| 2018 | Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings Xiaodong Lin, Ali A. Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang |
| 2017 | A Deep Learning Based Online Malicious URL and DNS Detection Scheme. Jianguo Jiang, Jiuming Chen, Kim-Kwang Raymond Choo, Chao Liu, Kunying Liu, Min Yu, Yongjian Wang |
| 2017 | A Framework for Formal Analysis of Privacy on SSO Protocols. Kailong Wang, Guangdong Bai, Naipeng Dong, Jin Song Dong |
| 2017 | A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware. Chonghua Wang, Shiqing Ma, Xiangyu Zhang, Junghwan Rhee, Xiaochun Yun, Zhiyu Hao |
| 2017 | A Program Manipulation Middleware and Its Applications on System Security. Ting Chen, Yang Xu, Xiaosong Zhang |
| 2017 | A Sudoku Matrix-Based Method of Pitch Period Steganography in Low-Rate Speech Coding. Zhongliang Yang, Xueshun Peng, Yongfeng Huang |
| 2017 | A-Tor: Accountable Anonymity in Tor. Quanwei Cai, Jonathan Lutes, Jingqiang Lin, Bo Luo |
| 2017 | Achieve Efficient and Privacy-Preserving Proximity Detection Scheme for Social Applications. Fengwei Wang, Hui Zhu, Rongxing Lu, Fen Liu, Cheng Huang, Hui Li |
| 2017 | All Your Accounts Are Belong to Us. Vlad Bulakh, Andrew J. Kaizer, Minaxi Gupta |
| 2017 | An Efficient Trustzone-Based In-application Isolation Schema for Mobile Authenticators. Yingjun Zhang, Yu Qin, Dengguo Feng, Bo Yang, Weijin Wang |
| 2017 | An On-Demand Defense Scheme Against DNS Cache Poisoning Attacks. Zheng Wang, Shui Yu, Scott Rose |
| 2017 | BKI: Towards Accountable and Decentralized Public-Key Infrastructure with Blockchain. Zhiguo Wan, Zhangshuang Guan, Feng Zhuo, Hequn Xian |
| 2017 | BluePass: A Secure Hand-Free Password Manager. Yue Li, Haining Wang, Kun Sun |
| 2017 | Cross-site Input Inference Attacks on Mobile Web Users. Rui Zhao, Chuan Yue, Qi Han |
| 2017 | Defining and Detecting Environment Discrimination in Android Apps. Yunfeng Hong, Yongjian Hu, Chun-Ming Lai, Shyhtsun Felix Wu, Iulian Neamtiu, Patrick D. McDaniel, Paul L. Yu, Hasan Cam, Gail-Joon Ahn |
| 2017 | DiffGuard: Obscuring Sensitive Information in Canary Based Protections. Jun Zhu, Weiping Zhou, Zhilong Wang, Dongliang Mu, Bing Mao |
| 2017 | Disrupting SDN via the Data Plane: A Low-Rate Flow Table Overflow Attack. Jiahao Cao, Mingwei Xu, Qi Li, Kun Sun, Yuan Yang, Jing Zheng |
| 2017 | Enhancing Android Security Through App Splitting. Drew Davidson, Vaibhav Rastogi, Mihai Christodorescu, Somesh Jha |
| 2017 | Exploring the Network of Real-World Passwords: Visualization and Estimation. Xiujia Guo, Zhao Wang, Zhong Chen |
| 2017 | Exposing LTE Security Weaknesses at Protocol Inter-layer, and Inter-radio Interactions. Muhammad Taqi Raza, Fatima Muhammad Anwar, Songwu Lu |
| 2017 | FRProtector: Defeating Control Flow Hijacking Through Function-Level Randomization and Transfer Protection. Jianming Fu, Rui Jin, Yan Lin |
| 2017 | Gray-Box Software Integrity Checking via Side-Channels. Hong Liu, Eugene Y. Vasserman |
| 2017 | Guilt-by-Association: Detecting Malicious Entities via Graph Mining. Pejman Najafi, Andrey Sapegin, Feng Cheng, Christoph Meinel |
| 2017 | H _2 DoS: An Application-Layer DoS Attack Towards HTTP/2 Protocol. Xiang Ling, Chunming Wu, Shouling Ji, Meng Han |
