| 2013 | A Cryptographic Analysis of OPACITY - (Extended Abstract). Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni, Giorgia Azzurra Marson, Arno Mittelbach, Cristina Onete |
| 2013 | A Quantitative Evaluation of Privilege Separation in Web Browser Designs. Xinshu Dong, Hong Hu, Prateek Saxena, Zhenkai Liang |
| 2013 | ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila |
| 2013 | AnDarwin: Scalable Detection of Semantically Similar Android Applications. Jonathan Crussell, Clint Gibler, Hao Chen |
| 2013 | Automated Certification of Authorisation Policy Resistance. Andreas Griesmayer, Charles Morisset |
| 2013 | Automated Security Proofs for Almost-Universal Hash for MAC Verification. Martin Gagné, Pascal Lafourcade, Yassine Lakhnech |
| 2013 | BISTRO: Binary Component Extraction and Embedding for Software Security Applications. Zhui Deng, Xiangyu Zhang, Dongyan Xu |
| 2013 | Ballot Secrecy and Ballot Independence Coincide. Ben Smyth, David Bernhard |
| 2013 | Bounded Memory Protocols and Progressing Collaborative Systems. Max I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov |
| 2013 | CellFlood: Attacking Tor Onion Routers on the Cheap. Marco Valerio Barbera, Vasileios P. Kemerlis, Vasilis Pappas, Angelos D. Keromytis |
| 2013 | Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings Jason Crampton, Sushil Jajodia, Keith Mayes |
| 2013 | Current Events: Identifying Webpages by Tapping the Electrical Outlet. Shane S. Clark, Hossen Asiful Mustafa, Benjamin Ransford, Jacob Sorber, Kevin Fu, Wenyuan Xu |
| 2013 | Data-Confined HTML5 Applications. Devdatta Akhawe, Frank Li, Warren He, Prateek Saxena, Dawn Song |
| 2013 | Distributed Shuffling for Preserving Access Confidentiality. Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati |
| 2013 | Efficient Privacy-Enhanced Familiarity-Based Recommender System. Arjan Jeckmans, Andreas Peter, Pieter H. Hartel |
| 2013 | Election Verifiability or Ballot Privacy: Do We Need to Choose? Edouard Cuvelier, Olivier Pereira, Thomas Peters |
| 2013 | Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling. Deian Stefan, Pablo Buiras, Edward Z. Yang, Amit Levy, David Terei, Alejandro Russo, David Mazières |
| 2013 | Enforcing Privacy in the Presence of Others: Notions, Formalisations and Relations. Naipeng Dong, Hugo Jonker, Jun Pang |
| 2013 | Ensuring File Authenticity in Private DFA Evaluation on Encrypted Files in the Cloud. Lei Wei, Michael K. Reiter |
| 2013 | Estimating Asset Sensitivity by Profiling Users. Youngja Park, Christopher S. Gates, Stephen C. Gates |
| 2013 | Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption. Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Jianfeng Ma, Wenjing Lou |
| 2013 | Formal Approach for Route Agility against Persistent Attackers. Jafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan |
| 2013 | HI-CFG: Construction by Binary Analysis and Application to Attack Polymorphism. Dan Caselden, Alex Bazhanyuk, Mathias Payer, Stephen McCamant, Dawn Song |
| 2013 | KQguard: Binary-Centric Defense against Kernel Queue Injection Attacks. Jinpeng Wei, Feng Zhu, Calton Pu |
| 2013 | Managing the Weakest Link - A Game-Theoretic Approach for the Mitigation of Insider Threats. Aron Laszka, Benjamin Johnson, Pascal Schöttle, Jens Grossklags, Rainer Böhme |
| 2013 | Measuring and Detecting Malware Downloads in Live Network Traffic. Phani Vadrevu, Babak Rahbarinia, Roberto Perdisci, Kang Li, Manos Antonakakis |
| 2013 | Mining Malware Specifications through Static Reachability Analysis. Hugo Daniel Macedo, Tayssir Touili |
| 2013 | Nowhere to Hide: Navigating around Privacy in Online Social Networks. Mathias Humbert, Théophile Studer, Matthias Grossglauser, Jean-Pierre Hubaux |
| 2013 | Patrol: Revealing Zero-Day Attack Paths through Network-Wide System Object Dependencies. Jun Dai, Xiaoyan Sun, Peng Liu |
| 2013 | Plug-and-Play IP Security - Anonymity Infrastructure instead of PKI. Yossi Gilad, Amir Herzberg |
| 2013 | Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits. Ivan Damgård, Marcel Keller, Enrique Larraia, Valerio Pastro, Peter Scholl, Nigel P. Smart |
| 2013 | Practical Secure Logging: Seekable Sequential Key Generators. Giorgia Azzurra Marson, Bertram Poettering |
| 2013 | Practical and Employable Protocols for UC-Secure Circuit Evaluation over ℤn. Jan Camenisch, Robert R. Enderlein, Victor Shoup |
| 2013 | Privacy-Preserving Accountable Computation. Michael Backes, Dario Fiore, Esfandiar Mohammadi |
| 2013 | Privacy-Preserving Matching of Community-Contributed Content. Mishari Al Mishari, Paolo Gasti, Gene Tsudik, Ekin Oguz |
| 2013 | Privacy-Preserving User Data Oriented Services for Groups with Dynamic Participation. Dmitry Kononchuk, Zekeriya Erkin, Jan C. A. van der Lubbe, Reginald L. Lagendijk |
| 2013 | Purpose Restrictions on Information Use. Michael Carl Tschantz, Anupam Datta, Jeannette M. Wing |
| 2013 | Range Extension Attacks on Contactless Smart Cards. Yossef Oren, Dvir Schirman, Avishai Wool |
| 2013 | Request-Based Comparable Encryption. Jun Furukawa |
| 2013 | Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract). Limin Jia, Jassim Aljuraidan, Elli Fragkaki, Lujo Bauer, Michael Stroucken, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake |
| 2013 | Symbolic Probabilistic Analysis of Off-Line Guessing. Bruno Conchinha, David A. Basin, Carlos Caleiro |
| 2013 | Universally Composable Key-Management. Steve Kremer, Robert Künnemann, Graham Steel |
| 2013 | Verifying Web Browser Extensions' Compliance with Private-Browsing Mode. Benjamin S. Lerner, Liam Elberty, Neal Poole, Shriram Krishnamurthi |
| 2013 | Vulnerable Delegation of DNS Resolution. Amir Herzberg, Haya Schulmann |