| Qapla: Policy compliance for database-backed systems | USENIX Security '17 | Aastha Mehta, Eslam Elnikety, Katura Harvey, Deepak Garg, Peter Druschel |
| BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking | USENIX Security '17 | Jiang Ming, Dongpeng Xu, Yufei Jiang, Dinghao Wu |
| Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and More | USENIX Security '17 | Peter Ney, Karl Koscher, Lee Organick, Luis Ceze, Tadayoshi Kohno |
| CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds | USENIX Security '17 | Kirill Nikitin, Eleftherios Kokoris-Kogias, Philipp Jovanovic, Nicolas Gailly, Linus Gasser, Ismail Khoffi, Justin Cappos, Bryan Ford |
| Ninja: Towards Transparent Tracing and Debugging on ARM | USENIX Security '17 | Zhenyu Ning, Fengwei Zhang |
| TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication | USENIX Security '17 | Mark O'Neill, Scott Heidbrink, Scott Ruoti, Jordan Whitehead, Dan Bunker, Luke Dickinson, Travis Hendershot, Joshua Reynolds, Kent Seamons, Daniel Zappala |
| Digtool: A Virtualization-Based Framework for Detecting Kernel Vulnerabilities | USENIX Security '17 | Jianfeng Pan, Guanglu Yan, Xiaocao Fan |
| Global Measurement of DNS Manipulation | USENIX Security '17 | Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nick Weaver, Vern Paxson |
| AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings | USENIX Security '17 | Giuseppe Petracca, Ahmad-Atamli Reineh, Yuqiong Sun, Jens Grossklags, Trent Jaeger |
| ORide: A Privacy-Preserving yet Accountable Ride-Hailing Service | USENIX Security '17 | Anh Pham, Italo Dacosta, Guillaume Endignoux, Juan Ramon Troncoso Pastoriza, Kevin Huguenin, Jean-Pierre Hubaux |
| The Loopix Anonymity System | USENIX Security '17 | Ania M. Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, George Danezis |
| Exploring User Perceptions of Discrimination in Online Targeted Advertising | USENIX Security '17 | Angelisa C. Plane, Elissa M. Redmiles, Michelle L. Mazurek, Michael Carl Tschantz |
| AuthentiCall: Efficient Identity and Content Authentication for Phone Calls | USENIX Security '17 | Bradley Reaves, Logan Blue, Hadi Abdullah, Luis Vargas, Patrick Traynor, Thomas Shrimpton |
| BootStomp: On the Security of Bootloaders in Mobile Devices | USENIX Security '17 | Nilo Redini, Aravind Machiry, Dipanjan Das, Yanick Fratantonio, Antonio Bianchi, Eric Gustafson, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna |
| Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies | USENIX Security '17 | Iskander Sanchez-Rola, Igor Santos, Davide Balzarotti |
| kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels | USENIX Security '17 | Sergej Schumilo, Cornelius Aschermann, Robert Gawlik, Sebastian Schinzel, Thorsten Holz |
| Same-Origin Policy: Evaluation in Modern Browsers | USENIX Security '17 | Jörg Schwenk, Marcus Niemietz, Christian Mainka |
| 6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices | USENIX Security '17 | Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac |
| Characterizing the Nature and Dynamics of Tor Exit Blocking | USENIX Security '17 | Rachee Singh, Rishab Nithyanand, Sadia Afroz, Paul Pearce, Michael Carl Tschantz, Phillipa Gill, Vern Paxson |
| Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions | USENIX Security '17 | Marc Stevens, Daniel Shumow |
| How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security | USENIX Security '17 | Ben Stock, Martin Johns, Marius Steffens, Michael Backes |
| USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs | USENIX Security '17 | Yang Su, Daniel Genkin, Damith Ranasinghe, Yuval Yarom |
| SmartAuth: User-Centered Authorization for the Internet of Things | USENIX Security '17 | Yuan Tian, Nan Zhang, Yueh-Hsun Lin, Xiaofeng Wang, Blase Ur, Xianzheng Guo, Patrick Tague |
| Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution | USENIX Security '17 | Jo Van Bulck, Nico Weichbrodt, Rüdiger Kapitza, Frank Piessens, Raoul Strackx |
| Locally Differentially Private Protocols for Frequency Estimation | USENIX Security '17 | Tianhao Wang, Jeremiah Blocki, Ninghui Li, Somesh Jha |