| 2017 | 10th International Workshop on Artificial Intelligence and Security (AISec 2017). Battista Biggio, David Freeman, Brad Miller, Arunesh Sinha |
| 2017 | 16th Workshop on Privacy in the Electronic Society (WPES 2017). Adam J. Lee |
| 2017 | 5Gen-C: Multi-input Functional Encryption and Program Obfuscation for Arithmetic Circuits. Brent Carmer, Alex J. Malozemoff, Mariana Raykova |
| 2017 | A Comprehensive Symbolic Analysis of TLS 1.3. Cas Cremers, Marko Horvat, Jonathan Hoyland, Sam Scott, Thyla van der Merwe |
| 2017 | A Fast and Verified Software Stack for Secure Function Evaluation. José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Vitor Pereira |
| 2017 | A Formal Foundation for Secure Remote Execution of Enclaves. Pramod Subramanyan, Rohit Sinha, Ilia A. Lebedev, Srinivas Devadas, Sanjit A. Seshia |
| 2017 | A Framework for Constructing Fast MPC over Arithmetic Circuits with Malicious Adversaries and an Honest-Majority. Yehuda Lindell, Ariel Nof |
| 2017 | A Large-Scale Empirical Study of Security Patches. Frank Li, Vern Paxson |
| 2017 | A Stitch in Time: Supporting Android Developers in WritingSecure Code. Duc Cuong Nguyen, Dominik Wermke, Yasemin Acar, Michael Backes, Charles Weir, Sascha Fahl |
| 2017 | A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components. Vasilios Mavroudis, Andrea Cerulli, Petr Svenda, Dan Cvrcek, Dusan Klinec, George Danezis |
| 2017 | A Type System for Privacy Properties. Véronique Cortier, Niklas Grimm, Joseph Lallemand, Matteo Maffei |
| 2017 | ASHES 2017: Workshop on Attacks and Solutions in Hardware Security. Chip-Hong Chang, Marten van Dijk, Farinaz Koushanfar, Ulrich Rührmair, Mark Tehranipoor |
| 2017 | AUTHSCOPE: Towards Automatic Discovery of Vulnerable Authorizations in Online Services. Chaoshun Zuo, Qingchuan Zhao, Zhiqiang Lin |
| 2017 | Algorithm Substitution Attacks from a Steganographic Perspective. Sebastian Berndt, Maciej Liskiewicz |
| 2017 | Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New Constructions. Miguel Ambrona, Gilles Barthe, Romain Gay, Hoeteck Wee |
| 2017 | Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation. Xiao Wang, Samuel Ranellucci, Jonathan Katz |
| 2017 | Automated Crowdturfing Attacks and Defenses in Online Review Systems. Yuanshun Yao, Bimal Viswanath, Jenna Cryan, Haitao Zheng, Ben Y. Zhao |
| 2017 | BBA+: Improving the Security and Applicability of Privacy-Preserving Point Collection. Gunnar Hartung, Max Hoffmann, Matthias Nagel, Andy Rupp |
| 2017 | Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms. Simon Oya, Carmela Troncoso, Fernando Pérez-González |
| 2017 | Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin. Yujin Kwon, Dohyun Kim, Yunmok Son, Eugene Y. Vasserman, Yongdae Kim |
| 2017 | Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing. Changyu Dong, Yilei Wang, Amjad Aldweesh, Patrick McCorry, Aad van Moorsel |
| 2017 | Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation. Shay Gueron, Yehuda Lindell |
| 2017 | Better Than Advertised: Improved Collision-Resistance Guarantees for MD-Based Hash Functions. Mihir Bellare, Joseph Jaeger, Julia Len |
| 2017 | Bolt: Anonymous Payment Channels for Decentralized Currencies. Matthew Green, Ian Miers |
| 2017 | CCCP: Closed Caption Crypto Phones to Resist MITM Attacks, Human Errors and Click-Through. Maliheh Shirvanian, Nitesh Saxena |
| 2017 | CCS 2017: Women in Cyber Security (CyberW) Workshop. Danfeng (Daphne) Yao, Elisa Bertino |
| 2017 | CCS'17 Tutorial Abstract / SGX Security and Privacy. Taesoo Kim, Zhiqiang Lin, Chia-Che Tsai |
