| 2018 | 2018 IEEE Symposium on Security and Privacy, SP 2018, Proceedings, 21-23 May 2018, San Francisco, California, USA |
| 2018 | A Formal Treatment of Accountable Proxying Over TLS. Karthikeyan Bhargavan, Ioana Boureanu, Antoine Delignat-Lavaud, Pierre-Alain Fouque, Cristina Onete |
| 2018 | A Machine Learning Approach to Prevent Malicious Calls over Telephony Networks. Huichen Li, Xiaojun Xu, Chang Liu, Teng Ren, Kun Wu, Xuezhi Cao, Weinan Zhang, Yong Yu, Dawn Song |
| 2018 | A Tale of Two Studies: The Best and Worst of YubiKey Usability. Joshua Reynolds, Trevor Smith, Ken Reese, Luke Dickinson, Scott Ruoti, Kent E. Seamons |
| 2018 | AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation. Timon Gehr, Matthew Mirman, Dana Drachsler-Cohen, Petar Tsankov, Swarat Chaudhuri, Martin T. Vechev |
| 2018 | Angora: Efficient Fuzzing by Principled Search. Peng Chen, Hao Chen |
| 2018 | Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two. Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate |
| 2018 | Another Flip in the Wall of Rowhammer Defenses. Daniel Gruss, Moritz Lipp, Michael Schwarz, Daniel Genkin, Jonas Juffinger, Sioli O'Connell, Wolfgang Schoechl, Yuval Yarom |
| 2018 | Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems. Connor Bolton, Sara Rampazzi, Chaohao Li, Andrew Kwong, Wenyuan Xu, Kevin Fu |
| 2018 | Bulletproofs: Short Proofs for Confidential Transactions and More. Benedikt Bünz, Jonathan Bootle, Dan Boneh, Andrew Poelstra, Pieter Wuille, Gregory Maxwell |
| 2018 | CollAFL: Path Sensitive Fuzzing. Shuitao Gan, Chao Zhang, Xiaojun Qin, Xuwen Tu, Kang Li, Zhongyu Pei, Zuoning Chen |
| 2018 | Compiler-Assisted Code Randomization. Hyungjoon Koo, Yaohui Chen, Long Lu, Vasileios P. Kemerlis, Michalis Polychronakis |
| 2018 | Computer Security and Privacy for Refugees in the United States. Lucy Simko, Ada Lerner, Samia Ibtasam, Franziska Roesner, Tadayoshi Kohno |
| 2018 | Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks. Kai Jansen, Matthias Schäfer, Daniel Moser, Vincent Lenders, Christina Pöpper, Jens B. Schmitt |
| 2018 | DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice. Vincent Cheval, Steve Kremer, Itsaka Rakotonirina |
| 2018 | Distance-Bounding Protocols: Verification without Time and Location. Sjouke Mauw, Zach Smith, Jorge Toro-Pozo, Rolando Trujillo-Rasua |
| 2018 | Do You Feel What I Hear? Enabling Autonomous IoT Device Pairing Using Different Sensor Types. Jun Han, Albert Jin Chung, Manal Kumar Sinha, Madhumitha Harishankar, Shijia Pan, Hae Young Noh, Pei Zhang, Patrick Tague |
| 2018 | Doubly-Efficient zkSNARKs Without Trusted Setup. Riad S. Wahby, Ioanna Tzialla, Abhi Shelat, Justin Thaler, Michael Walfish |
| 2018 | EnclaveDB: A Secure Database Using SGX. Christian Priebe, Kapil Vaswani, Manuel Costa |
| 2018 | Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed Reverse Zones. Kevin Borgolte, Shuang Hao, Tobias Fiebig, Giovanni Vigna |
| 2018 | EyeTell: Video-Assisted Touchscreen Keystroke Inference from Eye Movements. Yimin Chen, Tao Li, Rui Zhang, Yanchao Zhang, Terri Hedgpeth |
| 2018 | FP-STALKER: Tracking Browser Fingerprint Evolutions. Antoine Vastel, Pierre Laperdrix, Walter Rudametkin, Romain Rouvoy |
| 2018 | FPGA-Based Remote Power Side-Channel Attacks. Mark Zhao, G. Edward Suh |
| 2018 | FuturesMEX: Secure, Distributed Futures Market Exchange. Fabio Massacci, Chan Nam Ngo, Jing Nie, Daniele Venturi, Julian Williams |
| 2018 | Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU. Pietro Frigo, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi |
| 2018 | Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes. Daniel Votipka, Rock Stevens, Elissa M. Redmiles, Jeremy Hu, Michelle L. Mazurek |
| 2018 | Implementing Conjunction Obfuscation Under Entropic Ring LWE. David Bruce Cousins, Giovanni Di Crescenzo, Kamil Doruk Gür, Kevin King, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Erkay Savas |
| 2018 | Impossibility of Precise and Sound Termination-Sensitive Security Enforcements. Minh Ngo, Frank Piessens, Tamara Rezk |
| 2018 | Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage. Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson |
| 2018 | Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System. Yuqi Chen, Christopher M. Poskitt, Jun Sun |
| 2018 | Locally Differentially Private Frequent Itemset Mining. Tianhao Wang, Ninghui Li, Somesh Jha |
| 2018 | Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning. Matthew Jagielski, Alina Oprea, Battista Biggio, Chang Liu, Cristina Nita-Rotaru, Bo Li |
| 2018 | Mobile Application Web API Reconnaissance: Web-to-Mobile Inconsistencies & Vulnerabilities. Abner Mendoza, Guofei Gu |
