| How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel | USENIX Security '17 | Pengfei Wang, Jens Krinke, Kai Lu, Gen Li, Steve Dodier-Lazaro |
| Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks | USENIX Security '17 | Tao Wang, Ian Goldberg |
| CacheD: Identifying Cache-Based Timing Channels in Production Software | USENIX Security '17 | Shuai Wang, Pei Wang, Xiao Liu, Danfeng Zhang, Dinghao Wu |
| Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts | USENIX Security '17 | Jun Xu, Dongliang Mu, Xinyu Xing, Peng Liu, Ping Chen, Bing Mao |
| PlatPal: Detecting Malicious Documents with Platform Diversity | USENIX Security '17 | Meng Xu, Taesoo Kim |
| Attacking the Brain: Races in the SDN Control Plane | USENIX Security '17 | Lei Xu, Jeff Huang, Sungmin Hong, Jialong Zhang, Guofei Gu |
| Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART | USENIX Security '17 | Lei Xue, Yajin Zhou, Ting Chen, Xiapu Luo, Guofei Gu |
| Dead Store Elimination (Still) Considered Harmful | USENIX Security '17 | Zhaomo Yang, Brian Johannesmeyer, Anders Trier Olesen, Sorin Lerner, Kirill Levchenko |
| REM: Resource-Efficient Mining for Blockchains | USENIX Security '17 | Fan Zhang, Ittay Eyal, Robert Escriva, Ari Juels, Robbert van Renesse |
| Seeing Through The Same Lens: Introspecting Guest Address Space At Native Speed | USENIX Security '17 | Siqi Zhao, Xuhua Ding, Wen Xu, Dawu Gu |
| A Privacy Analysis of Cross-device Tracking | USENIX Security '17 | Sebastian Zimmeck, Jie S. Li, Hyungtae Kim, Steven M. Bellovin, Tony Jebara |
| Differential Privacy: From Theory to Deployment | USENIX Security '17 | Abhradeep Guha Thakurta |
| OSS-Fuzz - Google's continuous fuzzing service for open source software | USENIX Security '17 | Kostya Serebryany |
| Data Hemorrhage, Inequality, and You: How Technology and Data Flows are Changing the Civil Liberties Game | USENIX Security '17 | Shankar Narayan |
| When Your Threat Model Is "Everything": Defensive Security in Modern Newsrooms | USENIX Security '17 | Erinn Clark |
| An Ant in a World of Grasshoppers | USENIX Security '17 | Ellen Cram Kowalczyk |
| Vale: Verifying High-Performance Cryptographic Assembly Code | USENIX Security '17 | Barry Bond, Chris Hawblitzel, Manos Kapritsos, K. Rustan M. Leino, Jacob R. Lorch, Bryan Parno, Ashay Rane, Srinath Setty, Laure Thompson |
| A Longitudinal, End-to-End View of the DNSSEC Ecosystem | USENIX Security '17 | Taejoong Chung, Roland van Rijswijk-Deij, Balakrishnan Chandrasekaran, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson |
| Detecting Credential Spearphishing in Enterprise Settings | USENIX Security '17 | Grant Ho, Aashish Sharma, Mobin Javed, Vern Paxson, David Wagner |
| MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning | USENIX Security '17 | Shiqing Ma, Juan Zhai, Fei Wang, Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu |
| CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management | USENIX Security '17 | Adrian Tang, Simha Sethumadhavan, Salvatore Stolfo |
| Loophole: Timing Attacks on Shared Event Loops in Chrome | USENIX Security '17 | Pepe Vila, Boris Köpf |
| Performance Superpowers with Enhanced BPF | USENIX ATC '17 | Brendan Gregg |
| Visualizing Performance with Flame Graphs | USENIX ATC '17 | Brendan Gregg |
| Scaling Reliability at Dropbox: Our Journey towards a Distributed Ownership Model | SREcon17 Asia | Sat Kriya Khalsa |