| 2017 | CCSW'17: 2017 ACM Cloud Computing Security. Ghassan O. Karame, Angelos Stavrou |
| 2017 | CPS-SPC 2017: Third Workshop on Cyber-Physical Systems Security and PrivaCy. Rakesh B. Bobba, Awais Rashid |
| 2017 | Cache Side Channels: State of the Art and Research Opportunities. Yinqian Zhang |
| 2017 | Capturing Malware Propagations with Code Injections and Code-Reuse Attacks. David Korczynski, Heng Yin |
| 2017 | Certified Malware: Measuring Breaches of Trust in the Windows Code-Signing PKI. Doowon Kim, Bum Jun Kwon, Tudor Dumitras |
| 2017 | Certified Verification of Algebraic Properties on Low-Level Mathematical Constructs in Cryptographic Programs. Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang |
| 2017 | Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic Study. Qi Alfred Chen, Matthew Thomas, Eric Osterweil, Yulong Cao, Jie You, Zhuoqing Morley Mao |
| 2017 | Cliptography: Post-Snowden Cryptography. Qiang Tang, Moti Yung |
| 2017 | Code-Reuse Attacks for the Web: Breaking Cross-Site Scripting Mitigations via Script Gadgets. Sebastian Lekies, Krzysztof Kotowicz, Samuel Groß, Eduardo A. Vela Nava, Martin Johns |
| 2017 | Composing Differential Privacy and Secure Computation: A Case Study on Scaling Private Record Linkage. Xi He, Ashwin Machanavajjhala, Cheryl J. Flynn, Divesh Srivastava |
| 2017 | Compressive Traffic Analysis: A New Paradigm for Scalable Traffic Analysis. Milad Nasr, Amir Houmansadr, Arya Mazumdar |
| 2017 | Concurrency and Privacy with Payment-Channel Networks. Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Srivatsan Ravi |
| 2017 | Cryptographically Secure Information Flow Control on Key-Value Stores. Lucas Waye, Pablo Buiras, Owen Arden, Alejandro Russo, Stephen Chong |
| 2017 | DEFTL: Implementing Plausibly Deniable Encryption in Flash Translation Layer. Shijie Jia, Luning Xia, Bo Chen, Peng Liu |
| 2017 | DEMO: Akatosh: Automated Cyber Incident Verification and Impact Analysis. Jared M. Smith, Elliot Greenlee, Aaron E. Ferber |
| 2017 | DIFUZE: Interface Aware Fuzzing for Kernel Drivers. Jake Corina, Aravind Machiry, Christopher Salls, Yan Shoshitaishvili, Shuang Hao, Christopher Kruegel, Giovanni Vigna |
| 2017 | DUPLO: Unifying Cut-and-Choose for Garbled Circuits. Vladimir Kolesnikov, Jesper Buus Nielsen, Mike Rosulek, Ni Trieu, Roberto Trifiletti |
| 2017 | Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen Credentials. Kurt Thomas, Frank Li, Ali Zand, Jacob Barrett, Juri Ranieri, Luca Invernizzi, Yarik Markov, Oxana Comanescu, Vijay Eranti, Angelika Moscicki, Daniel Margolis, Vern Paxson, Elie Bursztein |
| 2017 | Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs. Giancarlo Pellegrino, Martin Johns, Simon Koch, Michael Backes, Christian Rossow |
| 2017 | Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning. Briland Hitaj, Giuseppe Ateniese, Fernando Pérez-Cruz |
| 2017 | DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning. Min Du, Feifei Li, Guineng Zheng, Vivek Srikumar |
| 2017 | Defending Against Key Exfiltration: Efficiency Improvements for Big-Key Cryptography via Large-Alphabet Subkey Prediction. Mihir Bellare, Wei Dai |
| 2017 | Designing New Operating Primitives to Improve Fuzzing Performance. Wen Xu, Sanidhya Kashyap, Changwoo Min, Taesoo Kim |
| 2017 | Detecting Structurally Anomalous Logins Within Enterprise Networks. Hossein Siadati, Nasir D. Memon |
| 2017 | Deterministic Browser. Yinzhi Cao, Zhanhao Chen, Song Li, Shujiang Wu |
| 2017 | Deterministic, Stash-Free Write-Only ORAM. Daniel S. Roche, Adam J. Aviv, Seung Geol Choi, Travis Mayberry |
