| 2017 | (Cross-)Browser Fingerprinting via OS and Hardware Level Features. Yinzhi Cao, Song Li, Erik Wijmans |
| 2017 | 24th Annual Network and Distributed System Security Symposium, NDSS 2017, San Diego, California, USA, February 26 - March 1, 2017 |
| 2017 | A Broad View of the Ecosystem of Socially Engineered Exploit Documents. Stevens Le Blond, Cédric Gilbert, Utkarsh Upadhyay, Manuel Gomez-Rodriguez, David R. Choffnes |
| 2017 | A Call to ARMs: Understanding the Costs and Benefits of JIT Spraying Mitigations. Wilson Lian, Hovav Shacham, Stefan Savage |
| 2017 | A Large-scale Analysis of the Mnemonic Password Advice. Johannes Kiesel, Benno Stein, Stefan Lucks |
| 2017 | ASLR on the Line: Practical Cache Attacks on the MMU. Ben Gras, Kaveh Razavi, Erik Bosman, Herbert Bos, Cristiano Giuffrida |
| 2017 | Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity. Robert Rudd, Richard Skowyra, David Bigelow, Veer Dedhia, Thomas Hobson, Stephen Crane, Christopher Liebchen, Per Larsen, Lucas Davi, Michael Franz, Ahmad-Reza Sadeghi, Hamed Okhravi |
| 2017 | An Evil Copy: How the Loader Betrays You. Xinyang Ge, Mathias Payer, Trent Jaeger |
| 2017 | Are We There Yet? On RPKI's Deployment and Security. Yossi Gilad, Avichai Cohen, Amir Herzberg, Michael Schapira, Haya Schulmann |
| 2017 | Automated Analysis of Privacy Requirements for Mobile Apps. Sebastian Zimmeck, Ziqi Wang, Lieyong Zou, Roger Iyengar, Bin Liu, Florian Schaub, Shomir Wilson, Norman M. Sadeh, Steven M. Bellovin, Joel R. Reidenberg |
| 2017 | Automated Synthesis of Semantic Malware Signatures using Maximum Satisfiability. Yu Feng, Osbert Bastani, Ruben Martins, Isil Dillig, Saswat Anand |
| 2017 | Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection. Aaron Johnson, Rob Jansen, Aaron D. Jaggard, Joan Feigenbaum, Paul Syverson |
| 2017 | BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments. Aravind Machiry, Eric Gustafson, Chad Spensky, Christopher Salls, Nick Stephens, Ruoyu Wang, Antonio Bianchi, Yung Ryn Choe, Christopher Kruegel, Giovanni Vigna |
| 2017 | Broken Hearted: How To Attack ECG Biometrics. Simon Eberz, Nicola Paoletti, Marc Roeschlin, Andrea Patané, Marta Kwiatkowska, Ivan Martinovic |
| 2017 | Catching Worms, Trojan Horses and PUPs: Unsupervised Detection of Silent Delivery Campaigns. Bum Jun Kwon, Virinchi Srinivas, Amol Deshpande, Tudor Dumitras |
| 2017 | Constant Round Maliciously Secure 2PC with Function-independent Preprocessing using LEGO. Jesper Buus Nielsen, Thomas Schneider, Roberto Trifiletti |
| 2017 | ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms. Yunhan Jack Jia, Qi Alfred Chen, Shiqi Wang, Amir Rahmati, Earlence Fernandes, Zhuoqing Morley Mao, Atul Prakash |
| 2017 | Cracking Android Pattern Lock in Five Attempts. Guixin Ye, Zhanyong Tang, Dingyi Fang, Xiaojiang Chen, Kwang In Kim, Ben Taylor, Zheng Wang |
| 2017 | DELTA: A Security Assessment Framework for Software-Defined Networks. Seungsoo Lee, Changhoon Yoon, Chanhee Lee, Seungwon Shin, Vinod Yegneswaran, Phillip A. Porras |
| 2017 | Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code. Giorgi Maisuradze, Michael Backes, Christian Rossow |
| 2017 | Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps. Xiaorui Pan, Xueqiang Wang, Yue Duan, Xiaofeng Wang, Heng Yin |
| 2017 | Deconstructing Xen. Le Shi, Yuming Wu, Yubin Xia, Nathan Dautenhahn, Haibo Chen, Binyu Zang, Jinming Li |
| 2017 | Dial One for Scam: A Large-Scale Analysis of Technical Support Scams. Najmeh Miramirkhani, Oleksii Starov, Nick Nikiforakis |
