| 2019 | A Mechanised Cryptographic Proof of the WireGuard Virtual Private Network Protocol. Benjamin Lipp, Bruno Blanchet, Karthikeyan Bhargavan |
| 2019 | A Practical Attestation Protocol for Autonomous Embedded Systems. Florian Kohnhäuser, Niklas Büscher, Stefan Katzenbeisser |
| 2019 | A Symbolic Analysis of ECC-Based Direct Anonymous Attestation. Jorden Whitefield, Liqun Chen, Ralf Sasse, Steve A. Schneider, Helen Treharne, Stephan Wesemeyer |
| 2019 | Adaptive Call-Site Sensitive Control Flow Integrity. Mustakimur Khandaker, Abu Naser, Wenqing Liu, Zhi Wang, Yajin Zhou, Yueqiang Cheng |
| 2019 | Challenges in Designing Exploit Mitigations for Deeply Embedded Systems. Ali Abbasi, Jos Wetzels, Thorsten Holz, Sandro Etalle |
| 2019 | Deanonymization and Linkability of Cryptocurrency Transactions Based on Network Analysis. Alex Biryukov, Sergei Tikhomirov |
| 2019 | Degenerate Fault Attacks on Elliptic Curve Parameters in OpenSSL. Akira Takahashi, Mehdi Tibouchi |
| 2019 | Discovering Correlations: A Formal Definition of Causal Dependency Among Heterogeneous Events. Charles Xosanavongsa, Eric Totel, Olivier Bettan |
| 2019 | Domain Impersonation is Feasible: A Study of CA Domain Validation Vulnerabilities. Lorenz Schwittmann, Matthäus Wander, Torben Weis |
| 2019 | DroidEvolver: Self-Evolving Android Malware Detection System. Ke Xu, Yingjiu Li, Robert H. Deng, Kai Chen, Jiayun Xu |
| 2019 | Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts. Raymond Cheng, Fan Zhang, Jernej Kos, Warren He, Nicholas Hynes, Noah M. Johnson, Ari Juels, Andrew Miller, Dawn Song |
| 2019 | EzPC: Programmable and Efficient Secure Two-Party Computation for Machine Learning. Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma, Shardul Tripathi |
| 2019 | False Sense of Security: A Study on the Effectivity of Jailbreak Detection in Banking Apps. Ansgar Kellner, Micha Horlboge, Konrad Rieck, Christian Wressnegger |
| 2019 | IEEE European Symposium on Security and Privacy, EuroS&P 2019, Stockholm, Sweden, June 17-19, 2019 |
| 2019 | IFAL: Issue First Activate Later Certificates for V2X. Eric R. Verheul, Christopher Hicks, Flavio D. Garcia |
| 2019 | Improving Automated Symbolic Analysis of Ballot Secrecy for E-Voting Protocols: A Method Based on Sufficient Conditions. Lucca Hirschi, Cas Cremers |
| 2019 | In Encryption We Don't Trust: The Effect of End-to-End Encryption to the Masses on User Perception. Sergej Dechand, Alena Naiakshina, Anastasia Danilova, Matthew Smith |
| 2019 | Information-Flow Control for Database-Backed Applications. Marco Guarnieri, Musard Balliu, Daniel Schoepe, David A. Basin, Andrei Sabelfeld |
| 2019 | Is Your Vote Overheard? A New Scalable Side-Channel Attack Against Paper Voting. Kristjan Krips, Jan Willemson, Sebastian Värv |
| 2019 | Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key. Zhen Liu, Guomin Yang, Duncan S. Wong, Khoa Nguyen, Huaxiong Wang |
| 2019 | MALPITY: Automatic Identification and Exploitation of Tarpit Vulnerabilities in Malware. Walla Sebastian, Christian Rossow |
| 2019 | Mitch: A Machine Learning Approach to the Black-Box Detection of CSRF Vulnerabilities. Stefano Calzavara, Mauro Conti, Riccardo Focardi, Alvise Rabitti, Gabriele Tolomei |
| 2019 | Noise Explorer: Fully Automated Modeling and Verification for Arbitrary Noise Protocols. Nadim Kobeissi, Georgio Nicolas, Karthikeyan Bhargavan |
| 2019 | On Aggregation of Information in Timing Attacks. Itsaka Rakotonirina, Boris Köpf |
| 2019 | PILOT: Practical Privacy-Preserving Indoor Localization Using OuTsourcing. Kimmo Järvinen, Helena Leppäkoski, Elena Simona Lohan, Philipp Richter, Thomas Schneider, Oleksandr Tkachenko, Zheng Yang |
| 2019 | PRADA: Protecting Against DNN Model Stealing Attacks. Mika Juuti, Sebastian Szyller, Samuel Marchal, N. Asokan |
| 2019 | Private Votes on Untrusted Platforms: Models, Attacks and Provable Scheme. Sergiu Bursuc, Constantin Catalin Dragan, Steve Kremer |
| 2019 | Programming with Flow-Limited Authorization: Coarser is Better. Mathias Vorreiter Pedersen, Stephen Chong |
| 2019 | ReplicaTEE: Enabling Seamless Replication of SGX Enclaves in the Cloud. Claudio Soriente, Ghassan Karame, Wenting Li, Sergey Fedorov |
| 2019 | Rethinking Location Privacy for Unknown Mobility Behaviors. Simon Oya, Carmela Troncoso, Fernando Pérez-González |
| 2019 | Revisiting User Privacy for Certificate Transparency. Daniel Kales, Olamide Omolola, Sebastian Ramacher |
| 2019 | SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting. Olivier Blazy, Angèle Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete, Elena Pagnin |
| 2019 | STEROIDS for DOPed Applications: A Compiler for Automated Data-Oriented Programming. Jannik Pewny, Philipp Koppe, Thorsten Holz |
| 2019 | SgxPectre: Stealing Intel Secrets from SGX Enclaves Via Speculative Execution. Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten-Hwang Lai |
| 2019 | SoK: Benchmarking Flaws in Systems Security. Erik van der Kouwe, Gernot Heiser, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida |
| 2019 | StopGuessing: Using Guessed Passwords to Thwart Online Guessing. Stuart E. Schechter, Yuan Tian, Cormac Herley |
| 2019 | Tell Me You Fixed It: Evaluating Vulnerability Notifications via Quarantine Networks. Orçun Çetin, Carlos Gañán, Lisette Altena, Samaneh Tajalizadehkhoob, Michel van Eeten |
| 2019 | The 5G-AKA Authentication Protocol Privacy. Adrien Koutsos |
| 2019 | The Case of Adversarial Inputs for Secure Similarity Approximation Protocols. Evgenios M. Kornaropoulos, Petros Efstathopoulos |
| 2019 | Towards Understanding Limitations of Pixel Discretization Against Adversarial Attacks. Jiefeng Chen, Xi Wu, Vaibhav Rastogi, Yingyu Liang, Somesh Jha |
| 2019 | TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis. Baojun Liu, Zhou Li, Peiyuan Zong, Chaoyi Lu, Hai-Xin Duan, Ying Liu, Sumayah A. Alrwais, Xiaofeng Wang, Shuang Hao, Yaoqi Jia, Yiming Zhang, Kai Chen, Zaifeng Zhang |
| 2019 | Understanding eWhoring. Alice Hutchings, Sergio Pastrana |
| 2019 | Up-To-Crash: Evaluating Third-Party Library Updatability on Android. Jie Huang, Nataniel P. Borges Jr., Sven Bugiel, Michael Backes |