| 2017 | Directed Greybox Fuzzing. Marcel Böhme, Van-Thuan Pham, Manh-Dung Nguyen, Abhik Roychoudhury |
| 2017 | Distributed Measurement with Private Set-Union Cardinality. Ellis Fenske, Akshaya Mani, Aaron Johnson, Micah Sherr |
| 2017 | DolphinAttack: Inaudible Voice Commands. Guoming Zhang, Chen Yan, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, Wenyuan Xu |
| 2017 | Don't Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains. Daiping Liu, Zhou Li, Kun Du, Haining Wang, Baojun Liu, Hai-Xin Duan |
| 2017 | Economic Factors of Vulnerability Trade and Exploitation. Luca Allodi |
| 2017 | Efficient Public Trace and Revoke from Standard Assumptions: Extended Abstract. Shweta Agrawal, Sanjay Bhattacherjee, Duong Hieu Phan, Damien Stehlé, Shota Yamada |
| 2017 | Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case. Nishanth Chandran, Juan A. Garay, Payman Mohassel, Satyanarayana Vusirikala |
| 2017 | Evading Classifiers by Morphing in the Dark. Hung Dang, Yue Huang, Ee-Chien Chang |
| 2017 | Exploiting a Thermal Side Channel for Power Attacks in Multi-Tenant Data Centers. Mohammad A. Islam, Shaolei Ren, Adam Wierman |
| 2017 | FAME: Fast Attribute-based Message Encryption. Shashank Agrawal, Melissa Chase |
| 2017 | FEAST 2017: The Second Workshop on Forming an Ecosystem Around Software Transformation. Taesoo Kim, Dinghao Wu |
| 2017 | Fairness in an Unfair World: Fair Multiparty Computation from Public Bulletin Boards. Arka Rai Choudhuri, Matthew Green, Abhishek Jain, Gabriel Kaptchuk, Ian Miers |
| 2017 | Fast Private Set Intersection from Homomorphic Encryption. Hao Chen, Kim Laine, Peter Rindal |
| 2017 | Faulds: A Non-Parametric Iterative Classifier for Internet-Wide OS Fingerprinting. Zain Shamsi, Daren B. H. Cline, Dmitri Loguinov |
| 2017 | FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution. Grant Hernandez, Farhaan Fowze, Dave (Jing) Tian, Tuba Yavuz, Kevin R. B. Butler |
| 2017 | FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware. Jian Huang, Jun Xu, Xinyu Xing, Peng Liu, Moinuddin K. Qureshi |
| 2017 | Forward Secure Dynamic Searchable Symmetric Encryption with Efficient Updates. Kee Sung Kim, Minkyu Kim, Dongsoo Lee, Je Hong Park, Woo-Hwan Kim |
| 2017 | Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives. Raphaël Bost, Brice Minaud, Olga Ohrimenko |
| 2017 | FreeGuard: A Faster Secure Heap Allocator. Sam Silvestro, Hongyu Liu, Corey Crosser, Zhiqiang Lin, Tongping Liu |
| 2017 | Full Accounting for Verifiable Outsourcing. Riad S. Wahby, Ye Ji, Andrew J. Blumberg, Abhi Shelat, Justin Thaler, Michael Walfish, Thomas Wies |
| 2017 | Generating Synthetic Decentralized Social Graphs with Local Differential Privacy. Zhan Qin, Ting Yu, Yin Yang, Issa Khalil, Xiaokui Xiao, Kui Ren |
| 2017 | Generic Semantic Security against a Kleptographic Adversary. Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou |
| 2017 | Global-Scale Secure Multiparty Computation. Xiao Wang, Samuel Ranellucci, Jonathan Katz |
| 2017 | HACL*: A Verified Modern Cryptographic Library. Jean Karim Zinzindohoué, Karthikeyan Bhargavan, Jonathan Protzenko, Benjamin Beurdouche |
| 2017 | Hearing Your Voice is Not Enough: An Articulatory Gesture Based Liveness Detection for Voice Authentication. Linghan Zhang, Sheng Tan, Jie Yang |
| 2017 | Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting. Samaneh Tajalizadehkhoob, Tom van Goethem, Maciej Korczynski, Arman Noroozian, Rainer Böhme, Tyler Moore, Wouter Joosen, Michel van Eeten |
| 2017 | HexType: Efficient Detection of Type Confusion Errors for C++. Yuseok Jeon, Priyam Biswas, Scott A. Carr, Byoungyoung Lee, Mathias Payer |
