| Profiling Node Applications | SREcon17 Europe | Sasha Goldshtein |
| Want to Solve Over-Monitoring and Alert Fatigue? Create the Right Incentives! | SREcon17 Europe | Kishore Jalleda |
| Make Haste Slowly: Balancing SRE Diligence in Urgency Driven Organizations | SREcon17 Europe | Jason Hiltz-Laforge |
| SRE Your gRPC—Building Reliable Distributed Systems (Illustrated with GRPC) | SREcon17 Europe | Grainne Sheerin, Gabe Krabbe |
| Globalizing SRE in a Walkup Culture | SREcon17 Europe | Bill Lincoln, Matt Coleman |
| Diversity and Inclusion in SRE: A Postmortem | SREcon17 Europe | Niall Richard Murphy |
| Care and Feeding of SRE | SREcon17 Europe | Narayan Desai |
| Lightning Talks Video | SREcon17 Europe | |
| Understanding the Mirai Botnet | USENIX Security '17 | Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, Yi Zhou |
| BLENDER: Enabling Local Search with a Hybrid Differential Privacy Model | USENIX Security '17 | Brendan Avent, Aleksandra Korolova, David Zeber, Torgeir Hovden, Benjamin Livshits |
| Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment | USENIX Security '17 | Xiaolong Bai, Zhe Zhou, XiaoFeng Wang, Zhou Li, Xianghang Mi, Nan Zhang, Tongxin Li, Shi-Min Hu, Kehuan Zhang |
| Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning | USENIX Security '17 | Sebastian Banescu, Christian Collberg, Alexander Pretschner |
| See No Evil, Hear No Evil, Feel No Evil, Print No Evil? Malicious Fill Patterns Detection in Additive Manufacturing | USENIX Security '17 | Christian Bayens, Tuan Le, Luis Garcia, Raheem Beyah, Mehdi Javanmard, Saman Zonouz |
| MCMix: Anonymous Messaging via Secure Multiparty Computation | USENIX Security '17 | Nikolaos Alexopoulos, Aggelos Kiayias, Riivo Talviste, Thomas Zacharias |
| Venerable Variadic Vulnerabilities Vanquished | USENIX Security '17 | Priyam Biswas, Alessandro Di Federico, Scott A. Carr, Prabhu Rajasekaran, Stijn Volckaert, Yeoul Na, Michael Franz, Mathias Payer |
| Syntia: Synthesizing the Semantics of Obfuscated Code | USENIX Security '17 | Tim Blazytko, Moritz Contag, Cornelius Aschermann, Thorsten Holz |
| Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name Takeovers | USENIX Security '17 | Tobias Lauinger, Abdelberi Chaabane, Ahmet Salih Buyukkayhan, Kaan Onarlioglu, William Robertson |
| CCSP: Controlled Relaxation of Content Security Policies by Runtime Policy Composition | USENIX Security '17 | Stefano Calzavara, Alvise Rabitti, Michele Bugliesi |
| Adaptive Android Kernel Live Patching | USENIX Security '17 | Yue Chen, Yulong Zhang, Zhi Wang, Liangzhao Xia, Chenfu Bao, Tao Wei |
| Neural Nets Can Learn Function Type Signatures From Binaries | USENIX Security '17 | Zheng Leong Chua, Shiqi Shen, Prateek Saxena, Zhenkai Liang |
| Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers | USENIX Security '17 | Thurston H.Y. Dang, Petros Maniatis, David Wagner |
| Efficient Protection of Path-Sensitive Control Security | USENIX Security '17 | Ren Ding, Chenxiong Qian, Chengyu Song, Bill Harris, Taesoo Kim, Wenke Lee |
| Prime+Abort: A Timer-Free High-Precision L3 Cache Attack using Intel TSX | USENIX Security '17 | Craig Disselkoen, David Kohlbrenner, Leo Porter, Dean Tullsen |
| Ensuring Authorized Updates in Multi-user Database-Backed Applications | USENIX Security '17 | Kevin Eykholt, Atul Prakash, Barzan Mozafari |
| Measuring HTTPS Adoption on the Web | USENIX Security '17 | Adrienne Porter Felt, Richard Barnes, April King, Chris Palmer, Chris Bentzel, Parisa Tabriz |