| 2014 | "To Share or not to Share" in Client-Side Encrypted Clouds. Duane C. Wilson, Giuseppe Ateniese |
| 2014 | (Pseudo-) Preimage Attacks on Step-Reduced HAS-160 and RIPEMD-160. Gaoli Wang, Yanzhao Shen |
| 2014 | A Practical Hardware-Assisted Approach to Customize Trusted Boot for Mobile Devices. Javier González, Michael Hölzl, Peter Riedl, Philippe Bonnet, René Mayrhofer |
| 2014 | ARBRA: Anonymous Reputation-Based Revocation with Efficient Authentication. Li Xi, Jianxiong Shao, Kang Yang, Dengguo Feng |
| 2014 | Adding Controllable Linkability to Pairing-Based Group Signatures for Free. Daniel Slamanig, Raphael Spreitzer, Thomas Unterluggauer |
| 2014 | An Evaluation of Single Character Frequency-Based Exclusive Signature Matching in Distinct IDS Environments. Weizhi Meng, Wenjuan Li, Lam-for Kwok |
| 2014 | Analyzing Android Browser Apps for file: // Vulnerabilities. Daoyuan Wu, Rocky K. C. Chang |
| 2014 | Attribute-Based Signatures for Circuits from Multilinear Maps. Fei Tang, Hongda Li, Bei Liang |
| 2014 | CodeXt: Automatic Extraction of Obfuscated Attack Code from Memory Dump. Ryan Farley, Xinyuan Wang |
| 2014 | Comprehensive Behavior Profiling for Proactive Android Malware Detection. Britton Wolfe, Karim O. Elish, Danfeng (Daphne) Yao |
| 2014 | Defining Injection Attacks. Donald Ray, Jay Ligatti |
| 2014 | Efficient Attack Forest Construction for Automotive On-board Networks. Martin Salfer, Hendrik Schweppe, Claudia Eckert |
| 2014 | Efficient Secure and Verifiable Outsourcing of Matrix Multiplications. Yihua Zhang, Marina Blanton |
| 2014 | Exploiting the Floating-Point Computing Power of GPUs for RSA. Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Jiwu Jing, Yuan Zhao |
| 2014 | Expressive and Secure Searchable Encryption in the Public Key Setting. Zhiquan Lv, Cheng Hong, Min Zhang, Dengguo Feng |
| 2014 | Fully Secure Self-Updatable Encryption in Prime Order Bilinear Groups. Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay |
| 2014 | Graded Encryption, or How to Play "Who Wants To Be A Millionaire?" Distributively. Aggelos Kiayias, Murat Osmanoglu, Qiang Tang |
| 2014 | Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations. Toomas Krips, Jan Willemson |
| 2014 | Information Security - 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings Sherman S. M. Chow, Jan Camenisch, Lucas Chi Kwong Hui, Siu-Ming Yiu |
| 2014 | Investigating the Hooking Behavior: A Page-Level Memory Monitoring Method for Live Forensics. Yingxin Cheng, Xiao Fu, Bin Luo, Rui Yang, Hao Ruan |
| 2014 | Lightweight Zero-Knowledge Proofs for Crypto-Computing Protocols. Sven Laur, Bingsheng Zhang |
| 2014 | MobiHydra: Pragmatic and Multi-level Plausibly Deniable Encryption Storage for Mobile Devices. Xingjie Yu, Bo Chen, Zhan Wang, Bing Chang, Wen Tao Zhu, Jiwu Jing |
| 2014 | Obfuscation-Based Non-Black-Box Extraction and Constant-Round Zero-Knowledge Arguments of Knowledge. Ning Ding |
| 2014 | On Formally Bounding Information Leakage by Statistical Estimation. Michele Boreale, Michela Paolini |
| 2014 | PAEQ: Parallelizable Permutation-Based Authenticated Encryption. Alex Biryukov, Dmitry Khovratovich |
| 2014 | Reducing User Tracking through Automatic Web Site State Isolations. Martin Stopczynski, Michael Zugelder |
| 2014 | Related-Key Security for Hybrid Encryption. Xianhui Lu, Bao Li, Dingding Jia |
| 2014 | Revised Algorithms for Computing Algebraic Immunity against Algebraic and Fast Algebraic Attacks. Lin Jiao, Bin Zhang, Mingsheng Wang |
| 2014 | SIACHEN: A Fine-Grained Policy Language for the Mitigation of Cross-Site Scripting Attacks. Ashar Javed, Jens Riemer, Jörg Schwenk |
| 2014 | Security Issues in OAuth 2.0 SSO Implementations. Wanpeng Li, Chris J. Mitchell |
| 2014 | Soundsquatting: Uncovering the Use of Homophones in Domain Squatting. Nick Nikiforakis, Marco Balduzzi, Lieven Desmet, Frank Piessens, Wouter Joosen |
| 2014 | Structure Based Data De-Anonymization of Social Networks and Mobility Traces. Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Jing (Selena) He, Raheem A. Beyah |
| 2014 | SystemWall: An Isolated Firewall Using Hardware-Based Memory Introspection. Sebastian Biedermann, Jakub Szefer |
| 2014 | Using Machine Language Model for Mimimorphic Malware Detection. Pinghai Yuan, Qingkai Zeng, Yao Liu |
| 2014 | Winnowing Double Structure for Wildcard Query in Payload Attribution. Yichen Wei, Fei Xu, Xiaojun Chen, Yiguo Pu, Jinqiao Shi, Sihan Qing |
| 2014 | eavesROP: Listening for ROP Payloads in Data Streams. Christopher Jämthagen, Linus Karlsson, Paul Stankovski, Martin Hell |
| 2014 | transAD: An Anomaly Detection Network Intrusion Sensor for the Web. Sharath Hiremagalore, Daniel Barbará, Dan Fleck, Walter Powell, Angelos Stavrou |