| 2017 | Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse. Panagiotis Kintis, Najmeh Miramirkhani, Charles Lever, Yizheng Chen, Rosa Romero Gómez, Nikolaos Pitropakis, Nick Nikiforakis, Manos Antonakakis |
| 2017 | Hindsight: Understanding the Evolution of UI Vulnerabilities in Mobile Browsers. Meng Luo, Oleksii Starov, Nima Honarmand, Nick Nikiforakis |
| 2017 | Homomorphic Secret Sharing: Optimizations and Applications. Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Michele Orrù |
| 2017 | How Unique is Your .onion?: An Analysis of the Fingerprintability of Tor Onion Services. Rebekah Overdorf, Marc Juárez, Gunes Acar, Rachel Greenstadt, Claudia Díaz |
| 2017 | IMF: Inferred Model-based Fuzzer. HyungSeok Han, Sang Kil Cha |
| 2017 | IRON: Functional Encryption using Intel SGX. Ben Fisch, Dhinakaran Vinayagamurthy, Dan Boneh, Sergey Gorbunov |
| 2017 | Identifying Open-Source License Violation and 1-day Security Risk at Large Scale. Ruian Duan, Ashish Bijlani, Meng Xu, Taesoo Kim, Wenke Lee |
| 2017 | Identity Related Threats, Vulnerabilities and Risk Mitigation in Online Social Networks: A Tutorial. Leila Bahri |
| 2017 | Identity-Based Format-Preserving Encryption. Mihir Bellare, Viet Tung Hoang |
| 2017 | Implementing BP-Obfuscation Using Graph-Induced Encoding. Shai Halevi, Tzipora Halevi, Victor Shoup, Noah Stephens-Davidowitz |
| 2017 | IoT S&P 2017: First Workshop on Internet of Things Security and Privacy. Theophilus Benson, Peng Liu, Srikanth Sundaresan, Yuqing Zhang |
| 2017 | JITGuard: Hardening Just-in-time Compilers with SGX. Tommaso Frassetto, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi |
| 2017 | Jasmin: High-Assurance and High-Speed Cryptography. José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Arthur Blot, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Hugo Pacheco, Benedikt Schmidt, Pierre-Yves Strub |
| 2017 | Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android. Erik Derr, Sven Bugiel, Sascha Fahl, Yasemin Acar, Michael Backes |
| 2017 | Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. Mathy Vanhoef, Frank Piessens |
| 2017 | Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX. Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, Xiaofeng Wang, Vincent Bindschaedler, Haixu Tang, Carl A. Gunter |
| 2017 | Let's Go in for a Closer Look: Observing Passwords in Their Natural Habitat. Sarah Pearman, Jeremy Thomas, Pardis Emami Naeini, Hana Habib, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman, Alain Forget |
| 2017 | Ligero: Lightweight Sublinear Arguments Without a Trusted Setup. Scott Ames, Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam |
| 2017 | MIST 2017: 9th International Workshop on Managing Insider Security Threats. Ilsun You, Elisa Bertino |
| 2017 | MTD 2017: Fourth ACM Workshop on Moving Target Defense (MTD). Hamed Okhravi, Xinming Ou |
| 2017 | Machine Learning Models that Remember Too Much. Congzheng Song, Thomas Ristenpart, Vitaly Shmatikov |
| 2017 | MagNet: A Two-Pronged Defense against Adversarial Examples. Dongyu Meng, Hao Chen |
| 2017 | Malicious-Secure Private Set Intersection via Dual Execution. Peter Rindal, Mike Rosulek |
| 2017 | Mass Discovery of Android Traffic Imprints through Instantiated Partial Execution. Yi Chen, Wei You, Yeonjoon Lee, Kai Chen, Xiaofeng Wang, Wei Zou |
| 2017 | May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519. Daniel Genkin, Luke Valenta, Yuval Yarom |
