| 2017 | 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017 |
| 2017 | A Framework for Universally Composable Diffie-Hellman Key Exchange. Ralf Küsters, Daniel Rausch |
| 2017 | A Lustrum of Malware Network Communication: Evolution and Insights. Chaz Lever, Platon Kotzias, Davide Balzarotti, Juan Caballero, Manos Antonakakis |
| 2017 | An Experimental Security Analysis of an Industrial Robot Controller. Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, Andrea Maria Zanchettin, Stefano Zanero |
| 2017 | Augur: Internet-Wide Detection of Connectivity Disruptions. Paul Pearce, Roya Ensafi, Frank Li, Nick Feamster, Vern Paxson |
| 2017 | Backward-Bounded DSE: Targeting Infeasibility Questions on Obfuscated Codes. Sébastien Bardin, Robin David, Jean-Yves Marion |
| 2017 | CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers. James Larisch, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson |
| 2017 | Catena: Efficient Non-equivocation via Bitcoin. Alin Tomescu, Srinivas Devadas |
| 2017 | Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop. Yanick Fratantonio, Chenxiong Qian, Simon P. Chung, Wenke Lee |
| 2017 | CoSMeDis: A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees. Thomas Bauereiß, Armando Pesenti Gritti, Andrei Popescu, Franco Raimondi |
| 2017 | Comparing the Usability of Cryptographic APIs. Yasemin Acar, Michael Backes, Sascha Fahl, Simson L. Garfinkel, Doowon Kim, Michelle L. Mazurek, Christian Stransky |
| 2017 | Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks. Yixin Sun, Anne Edmundson, Nick Feamster, Mung Chiang, Prateek Mittal |
| 2017 | Cryptographic Function Detection in Obfuscated Binaries via Bit-Precise Symbolic Loop Mapping. Dongpeng Xu, Jiang Ming, Dinghao Wu |
| 2017 | Finding and Preventing Bugs in JavaScript Bindings. Fraser Brown, Shravan Narayan, Riad S. Wahby, Dawson R. Engler, Ranjit Jhala, Deian Stefan |
| 2017 | From Trash to Treasure: Timing-Sensitive Garbage Collection. Mathias V. Pedersen, Aslan Askarov |
| 2017 | HVLearn: Automated Black-Box Analysis of Hostname Verification in SSL/TLS Implementations. Suphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, Suman Jana |
| 2017 | Hardening Java's Access Control by Abolishing Implicit Privilege Elevation. Philipp Holzinger, Ben Hermann, Johannes Lerch, Eric Bodden, Mira Mezini |
| 2017 | Hijacking Bitcoin: Routing Attacks on Cryptocurrencies. Maria Apostolaki, Aviv Zohar, Laurent Vanbever |
| 2017 | How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles. Moritz Contag, Vector Guo Li, Andre Pawlowski, Felix Domke, Kirill Levchenko, Thorsten Holz, Stefan Savage |
| 2017 | How to Learn Klingon without a Dictionary: Detection and Measurement of Black Keywords Used by the Underground Economy. Hao Yang, Xiulin Ma, Kun Du, Zhou Li, Hai-Xin Duan, Xiaodong Su, Guang Liu, Zhifeng Geng, Jianping Wu |
| 2017 | IKP: Turning a PKI Around with Decentralized Automated Incentives. Stephanos Matsumoto, Raphael M. Reischuk |
| 2017 | IVD: Automatic Learning and Enforcement of Authorization Rules in Online Social Networks. Paul Marinescu, Chad Parry, Marjori Pomarole, Yuan Tian, Patrick Tague, Ioannis Papagiannis |
| 2017 | Identifying Personal DNA Methylation Profiles by Genotype Inference. Michael Backes, Pascal Berrang, Matthias Bieg, Roland Eils, Carl Herrmann, Mathias Humbert, Irina Lehmann |
| 2017 | Implementing and Proving the TLS 1.3 Record Layer. Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Jonathan Protzenko, Aseem Rastogi, Nikhil Swamy, Santiago Zanella-Béguelin, Karthikeyan Bhargavan, Jianyang Pan, Jean Karim Zinzindohoue |
| 2017 | IoT Goes Nuclear: Creating a ZigBee Chain Reaction. Eyal Ronen, Adi Shamir, Achi-Or Weingarten, Colin O'Flynn |
| 2017 | Is Interaction Necessary for Distributed Private Learning? Adam D. Smith, Abhradeep Thakurta, Jalaj Upadhyay |
| 2017 | Leakage-Abuse Attacks against Order-Revealing Encryption. Paul Grubbs, Kevin Sekniqi, Vincent Bindschaedler, Muhammad Naveed, Thomas Ristenpart |
| 2017 | Machine-Checked Proofs of Privacy for Electronic Voting Protocols. Véronique Cortier, Constantin Catalin Dragan, François Dupressoir, Benedikt Schmidt, Pierre-Yves Strub, Bogdan Warinschi |
| 2017 | Membership Inference Attacks Against Machine Learning Models. Reza Shokri, Marco Stronati, Congzheng Song, Vitaly Shmatikov |
| 2017 | Multi-touch Authentication Using Hand Geometry and Behavioral Information. Yunpeng Song, Zhongmin Cai, Zhi-Li Zhang |
| 2017 | NEZHA: Efficient Domain-Independent Differential Testing. Theofilos Petsios, Adrian Tang, Salvatore J. Stolfo, Angelos D. Keromytis, Suman Jana |
