| 2017 | A Behavioral Biometric Authentication Framework on Smartphones. Ahmed Mahfouz, Tarek M. Mahmoud, Ahmed Sharaf Eldin |
| 2017 | A Ciphertext-Policy Attribute-based Encryption Scheme With Optimized Ciphertext Size And Fast Decryption. Qutaibah M. Malluhi, Abdullatif Shikfa, Viet Cuong Trinh |
| 2017 | A Secure, Practical & Safe Packet Spoofing Service. Will Scott |
| 2017 | A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol. Gildas Avoine, Xavier Bultel, Sébastien Gambs, David Gérault, Pascal Lafourcade, Cristina Onete, Jean-Marc Robert |
| 2017 | Accurate Manipulation of Delay-based Internet Geolocation. AbdelRahman Abdou, Ashraf Matrawy, Paul C. van Oorschot |
| 2017 | Advanced Security Research in the Era of the Internet of Things. Gregory Akers |
| 2017 | Almost Universal Forgery Attacks on the COPA and Marble Authenticated Encryption Algorithms. Jiqiang Lu |
| 2017 | An Attack Against Message Authentication in the ERTMS Train to Trackside Communication Protocols. Tom Chothia, Mihai Ordean, Joeri de Ruiter, Richard James Thomas |
| 2017 | An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption. Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au, Surya Nepal |
| 2017 | Android Database Attacks Revisited. Behnaz Hassanshahi, Roland H. C. Yap |
| 2017 | Automatically Inferring Malware Signatures for Anti-Virus Assisted Attacks. Christian Wressnegger, Kevin Freeman, Fabian Yamaguchi, Konrad Rieck |
| 2017 | BRIDEMAID: An Hybrid Tool for Accurate Detection of Android Malware. Fabio Martinelli, Francesco Mercaldo, Andrea Saracino |
| 2017 | BinSequence: Fast, Accurate and Scalable Binary Code Reuse Detection. He Huang, Amr M. Youssef, Mourad Debbabi |
| 2017 | BlindIDS: Market-Compliant and Privacy-Friendly Intrusion Detection System over Encrypted Traffic. Sébastien Canard, Aïda Diop, Nizar Kheir, Marie Paindavoine, Mohamed Sabt |
| 2017 | Boosting the Guessing Attack Performance on Android Lock Patterns with Smudge Attacks. Seunghun Cha, Sungsu Kwag, Hyoungshick Kim, Jun Ho Huh |
| 2017 | Breaking Ad-hoc Runtime Integrity Protection Mechanisms in Android Financial Apps. Taehun Kim, Hyeonmin Ha, Seoyoon Choi, Jaeyeon Jung, Byung-Gon Chun |
| 2017 | Cache-Based Application Detection in the Cloud Using Machine Learning. Berk Gülmezoglu, Thomas Eisenbarth, Berk Sunar |
| 2017 | Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications. Amiangshu Bosu, Fang Liu, Danfeng (Daphne) Yao, Gang Wang |
| 2017 | Control-Flow Hijacking: Are We Making Progress? Mathias Payer |
| 2017 | CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks. David M. Sommer, Aritra Dhar, Luka Malisa, Esfandiar Mohammadi, Daniel Ronzani, Srdjan Capkun |
| 2017 | DRIVE: Dynamic Runtime Integrity Verification and Evaluation. Andre Rein |
| 2017 | DataShield: Configurable Data Confidentiality and Integrity. Scott A. Carr, Mathias Payer |
| 2017 | Detecting Inter-App Information Leakage Paths. Shweta Bhandari, Frédéric Herbreteau, Vijay Laxmi, Akka Zemmari, Partha S. Roop, Manoj Singh Gaur |
| 2017 | Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu. Sanchuan Chen, Xiaokuan Zhang, Michael K. Reiter, Yinqian Zhang |
| 2017 | Detection of Information Leaks via Reflection in Android Apps. Jyoti Gajrani, Li Li, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur, Mauro Conti |
| 2017 | Discovering Logical Vulnerabilities in the Wi-Fi Handshake Using Model-Based Testing. Mathy Vanhoef, Domien Schepers, Frank Piessens |
| 2017 | DoS Attacks on Your Memory in Cloud. Tianwei Zhang, Yinqian Zhang, Ruby B. Lee |
| 2017 | Don't Skype & Type!: Acoustic Eavesdropping in Voice-Over-IP. Alberto Compagno, Mauro Conti, Daniele Lain, Gene Tsudik |
| 2017 | DroidForensics: Accurate Reconstruction of Android Attacks via Multi-layer Forensic Logging. Xingzi Yuan, Omid Setayeshfar, Hongfei Yan, Pranav Panage, Xuetao Wei, Kyu Hyung Lee |
| 2017 | DroidPill: Pwn Your Daily-Use Apps. Chaoting Xuan, Gong Chen, Erich Stuntebeck |
