| 2017 | A Secure Mobile Authentication Alternative to Biometrics. Mozhgan Azimpourkivi, Umut Topkara, Bogdan Carbunar |
| 2017 | A Security-Mode for Carrier-Grade SDN Controllers. Changhoon Yoon, Seungwon Shin, Phillip A. Porras, Vinod Yegneswaran, Heedo Kang, Martin W. Fong, Brian O'Connor, Thomas Vachuska |
| 2017 | Analysis of SEAndroid Policies: Combining MAC and DAC in Android. Haining Chen, Ninghui Li, William Enck, Yousra Aafer, Xiangyu Zhang |
| 2017 | Automated Analysis of Secure Internet of Things Protocols. Jun Young Kim, Ralph Holz, Wen Hu, Sanjay Jha |
| 2017 | Breaking and Fixing Destructive Code Read Defenses. Jannik Pewny, Philipp Koppe, Lucas Davi, Thorsten Holz |
| 2017 | Co-processor-based Behavior Monitoring: Application to the Detection of Attacks Against the System Management Mode. Ronny Chevalier, Maugan Villatel, David Plaquin, Guillaume Hiet |
| 2017 | Commoner Privacy And A Study On Network Traces. Xiyue Deng, Jelena Mirkovic |
| 2017 | DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting. Riccardo Bortolameotti, Thijs van Ede, Marco Caselli, Maarten H. Everts, Pieter H. Hartel, Rick Hofstede, Willem Jonker, Andreas Peter |
| 2017 | Droid-AntiRM: Taming Control Flow Anti-analysis to Support Automated Dynamic Analysis of Android Malware. Xiaolei Wang, Sencun Zhu, Dehua Zhou, Yuexiang Yang |
| 2017 | ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers. Ali Abbasi, Thorsten Holz, Emmanuele Zambon, Sandro Etalle |
| 2017 | Ex-Ray: Detection of History-Leaking Browser Extensions. Michael Weissbacher, Enrico Mariconti, Guillermo Suarez-Tangil, Gianluca Stringhini, William K. Robertson, Engin Kirda |
| 2017 | Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information. Antonio Bianchi, Eric Gustafson, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna |
| 2017 | Grid Shock: Coordinated Load-Changing Attacks on Power Grids: The Non-Smart Power Grid is Vulnerable to Cyber Attacks as Well. Adrian Dabrowski, Johanna Ullrich, Edgar R. Weippl |
| 2017 | Here Is Your Fingerprint!: Actual Risk versus User Perception of Latent Fingerprints and Smudges Remaining on Smartphones. Hoyeon Lee, Seungyeon Kim, Taekyoung Kwon |
| 2017 | HoloPair: Securing Shared Augmented Reality Using Microsoft HoloLens. Ivo Sluganovic, Matej Serbec, Ante Derek, Ivan Martinovic |
| 2017 | I Like It, but I Hate It: Employee Perceptions Towards an Institutional Transition to BYOD Second-Factor Authentication. Jake Weidman, Jens Grossklags |
| 2017 | Kakute: A Precise, Unified Information Flow Analysis System for Big-data Security. Jianyu Jiang, Shixiong Zhao, Danish Alsayed, Yuexuan Wang, Heming Cui, Feng Liang, Zhaoquan Gu |
| 2017 | Lean On Me: Mining Internet Service Dependencies From Large-Scale DNS Data. Matteo Dell'Amico, Leyla Bilge, Ashwin Kumar Kayyoor, Petros Efstathopoulos, Pierre-Antoine Vervier |
| 2017 | Machine-Learning-Guided Typestate Analysis for Static Use-After-Free Detection. Hua Yan, Yulei Sui, Shiping Chen, Jingling Xue |
| 2017 | Malware Detection in Adversarial Settings: Exploiting Feature Evolutions and Confusions in Android Apps. Wei Yang, Deguang Kong, Tao Xie, Carl A. Gunter |
| 2017 | Marmite: Spreading Malicious File Reputation Through Download Graphs. Gianluca Stringhini, Yun Shen, Yufei Han, Xiangliang Zhang |
| 2017 | Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans. Matús Nemec, Dusan Klinec, Petr Svenda, Peter Sekan, Vashek Matyas |
| 2017 | Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification. Xiaoyu Cao, Neil Zhenqiang Gong |
| 2017 | Nioh: Hardening The Hypervisor by Filtering Illegal I/O Requests to Virtual Devices. Junya Ogasawara, Kenji Kono |
