| 2017 | 2017 IEEE European Symposium on Security and Privacy, EuroS&P 2017, Paris, France, April 26-28, 2017 |
| 2017 | 9-1-1 DDoS: Attacks, Analysis and Mitigation. Mordechai Guri, Yisroel Mirsky, Yuval Elovici |
| 2017 | A Formal Security Analysis of the Signal Messaging Protocol. Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt, Douglas Stebila |
| 2017 | A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and Its Application to Fair Exchange. Michael Backes, Jannik Dreier, Steve Kremer, Robert Künnemann |
| 2017 | ARTist: The Android Runtime Instrumentation and Security Toolkit. Michael Backes, Sven Bugiel, Oliver Schranz, Philipp von Styp-Rekowsky, Sebastian Weisgerber |
| 2017 | Accumulators with Applications to Anonymity-Preserving Revocation. Foteini Baldimtsi, Jan Camenisch, Maria Dubovitskaya, Anna Lysyanskaya, Leonid Reyzin, Kai Samelin, Sophia Yakoubov |
| 2017 | An Expressive (Zero-Knowledge) Set Accumulator. Yupeng Zhang, Jonathan Katz, Charalampos Papamanthou |
| 2017 | Auditable Data Structures. Michael T. Goodrich, Evgenios M. Kornaropoulos, Michael Mitzenmacher, Roberto Tamassia |
| 2017 | Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach. Nadim Kobeissi, Karthikeyan Bhargavan, Bruno Blanchet |
| 2017 | Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools. Georg Merzdovnik, Markus Huber, Damjan Buhov, Nick Nikiforakis, Sebastian Neuner, Martin Schmiedecker, Edgar R. Weippl |
| 2017 | CodeArmor: Virtualizing the Code Space to Counter Disclosure Attacks. Xi Chen, Herbert Bos, Cristiano Giuffrida |
| 2017 | Compiler-Agnostic Function Detection in Binaries. Dennis Andriesse, Asia Slowinska, Herbert Bos |
| 2017 | Confidante: Usable Encrypted Email: A Case Study with Lawyers and Journalists. Ada Lerner, Eric Zeng, Franziska Roesner |
| 2017 | Content delivery over TLS: a cryptographic analysis of keyless SSL. Karthikeyan Bhargavan, Ioana Boureanu, Pierre-Alain Fouque, Cristina Onete, Benjamin Richard |
| 2017 | Designing and Proving an EMV-Compliant Payment Protocol for Mobile Devices. Véronique Cortier, Alicia Filipiak, Jan Florent, Said Gharout, Jacques Traoré |
| 2017 | Efficient and Flexible Discovery of PHP Application Vulnerabilities. Michael Backes, Konrad Rieck, Malte Skoruppa, Ben Stock, Fabian Yamaguchi |
| 2017 | FairTest: Discovering Unwarranted Associations in Data-Driven Applications. Florian Tramèr, Vaggelis Atlidakis, Roxana Geambasu, Daniel J. Hsu, Jean-Pierre Hubaux, Mathias Humbert, Ari Juels, Huang Lin |
| 2017 | Internet Censorship in Thailand: User Practices and Potential Threats. Genevieve Gebhart, Tadayoshi Kohno |
| 2017 | LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine Learning. Michael Backes, Mohammad Nauman |
| 2017 | Large-Scale Analysis & Detection of Authentication Cross-Site Request Forgeries. Avinash Sudhodanan, Roberto Carbone, Luca Compagna, Nicolas Dolgin, Alessandro Armando, Umberto Morelli |
| 2017 | On the Effectiveness of Virtualization Based Memory Isolation on Multicore Platforms. Siqi Zhao, Xuhua Ding |
| 2017 | Open Doors for Bob and Mallory: Open Port Usage in Android Apps and Security Implications. Yunhan Jack Jia, Qi Alfred Chen, Yikai Lin, Chao Kong, Zhuoqing Morley Mao |
| 2017 | Outsmarting Network Security with SDN Teleportation. Kashyap Thimmaraju, Liron Schiff, Stefan Schmid |
| 2017 | Privacy Threats through Ultrasonic Side Channels on Mobile Devices. Daniel Arp, Erwin Quiring, Christian Wressnegger, Konrad Rieck |
| 2017 | Privacy-Preserving User-Auditable Pseudonym Systems. Jan Camenisch, Anja Lehmann |
| 2017 | Reasoning about Probabilistic Defense Mechanisms against Remote Attacks. Martín Ochoa, Sebastian Banescu, Cynthia Disenfeld, Gilles Barthe, Vijay Ganesh |
| 2017 | Redactable Blockchain - or - Rewriting History in Bitcoin and Friends. Giuseppe Ateniese, Bernardo Magri, Daniele Venturi, Ewerton R. Andrade |
| 2017 | Refining Authenticated Key Agreement with Strong Adversaries. Joseph Lallemand, David A. Basin, Christoph Sprenger |
| 2017 | Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates. Marc Fischlin, Felix Günther |
| 2017 | Reputation Metrics Design to Improve Intermediary Incentives for Security of TLDs. Maciej Korczynski, Samaneh Tajalizadehkhoob, Arman Noroozian, Maarten Wullink, Cristian Hesselman, Michel van Eeten |
| 2017 | Revisiting Browser Security in the Modern Era: New Data-Only Attacks and Defenses. Roman Rogowski, Micah Morton, Forrest Li, Fabian Monrose, Kevin Z. Snow, Michalis Polychronakis |
| 2017 | Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge. Florian Tramèr, Fan Zhang, Huang Lin, Jean-Pierre Hubaux, Ari Juels, Elaine Shi |
| 2017 | Secure Queries on Encrypted Multi-writer Tables. Angelo Massimo Perillo, Giuseppe Persiano, Alberto Trombetta |
| 2017 | SoK: Fraud in Telephony Networks. Merve Sahin, Aurélien Francillon, Payas Gupta, Mustaque Ahamad |
| 2017 | SoK: Single Sign-On Security - An Evaluation of OpenID Connect. Christian Mainka, Vladislav Mladenov, Jörg Schwenk, Tobias Wich |
| 2017 | Symbolic Models for Isolated Execution Environments. Charlie Jacomme, Steve Kremer, Guillaume Scerri |
| 2017 | Towards Practical Attacks on Argon2i and Balloon Hashing. Joël Alwen, Jeremiah Blocki |
| 2017 | Use of Simulators for Side-Channel Analysis. Nikita Veshchikov, Sylvain Guilley |
| 2017 | WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks. Timothy Trippel, Ofir Weisse, Wenyuan Xu, Peter Honeyman, Kevin Fu |
| 2017 | When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks. Hyunwook Hong, Hyunwoo Choi, Dongkwan Kim, Hongil Kim, Byeongdo Hong, Jiseong Noh, Yongdae Kim |