| 2017 | Enabling End-Users to Protect their Privacy. Mahmoud Barhamgi, Mu Yang, Chia-Mu Yu, Yijun Yu, Arosha K. Bandara, Djamal Benslimane, Bashar Nuseibeh |
| 2017 | EncKV: An Encrypted Key-value Store with Rich Queries. Xingliang Yuan, Yu Guo, Xinyu Wang, Cong Wang, Baochun Li, Xiaohua Jia |
| 2017 | Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics. Simon Eberz, Kasper Bonne Rasmussen, Vincent Lenders, Ivan Martinovic |
| 2017 | Extracting Conditional Formulas for Cross-Platform Bug Search. Qian Feng, Minghua Wang, Mu Zhang, Rundong Zhou, Andrew Henderson, Heng Yin |
| 2017 | Functional Encryption with Oblivious Helper. Pierre-Alain Dupont, David Pointcheval |
| 2017 | Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions. Cheng Huang, Shuang Hao, Luca Invernizzi, Jiayong Liu, Yong Fang, Christopher Kruegel, Giovanni Vigna |
| 2017 | Group Signatures with Time-bound Keys Revisited: A New Model and an Efficient Construction. Keita Emura, Takuya Hayashi, Ai Ishida |
| 2017 | Hardware Trojans and Other Threats against Embedded Systems. Christof Paar |
| 2017 | Heterogeneous Rainbow Table Widths Provide Faster Cryptanalyses. Gildas Avoine, Xavier Carpent |
| 2017 | Hit by the Bus: QoS Degradation Attack on Android. Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar |
| 2017 | How Discover a Malware using Model Checking. Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone |
| 2017 | LINCOS: A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality. Johannes Braun, Johannes Buchmann, Denise Demirel, Matthias Geihs, Mikio Fujiwara, Shiho Moriai, Masahide Sasaki, Atsushi Waseda |
| 2017 | Lightweight Swarm Attestation: A Tale of Two LISA-s. Xavier Carpent, Karim El Defrawy, Norrathep Rattanavipanon, Gene Tsudik |
| 2017 | Localization of Spoofing Devices using a Large-scale Air Traffic Surveillance System. Kai Jansen, Matthias Schäfer, Vincent Lenders, Christina Pöpper, Jens B. Schmitt |
| 2017 | Memory Safety for Embedded Devices with nesCheck. Daniele Midi, Mathias Payer, Elisa Bertino |
| 2017 | Mis-operation Resistant Searchable Homomorphic Encryption. Keita Emura, Takuya Hayashi, Noboru Kunihiro, Jun Sakuma |
| 2017 | MoPS: A Modular Protection Scheme for Long-Term Storage. Christian Weinert, Denise Demirel, Martín A. Gagliotti Vigil, Matthias Geihs, Johannes Buchmann |
| 2017 | Model-based Attack Detection Scheme for Smart Water Distribution Networks. Chuadhry Mujeeb Ahmed, Carlos Murguia, Justin Ruths |
| 2017 | On the Detection of Kernel-Level Rootkits Using Hardware Performance Counters. Baljit Singh, Dmitry Evtyushkin, Jesse Elwell, Ryan Riley, Iliano Cervesato |
| 2017 | On the Robustness of RSA-OAEP Encryption and RSA-PSS Signatures Against (Malicious) Randomness Failures. Jacob C. N. Schuldt, Kazumasa Shinagawa |
| 2017 | Pass-O: A Proposal to Improve the Security of Pattern Unlock Scheme. Harshal Tupsamudre, Vijayanand Banahatti, Sachin Lodha, Ketan Vyas |
| 2017 | PayBreak: Defense Against Cryptographic Ransomware. Eugene Kolodenker, William Koch, Gianluca Stringhini, Manuel Egele |
| 2017 | Pinpointing Vulnerabilities. Yue Chen, Mustakimur Khandaker, Zhi Wang |
| 2017 | Practical Black-Box Attacks against Machine Learning. Nicolas Papernot, Patrick D. McDaniel, Ian J. Goodfellow, Somesh Jha, Z. Berkay Celik, Ananthram Swami |
| 2017 | PrivWatcher: Non-bypassable Monitoring and Protection of Process Credentials from Memory Corruption Attacks. Quan Chen, Ahmed M. Azab, Guruprasad Ganesh, Peng Ning |
| 2017 | Privacy-preserving and Optimal Interval Release for Disease Susceptibility. Kosuke Kusano, Ichiro Takeuchi, Jun Sakuma |
| 2017 | Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017 Ramesh Karri, Ozgur Sinanoglu, Ahmad-Reza Sadeghi, Xun Yi |
| 2017 | Proofs of Data Residency: Checking whether Your Cloud Files Have Been Relocated. Hung Dang, Erick Purwanto, Ee-Chien Chang |
| 2017 | Quantitative Security Assessment Method based on Entropy for Moving Target Defense. Duohe Ma, Liming Wang, Cheng Lei, Zhen Xu, Hongqi Zhang, Meng Li |