| 2017 | HSTS Measurement and an Enhanced Stripping Attack Against HTTPS. Xurong Li, Chunming Wu, Shouling Ji, Qinchen Gu, Raheem A. Beyah |
| 2017 | Inferring Implicit Assumptions and Correct Usage of Mobile Payment Protocols. Quanqi Ye, Guangdong Bai, Naipeng Dong, Jin Song Dong |
| 2017 | JSForce: A Forced Execution Engine for Malicious JavaScript Detection. Xunchao Hu, Yao Cheng, Yue Duan, Andrew Henderson, Heng Yin |
| 2017 | Lambda Obfuscation. Pengwei Lan, Pei Wang, Shuai Wang, Dinghao Wu |
| 2017 | LinkFlow: Efficient Large-Scale Inter-app Privacy Leakage Detection. Yi He, Qi Li, Kun Sun |
| 2017 | MPOPE: Multi-provider Order-Preserving Encryption for Cloud Data Privacy. Jinwen Liang, Zheng Qin, Sheng Xiao, Jixin Zhang, Hui Yin, Keqin Li |
| 2017 | Mending Wall: On the Implementation of Censorship in India. Devashish Gosain, Anshika Agarwal, Sahil Shekhawat, Hrishikesh B. Acharya, Sambuddho Chakravarty |
| 2017 | Optimizing TLB for Access Pattern Privacy Protection in Data Outsourcing. Yao Liu, Qingkai Zeng, Pinghai Yuan |
| 2017 | Outsourced k-Means Clustering over Encrypted Data Under Multiple Keys in Spark Framework. Hong Rong, Huimei Wang, Jian Liu, Jialu Hao, Ming Xian |
| 2017 | Privacy-Preserving Relevance Ranking Scheme and Its Application in Multi-keyword Searchable Encryption. Peisong Shen, Chi Chen, Xiaojie Zhu |
| 2017 | Query Recovery Attacks on Searchable Encryption Based on Partial Knowledge. Guofeng Wang, Chuanyi Liu, Yingfei Dong, Hezhong Pan, Peiyi Han, Binxing Fang |
| 2017 | ROPOB: Obfuscating Binary Code via Return Oriented Programming. Dongliang Mu, Jia Guo, Wenbiao Ding, Zhilong Wang, Bing Mao, Lei Shi |
| 2017 | SDN-Based Kernel Modular Countermeasure for Intrusion Detection. Tommy Chin, Kaiqi Xiong, Mohamed Rahouti |
| 2017 | SLIM: Secure and Lightweight Identity Management in VANETs with Minimum Infrastructure Reliance. Jian Kang, Yousef Elmehdwi, Dan Lin |
| 2017 | ThiefTrap - An Anti-theft Framework for Android. Sascha Groß, Abhishek Tiwari, Christian Hammer |
| 2017 | TopHat : Topology-Based Host-Level Attribution for Multi-stage Attacks in Enterprise Systems Using Software Defined Networks. Subramaniyam Kannan, Paul Wood, Larry Deatrick, Patricia Beane, Somali Chaterji, Saurabh Bagchi |
| 2017 | Turing Obfuscation. Yan Wang, Shuai Wang, Pei Wang, Dinghao Wu |
| 2017 | Twisting Lattice and Graph Techniques to Compress Transactional Ledgers. Rémi Géraud, David Naccache, Razvan Rosie |
| 2017 | Understanding Adversarial Strategies from Bot Recruitment to Scheduling. Wentao Chang, Aziz Mohaisen, An Wang, Songqing Chen |
| 2017 | VCIDS: Collaborative Intrusion Detection of Sensor and Actuator Attacks on Connected Vehicles. Pinyao Guo, Hunmin Kim, Le Guan, Minghui Zhu, Peng Liu |
| 2017 | VaultIME: Regaining User Control for Password Managers Through Auto-Correction. Le Guan, Sadegh Farhang, Yu Pu, Pinyao Guo, Jens Grossklags, Peng Liu |
| 2017 | Very Short Intermittent DDoS Attacks in an Unsaturated System. Huasong Shan, Qingyang Wang, Qiben Yan |
| 2017 | Visual Analysis of Android Malware Behavior Profile Based on PMCG_droid : A Pruned Lightweight APP Call Graph. Yan Zhang, Gui Peng, Lu Yang, Yazhe Wang, Minghui Tian, Jianxing Hu, Liming Wang, Chen Song |