | Persuasive Cued Click-Points | ppt |
| 4 | Anuj Kalia, Shashank Gupta | Detecting Forged TCP Reset Packets | ppt |
| 5 | Jagmeet Bali, Agastya Nanda | Using Cloud Storage as Attack Vector and Online Slack Space | ppt |
| 6 | Siddharth Bora, Salik Jamal Warsi | Visual Cryptography | ppt |
| 7 | Ravee, Rahul | Clickjacking: Attacks and Defenses | ppt |
| 8 | Alankrit, Nikita Gupta | Detecting Spammers on Social Networks | ppt |
| 9 | Faisal, Vigya | Detecting Spammers on Social Networks | ppt |
| 10 | Abhishek Gangwal, Rohan Sharma | Leaking Browser History | ppt |
| 11 | Jatin Kumar, Ankush Jindal | Detecting Return-to-libc Buffer Overflow Attacks Using Network Intrusion Detection Systems | ppt |
| 12 | Parth, Abhinn | A combinatorial approach to detecting buffer overflow vulnerabilities | ppt |
| 13 | Shehbaz Jaffer, Anshuj Garg | How unique is your web browser | ppt |
| 14 | Ashutosh, Chandra Prakash | SybilInfer: Detecting Sybil Nodes using Social Networks | ppt |
| 15 | Rahul, Aswin | Design and Evaluation of a Real-Time URL Spam Filtering Service | ppt |
| 16 | Siddhant, Deepak | Privacy-Preserving Social Plug-ins | ppt |
| 17 | Rajat, Parikshit | Aurasium: Practical Policy Enforcement for Android Applications | ppt |
| 18 | Björn Holm, Pasi Saarinen | Pwning Random Number Generators | ppt |
| 19 | Jwala N Rao, Deepika M | Defense against Rubber hose attacks | ppt |
| 20 | Kritarth, Arunim samat | Dissent: Accountable Anonymous Group Messaging | ppt |
| 21 | Manav, Jagjeet | These Aren’t the Droids You’re Looking For | ppt |
| 22 | Abhinav, Hitesh | Protecting Browsers from Cross-Origin CSS Attacks | ppt |
No comments:
Post a Comment