| 2003 | 19th Annual Computer Security Applications Conference (ACSAC 2003), 8-12 December 2003, Las Vegas, NV, USA |
| 2003 | A Failure to Learn from the Past. Eugene H. Spafford |
| 2003 | A Multi-View Tool for Checking the Security Semantics of Router Configurations. Holger Peine, Reinhard Schwarz |
| 2003 | A Policy Validation Framework for Enterprise Authorization Specification. Ramaswamy Chandramouli |
| 2003 | A Stateful Intrusion Detection System for World-Wide Web Servers. Giovanni Vigna, William K. Robertson, Vishal Kher, Richard A. Kemmerer |
| 2003 | An Editor for Adaptive XML-Based Policy Management of IPsec. Raj Mohan, Timothy E. Levin, Cynthia E. Irvine |
| 2003 | An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems. Darren Mutz, Giovanni Vigna, Richard A. Kemmerer |
| 2003 | An IP Traceback Technique against Denial-of-Service Attacks. Zhaole Chen, Moon-Chuen Lee |
| 2003 | An Intrusion-Tolerant Password Authentication System. Xunhua Wang, Mohammad Hossain Heydari, Hua Lin |
| 2003 | Attack Signature Matching and Discovery in Systems Employing Heterogeneous IDS. Nathan Carey, George M. Mohay, Andrew J. Clark |
| 2003 | Automated Analysis for Digital Forensic Science: Semantic Integrity Checking. Tye Stallard, Karl N. Levitt |
| 2003 | Automatic Reassembly of Document Fragments via Context Based Statistical Models. Kulesh Shanmugasundaram, Nasir D. Memon |
| 2003 | Bayesian Event Classification for Intrusion Detection. Christopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur |
| 2003 | Behavioral Authentication of Server Flows. James P. Early, Carla E. Brodley, Catherine Rosenberg |
| 2003 | Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS. Yu-Sung Wu, Bingrui Foo, Yongguo Mei, Saurabh Bagchi |
| 2003 | Defending Embedded Systems Against Buffer Overflow via Hardware/Software. Zili Shao, Qingfeng Zhuge, Yi He, Edwin Hsing-Mean Sha |
| 2003 | Design, Implementation and Test of an Email Virus Throttle. Matthew M. Williamson |
| 2003 | Differential Data Protection for Dynamic Distributed Application. Patrick M. Widener, Karsten Schwan, Fabián E. Bustamante |
| 2003 | Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs. Steven Noel, Sushil Jajodia, Brian O'Berry, Michael Jacobs |
| 2003 | Experimenting with a Policy-Based HIDS Based on an Information Flow Control Model. Jacob Zimmermann, Ludovic Mé, Christophe Bidan |
| 2003 | Forum Session: Security for Wireless Sensor Networks. David Carman, Daniel Coffin, Bruno Dutertre, Vipin Swarup, Ronald J. Watro |
| 2003 | Goalkeeper: Close-In Interface Protection. Stephen D. Wolthusen |
| 2003 | Honeypots: Catching the Insider Threat. Lance Spitzner |
| 2003 | How to unwittingly sign non-repudiable documents with Java applications. Danilo Bruschi, D. Fabris, V. Glave, Emilia Rosti |
| 2003 | Intrusion Detection: A Bioinformatics Approach. Scott E. Coull, Joel W. Branch, Boleslaw K. Szymanski, Eric Breimer |
| 2003 | Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs. Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar |
| 2003 | Log Correlation for Intrusion Detection: A Proof of Concept. Cristina L. Abad, Jed Taylor, Cigdem Sengul, William Yurcik, Yuanyuan Zhou, Kenneth E. Rowe |
| 2003 | MLS-PCA: A High Assurance Security Architecture for Future Avionics. Clark Weissman |
| 2003 | Making Secure TCP Connections Resistant to Server Failures. Hailin Wu, Andrew Burt, Ramki Thurimella |
| 2003 | Miracle Cures and Toner Cartridges: Finding Solutions to the Spam Problem. Michael Clifford, Daniel Faigin, Matt Bishop, Tasneem G. Brutch |
| 2003 | Modeling of Multiple Agent based Cryptographic Key Recovery Protocol. Shinyoung Lim, Sangseung Kang, Joo-Chan Sohn |
| 2003 | Modelling Contexts in the Or-BAC Model. Frédéric Cuppens, Alexandre Miège |
| 2003 | Multi-Version Attack Recovery for Workflow System. Meng Yu, Peng Liu, Wanyu Zang |
| 2003 | PSOS Revisited. Peter G. Neumann, Richard J. Feiertag |
| 2003 | Poly2 Paradigm: A Secure Network Service Architecture. Eric Bryant, James P. Early, Rajeev Gopalakrishna, Gregory Roth, Eugene H. Spafford, Keith Watson, Paul Williams, Scott Yost |
| 2003 | Practical Random Number Generation in Software. John Viega |
| 2003 | Protecting Personal Data: Can IT Security Management Standards Help? Giovanni Iachello |
| 2003 | S-ARP: a Secure Address Resolution Protocol. Danilo Bruschi, A. Ornaghi, Emilia Rosti |
| 2003 | Scalable and Efficient PKI for Inter-Organizational Communication. Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan Willemson |
| 2003 | Security Analysis of the SAML Single Sign-on Browser/Artifact Profile. Thomas Groß |
| 2003 | Security Design in Online Games. Jeff Jianxin Yan |
| 2003 | Synthesizing Test Data for Fraud Detection Systems. Emilie Lundin Barse, Håkan Kvarnström, Erland Jonsson |
| 2003 | Themes and Highlights of the New Security Paradigms Workshop 2003. O. Sami Saydjari, Carla Marceau |
| 2003 | Usable Access Control for the World Wide Web. Dirk Balfanz |