| 2017 | Most Websites Don't Need to Vibrate: A Cost-Benefit Approach to Improving Browser Security. Peter Snyder, Cynthia Bagier Taylor, Chris Kanich |
| 2017 | Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection. Xiaojun Xu, Chang Liu, Qian Feng, Heng Yin, Le Song, Dawn Song |
| 2017 | New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs. Gottfried Herold, Max Hoffmann, Michael Klooß, Carla Ràfols, Andy Rupp |
| 2017 | No-Match Attacks and Robust Partnering Definitions: Defining Trivial Attacks for Security Protocols is Not Trivial. Yong Li, Sven Schäge |
| 2017 | Nonmalleable Information Flow Control. Ethan Cecchetti, Andrew C. Myers, Owen Arden |
| 2017 | Object Flow Integrity. Wenhao Wang, Xiaoyang Xu, Kevin W. Hamlen |
| 2017 | Oblivious Neural Network Predictions via MiniONN Transformations. Jian Liu, Mika Juuti, Yao Lu, N. Asokan |
| 2017 | On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs. Shahin Tajik, Heiko Lohrke, Jean-Pierre Seifert, Christian Boit |
| 2017 | PLAS 2017: ACM SIGSAC Workshop on Programming Languages and Analysis for Security. Nataliia Bielova, Marco Gaboardi |
| 2017 | POISED: Spotting Twitter Spam Off the Beaten Paths. Shirin Nilizadeh, Francois Labreche, Alireza Sedighian, Ali Zand, José M. Fernandez, Christopher Kruegel, Gianluca Stringhini, Giovanni Vigna |
| 2017 | POSTER: A Comprehensive Study of Forged Certificates in the Wild. Mingxin Cui, Zigang Cao, Gang Xiong, Junzheng Shi |
| 2017 | POSTER: A PU Learning based System for Potential Malicious URL Detection. Ya-Lin Zhang, Longfei Li, Jun Zhou, Xiaolong Li, Yujiang Liu, Yuanchao Zhang, Zhi-Hua Zhou |
| 2017 | POSTER: A Unified Framework of Differentially Private Synthetic Data Release with Generative Adversarial Network. Pei-Hsuan Lu, Chia-Mu Yu |
| 2017 | POSTER: AFL-based Fuzzing for Java with Kelinci. Rody Kersten, Kasper Søe Luckow, Corina S. Pasareanu |
| 2017 | POSTER: Actively Detecting Implicit Fraudulent Transactions. Shaosheng Cao, Xinxing Yang, Jun Zhou, Xiaolong Li, Yuan (Alan) Qi, Kai Xiao |
| 2017 | POSTER: An Empirical Measurement Study on Multi-tenant Deployment Issues of CDNs. Zixi Cai, Zigang Cao, Gang Xiong, Zhen Li, Wei Xia |
| 2017 | POSTER: BGPCoin: A Trustworthy Blockchain-based Resource Management Solution for BGP Security. Qianqian Xing, Baosheng Wang, Xiaofeng Wang |
| 2017 | POSTER: Covert Channel Based on the Sequential Analysis in Android Systems. Jun-Won Ho, Kyungrok Won, Jee Sun Kim |
| 2017 | POSTER: Cyber Attack Prediction of Threats from Unconventional Resources (CAPTURE). Ahmet Okutan, Gordon Werner, Katie McConky, Shanchieh Jay Yang |
| 2017 | POSTER: Detection of CPS Program Anomalies by Enforcing Cyber-Physical Execution Semantics. Long Cheng, Ke Tian, Danfeng (Daphne) Yao |
| 2017 | POSTER: Evaluating Reflective Deception as a Malware Mitigation Strategy. Thomas Shaw, James Arrowood, Michael Kvasnicka, Shay Taylor, Kyle Cook, John Hale |
| 2017 | POSTER: Finding Vulnerabilities in P4 Programs with Assertion-based Verification. Lucas Freire, Miguel C. Neves, Alberto E. Schaeffer Filho, Marinho P. Barcellos |
| 2017 | POSTER: Hidden in Plain Sight: A Filesystem for Data Integrity and Confidentiality. Anne Kohlbrenner, Frederico Araujo, Teryl Taylor, Marc Ph. Stoecklin |
| 2017 | POSTER: Improving Anonymity of Services Deployed Over Tor by Changing Guard Selection. Abhishek Singh |
| 2017 | POSTER: Inaudible Voice Commands. Liwei Song, Prateek Mittal |
| 2017 | POSTER: Intrusion Detection System for In-vehicle Networks using Sensor Correlation and Integration. Huaxin Li, Li Zhao, Marcio Juliato, Shabbir Ahmed, Manoj R. Sastry, Lily L. Yang |
