| 2013 | A building code for building code: putting what we know works to work. Carl E. Landwehr |
| 2013 | A comprehensive black-box methodology for testing the forensic characteristics of solid-state drives. Gabriele Bonetti, Marco Viglione, Alessandro Frossi, Federico Maggi, Stefano Zanero |
| 2013 | A portable user-level approach for system-wide integrity protection. Wai-Kit Sze, R. Sekar |
| 2013 | AFrame: isolating advertisements from mobile applications in Android. Xiao Zhang, Amit Ahlawat, Wenliang Du |
| 2013 | Annual Computer Security Applications Conference, ACSAC '13, New Orleans, LA, USA, December 9-13, 2013 Charles N. Payne Jr. |
| 2013 | Auto-FBI: a user-friendly approach for secure access to sensitive content on the web. Mohsen Zohrevandi, Rida A. Bazzi |
| 2013 | Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks. Ting-Fang Yen, Alina Oprea, Kaan Onarlioglu, Todd Leetham, William K. Robertson, Ari Juels, Engin Kirda |
| 2013 | CPS: an efficiency-motivated attack against autonomous vehicular transportation. Ryan M. Gerdes, Chris Winstead, Kevin P. Heaslip |
| 2013 | CPS: stateful policy enforcement for control system device usage. Stephen E. McLaughlin |
| 2013 | Control-flow restrictor: compiler-based CFI for iOS. Jannik Pewny, Thorsten Holz |
| 2013 | Crossover: secure and usable user interface for mobile devices with multiple isolated OS personalities. Matthias Lange, Steffen Liebergeld |
| 2013 | DR BACA: dynamic role based access control for Android. Felix Rohrer, Yuting Zhang, Lou Chitkushev, Tanya Zlateva |
| 2013 | DUET: integration of dynamic and static analyses for malware clustering with cluster ensembles. Xin Hu, Kang G. Shin |
| 2013 | Discovery of emergent malicious campaigns in cellular networks. Nathaniel Boggs, Wei Wang, Suhas Mathur, Baris Coskun, Carol Pincock |
| 2013 | Do I know you?: efficient and privacy-preserving common friend-finder protocols and applications. Marcin Nagy, Emiliano De Cristofaro, Alexandra Dmitrienko, N. Asokan, Ahmad-Reza Sadeghi |
| 2013 | Extraction of statistically significant malware behaviors. Sirinda Palahan, Domagoj Babic, Swarat Chaudhuri, Daniel Kifer |
| 2013 | FireDroid: hardening security in almost-stock Android. Giovanni Russello, Arturo Blas Jimenez, Habib Naderi, Wannes van der Mark |
| 2013 | GPU and CPU parallelization of honest-but-curious secure two-party computation. Nathaniel Husted, Steven A. Myers, Abhi Shelat, Paul Grubbs |
| 2013 | Implementation and implications of a stealth hard-drive backdoor. Jonas Zaddach, Anil Kurmus, Davide Balzarotti, Erik-Oliver Blass, Aurélien Francillon, Travis Goodspeed, Moitrayee Gupta, Ioannis Koltsidas |
| 2013 | Message in a bottle: sailing past censorship. Luca Invernizzi, Christopher Kruegel, Giovanni Vigna |
| 2013 | MyCloud: supporting user-configured privacy protection in cloud computing. Min Li, Wanyu Zang, Kun Bai, Meng Yu, Peng Liu |
| 2013 | No attack necessary: the surprising dynamics of SSL trust relationships. B. Amann, Robin Sommer, Matthias Vallentin, Seth Hall |
| 2013 | PRIME: private RSA infrastructure for memory-less encryption. Behrad Garmany, Tilo Müller |
| 2013 | PatchDroid: scalable third-party security patches for Android devices. Collin Mulliner, Jon Oberheide, William K. Robertson, Engin Kirda |
| 2013 | Pitfalls in the automated strengthening of passwords. David Schmidt, Trent Jaeger |
| 2013 | Revisiting graphical passwords for augmenting, not replacing, text passwords. Murat Akpulat, Kemal Bicakci, Ugur Cil |
| 2013 | SPIDER: stealthy binary program instrumentation and debugging via hardware virtualization. Zhui Deng, Xiangyu Zhang, Dongyan Xu |
| 2013 | Seeing is not believing: visual verifications through liveness analysis using mobile devices. Mahmudur Rahman, Umut Topkara, Bogdan Carbunar |
| 2013 | SigMal: a static signal processing based malware triage. Dhilung Kirat, Lakshmanan Nataraj, Giovanni Vigna, B. S. Manjunath |
| 2013 | SilverLine: preventing data leaks from compromised web applications. Yogesh Mundada, Anirudh Ramachandran, Nick Feamster |
| 2013 | Socket overloading for fun and cache-poisoning. Amir Herzberg, Haya Schulmann |
| 2013 | Subverting system authentication with context-aware, reactive virtual machine introspection. Yangchun Fu, Zhiqiang Lin, Kevin W. Hamlen |
| 2013 | Systems thinking for safety and security. William Young, Nancy G. Leveson |
| 2013 | The man who Iasonas Polakis, Stamatis Volanis, Elias Athanasopoulos, Evangelos P. Markatos |
| 2013 | Uncovering access control weaknesses and flaws with security-discordant software clones. François Gauthier, Thierry Lavoie, Ettore Merlo |
| 2013 | Validating web content with senser. Jordan Wilberding, Andrew Yates, Micah Sherr, Wenchao Zhou |
| 2013 | k-subscription: privacy-preserving microblogging browsing through obfuscation. Panagiotis Papadopoulos, Antonis Papadogiannakis, Michalis Polychronakis, Apostolis Zarras, Thorsten Holz, Evangelos P. Markatos |