| 2018 | BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews. Claudio Rizzo, Lorenzo Cavallaro, Johannes Kinder |
| 2018 | Backdoors: Definition, Deniability and Detection. Sam L. Thomas, Aurélien Francillon |
| 2018 | Before Toasters Rise Up: A View into the Emerging IoT Threat Landscape. Pierre-Antoine Vervier, Yun Shen |
| 2018 | Characterizing Eve: Analysing Cybercrime Actors in a Large Underground Forum. Sergio Pastrana, Alice Hutchings, Andrew Caines, Paula Buttery |
| 2018 | Control Plane Reflection Attacks in SDNs: New Attacks and Countermeasures. Menghao Zhang, Guanyu Li, Lei Xu, Jun Bi, Guofei Gu, Jiasong Bai |
| 2018 | CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices. Chen Cao, Le Guan, Ning Zhang, Neng Gao, Jingqiang Lin, Bo Luo, Peng Liu, Ji Xiang, Wenjing Lou |
| 2018 | DNS Unchained: Amplified Application-Layer DoS Attacks Against DNS Authoritatives. Jonas Bushart, Christian Rossow |
| 2018 | Defeating Software Mitigations Against Rowhammer: A Surgical Precision Hammer. Andrei Tatar, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi |
| 2018 | Dictionary Extraction and Detection of Algorithmically Generated Domain Names in Passive DNS Traffic. Mayana Pereira, Shaun Coleman, Bin Yu, Martine De Cock, Anderson C. A. Nascimento |
| 2018 | Error-Sensor: Mining Information from HTTP Error Traffic for Malware Intelligence. Jialong Zhang, Jiyong Jang, Guofei Gu, Marc Ph. Stoecklin, Xin Hu |
| 2018 | Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks. Kang Liu, Brendan Dolan-Gavitt, Siddharth Garg |
| 2018 | Furnace: Self-service Tenant VMI for the Cloud. Micah Bushouse, Douglas S. Reeves |
| 2018 | Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers. Ishai Rosenberg, Asaf Shabtai, Lior Rokach, Yuval Elovici |
| 2018 | GuidedPass: Helping Users to Create Strong and Memorable Passwords. Simon S. Woo, Jelena Mirkovic |
| 2018 | Hardware Assisted Randomization of Data. Brian Belleville, Hyungon Moon, Jangseop Shin, Dongil Hwang, Joseph M. Nash, Seonhwa Jung, Yeoul Na, Stijn Volckaert, Per Larsen, Yunheung Paek, Michael Franz |
| 2018 | Identifying Key Leakage of Bitcoin Users. Michael Brengel, Christian Rossow |
| 2018 | KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels. Zhi Zhang, Yueqiang Cheng, Surya Nepal, Dongxi Liu, Qingni Shen, Fethi A. Rabhi |
| 2018 | Malicious IoT Implants: Tampering with Serial Communication over the Internet. Philipp Morgner, Stefan Pfennig, Dennis Salzner, Zinaida Benenson |
| 2018 | MicroStache: A Lightweight Execution Context for In-Process Safe Region Isolation. Lucian Mogosanu, Ashay Rane, Nathan Dautenhahn |
| 2018 | Next Generation P2P Botnets: Monitoring Under Adverse Conditions. Leon Böck, Emmanouil Vasilomanolakis, Max Mühlhäuser, Shankar Karuppayah |
| 2018 | OTTer: A Scalable High-Resolution Encrypted Traffic Identification Engine. Eva Papadogiannaki, Constantinos Halevidis, Periklis Akritidis, Lazaros Koromilas |
| 2018 | PartiSan: Fast and Flexible Sanitization via Run-Time Partitioning. Julian Lettner, Dokyung Song, Taemin Park, Per Larsen, Stijn Volckaert, Michael Franz |
| 2018 | PostScript Undead: Pwning the Web with a 35 Years Old Language. Jens Müller, Vladislav Mladenov, Dennis Felsch, Jörg Schwenk |
| 2018 | Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids. Johanna Ullrich, Nicholas Stifter, Aljosha Judmayer, Adrian Dabrowski, Edgar R. Weippl |
| 2018 | Proteus: Detecting Android Emulators from Instruction-Level Profiles. Onur Sahin, Ayse K. Coskun, Manuel Egele |
| 2018 | RWGuard: A Real-Time Detection System Against Cryptographic Ransomware. Shagufta Mehnaz, Anand Mudgerikar, Elisa Bertino |
| 2018 | Reading Between the Lines: Content-Agnostic Detection of Spear-Phishing Emails. Hugo Gascon, Steffen Ullrich, Benjamin Stritter, Konrad Rieck |
| 2018 | Research in Attacks, Intrusions, and Defenses - 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings Michael D. Bailey, Thorsten Holz, Manolis Stamatogiannakis, Sotiris Ioannidis |
| 2018 | ShadowMonitor: An Effective In-VM Monitoring Framework with Hardware-Enforced Isolation. Bin Shi, Lei Cui, Bo Li, Xudong Liu, Zhiyu Hao, Haiying Shen |
| 2018 | Statistical Similarity of Critical Infrastructure Network Traffic Based on Nearest Neighbor Distances. Jeong-Han Yun, Yoonho Hwang, Woomyo Lee, Hee-Kap Ahn, Sin-Kyu Kim |
| 2018 | SybilBlind: Detecting Fake Users in Online Social Networks Without Manual Labels. Binghui Wang, Le Zhang, Neil Zhenqiang Gong |
| 2018 | Trusted Execution Path for Protecting Java Applications Against Deserialization of Untrusted Data. Stefano Cristalli, Edoardo Vignati, Danilo Bruschi, Andrea Lanzi |
| 2018 | τCFI: Type-Assisted Control Flow Integrity for x86-64 Binaries. Paul Muntean, Matthias Fischer, Gang Tan, Zhiqiang Lin, Jens Grossklags, Claudia Eckert |