| 2017 | NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64. Yaohui Chen, Dongli Zhang, Ruowen Wang, Rui Qiao, Ahmed M. Azab, Long Lu, Hayawardh Vijayakumar, Wenbo Shen |
| 2017 | Obstacles to the Adoption of Secure Communication Tools. Ruba Abu-Salma, M. Angela Sasse, Joseph Bonneau, Anastasia Danilova, Alena Naiakshina, Matthew Smith |
| 2017 | One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation. Jan Camenisch, Liqun Chen, Manu Drijvers, Anja Lehmann, David Novick, Rainer Urian |
| 2017 | Optimized Honest-Majority MPC for Malicious Adversaries - Breaking the 1 Billion-Gate Per Second Barrier. Toshinori Araki, Assi Barak, Jun Furukawa, Tamar Lichter, Yehuda Lindell, Ariel Nof, Kazuma Ohara, Adi Watzman, Or Weinstein |
| 2017 | Protecting Bare-Metal Embedded Systems with Privilege Overlays. Abraham A. Clements, Naif Saleh Almakhdhub, Khaled Saab, Prashast Srivastava, Jinkyu Koo, Saurabh Bagchi, Mathias Payer |
| 2017 | Pyramid: Enhancing Selectivity in Big Data Protection with Count Featurization. Mathias Lécuyer, Riley Spahn, Roxana Geambasu, Tzu-Kuo Huang, Siddhartha Sen |
| 2017 | Scalable Bias-Resistant Distributed Randomness. Ewa Syta, Philipp Jovanovic, Eleftherios Kokoris-Kogias, Nicolas Gailly, Linus Gasser, Ismail Khoffi, Michael J. Fischer, Bryan Ford |
| 2017 | SecureML: A System for Scalable Privacy-Preserving Machine Learning. Payman Mohassel, Yupeng Zhang |
| 2017 | Securing Augmented Reality Output. Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner |
| 2017 | Side-Channel Attacks on Shared Search Indexes. Liang Wang, Paul Grubbs, Jiahui Lu, Vincent Bindschaedler, David Cash, Thomas Ristenpart |
| 2017 | Skyfire: Data-Driven Seed Generation for Fuzzing. Junjie Wang, Bihuan Chen, Lei Wei, Yang Liu |
| 2017 | SmarPer: Context-Aware and Automatic Runtime-Permissions for Mobile Devices. Katarzyna Olejnik, Italo Dacosta, Joana Soares Machado, Kévin Huguenin, Mohammad Emtiyaz Khan, Jean-Pierre Hubaux |
| 2017 | SoK: Cryptographically Protected Database Search. Benjamin Fuller, Mayank Varia, Arkady Yerukhimovich, Emily Shen, Ariel Hamlin, Vijay Gadepally, Richard Shay, John Darby Mitchell, Robert K. Cunningham |
| 2017 | SoK: Exploiting Network Printers. Jens Müller, Vladislav Mladenov, Juraj Somorovsky, Jörg Schwenk |
| 2017 | SoK: Science, Security and the Elusive Goal of Security as a Scientific Pursuit. Cormac Herley, Paul C. van Oorschot |
| 2017 | Spotless Sandboxes: Evading Malware Analysis Systems Using Wear-and-Tear Artifacts. Najmeh Miramirkhani, Mahathi Priya Appini, Nick Nikiforakis, Michalis Polychronakis |
| 2017 | Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security. Felix Fischer, Konstantin Böttinger, Huang Xiao, Christian Stransky, Yasemin Acar, Michael Backes, Sascha Fahl |
| 2017 | SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations. Sze Yiu Chau, Omar Chowdhury, Md. Endadul Hoque, Huangyi Ge, Aniket Kate, Cristina Nita-Rotaru, Ninghui Li |
| 2017 | SysPal: System-Guided Pattern Locks for Android. Geumhwan Cho, Jun Ho Huh, Junsung Cho, Seongyeol Oh, Youngbae Song, Hyoungshick Kim |
| 2017 | The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences. Primal Wijesekera, Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman, David A. Wagner, Konstantin Beznosov |
| 2017 | The Password Reset MitM Attack. Nethanel Gelernter, Senia Kalma, Bar Magnezi, Hen Porcilan |
| 2017 | To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild. Brown Farinholt, Mohammad Rezaeirad, Paul Pearce, Hitesh Dharmdasani, Haikuo Yin, Stevens Le Blond, Damon McCoy, Kirill Levchenko |
| 2017 | Towards Evaluating the Robustness of Neural Networks. Nicholas Carlini, David A. Wagner |
| 2017 | Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks. Sumayah A. Alrwais, Xiaojing Liao, Xianghang Mi, Peng Wang, Xiaofeng Wang, Feng Qian, Raheem A. Beyah, Damon McCoy |
| 2017 | VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery. Seulbae Kim, Seunghoon Woo, Heejo Lee, Hakjoo Oh |
| 2017 | Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate. Karthikeyan Bhargavan, Bruno Blanchet, Nadim Kobeissi |
| 2017 | Verifying and Synthesizing Constant-Resource Implementations with Types. Van Chan Ngo, Mario Dehesa-Azuara, Matthew Fredrikson, Jan Hoffmann |
| 2017 | XHOUND: Quantifying the Fingerprintability of Browser Extensions. Oleksii Starov, Nick Nikiforakis |
| 2017 | Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits. Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, David Brumley |
| 2017 | vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases. Yupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos, Charalampos Papamanthou |