| 2018 | Oblix: An Efficient Oblivious Search Index. Pratyush Mishra, Rishabh Poddar, Jerry Chen, Alessandro Chiesa, Raluca Ada Popa |
| 2018 | OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding. Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Ewa Syta, Bryan Ford |
| 2018 | On Enforcing the Digital Immunity of a Large Humanitarian Organization. Stevens Le Blond, Alejandro Cuevas, Juan Ramón Troncoso-Pastoriza, Philipp Jovanovic, Bryan Ford, Jean-Pierre Hubaux |
| 2018 | On the Economics of Offline Password Cracking. Jeremiah Blocki, Benjamin Harsha, Samson Zhou |
| 2018 | PIR with Compressed Queries and Amortized Query Processing. Sebastian Angel, Hao Chen, Kim Laine, Srinath T. V. Setty |
| 2018 | Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels. Meng Xu, Chenxiong Qian, Kangjie Lu, Michael Backes, Taesoo Kim |
| 2018 | Privacy Risks with Facebook's PII-Based Targeting: Auditing a Data Broker's Advertising Interface. Giridhari Venkatadri, Athanasios Andreou, Yabing Liu, Alan Mislove, Krishna P. Gummadi, Patrick Loiseau, Oana Goga |
| 2018 | Protecting the Stack with Metadata Policies and Tagged Hardware. Nick Roessler, André DeHon |
| 2018 | Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races. Guoxing Chen, Wenhao Wang, Tianyu Chen, Sanchuan Chen, Yinqian Zhang, Xiaofeng Wang, Ten-Hwang Lai, Dongdai Lin |
| 2018 | Routing Around Congestion: Defeating DDoS Attacks and Adverse Network Conditions via Reactive BGP Routing. Jared M. Smith, Max Schuchard |
| 2018 | Secure Device Bootstrapping Without Secrets Resistant to Signal Manipulation Attacks. Nirnimesh Ghose, Loukas Lazos, Ming Li |
| 2018 | Secure Two-party Threshold ECDSA from ECDSA Assumptions. Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat |
| 2018 | SoK: "Plug & Pray" Today - Understanding USB Insecurity in Versions 1 Through C. Jing (Dave) Tian, Nolen Scaife, Deepak Kumar, Michael D. Bailey, Adam Bates, Kevin R. B. Butler |
| 2018 | SoK: Keylogging Side Channels. John V. Monaco |
| 2018 | Sonar: Detecting SS7 Redirection Attacks with Audio-Based Distance Bounding. Christian Peeters, Hadi Abdullah, Nolen Scaife, Jasmine D. Bowers, Patrick Traynor, Bradley Reaves, Kevin R. B. Butler |
| 2018 | Speechless: Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors. S. Abhishek Anand, Nitesh Saxena |
| 2018 | Static Evaluation of Noninterference Using Approximate Model Counting. Ziqiao Zhou, Zhiyun Qian, Michael K. Reiter, Yinqian Zhang |
| 2018 | Stealing Hyperparameters in Machine Learning. Binghui Wang, Neil Zhenqiang Gong |
| 2018 | Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid-postMessage Enabled Mobile Applications. Guangliang Yang, Jeff Huang, Guofei Gu, Abner Mendoza |
| 2018 | Surveylance: Automatically Detecting Online Survey Scams. Amin Kharraz, William K. Robertson, Engin Kirda |
| 2018 | T-Fuzz: Fuzzing by Program Transformation. Hui Peng, Yan Shoshitaishvili, Mathias Payer |
| 2018 | The Cards Aren't Alright: Detecting Counterfeit Gift Cards Using Encoding Jitter. Nolen Scaife, Christian Peeters, Camilo Velez, Hanqing Zhao, Patrick Traynor, David Arnold |
| 2018 | The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators. Marten Oltrogge, Erik Derr, Christian Stransky, Yasemin Acar, Sascha Fahl, Christian Rossow, Giancarlo Pellegrino, Sven Bugiel, Michael Backes |
| 2018 | The Spyware Used in Intimate Partner Violence. Rahul Chatterjee, Periwinkle Doerfler, Hadas Orgad, Sam Havron, Jackeline Palmer, Diana Freed, Karen Levy, Nicola Dell, Damon McCoy, Thomas Ristenpart |
| 2018 | Towards Security and Privacy for Multi-user Augmented Reality: Foundations with End Users. Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner |
| 2018 | Tracking Certificate Misissuance in the Wild. Deepak Kumar, Zhengping Wang, Matthew Hyder, Joseph Dickinson, Gabrielle Beck, David Adrian, Joshua Mason, Zakir Durumeric, J. Alex Halderman, Michael D. Bailey |
| 2018 | Tracking Ransomware End-to-end. Danny Yuxing Huang, Maxwell Matthaios Aliapoulios, Vector Guo Li, Luca Invernizzi, Elie Bursztein, Kylie McRoberts, Jonathan Levin, Kirill Levchenko, Alex C. Snoeren, Damon McCoy |
| 2018 | Understanding Linux Malware. Emanuele Cozzi, Mariano Graziano, Yanick Fratantonio, Davide Balzarotti |
| 2018 | When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across Contexts. Simon Eberz, Giulio Lovisotto, Andrea Patane, Marta Kwiatkowska, Vincent Lenders, Ivan Martinovic |
| 2018 | vRAM: Faster Verifiable RAM with Program-Independent Preprocessing. Yupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos, Charalampos Papamanthou |
| 2018 | xJsnark: A Framework for Efficient Verifiable Computation. Ahmed E. Kosba, Charalampos Papamanthou, Elaine Shi |