| Modelling and Analysis of a Hierarchy of Distance Bounding Attacks | USENIX Security '18 | Tom Chothia, Joeri de Ruiter, Ben Smyth |
| The Secure Socket API: TLS as an Operating System Service | USENIX Security '18 | Mark O'Neill, Scott Heidbrink, Jordan Whitehead, Tanner Perdue, Luke Dickinson, Torstein Collett, Nick Bonner, Kent Seamons, Daniel Zappala |
| Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks | USENIX Security '18 | Wei Meng, Chenxiong Qian, Shuang Hao, Kevin Borgolte, Giovanni Vigna, Christopher Kruegel, Wenke Lee |
| Reading Thieves' Cant: Automatically Identifying and Understanding Dark Jargons from Cybercrime Marketplaces | USENIX Security '18 | Kan Yuan, Haoran Lu, Xiaojing Liao, XiaoFeng Wang |
| Arbitrum: Scalable, private smart contracts | USENIX Security '18 | Harry Kalodner, Steven Goldfeder, Xiaoqi Chen, S. Matthew Weinberg, Edward W. Felten |
| NetHide: Secure and Practical Network Topology Obfuscation | USENIX Security '18 | Roland Meier, Petar Tsankov, Vincent Lenders, Laurent Vanbever, Martin Vechev |
| GAZELLE: A Low Latency Framework for Secure Neural Network Inference | USENIX Security '18 | Chiraag Juvekar, Vinod Vaikuntanathan, Anantha Chandrakasan |
| Freezing the Web: A Study of ReDoS Vulnerabilities in JavaScript-based Web Servers | USENIX Security '18 | Cristian-Alexandru Staicu, Michael Pradel |
| Acquisitional Rule-based Engine for Discovering Internet-of-Things Devices | USENIX Security '18 | Xuan Feng, Qiang Li, Haining Wang, Limin Sun |
| DelegaTEE: Brokered Delegation Using Trusted Execution Environments | USENIX Security '18 | Sinisa Matetic, Moritz Schneider, Andrew Miller, Ari Juels, Srdjan Capkun |
| AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning | USENIX Security '18 | Jinyuan Jia, Neil Zhenqiang Gong |
| Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets | USENIX Security '18 | Rolf van Wegberg, Samaneh Tajalizadehkhoob, Kyle Soska, Ugur Akyazi, Carlos Hernandez Ganan, Bram Klievink, Nicolas Christin, Michel van Eeten |
| Automatic Heap Layout Manipulation for Exploitation | USENIX Security '18 | Sean Heelan, Tom Melham, Daniel Kroening |
| Fp-Scanner: The Privacy Implications of Browser Fingerprint Inconsistencies | USENIX Security '18 | Antoine Vastel, Pierre Laperdrix, Walter Rudametkin, Romain Rouvoy |
| An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications | USENIX Security '18 | Xiaohan Zhang, Yuan Zhang, Qianqian Mo, Hao Xia, Zhemin Yang, Min Yang, Xiaofeng Wang, Long Lu, Haixin Duan |
| SAD THUG: Structural Anomaly Detection for Transmissions of High-value Information Using Graphics | USENIX Security '18 | Jonathan P. Chapman |
| An Empirical Analysis of Anonymity in Zcash | USENIX Security '18 | George Kappos, Haaroon Yousaf, Mary Maller, Sarah Meiklejohn |
| DATA – Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries | USENIX Security '18 | Samuel Weiser, Andreas Zankl, Raphael Spreitzer, Katja Miller, Stefan Mangard, Georg Sigl |
| BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid | USENIX Security '18 | Saleh Soltan, Prateek Mittal, H. Vincent Poor |
| Bamboozling Certificate Authorities with BGP | USENIX Security '18 | Henry Birge-Lee, Yixin Sun, Anne Edmundson, Jennifer Rexford, Prateek Mittal |
| Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution | USENIX Security '18 | Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, Raoul Strackx |
| ACES: Automatic Compartments for Embedded Systems | USENIX Security '18 | Abraham A Clements, Naif Saleh Almakhdhub, Saurabh Bagchi, Mathias Payer |
| Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation | USENIX Security '18 | Richard Bonett, Kaushal Kafle, Kevin Moran, Adwait Nadkarni, Denys Poshyvanyk |
| FlowCog: Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps | USENIX Security '18 | Xiang Pan, Yinzhi Cao, Xuechao Du, Boyuan He, Gan Fang, Rui Shao, Yan Chen |
| Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path | USENIX Security '18 | Baojun Liu, Chaoyi Lu, Haixin Duan, Ying Liu, Zhou Li, Shuang Hao, Min Yang |