| 2017 | Dissecting Tor Bridges: A Security Evaluation of their Private and Public Infrastructures. Srdjan Matic, Carmela Troncoso, Juan Caballero |
| 2017 | Dynamic Differential Location Privacy with Personalized Error Bounds. Lei Yu, Ling Liu, Calton Pu |
| 2017 | Dynamic Virtual Address Range Adjustment for Intra-Level Privilege Separation on ARM. Yeongpil Cho, Donghyun Kwon, Hayoon Yi, Yunheung Paek |
| 2017 | Enabling Reconstruction of Attacks on Users via Efficient Browsing Snapshots. Phani Vadrevu, Jienan Liu, Bo Li, Babak Rahbarinia, Kyu Hyung Lee, Roberto Perdisci |
| 2017 | FBS-Radar: Uncovering Fake Base Stations at Scale in the Wild. Zhenhua Li, Weiwei Wang, Christo Wilson, Jian Chen, Chen Qian, Taeho Jung, Lan Zhang, Kebin Liu, Xiangyang Li, Yunhao Liu |
| 2017 | Fake Co-visitation Injection Attacks to Recommender Systems. Guolei Yang, Neil Zhenqiang Gong, Ying Cai |
| 2017 | Fast Actively Secure OT Extension for Short Secrets. Arpita Patra, Pratik Sarkar, Ajith Suresh |
| 2017 | HOP: Hardware makes Obfuscation Practical. Kartik Nayak, Christopher W. Fletcher, Ling Ren, Nishanth Chandran, Satya V. Lokam, Elaine Shi, Vipul Goyal |
| 2017 | Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud. Clémentine Maurice, Manuel Weber, Michael Schwarz, Lukas Giner, Daniel Gruss, Carlo Alberto Boano, Stefan Mangard, Kay Römer |
| 2017 | Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit. Luis Garcia, Ferdinand Brasser, Mehmet Hazar Cintuglu, Ahmad-Reza Sadeghi, Osama A. Mohammed, Saman A. Zonouz |
| 2017 | HisTorε: Differentially Private and Robust Statistics Collection for Tor. Akshaya Mani, Micah Sherr |
| 2017 | IO-DSSE: Scaling Dynamic Searchable Encryption to Millions of Indexes By Improving Locality. Ian Miers, Payman Mohassel |
| 2017 | Indiscreet Logs: Diffie-Hellman Backdoors in TLS. Kristen Dorey, Nicholas Chang-Fong, Aleksander Essex |
| 2017 | Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis. Claude Fachkha, Elias Bou-Harb, Anastasis Keliris, Nasir D. Memon, Mustaque Ahamad |
| 2017 | KEH-Gait: Towards a Mobile Healthcare User Authentication System by Kinetic Energy Harvesting. Weitao Xu, Guohao Lan, Qi Lin, Sara Khalifa, Neil Bergmann, Mahbub Hassan, Wen Hu |
| 2017 | MARX: Uncovering Class Hierarchies in C++ Programs. Andre Pawlowski, Moritz Contag, Victor van der Veen, Chris Ouwehand, Thorsten Holz, Herbert Bos, Elias Athanasopoulos, Cristiano Giuffrida |
| 2017 | MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models. Enrico Mariconti, Lucky Onwuzurike, Panagiotis Andriotis, Emiliano De Cristofaro, Gordon J. Ross, Gianluca Stringhini |
| 2017 | Measuring small subgroup attacks against Diffie-Hellman. Luke Valenta, David Adrian, Antonio Sanso, Shaanan Cohney, Joshua Fried, Marcella Hastings, J. Alex Halderman, Nadia Heninger |
| 2017 | Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis. Andrea Continella, Yanick Fratantonio, Martina Lindorfer, Alessandro Puccetti, Ali Zand, Christopher Kruegel, Giovanni Vigna |
| 2017 | ObliviSync: Practical Oblivious File Backup and Synchronization. Adam J. Aviv, Seung Geol Choi, Travis Mayberry, Daniel S. Roche |
| 2017 | On the Safety and Efficiency of Virtual Firewall Elasticity Control. Juan Deng, Hongda Li, Hongxin Hu, Kuang-Ching Wang, Gail-Joon Ahn, Ziming Zhao, Wonkyu Han |
| 2017 | P2P Mixing and Unlinkable Bitcoin Transactions. Tim Ruffing, Pedro Moreno-Sanchez, Aniket Kate |
