| 2017 | Android Malware Clustering Through Malicious Payload Mining. Yuping Li, Jiyong Jang, Xin Hu, Xinming Ou |
| 2017 | BEADS: Automated Attack Discovery in OpenFlow-Based SDN Systems. Samuel Jero, Xiangyu Bu, Cristina Nita-Rotaru, Hamed Okhravi, Richard Skowyra, Sonia Fahmy |
| 2017 | Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing Fitbit. Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti |
| 2017 | CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial Microcontrollers. Thomas Nyman, Jan-Erik Ekberg, Lucas Davi, N. Asokan |
| 2017 | Exploring the Ecosystem of Malicious Domain Registrations in the .eu TLD. Thomas Vissers, Jan Spooren, Pieter Agten, Dirk Jumpertz, Peter Janssen, Marc Van Wesemael, Frank Piessens, Wouter Joosen, Lieven Desmet |
| 2017 | Filtering for Malice Through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level. Kai Chen, Tongxin Li, Bin Ma, Peng Wang, Xiaofeng Wang, Peiyuan Zong |
| 2017 | ILAB: An Interactive Labelling Strategy for Intrusion Detection. Anaël Beaugnon, Pierre Chifflier, Francis R. Bach |
| 2017 | LAZARUS: Practical Side-Channel Resilient Kernel-Space Randomization. David Gens, Orlando Arias, Dean Sullivan, Christopher Liebchen, Yier Jin, Ahmad-Reza Sadeghi |
| 2017 | Lens on the Endpoint: Hunting for Malicious Software Through Endpoint Data Analysis. Ahmet Salih Buyukkayhan, Alina Oprea, Zhou Li, William K. Robertson |
| 2017 | Linking Amplification DDoS Attacks to Booter Services. Johannes Krupp, Mohammad Karami, Christian Rossow, Damon McCoy, Michael Backes |
| 2017 | Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises. Rashid Tahir, Muhammad Huzaifa, Anupam Das, Mohammad Ahmad, Carl A. Gunter, Fareed Zaffar, Matthew Caesar, Nikita Borisov |
| 2017 | Practical and Accurate Runtime Application Protection Against DoS Attacks. Mohamed Elsabagh, Dan Fleck, Angelos Stavrou, Michael Kaplan, Thomas Bowen |
| 2017 | Precisely and Scalably Vetting JavaScript Bridge in Android Hybrid Apps. Guangliang Yang, Abner Mendoza, Jialong Zhang, Guofei Gu |
| 2017 | Redemption: Real-Time Protection Against Ransomware at End-Hosts. Amin Kharraz, Engin Kirda |
| 2017 | Research in Attacks, Intrusions, and Defenses - 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings Marc Dacier, Michael D. Bailey, Michalis Polychronakis, Manos Antonakakis |
| 2017 | Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage. Kevin Leach, Fengwei Zhang, Westley Weimer |
| 2017 | Secure In-Cache Execution. Yue Chen, Mustakimur Khandaker, Zhi Wang |
| 2017 | Sgx-Lapd: Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults. Yangchun Fu, Erick Bauman, Raul Quinonez, Zhiqiang Lin |
| 2017 | Static Program Analysis as a Fuzzing Aid. Bhargava Shastry, Markus Leutner, Tobias Fiebig, Kashyap Thimmaraju, Fabian Yamaguchi, Konrad Rieck, Stefan Schmid, Jean-Pierre Seifert, Anja Feldmann |
| 2017 | Stealth Loader: Trace-Free Program Loading for API Obfuscation. Yuhei Kawakoya, Eitaro Shioji, Yuto Otsuki, Makoto Iwamura, Takeshi Yada |
| 2017 | Trapped by the UI: The Android Case. Efthimios Alepis, Constantinos Patsakis |
| 2017 | VDF: Targeted Evolutionary Fuzz Testing of Virtual Devices. Andrew Henderson, Heng Yin, Guang Jin, Hao Han, Hongmei Deng |