| Constant-Time Callees with Variable-Time Callers | USENIX Security '17 | Cesar Pereida García, Billy Bob Brumley |
| Detecting Android Root Exploits by Learning from Root Providers | USENIX Security '17 | Ioannis Gasparis, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy |
| HELP: Helper-Enabled In-Band Device Pairing Resistant Against Signal Cancellation | USENIX Security '17 | Nirnimesh Ghose, Loukas Lazos, Ming Li |
| AutoLock: Why Cache Attacks on ARM Are Harder Than You Think | USENIX Security '17 | Marc Green, Leandro Rodrigues-Lima, Andreas Zankl, Gorka Irazoqui, Johann Heyszl, Thomas Eisenbarth |
| Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory | USENIX Security '17 | Daniel Gruss, Julian Lettner, Felix Schuster, Olya Ohrimenko, Istvan Haller, Manuel Costa |
| SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data | USENIX Security '17 | Md Nahid Hossain, Sadegh M. Milajerdi, Junao Wang, Birhanu Eshete, Rigel Gjomemo, R. Sekar, Scott Stoller, V.N. Venkatakrishnan |
| vTZ: Virtualizing ARM TrustZone | USENIX Security '17 | Zhichao Hua, Jinyu Gu, Yubin Xia, Haibo Chen, Binyu Zang, Haibing Guan |
| Identifier Binding Attacks and Defenses in Software-Defined Networks | USENIX Security '17 | Samuel Jero, William Koch, Richard Skowyra, Hamed Okhravi, Cristina Nita-Rotaru, David Bigelow |
| Towards Efficient Heap Overflow Discovery | USENIX Security '17 | Xiangkun Jia, Chao Zhang, Purui Su, Yi Yang, Huafeng Huang, Dengguo Feng |
| Transcend: Detecting Concept Drift in Malware Classification Models | USENIX Security '17 | Roberto Jordaney, Kumar Sharad, Santanu K. Dash, Zhi Wang, Davide Papini, Ilia Nouretdinov, Lorenzo Cavallaro |
| On the effectiveness of mitigations against floating-point timing channels | USENIX Security '17 | David Kohlbrenner, Hovav Shacham |
| Reverse Engineering x86 Processor Microcode | USENIX Security '17 | Philipp Koppe, Benjamin Kollenda, Marc Fyrbiak, Christian Kison, Robert Gawlik, Christof Paar, Thorsten Holz |
| "I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS | USENIX Security '17 | Katharina Krombholz, Wilfried Mayer, Martin Schmiedecker, Edgar Weippl |
| Phoenix: Rebirth of a Cryptographic Password-Hardening Service | USENIX Security '17 | Russell W. F. Lai, Christoph Egger, Dominique Schröder, Sherman S. M. Chow |
| CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory | USENIX Security '17 | Ferdinand Brasser, Lucas Davi, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi |
| Hacking in Darkness: Return-oriented Programming against Secure Enclaves | USENIX Security '17 | Jaehyuk Lee, Jinsoo Jang, Yeongjin Jang, Nohyun Kwak, Yeseul Choi, Changho Choi, Taesoo Kim, Marcus Peinado, Brent Byunghoon Kang |
| Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing | USENIX Security '17 | Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, Marcus Peinado |
| DeTor: Provably Avoiding Geographic Regions in Tor | USENIX Security '17 | Zhihao Li, Stephen Herwig, Dave Levin |
| Measuring the Insecurity of Mobile Deep Links of Android | USENIX Security '17 | Fang Liu, Chun Wang, Andres Pico, Danfeng Yao, Gang Wang |
| SmartPool: Practical Decentralized Pooled Mining | USENIX Security '17 | Loi Luu, Yaron Velner, Jason Teutsch, Prateek Saxena |
| DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers | USENIX Security '17 | Aravind Machiry, Chad Spensky, Jake Corina, Nick Stephens, Christopher Kruegel, Giovanni Vigna |
| PDF Mirage: Content Masking Attack Against Information-Based Online Services | USENIX Security '17 | Ian Markwood, Dakun Shen, Yao Liu, Zhuo Lu |
| ROTE: Rollback Protection for Trusted Execution | USENIX Security '17 | Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, Srdjan Capkun |
| Towards Practical Tools for Side Channel Aware Software Engineering: 'Grey Box' Modelling for Instruction Leakages | USENIX Security '17 | David McCann, Elisabeth Oswald, Carolyn Whitnall |
| When the Weakest Link is Strong: Secure Collaboration in the Case of the Panama Papers | USENIX Security '17 | Susan E. McGregor, Elizabeth Anne Watkins, Mahdi Nasrullah Al-Ameen, Kelly Caine, Franziska Roesner |