| 2017 | POSTER: Is Active Electromagnetic Side-channel Attack Practical? Satohiro Wakabayashi, Seita Maruyama, Tatsuya Mori, Shigeki Goto, Masahiro Kinugawa, Yu-ichi Hayashi |
| 2017 | POSTER: Neural Network-based Graph Embedding for Malicious Accounts Detection. Ziqi Liu, Chaochao Chen, Jun Zhou, Xiaolong Li, Feng Xu, Tao Chen, Le Song |
| 2017 | POSTER: PenJ1939: An Interactive Framework for Design and Dissemination of Exploits for Commercial Vehicles. Subhojeet Mukherjee, Noah Cain, Jacob Walker, David White, Indrajit Ray, Indrakshi Ray |
| 2017 | POSTER: Practical Fraud Transaction Prediction. Longfei Li, Jun Zhou, Xiaolong Li, Tao Chen |
| 2017 | POSTER: PriReMat: A Distributed Tool for Privacy Preserving Record Linking in Healthcare. Diptendu Mohan Kar, Ibrahim Lazrig, Indrajit Ray, Indrakshi Ray |
| 2017 | POSTER: Probing Tor Hidden Service with Dockers. Jonghyeon Park, Youngseok Lee |
| 2017 | POSTER: Rethinking Fingerprint Identification on Smartphones. Seungyeon Kim, Hoyeon Lee, Taekyoung Kwon |
| 2017 | POSTER: Rust SGX SDK: Towards Memory Safety in Intel SGX Enclave. Yu Ding, Ran Duan, Long Li, Yueqiang Cheng, Yulong Zhang, Tanghui Chen, Tao Wei, Huibo Wang |
| 2017 | POSTER: Semi-supervised Classification for Dynamic Android Malware Detection. Li Chen, Mingwei Zhang, Chih-Yuan Yang, Ravi Sahita |
| 2017 | POSTER: TOUCHFLOOD: A Novel Class of Attacks against Capacitive Touchscreens. Seita Maruyama, Satohiro Wakabayashi, Tatsuya Mori |
| 2017 | POSTER: TouchTrack: How Unique are your Touch Gestures? Rahat Masood, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kâafar |
| 2017 | POSTER: Towards Precise and Automated Verification of Security Protocols in Coq. Hernan M. Palombo, Hao Zheng, Jay Ligatti |
| 2017 | POSTER: Vulnerability Discovery with Function Representation Learning from Unlabeled Projects. Guanjun Lin, Jun Zhang, Wei Luo, Lei Pan, Yang Xiang |
| 2017 | POSTER: Watch Out Your Smart Watch When Paired. Youngjoo Lee, WonSeok Yang, Taekyoung Kwon |
| 2017 | POSTER: Who was Behind the Camera? - Towards Some New Forensics. Jeff Yan, Aurélien Bourquard |
| 2017 | POSTER: Why Are You Going That Way? Measuring Unnecessary Exposure of Network Traffic to Nation States. Jordan Holland, Max Schuchard |
| 2017 | POSTER: X-Ray Your DNS. Amit Klein, Vladimir Kravtsov, Alon Perlmuter, Haya Schulmann, Michael Waidner |
| 2017 | PeGaSus: Data-Adaptive Differentially Private Stream Processing. Yan Chen, Ashwin Machanavajjhala, Michael Hay, Gerome Miklau |
| 2017 | Pool: Scalable On-Demand Secure Computation Service Against Malicious Adversaries. Ruiyu Zhu, Yan Huang, Darion Cassel |
| 2017 | Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives. Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha |
| 2017 | Poster: Adversarial Examples for Classifiers in High-Dimensional Network Data. Muhammad Ejaz Ahmed, Hyoungshick Kim |
| 2017 | Practical Attacks Against Graph-based Clustering. Yizheng Chen, Yacin Nadji, Athanasios Kountouras, Fabian Monrose, Roberto Perdisci, Manos Antonakakis, Nikolaos Vasiloglou |
| 2017 | Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions. Joël Alwen, Jeremiah Blocki, Benjamin Harsha |
| 2017 | Practical Multi-party Private Set Intersection from Symmetric-Key Techniques. Vladimir Kolesnikov, Naor Matania, Benny Pinkas, Mike Rosulek, Ni Trieu |
| 2017 | Practical Quantum-Safe Voting from Lattices. Rafaël del Pino, Vadim Lyubashevsky, Gregory Neven, Gregor Seiler |
| 2017 | Practical Secure Aggregation for Privacy-Preserving Machine Learning. Kallista A. Bonawitz, Vladimir Ivanov, Ben Kreuter, Antonio Marcedone, H. Brendan McMahan, Sarvar Patel, Daniel Ramage, Aaron Segal, Karn Seth |
