| 2003 | A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention. John Wilander, Mariam Kamkar |
| 2003 | A Virtual Machine Introspection Based Architecture for Intrusion Detection. Tal Garfinkel, Mendel Rosenblum |
| 2003 | Access Control Based on Execution History. Martín Abadi, Cédric Fournet |
| 2003 | Detecting Service Violations and DoS Attacks. Ahsan Habib, Mohamed Hefeeda, Bharat K. Bhargava |
| 2003 | Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks. Donggang Liu, Peng Ning |
| 2003 | Efficient Multicast Packet Authentication. Alain Pannetrat, Refik Molva |
| 2003 | Efficient Security Mechanisms for Routing Protocolsa. Yih-Chun Hu, Adrian Perrig, David B. Johnson |
| 2003 | Fighting Spam by Encapsulating Policy in Email Addresses. John Ioannidis |
| 2003 | Integrating Security, Mobility and Multi-Homing in a HIP Way. Pekka Nikander, Jukka Ylitalo, Jorma Wall |
| 2003 | Moderately Hard, Memory-Bound Functions. Martín Abadi, Michael Burrows, Ted Wobber |
| 2003 | Proactive Two-Party Signatures for User Authentication. Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis, David Mazières |
| 2003 | Proceedings of the Network and Distributed System Security Symposium, NDSS 2003, San Diego, California, USA |
| 2003 | Proxy Cryptography Revisited. Anca-Andreea Ivan, Yevgeniy Dodis |
| 2003 | Secure IP Telephony using Multi-layered Protection. Brennen Reynolds, Dipak Ghosal |
| 2003 | SiRiUS: Securing Remote Untrusted Storage. Eu-Jin Goh, Hovav Shacham, Nagendra Modadugu, Dan Boneh |
| 2003 | Testing C Programs for Buffer Overflow Vulnerabilities. Eric Haugh, Matt Bishop |
| 2003 | Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools. Tal Garfinkel |
| 2003 | Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing. Geoffrey Goodell, William Aiello, Timothy Griffin, John Ioannidis, Patrick D. McDaniel, Aviel D. Rubin |