| End-to-End Measurements of Email Spoofing Attacks | USENIX Security '18 | Hang Hu, Gang Wang |
| End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking in Content Delivery Networks | USENIX Security '18 | Shuai Hao, Yubao Zhang, Haining Wang, Angelos Stavrou |
| Schrödinger’s RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem | USENIX Security '18 | Mohammad Rezaeirad, Brown Farinholt, Hitesh Dharmdasani, Paul Pearce, Kirill Levchenko, Damon McCoy |
| Towards a Secure Zero-rating Framework with Three Parties | USENIX Security '18 | Zhiheng Liu, Zhen Zhang, Yinzhi Cao, Zhaohan Xi, Shihao Jing, Humberto La Roche |
| The aftermath of a crypto-ransomware attack at a large academic institution | USENIX Security '18 | Leah Zhang-Kennedy, Hala Assal, Jessica Rocheleau, Reham Mohamed, Khadija Baig, Sonia Chiasson |
| Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors | USENIX Security '18 | Yazhou Tu, Zhiqiang Lin, Insup Lee, Xiali Hei |
| Understanding the Reproducibility of Crowd-reported Security Vulnerabilities | USENIX Security '18 | Dongliang Mu, Alejandro Cuevas, Limin Yang, Hang Hu, Xinyu Xing, Bing Mao, Gang Wang |
| Fast and Service-preserving Recovery from Malware Infections Using CRIU | USENIX Security '18 | Ashton Webster, Ryan Eckenrod, James Purtilo |
| From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the Wild | USENIX Security '18 | Chaowei Xiao, Armin Sarabi, Yang Liu, Bo Li, Mingyan Liu, Tudor Dumitras |
| MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation | USENIX Security '18 | Shankara Pailoor, Andrew Aday, Suman Jana |
| Skill Squatting Attacks on Amazon Alexa | USENIX Security '18 | Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates, Michael Bailey |
| Charm: Facilitating Dynamic Analysis of Device Drivers of Mobile Systems | USENIX Security '18 | Seyed Mohammadjavad Seyed Talebi, Hamid Tavakoli, Hang Zhang, Zheng Zhang, Ardalan Amiri Sani, Zhiyun Qian |
| Dependence-Preserving Data Compaction for Scalable Forensic Analysis | USENIX Security '18 | Md Nahid Hossain, Junao Wang, R. Sekar, Scott D. Stoller |
| Precise and Accurate Patch Presence Test for Binaries | USENIX Security '18 | Hang Zhang, Zhiyun Qian |
| Erays: Reverse Engineering Ethereum's Opaque Smart Contracts | USENIX Security '18 | Yi Zhou, Deepak Kumar, Surya Bakshi, Joshua Mason, Andrew Miller, Michael Bailey |
| The Dangers of Key Reuse: Practical Attacks on IPsec IKE | USENIX Security '18 | Dennis Felsch, Martin Grothe, Jörg Schwenk, Adam Czubak, Marcin Szymanek |
| Quack: Scalable Remote Measurement of Application-Layer Censorship | USENIX Security '18 | Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, Roya Ensafi |
| Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think | USENIX Security '18 | Stephan van Schaik, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi |
| Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring | USENIX Security '18 | Yossi Adi, Carsten Baum, Moustapha Cisse, Benny Pinkas, Joseph Keshet |
| Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse | USENIX Security '18 | Sanam Ghorbani Lyastani, Michael Schilling, Sascha Fahl, Michael Backes, Sven Bugiel |
| Formal Security Analysis of Neural Networks using Symbolic Intervals | USENIX Security '18 | Shiqi Wang, Kexin Pei, Justin Whitehouse, Junfeng Yang, Suman Jana |
| We Still Don’t Have Secure Cross-Domain Requests: an Empirical Study of CORS | USENIX Security '18 | Jianjun Chen, Jian Jiang, Haixin Duan, Tao Wan, Shuo Chen, Vern Paxson, Min Yang |
| Vetting Single Sign-On SDK Implementations via Symbolic Reasoning | USENIX Security '18 | Ronghai Yang, Wing Cheong Lau, Jiongyi Chen, Kehuan Zhang |
| Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secrets | USENIX Security '18 | Weiteng Chen, Zhiyun Qian |
| One&Done: A Single-Decryption EM-Based Attack on OpenSSL’s Constant-Time Blinded RSA | USENIX Security '18 | Monjur Alam, Haider Adnan Khan, Moumita Dey, Nishith Sinha, Robert Callan, Alenka Zajic, Milos Prvulovic |