| 2019 | A Security Evaluation of Industrial Radio Remote Controllers. Federico Maggi, Marco Balduzzi, Jonathan Andersson, Philippe Lin, Stephen Hilt, Akira Urano, Rainer Vosseler |
| 2019 | BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation. Nilo Redini, Ruoyu Wang, Aravind Machiry, Yan Shoshitaishvili, Giovanni Vigna, Christopher Kruegel |
| 2019 | DPX: Data-Plane eXtensions for SDN Security Service Instantiation. Taejune Park, Yeonkeun Kim, Vinod Yegneswaran, Phillip A. Porras, Zhaoyan Xu, KyoungSoo Park, Seungwon Shin |
| 2019 | Detecting, Fingerprinting and Tracking Reconnaissance Campaigns Targeting Industrial Control Systems. Olivier Cabana, Amr M. Youssef, Mourad Debbabi, Bernard Lebel, Marthe Kassouf, Basile L. Agba |
| 2019 | Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings Roberto Perdisci, Clémentine Maurice, Giorgio Giacinto, Magnus Almgren |
| 2019 | How Does Malware Use RDTSC? A Study on Operations Executed by Malware with CPU Cycle Measurement. Yoshihiro Oyama |
| 2019 | Large-Scale Analysis of Infrastructure-Leaking DNS Servers. Dennis Tatang, Carl Richard Theodor Schneider, Thorsten Holz |
| 2019 | Memory Categorization: Separating Attacker-Controlled Data. Matthias Neugschwandtner, Alessandro Sorniotti, Anil Kurmus |
| 2019 | Morellian Analysis for Browsers: Making Web Authentication Stronger with Canvas Fingerprinting. Pierre Laperdrix, Gildas Avoine, Benoit Baudry, Nick Nikiforakis |
| 2019 | New Kid on the Web: A Study on the Prevalence of WebAssembly in the Wild. Marius Musch, Christian Wressnegger, Martin Johns, Konrad Rieck |
| 2019 | No Need to Marry to Change Your Name! Attacking Profinet IO Automation Networks Using DCP. Stefan Mehner, Hartmut König |
| 2019 | On Deception-Based Protection Against Cryptographic Ransomware. Ziya Alper Genç, Gabriele Lenzini, Daniele Sgandurra |
| 2019 | On the Perils of Leaking Referrers in Online Collaboration Services. Beliz Kaleli, Manuel Egele, Gianluca Stringhini |
| 2019 | Overshadow PLC to Detect Remote Control-Logic Injection Attacks. Hyunguk Yoo, Sushma Kalle, Jared Smith, Irfan Ahmed |
| 2019 | PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware. Denis Ugarte, Davide Maiorca, Fabrizio Cara, Giorgio Giacinto |
| 2019 | Practical Enclave Malware with Intel SGX. Michael Schwarz, Samuel Weiser, Daniel Gruss |
| 2019 | Practical Password Hardening Based on TLS. Constantinos Diomedous, Elias Athanasopoulos |
| 2019 | Role Inference + Anomaly Detection = Situational Awareness in BACnet Networks. Davide Fauri, Michail Kapsalakis, Daniel Ricardo dos Santos, Elisa Costante, Jerry den Hartog, Sandro Etalle |
| 2019 | SAFE: Self-Attentive Function Embeddings for Binary Similarity. Luca Massarelli, Giuseppe Antonio Di Luna, Fabio Petroni, Roberto Baldoni, Leonardo Querzoni |
| 2019 | Security in Plain TXT - Observing the Use of DNS TXT Records in the Wild. Adam Portier, Henry Carter, Charles Lever |
| 2019 | Triggerflow: Regression Testing by Advanced Execution Path Inspection. Iaroslav Gridin, Cesar Pereida García, Nicola Tuveri, Billy Bob Brumley |
| 2019 | TypeMiner: Recovering Types in Binary Programs Using Machine Learning. Alwin Maier, Hugo Gascon, Christian Wressnegger, Konrad Rieck |
| 2019 | Understanding the Security of Traffic Signal Infrastructure. Zhenyu Ning, Fengwei Zhang, Stephen M. Remias |
| 2019 | Wild Extensions: Discovering and Analyzing Unlisted Chrome Extensions. Aidan Beggs, Alexandros Kapravelos |