| 2018 | 2018 IEEE European Symposium on Security and Privacy, EuroS&P 2018, London, United Kingdom, April 24-26, 2018 |
| 2018 | A Formal Analysis of the Neuchatel e-Voting Protocol. Véronique Cortier, David Galindo, Mathieu Turuani |
| 2018 | Attacking Deterministic Signature Schemes Using Fault Attacks. Damian Poddebniak, Juraj Somorovsky, Sebastian Schinzel, Manfred Lochter, Paul Rösler |
| 2018 | COVERN: A Logic for Compositional Verification of Information Flow Control. Toby C. Murray, Robert Sison, Kai Engelhardt |
| 2018 | CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM. Joppe W. Bos, Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Gregor Seiler, Damien Stehlé |
| 2018 | ChainSmith: Automatically Learning the Semantics of Malicious Campaigns by Mining Threat Intelligence Reports. Ziyun Zhu, Tudor Dumitras |
| 2018 | Crypto Crumple Zones: Enabling Limited Access without Mass Surveillance. Charles V. Wright, Mayank Varia |
| 2018 | DeepRefiner: Multi-layer Android Malware Detection System Applying Deep Neural Networks. Ke Xu, Yingjiu Li, Robert H. Deng, Kai Chen |
| 2018 | Dissecting Privacy Risks in Biomedical Data. Pascal Berrang, Mathias Humbert, Yang Zhang, Irina Lehmann, Roland Eils, Michael Backes |
| 2018 | Eraser: Your Data Won't Be Back. Kaan Onarlioglu, William K. Robertson, Engin Kirda |
| 2018 | Forgotten Siblings: Unifying Attacks on Machine Learning and Digital Watermarking. Erwin Quiring, Daniel Arp, Konrad Rieck |
| 2018 | Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure. Patrick Speicher, Marcel Steinmetz, Robert Künnemann, Milivoj Simeonovski, Giancarlo Pellegrino, Jörg Hoffmann, Michael Backes |
| 2018 | Get in Line: Ongoing Co-presence Verification of a Vehicle Formation Based on Driving Trajectories. Christian Vaas, Mika Juuti, N. Asokan, Ivan Martinovic |
| 2018 | Have Your PI and Eat it Too: Practical Security on a Low-Cost Ubiquitous Computing Platform. Amit Vasudevan, Sagar Chaki |
| 2018 | I Spy with My Little Eye: Analysis and Detection of Spying Browser Extensions. Anupama Aggarwal, Bimal Viswanath, Liang Zhang, Saravana Kumar, Ayush Shah, Ponnurangam Kumaraguru |
| 2018 | In Search of CurveSwap: Measuring Elliptic Curve Implementations in the Wild. Luke Valenta, Nick Sullivan, Antonio Sanso, Nadia Heninger |
| 2018 | Just In Time Hashing. Benjamin Harsha, Jeremiah Blocki |
| 2018 | Language-Independent Synthesis of Firewall Policies. Chiara Bodei, Pierpaolo Degano, Letterio Galletta, Riccardo Focardi, Mauro Tempesta, Lorenzo Veronese |
| 2018 | Masters of Time: An Overview of the NTP Ecosystem. Teemu Rytilahti, Dennis Tatang, Janosch Kopper, Thorsten Holz |
| 2018 | Mining ABAC Rules from Sparse Logs. Carlos Cotrini, Thilo Weghorn, David A. Basin |
| 2018 | More is Less: On the End-to-End Security of Group Chats in Signal, WhatsApp, and Threema. Paul Rösler, Christian Mainka, Jörg Schwenk |
| 2018 | On Composability of Game-Based Password Authenticated Key Exchange. Marjan Skrobot, Jean Lancrenon |
| 2018 | Online Synthesis of Adaptive Side-Channel Attacks Based On Noisy Observations. Lucas Bang, Nicolás Rosner, Tevfik Bultan |
| 2018 | Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure. Enes Göktas, Benjamin Kollenda, Philipp Koppe, Erik Bosman, Georgios Portokalidis, Thorsten Holz, Herbert Bos, Cristiano Giuffrida |
| 2018 | Probabilistic Obfuscation Through Covert Channels. Jon Stephens, Babak Yadegari, Christian S. Collberg, Saumya Debray, Carlos Scheidegger |
| 2018 | Security Risks in Asynchronous Web Servers: When Performance Optimizations Amplify the Impact of Data-Oriented Attacks. Micah Morton, Jan Werner, Panagiotis Kintis, Kevin Z. Snow, Manos Antonakakis, Michalis Polychronakis, Fabian Monrose |
| 2018 | Short Double- and N-Times-Authentication-Preventing Signatures from ECDSA and More. David Derler, Sebastian Ramacher, Daniel Slamanig |
| 2018 | SoK: Security and Privacy in Machine Learning. Nicolas Papernot, Patrick D. McDaniel, Arunesh Sinha, Michael P. Wellman |
| 2018 | Sponge-Based Control-Flow Protection for IoT Devices. Mario Werner, Thomas Unterluggauer, David Schaffenrath, Stefan Mangard |
| 2018 | TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer. Chen Chen, Daniele Enrico Asoni, Adrian Perrig, David Barrera, George Danezis, Carmela Troncoso |
| 2018 | The Real First Class? Inferring Confidential Corporate Mergers and Government Relations from Air Traffic Communication. Martin Strohmeier, Matthew Smith, Vincent Lenders, Ivan Martinovic |
| 2018 | Understanding User Tradeoffs for Search in Encrypted Communication. Wei Bai, Ciara Lynton, Charalampos Papamanthou, Michelle L. Mazurek |
| 2018 | User Blocking Considered Harmful? An Attacker-Controllable Side Channel to Identify Social Accounts. Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Keito Sasaoka, Takeshi Yagi, Tatsuya Mori |
| 2018 | What You Get is What You C: Controlling Side Effects in Mainstream C Compilers. Laurent Simon, David Chisnall, Ross J. Anderson |