| 2017 | Objective Metrics and Gradient Descent Algorithms for Adversarial Examples in Machine Learning. Uyeong Jang, Xi Wu, Somesh Jha |
| 2017 | On the Pitfalls of End-to-End Encrypted Communications: A Study of Remote Key-Fingerprint Verification. Maliheh Shirvanian, Nitesh Saxena, Jesvin James George |
| 2017 | Orpheus: Enforcing Cyber-Physical Execution Semantics to Defend Against Data-Oriented Attacks. Long Cheng, Ke Tian, Danfeng (Daphne) Yao |
| 2017 | Picky Attackers: Quantifying the Role of System Properties on Intruder Behavior. Timothy Barron, Nick Nikiforakis |
| 2017 | Piston: Uncooperative Remote Runtime Patching. Christopher Salls, Yan Shoshitaishvili, Nick Stephens, Christopher Kruegel, Giovanni Vigna |
| 2017 | Predicting Cyber Threats with Virtual Security Products. Shang-Tse Chen, Yufei Han, Duen Horng Chau, Christopher S. Gates, Michael Hart, Kevin A. Roundy |
| 2017 | Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017 |
| 2017 | Protecting Against Malicious Bits On the Wire: Automatically Generating a USB Protocol Parser for a Production Kernel. Peter C. Johnson, Sergey Bratus, Sean W. Smith |
| 2017 | Protecting COTS Binaries from Disclosure-guided Code Reuse Attacks. Mingwei Zhang, Michalis Polychronakis, R. Sekar |
| 2017 | Proxy Re-Encryption Based on Homomorphic Encryption. Reda Bellafqira, Gouenou Coatrieux, Dalel Bouslimi, Gwenolé Quellec, Michel Cozic |
| 2017 | QUASAR: Quantitative Attack Space Analysis and Reasoning. Richard Skowyra, Steven R. Gomez, David Bigelow, James Landry, Hamed Okhravi |
| 2017 | RESECT: Self-Learning Traffic Filters for IP Spoofing Defense. Jelena Mirkovic, Erik Kline, Peter L. Reiher |
| 2017 | RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications. Taegyu Kim, Chung Hwan Kim, Hongjun Choi, Yonghwi Kwon, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu |
| 2017 | Secure and Efficient Software-based Attestation for Industrial Control Devices with ARM Processors. Binbin Chen, Xinshu Dong, Guangdong Bai, Sumeet Jauhar, Yueqiang Cheng |
| 2017 | SecureDroid: Enhancing Security of Machine Learning-based Detection against Adversarial Android Malware Attacks. Lingwei Chen, Shifu Hou, Yanfang Ye |
| 2017 | Smoke Detector: Cross-Product Intrusion Detection With Weak Indicators. Kevin A. Roundy, Acar Tamersoy, Michael Spertus, Michael Hart, Daniel Kats, Matteo Dell'Amico, Robert Scott |
| 2017 | Spinner: Semi-Automatic Detection of Pinning without Hostname Verification. Chris McMahon Stone, Tom Chothia, Flavio D. Garcia |
| 2017 | Supplementing Modern Software Defenses with Stack-Pointer Sanity. Anh Quach, Matthew Cole, Aravind Prakash |
| 2017 | Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices. Le Guan, Shijie Jia, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin, Peng Liu, Xinyu Xing, Luning Xia |
| 2017 | TRAKS: A Universal Key Management Scheme for ERTMS. Richard James Thomas, Mihai Ordean, Tom Chothia, Joeri de Ruiter |
| 2017 | TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of CTI Sources. Ghaith Husari, Ehab Al-Shaer, Mohiuddin Ahmed, Bill Chu, Xi Niu |
| 2017 | The Devil's in The Details: Placing Decoy Routers in the Internet. Devashish Gosain, Anshika Agarwal, Sambuddho Chakravarty, Hrishikesh B. Acharya |
| 2017 | Towards Baselines for Shoulder Surfing on Mobile Authentication. Adam J. Aviv, John T. Davin, Flynn Wolf, Ravi Kuber |
| 2017 | VulCAN: Efficient Component Authentication and Software Isolation for Automotive Control Networks. Jo Van Bulck, Jan Tobias Mühlberg, Frank Piessens |
| 2017 | n-Auth: Mobile Authentication Done Right. Roel Peeters, Jens Hermans, Pieter Maene, Katri Grenman, Kimmo Halunen, Juha Häikiö |