| 2017 | PSI: Precise Security Instrumentation for Enterprise Networks. Tianlong Yu, Seyed Kaveh Fayaz, Michael P. Collins, Vyas Sekar, Srinivasan Seshan |
| 2017 | PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables. Lucas Davi, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi |
| 2017 | Panoply: Low-TCB Linux Applications With SGX Enclaves. Shweta Shinde, Dat Le Tien, Shruti Tople, Prateek Saxena |
| 2017 | Pushing the Communication Barrier in Secure Computation using Lookup Tables. Ghada Dessouky, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni, Michael Zohner |
| 2017 | Ramblr: Making Reassembly Great Again. Ruoyu Wang, Yan Shoshitaishvili, Antonio Bianchi, Aravind Machiry, John Grosen, Paul Grosen, Christopher Kruegel, Giovanni Vigna |
| 2017 | SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs. Jaebaek Seo, Byoungyoung Lee, Seong-min Kim, Ming-Wei Shih, Insik Shin, Dongsu Han, Taesoo Kim |
| 2017 | Safelnit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities. Alyssa Milburn, Herbert Bos, Cristiano Giuffrida |
| 2017 | Self Destructing Exploit Executions via Input Perturbation. Yonghwi Kwon, Brendan Saltaformaggio, I Luk Kim, Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu |
| 2017 | Show Me the Money! Finding Flawed Implementations of Third-party In-app Payment in Android Apps. Wenbo Yang, Yuanyuan Zhang, Juanru Li, Hui Liu, Qing Wang, Yueheng Zhang, Dawu Gu |
| 2017 | SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks. Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei |
| 2017 | Stack Bounds Protection with Low Fat Pointers. Gregory J. Duck, Roland H. C. Yap, Lorenzo Cavallaro |
| 2017 | T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs. Ming-Wei Shih, Sangho Lee, Taesoo Kim, Marcus Peinado |
| 2017 | TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation. Yushun Wang, Taous Madi, Suryadipta Majumdar, Yosr Jarraya, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi |
| 2017 | The Effect of DNS on Tor's Anonymity. Benjamin Greschbach, Tobias Pulls, Laura M. Roberts, Philipp Winter, Nick Feamster |
| 2017 | The Security Impact of HTTPS Interception. Zakir Durumeric, Zane Ma, Drew Springall, Richard Barnes, Nick Sullivan, Elie Bursztein, Michael D. Bailey, J. Alex Halderman, Vern Paxson |
| 2017 | Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web. Tobias Lauinger, Abdelberi Chaabane, Sajjad Arshad, William Robertson, Christo Wilson, Engin Kirda |
| 2017 | Towards Implicit Visual Memory-Based Authentication. Claude Castelluccia, Markus Dürmuth, Maximilian Golla, Fatma Deniz |
| 2017 | TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub. Ethan Heilman, Leen Alshenibr, Foteini Baldimtsi, Alessandra Scafuro, Sharon Goldberg |
| 2017 | Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying. Kangjie Lu, Marie-Therese Walter, David Pfaff, Stefan Nümberger, Wenke Lee, Michael Backes |
| 2017 | Using Fully Homomorphic Encryption for Statistical Analysis of Categorical, Ordinal and Numerical Data. Wenjie Lu, Shohei Kawasaki, Jun Sakuma |
| 2017 | VUzzer: Application-aware Evolutionary Fuzzing. Sanjay Rawat, Vivek Jain, Ashish Kumar, Lucian Cojocar, Cristiano Giuffrida, Herbert Bos |
| 2017 | Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones. Simon Birnbach, Richard Baker, Ivan Martinovic |
| 2017 | WindowGuard: Systematic Protection of GUI Security in Android. Chuangang Ren, Peng Liu, Sencun Zhu |
| 2017 | WireGuard: Next Generation Kernel Network Tunnel. Jason A. Donenfeld |