| Circonus: Design (Failures) Case Study | SREcon18 Europe | Theo Schlossnagle, Heinrich Hartmann |
| Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks | USENIX Security '18 | Ben Gras, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida |
| A Sense of Time for JavaScript and Node.js: First-Class Timeouts as a Cure for Event Handler Poisoning | USENIX Security '18 | James C. Davis, Eric R. Williamson, Dongyoon Lee |
| The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing PKI | USENIX Security '18 | Doowon Kim, Bum Jun Kwon, Kristián Kozák, Christopher Gates, Tudor Dumitraș |
| Guarder: A Tunable Secure Allocator | USENIX Security '18 | Sam Silvestro, Hongyu Liu, Tianyi Liu, Zhiqiang Lin, Tongping Liu |
| teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts | USENIX Security '18 | Johannes Krupp, Christian Rossow |
| How Do Tor Users Interact With Onion Services? | USENIX Security '18 | Philipp Winter, Anne Edmundson, Laura M. Roberts, Agnieszka Dutkowska-Żuk, Marshini Chetty, Nick Feamster |
| Shielding Software From Privileged Side-Channel Attacks | USENIX Security '18 | Xiaowan Dong, Zhuojia Shen, John Criswell, Alan L. Cox, Sandhya Dwarkadas |
| Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning | USENIX Security '18 | Hamza Harkous, Kassem Fawaz, Rémi Lebret, Florian Schaub, Kang G. Shin, Karl Aberer |
| Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts | USENIX Security '18 | Lorenz Breidenbach, Phil Daian, Florian Tramer, Ari Juels |
| Tackling runtime-based obfuscation in Android with TIRO | USENIX Security '18 | Michelle Y. Wong, David Lie |
| All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems | USENIX Security '18 | Kexiong (Curtis) Zeng, Shinan Liu, Yuanchao Shu, Dong Wang, Haoyu Li, Yanzhi Dou, Gang Wang, Yaling Yang |
| Meltdown: Reading Kernel Memory from User Space | USENIX Security '18 | Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg |
| FANCI : Feature-based Automated NXDomain Classification and Intelligence | USENIX Security '18 | Samuel Schüppen, Dominik Teubert, Patrick Herrmann, Ulrike Meyer |
| With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning | USENIX Security '18 | Bolun Wang, Yuanshun Yao, Bimal Viswanath, Haitao Zheng, Ben Y. Zhao |
| DIZK: A Distributed Zero Knowledge Proof System | USENIX Security '18 | Howard Wu, Wenting Zheng, Alessandro Chiesa, Raluca Ada Popa, Ion Stoica |
| When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks | USENIX Security '18 | Octavian Suciu, Radu Marginean, Yigitcan Kaya, Hal Daume III, Tudor Dumitras |
| HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security | USENIX Security '18 | Moritz Eckert, Antonio Bianchi, Ruoyu Wang, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna |
| Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising Purposes | USENIX Security '18 | José González Cabañas, Ángel Cuevas, Rubén Cuevas |
| Effective Detection of Multimedia Protocol Tunneling using Machine Learning | USENIX Security '18 | Diogo Barradas, Nuno Santos, Luís Rodrigues |
| Return Of Bleichenbacher’s Oracle Threat (ROBOT) | USENIX Security '18 | Hanno Böck, Juraj Somorovsky, Craig Young |
| SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection | USENIX Security '18 | Peng Gao, Xusheng Xiao, Ding Li, Zhichun Li, Kangkook Jee, Zhenyu Wu, Chung Hwan Kim, Sanjeev R. Kulkarni, Prateek Mittal |
| O Single Sign-Off, Where Art Thou? An Empirical Analysis of Single Sign-On Account Hijacking and Session Management on the Web | USENIX Security '18 | Mohammad Ghasemisharif, Amrutha Ramesh, Stephen Checkoway, Chris Kanich, Jason Polakis |
| A4NT: Author Attribute Anonymity by Adversarial Training of Neural Machine Translation | USENIX Security '18 | Rakshith Shetty, Bernt Schiele, Mario Fritz |
| Rethinking Access Control and Authentication for the Home Internet of Things (IoT) | USENIX Security '18 | Weijia He, Maximilian Golla, Roshni Padhi, Jordan Ofek, Markus Dürmuth, Earlence Fernandes, Blase Ur |