| 2017 | SCM: Secure Code Memory Architecture. Ruan de Clercq, Ronald De Keulenaer, Pieter Maene, Bart Preneel, Bjorn De Sutter, Ingrid Verbauwhede |
| 2017 | SECRET: On the Feasibility of a Secure, Efficient, and Collaborative Real-Time Web Editor. Dennis Felsch, Christian Mainka, Vladislav Mladenov, Jörg Schwenk |
| 2017 | SGX-Log: Securing System Logs With SGX. Vishal Karande, Erick Bauman, Zhiqiang Lin, Latifur Khan |
| 2017 | SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android. Ruowen Wang, Ahmed M. Azab, William Enck, Ninghui Li, Peng Ning, Xun Chen, Wenbo Shen, Yueqiang Cheng |
| 2017 | Scaling and Effectiveness of Email Masquerade Attacks: Exploiting Natural Language Generation. Shahryar Baki, Rakesh M. Verma, Arjun Mukherjee, Omprakash Gnawali |
| 2017 | Secure Integration of Web Content and Applications on Commodity Mobile Operating Systems. Drew Davidson, Yaohui Chen, Franklin George, Long Lu, Somesh Jha |
| 2017 | Secure Wallet-Assisted Offline Bitcoin Payments with Double-Spender Revocation. Alexandra Dmitrienko, David Noack, Moti Yung |
| 2017 | Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives. Thomas Unterluggauer, Mario Werner, Stefan Mangard |
| 2017 | Security in Personal Genomics: Lest We Forget. Gene Tsudik |
| 2017 | Sharing Proofs of Retrievability across Tenants. Frederik Armknecht, Jens-Matthias Bohli, David Froelicher, Ghassan Karame |
| 2017 | Side Channels in Deduplication: Trade-offs between Leakage and Efficiency. Frederik Armknecht, Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani |
| 2017 | Strict Virtual Call Integrity Checking for C++ Binaries. Mohamed Elsabagh, Dan Fleck, Angelos Stavrou |
| 2017 | Taming Asymmetric Network Delays for Clock Synchronization Using Power Grid Voltage. Dima Rabadi, Rui Tan, David K. Y. Yau, Sreejaya Viswanathan |
| 2017 | The Case for In-Network Replay Suppression. Taeho Lee, Christos Pappas, Adrian Perrig, Virgil D. Gligor, Yih-Chun Hu |
| 2017 | The Case for System Command Encryption. Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Naccache |
| 2017 | The Circle Game: Scalable Private Membership Test Using Trusted Hardware. Sandeep Tamrakar, Jian Liu, Andrew Paverd, Jan-Erik Ekberg, Benny Pinkas, N. Asokan |
| 2017 | The Role of Hosting Providers in Fighting Command and Control Infrastructure of Financial Malware. Samaneh Tajalizadehkhoob, Carlos Gañán, Arman Noroozian, Michel van Eeten |
| 2017 | To Update or Not to Update: Insights From a Two-Year Study of Android App Evolution. Vincent F. Taylor, Ivan Martinovic |
| 2017 | Toward Detecting Collusive Ranking Manipulation Attackers in Mobile App Markets. Hao Chen, Daojing He, Sencun Zhu, Jingshun Yang |
| 2017 | Towards Extending Noiseless Privacy: Dependent Data and More Practical Approach. Krzysztof Grining, Marek Klonowski |
| 2017 | Towards Formal Security Analysis of Industrial Control Systems. Marco Rocchetto, Nils Ole Tippenhauer |
| 2017 | Traffic Analysis Attacks in Anonymity Networks. Katharina Siobhan Kohls, Christina Pöpper |
| 2017 | TriFlow: Triaging Android Applications using Speculative Information Flows. Omid Mirzaei, Guillermo Suarez-Tangil, Juan E. Tapiador, José María de Fuentes |
| 2017 | Understanding Human-Chosen PINs: Characteristics, Distribution and Security. Ding Wang, Qianchen Gu, Xinyi Huang, Ping Wang |
| 2017 | Updatable Block-Level Message-Locked Encryption. Yongjun Zhao, Sherman S. M. Chow |
| 2017 | Using Program Analysis to Synthesize Sensor Spoofing Attacks. Ivan Pustogarov, Thomas Ristenpart, Vitaly Shmatikov |
| 2017 | VTBPEKE: Verifier-based Two-Basis Password Exponential Key Exchange. David Pointcheval, Guilin Wang |
| 2017 | WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Networks. Arash Shaghaghi, Mohamed Ali Kâafar, Sanjay Jha |
| 2017 | What You See is Not What You Get: Leakage-Resilient Password Entry Schemes for Smart Glasses. Yan Li, Yao Cheng, Yingjiu Li, Robert H. Deng |