| 2017 | A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks. Andrea Palanca, Eric Evenchick, Federico Maggi, Stefano Zanero |
| 2017 | BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape. Paria Shirani, Lingyu Wang, Mourad Debbabi |
| 2017 | Deep Ground Truth Analysis of Current Android Malware. Fengguo Wei, Yuping Li, Sankardas Roy, Xinming Ou, Wu Zhou |
| 2017 | Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings Michalis Polychronakis, Michael Meier |
| 2017 | DynODet: Detecting Dynamic Obfuscation in Malware. Danny Kim, Amir Majlesi-Kupaei, Julien Roy, Kapil Anand, Khaled ElWazeer, Daniel Buettner, Rajeev Barua |
| 2017 | Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage. George D. Webster, Bojan Kolosnjaji, Christian von Pentz, Julian Kirsch, Zachary D. Hanif, Apostolis Zarras, Claudia Eckert |
| 2017 | HumIDIFy: A Tool for Hidden Functionality Detection in Firmware. Sam L. Thomas, Flavio D. Garcia, Tom Chothia |
| 2017 | LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED. Mordechai Guri, Boris Zadov, Yuval Elovici |
| 2017 | Last Line of Defense: A Novel IDS Approach Against Advanced Threats in Industrial Control Systems. Mark Luchs, Christian Doerr |
| 2017 | Malware Guard Extension: Using SGX to Conceal Cache Attacks. Michael Schwarz, Samuel Weiser, Daniel Gruss, Clémentine Maurice, Stefan Mangard |
| 2017 | Measuring Network Reputation in the Ad-Bidding Process. Yizheng Chen, Yacin Nadji, Rosa Romero Gómez, Manos Antonakakis, David Dagon |
| 2017 | Measuring and Defeating Anti-Instrumentation-Equipped Malware. Mario Polino, Andrea Continella, Sebastiano Mariani, Stefano D'Alessio, Lorenzo Fontana, Fabio Gritti, Stefano Zanero |
| 2017 | MemPatrol: Reliable Sideline Integrity Monitoring for High-Performance Systems. Myoung Jin Nam, Wonhong Nam, Jin-Young Choi, Periklis Akritidis |
| 2017 | On the Privacy Impacts of Publicly Leaked Password Databases. Olivier Heen, Christoph Neumann |
| 2017 | On the Trade-Offs in Oblivious Execution Techniques. Shruti Tople, Prateek Saxena |
| 2017 | Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps. Thomas Barabosch, Niklas Bergmann, Adrian Dombeck, Elmar Padilla |
| 2017 | SCVD: A New Semantics-Based Approach for Cloned Vulnerable Code Detection. Deqing Zou, Hanchao Qi, Zhen Li, Song Wu, Hai Jin, Guozhong Sun, Sujuan Wang, Yuyi Zhong |
| 2017 | SPEAKER: Split-Phase Execution of Application Containers. Lingguang Lei, Jianhua Sun, Kun Sun, Chris Shenefiel, Rui Ma, Yuewu Wang, Qi Li |
| 2017 | Unsupervised Detection of APT C&C Channels using Web Request Graphs. Pavlos Lamprakis, Ruggiero Dargenio, David Gugelmann, Vincent Lenders, Markus Happe, Laurent Vanbever |