| 2014 | A Peered Bulletin Board for Robust Use in Verifiable Voting Systems. Chris Culnane, Steve A. Schneider |
| 2014 | A Sound Abstraction of the Parsing Problem. Sebastian Mödersheim, Georgios Katsoris |
| 2014 | Actor Key Compromise: Consequences and Countermeasures. David A. Basin, Cas Cremers, Marko Horvat |
| 2014 | Additive and Multiplicative Notions of Leakage, and Their Capacities. Mário S. Alvim, Konstantinos Chatzikokolakis, Annabelle McIver, Carroll Morgan, Catuscia Palamidessi, Geoffrey Smith |
| 2014 | Attribute-Based Encryption for Access Control Using Elementary Operations. Jason Crampton, Alexandre Pinto |
| 2014 | Automated Analysis and Synthesis of Block-Cipher Modes of Operation. Alex J. Malozemoff, Jonathan Katz, Matthew D. Green |
| 2014 | Automated Generation of Attack Trees. Roberto Vigo, Flemming Nielson, Hanne Riis Nielson |
| 2014 | Balancing Societal Security and Individual Privacy: Accountable Escrow System. Jia Liu, Mark Dermot Ryan, Liqun Chen |
| 2014 | Certificates for Verifiable Forensics. Radha Jagadeesan, C. M. Lubinski, Corin Pitcher, James Riely, Charles Winebrinner |
| 2014 | Certified Synthesis of Efficient Batch Verifiers. Joseph A. Akinyele, Gilles Barthe, Benjamin Grégoire, Benedikt Schmidt, Pierre-Yves Strub |
| 2014 | Compositional Information-Flow Security for Interactive Systems. Willard Rafnsson, Andrei Sabelfeld |
| 2014 | Decidability for Lightweight Diffie-Hellman Protocols. Daniel J. Dougherty, Joshua D. Guttman |
| 2014 | Declarative Policies for Capability Control. Christos Dimoulas, Scott Moore, Aslan Askarov, Stephen Chong |
| 2014 | Differential Privacy: An Economic Method for Choosing Epsilon. Justin Hsu, Marco Gaboardi, Andreas Haeberlen, Sanjeev Khanna, Arjun Narayan, Benjamin C. Pierce, Aaron Roth |
| 2014 | From Input Private to Universally Composable Secure Multi-party Computation Primitives. Dan Bogdanov, Peeter Laud, Sven Laur, Pille Pullonen |
| 2014 | How Task Familiarity and Cognitive Predispositions Impact Behavior in a Security Game of Timing. Jens Grossklags, David Reitter |
| 2014 | IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014 |
| 2014 | Information Flow Monitoring as Abstract Interpretation for Relational Logic. Andrey Chudnov, George Kuan, David A. Naumann |
| 2014 | Malleable Signatures: New Definitions and Delegatable Anonymous Credentials. Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn |
| 2014 | Mignis: A Semantic Based Tool for Firewall Configuration. Pedro Adão, Claudio Bozzato, G. Dei Rossi, Riccardo Focardi, Flaminia L. Luccio |
| 2014 | Modeling Diffie-Hellman Derivability for Automated Analysis. Moses D. Liskov, F. Javier Thayer |
| 2014 | Noninterference under Weak Memory Models. Heiko Mantel, Matthias Perner, Jens Sauer |
| 2014 | On Dynamic Flow-Sensitive Floating-Label Systems. Pablo Buiras, Deian Stefan, Alejandro Russo |
| 2014 | Portable Software Fault Isolation. Joshua A. Kroll, Gordon Stewart, Andrew W. Appel |
| 2014 | Provably Sound Browser-Based Enforcement of Web Session Integrity. Michele Bugliesi, Stefano Calzavara, Riccardo Focardi, Wilayat Khan, Mauro Tempesta |
| 2014 | Proving Differential Privacy in Hoare Logic. Gilles Barthe, Marco Gaboardi, Emilio Jesús Gallego Arias, Justin Hsu, César Kunz, Pierre-Yves Strub |
| 2014 | Stateful Declassification Policies for Event-Driven Programs. Mathy Vanhoef, Willem De Groef, Dominique Devriese, Frank Piessens, Tamara Rezk |
| 2014 | TUC: Time-Sensitive and Modular Analysis of Anonymous Communication. Michael Backes, Praveen Manoharan, Esfandiar Mohammadi |
| 2014 | The Complexity of Estimating Systematic Risk in Networks. Benjamin Johnson, Aron Laszka, Jens Grossklags |
| 2014 | Who's Afraid of Which Bad Wolf? A Survey of IT Security Risk Awareness. Marian Harbach, Sascha Fahl, Matthew Smith |