presented at event 25th ACM Conference on Computer and Communications Security (Poster and Demo Session) Conference