| 2003 | A Simple Language for Real-Time Cryptographic Protocol Analysis. Roberto Gorrieri, Enrico Locatelli, Fabio Martinelli |
| 2003 | A Tail-Recursive Semantics for Stack Inspections. John Clements, Matthias Felleisen |
| 2003 | Approximate Pruning in Tabled Logic Programming. Luís Fernando Castro, David Scott Warren |
| 2003 | Automatic Software Model Checking Using CLP. Cormac Flanagan |
| 2003 | Building Certified Libraries for PCC: Dynamic Storage Allocation. Dachuan Yu, Nadeem Abdul Hamid, Zhong Shao |
| 2003 | Computer Security from a Programming Language and Static Analysis Perspective. Xavier Leroy |
| 2003 | Core Formal Molecular Biology. Vincent Danos, Cosimo Laneve |
| 2003 | Correction of Functional Logic Programs. María Alpuente, Demis Ballis, Francisco J. Correa, Moreno Falaschi |
| 2003 | Correctness of Data Representations Involving Heap Data Structures. Uday S. Reddy, Hongseok Yang |
| 2003 | Finite Differencing of Logical Formulas for Static Analysis. Thomas W. Reps, Shmuel Sagiv, Alexey Loginov |
| 2003 | Flexible Models for Dynamic Linking. Sophia Drossopoulou, Giovanni Lagorio, Susan Eisenbach |
| 2003 | Goal-Independent Suspension Analysis for Logic Programs with Dynamic Scheduling. Samir Genaim, Andy King |
| 2003 | Handling Encryption in an Analysis for Secure Information Flow. Peeter Laud |
| 2003 | Modeling Web Interactions. Paul T. Graunke, Robert Bruce Findler, Shriram Krishnamurthi, Matthias Felleisen |
| 2003 | On the Secure Implementation of Security Protocols. Pablo Giambiagi, Mads Dam |
| 2003 | Programming Languages and Systems, 12th European Symposium on Programming, ESOP 2003, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2003, Warsaw, Poland, April 7-11, 2003, Proceedings Pierpaolo Degano |
| 2003 | Programming Type-Safe Program Updates. Martin Erwig, Deling Ren |
| 2003 | Register Allocation by Proof Transformation. Atsushi Ohori |
| 2003 | Requirements on the Execution of Kahn Process Networks. Marc Geilen, Twan Basten |
| 2003 | Rule Formats for Non Interference. Simone Tini |
| 2003 | Security Properties: Two Agents Are Sufficient. Hubert Comon-Lundh, Véronique Cortier |
| 2003 | Tagging, Encoding, and Jones Optimality. Olivier Danvy, Pablo E. Martínez López |
| 2003 | The Rely-Guarantee Method in Isabelle/HOL. Leonor Prensa Nieto |
| 2003 | Type Error Slicing in Implicitly Typed Higher-Order Languages. Christian Haack, Joe B. Wells |
| 2003 | Type Inference for a Distributed pi-Calculus. Cédric Lhoussaine |
| 2003 | Using Controller-Synthesis Techniques to Build Property-Enforcing Layers. Karine Altisen, Aurélie Clodic, Florence Maraninchi, Éric Rutten |
| 2003 | Verifying Temporal Heap Properties Specified via Evolution Logic. Eran Yahav, Thomas W. Reps, Shmuel Sagiv, Reinhard Wilhelm |
| 2003 | What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis. Catherine Meadows |