| 2017 | Practical UC-Secure Delegatable Credentials with Attributes and Their Application to Blockchain. Jan Camenisch, Manu Drijvers, Maria Dubovitskaya |
| 2017 | Precise Detection of Side-Channel Vulnerabilities using Quantitative Cartesian Hoare Logic. Jia Chen, Yu Feng, Isil Dillig |
| 2017 | Presence Attestation: The Missing Link in Dynamic Trust Bootstrapping. Zhangkai Zhang, Xuhua Ding, Gene Tsudik, Jinhua Cui, Zhoujun Li |
| 2017 | Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017 Bhavani Thuraisingham, David Evans, Tal Malkin, Dongyan Xu |
| 2017 | Provably-Secure Logic Locking: From Theory To Practice. Muhammad Yasin, Abhrajit Sengupta, Mohammed Thari Nabeel, Mohammed Ashraf, Jeyavijayan Rajendran, Ozgur Sinanoglu |
| 2017 | PtrSplit: Supporting General Pointers in Automatic Program Partitioning. Shen Liu, Gang Tan, Trent Jaeger |
| 2017 | Quantifying the Pressure of Legal Risks on Third-party Vulnerability Research. Alexander Gamero-Garrido, Stefan Savage, Kirill Levchenko, Alex C. Snoeren |
| 2017 | Querying for Queries: Indexes of Queries for Efficient and Expressive IT-PIR. Syed Mahbub Hafiz, Ryan Henry |
| 2017 | RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking. Yang Ji, Sangho Lee, Evan Downing, Weiren Wang, Mattia Fazzini, Taesoo Kim, Alessandro Orso, Wenke Lee |
| 2017 | Revive: Rebalancing Off-Blockchain Payment Networks. Rami Khalil, Arthur Gervais |
| 2017 | Rewriting History: Changing the Archived Web from the Present. Ada Lerner, Tadayoshi Kohno, Franziska Roesner |
| 2017 | Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance. Yan Shoshitaishvili, Michael Weissbacher, Lukas Dresel, Christopher Salls, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna |
| 2017 | RiskTeller: Predicting the Risk of Cyber Incidents. Leyla Bilge, Yufei Han, Matteo Dell'Amico |
| 2017 | S Thang Hoang, Ceyhun D. Ozkaptan, Attila A. Yavuz, Jorge Guajardo, Tam Nguyen |
| 2017 | SGX-BigMatrix: A Practical Encrypted Data Analytic Framework With Trusted Processors. Fahad Shaon, Murat Kantarcioglu, Zhiqiang Lin, Latifur Khan |
| 2017 | STACCO: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves. Yuan Xiao, Mengyuan Li, Sanchuan Chen, Yinqian Zhang |
| 2017 | SafeConfig'17: Applying the Scientific Method to Active Cyber Defense Research. Nicholas J. Multari, Anoop Singhal, Erin Miller |
| 2017 | Scaling ORAM for Secure Computation. Jack Doerner, Abhi Shelat |
| 2017 | Security and Machine Learning. David A. Wagner |
| 2017 | SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits. Wei You, Peiyuan Zong, Kai Chen, Xiaofeng Wang, Xiaojing Liao, Pan Bian, Bin Liang |
| 2017 | Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing against strongSwan and Electromagnetic Emanations in Microcontrollers. Thomas Espitau, Pierre-Alain Fouque, Benoît Gérard, Mehdi Tibouchi |
| 2017 | SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities. Theofilos Petsios, Jason Zhao, Angelos D. Keromytis, Suman Jana |
| 2017 | Solidus: Confidential Distributed Ledger Transactions via PVORM. Ethan Cecchetti, Fan Zhang, Yan Ji, Ahmed E. Kosba, Ari Juels, Elaine Shi |
| 2017 | Standardizing Bad Cryptographic Practice: A Teardown of the IEEE Standard for Protecting Electronic-design Intellectual Property. Animesh Chhotaray, Adib Nahiyan, Thomas Shrimpton, Domenic Forte, Mark Tehranipoor |
| 2017 | Synthesis of Probabilistic Privacy Enforcement. Martin Kucera, Petar Tsankov, Timon Gehr, Marco Guarnieri, Martin T. Vechev |
