| 2017 | A Formal Approach to Cyber-Physical Attacks. Ruggero Lanotte, Massimo Merro, Riccardo Muradore, Luca Viganò |
| 2017 | A Sound Flow-Sensitive Heap Abstraction for the Static Analysis of Android Applications. Stefano Calzavara, Ilya Grishchenko, Adrien Koutsos, Matteo Maffei |
| 2017 | A Universally Composable Treatment of Network Time. Ran Canetti, Kyle Hogan, Aanchal Malhotra, Mayank Varia |
| 2017 | Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications. Kevin Milner, Cas Cremers, Jiangshan Yu, Mark Ryan |
| 2017 | Deciding Secrecy of Security Protocols for an Unbounded Number of Sessions: The Case of Depth-Bounded Processes. Emanuele D'Osualdo, Luke Ong, Alwen Tiu |
| 2017 | Differential Privacy in Quantum Computation. Li Zhou, Mingsheng Ying |
| 2017 | Formal Computational Unlinkability Proofs of RFID Protocols. Hubert Comon, Adrien Koutsos |
| 2017 | Formal Verification of Protocols Based on Short Authenticated Strings. Stéphanie Delaune, Steve Kremer, Ludovic Robin |
| 2017 | Formalizing and Proving a Typing Result for Security Protocols in Isabelle/HOL. Andreas Viktor Hess, Sebastian Mödersheim |
| 2017 | How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games. Tiffany Bao, Yan Shoshitaishvili, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna, David Brumley |
| 2017 | Human Computing for Handling Strong Corruptions in Authenticated Key Exchange. Alexandra Boldyreva, Shan Chen, Pierre-Alain Dupont, David Pointcheval |
| 2017 | Leakage-Minimal Design: Universality, Limitations, and Applications. M. H. R. Khouzani, Pasquale Malacaria |
| 2017 | Mechanizing the Proof of Adaptive, Information-Theoretic Security of Cryptographic Protocols in the Random Oracle Model. Alley Stoughton, Mayank Varia |
| 2017 | On the Protection of Private Information in Machine Learning Systems: Two Recent Approches. Martín Abadi, Úlfar Erlingsson, Ian J. Goodfellow, H. Brendan McMahan, Ilya Mironov, Nicolas Papernot, Kunal Talwar, Li Zhang |
| 2017 | PrivatePool: Privacy-Preserving Ridesharing. Per A. Hallgren, Claudio Orlandi, Andrei Sabelfeld |
| 2017 | Proving Flow Security of Sequential Logic via Automatically-Synthesized Relational Invariants. Hyoukjun Kwon, William Harris, Hadi Esmaeilzadeh |
| 2017 | Reconciling Privacy and Utility in Continuous-Time Diffusion Networks. Michael Backes, Manuel Gomez-Rodriguez, Praveen Manoharan, Bartlomiej Surma |
| 2017 | Rethinking Large-Scale Consensus. Rafael Pass, Elaine Shi |
| 2017 | Run-Time Attack Detection in Cryptographic APIs. Riccardo Focardi, Marco Squarcina |
| 2017 | Rényi Differential Privacy. Ilya Mironov |
| 2017 | SAT-Equiv: An Efficient Tool for Equivalence Properties. Véronique Cortier, Antoine Dallon, Stéphanie Delaune |
| 2017 | Secure Compilation and Hyperproperty Preservation. Marco Patrignani, Deepak Garg |
| 2017 | Secure Composition of PKIs with Public Key Protocols. Vincent Cheval, Véronique Cortier, Bogdan Warinschi |
| 2017 | Securing Concurrent Lazy Programs Against Information Leakage. Marco Vassena, Joachim Breitner, Alejandro Russo |
| 2017 | Securing Databases from Probabilistic Inference. Marco Guarnieri, Srdjan Marinovic, David A. Basin |
| 2017 | Symbolic Verification of Privacy-Type Properties for Security Protocols with XOR. David Baelde, Stéphanie Delaune, Ivan Gazeau, Steve Kremer |
| 2017 | Symbolic and Computational Mechanized Verification of the ARINC823 Avionic Protocols. Bruno Blanchet |
| 2017 | Synthesis of Adaptive Side-Channel Attacks. Quoc-Sang Phan, Lucas Bang, Corina S. Pasareanu, Pasquale Malacaria, Tevfik Bultan |
| 2017 | The Web SSO Standard OpenID Connect: In-depth Formal Security Analysis and Security Guidelines. Daniel Fett, Ralf Küsters, Guido Schmitz |
| 2017 | Tight Bounds on Information Leakage from Repeated Independent Runs. David M. Smith, Geoffrey Smith |
| 2017 | Towards a Flow- and Path-Sensitive Information Flow Analysis. Peixuan Li, Danfeng Zhang |
| 2017 | Types for Location and Data Security in Cloud Environments. Ivan Gazeau, Tom Chothia, Dominic Duggan |
| 2017 | UC-Secure Non-interactive Public-Key Encryption. Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin |
| 2017 | Verified Translation Validation of Static Analyses. Gilles Barthe, Sandrine Blazy, Vincent Laporte, David Pichardie, Alix Trieu |