| 2017 | T/Key: Second-Factor Authentication From Secure Hash Chains. Dmitry Kogan, Nathan Manohar, Dan Boneh |
| 2017 | Tail Attacks on Web Applications. Huasong Shan, Qingyang Wang, Calton Pu |
| 2017 | The ART of App Compartmentalization: Compiler-based Library Privilege Separation on Stock Android. Jie Huang, Oliver Schranz, Sven Bugiel, Michael Backes |
| 2017 | The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later. Victor van der Veen, Dennis Andriesse, Manolis Stamatogiannakis, Xi Chen, Herbert Bos, Cristiano Giuffrida |
| 2017 | The Return of Coppersmith's Attack: Practical Factorization of Widely Used RSA Moduli. Matús Nemec, Marek Sýs, Petr Svenda, Dusan Klinec, Vashek Matyas |
| 2017 | The TypTop System: Personalized Typo-Tolerant Password Checking. Rahul Chatterjee, Joanne Woodage, Yuval Pnueli, Anusha Chowdhury, Thomas Ristenpart |
| 2017 | The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks. Milad Nasr, Hadi Zolfaghari, Amir Houmansadr |
| 2017 | The Wolf of Name Street: Hijacking Domains Through Their Nameservers. Thomas Vissers, Timothy Barron, Tom van Goethem, Wouter Joosen, Nick Nikiforakis |
| 2017 | TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation. Nico Döttling, Satrajit Ghosh, Jesper Buus Nielsen, Tobias Nilges, Roberto Trifiletti |
| 2017 | To BLISS-B or not to be: Attacking strongSwan's Implementation of Post-Quantum Signatures. Peter Pessl, Leon Groot Bruinderink, Yuval Yarom |
| 2017 | Tutorial: Private Information Retrieval. Ryan Henry |
| 2017 | Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews. Tongxin Li, Xueqiang Wang, Mingming Zha, Kai Chen, Xiaofeng Wang, Luyi Xing, Xiaolong Bai, Nan Zhang, Xinhui Han |
| 2017 | Use Privacy in Data-Driven Systems: Theory and Experiments with Machine Learnt Programs. Anupam Datta, Matthew Fredrikson, Gihyuk Ko, Piotr Mardziel, Shayak Sen |
| 2017 | Verified Correctness and Security of mbedTLS HMAC-DRBG. Katherine Q. Ye, Matthew Green, Naphat Sanguansin, Lennart Beringer, Adam Petcher, Andrew W. Appel |
| 2017 | Verifying Security Policies in Multi-agent Workflows with Loops. Bernd Finkbeiner, Christian Müller, Helmut Seidl, Eugen Zalinescu |
| 2017 | VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces via Physical Vibration. Jian Liu, Chen Wang, Yingying Chen, Nitesh Saxena |
| 2017 | Viden: Attacker Identification on In-Vehicle Networks. Kyong-Tak Cho, Kang G. Shin |
| 2017 | Vulnerable Implicit Service: A Revisit. Lingguang Lei, Yi He, Kun Sun, Jiwu Jing, Yuewu Wang, Qi Li, Jian Weng |
| 2017 | Watch Me, but Don't Touch Me! Contactless Control Flow Monitoring via Electromagnetic Emanations. Yi Han, Sriharsha Etigowni, Hua Liu, Saman A. Zonouz, Athina P. Petropulu |
| 2017 | Web Tracking Technologies and Protection Mechanisms. Nataliia Bielova |
| 2017 | Where the Wild Warnings Are: Root Causes of Chrome HTTPS Certificate Errors. Mustafa Emre Acer, Emily Stark, Adrienne Porter Felt, Sascha Fahl, Radhika Bhargava, Bhanu Dev, Matt Braithwaite, Ryan Sleevi, Parisa Tabriz |
| 2017 | Why Do Developers Get Password Storage Wrong?: A Qualitative Usability Study. Alena Naiakshina, Anastasia Danilova, Christian Tiefenau, Marco Herzog, Sergej Dechand, Matthew Smith |
| 2017 | Workshop on Multimedia Privacy and Security. Roger Hallman, Kurt Rohloff, Victor Chang |
| 2017 | Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services. Matteo Campanelli, Rosario Gennaro, Steven Goldfeder, Luca Nizzardo |
| 2017 | walk2friends: Inferring Social Links from Mobility Profiles. Michael Backes, Mathias Humbert, Jun Pang, Yang Zhang |