| 2005 | "Diversity as a computer defense mechanism". Bev Littlewood |
| 2005 | Average case vs. worst case: margins of safety in system design. Christian W. Probst, Andreas Gal, Michael Franz |
| 2005 | Diversity as a computer defense mechanism. Carol Taylor, Jim Alves-Foss |
| 2005 | Diversity: the biological perspective position statement. Carol Taylor |
| 2005 | Divide and conquer: the role of trust and assurance in the design of secure socio-technical systems. Ivan Flechais, Jens Riegelsberger, Martina Angela Sasse |
| 2005 | Empirical privilege profiling. Carla Marceau, Robert A. Joyce |
| 2005 | Flooding and recycling authorizations. Konstantin Beznosov |
| 2005 | Internet instability and disturbance: goal or menace? Richard Ford, Mark Bush, Alex Boulatov |
| 2005 | Message authentication by integrity with public corroboration. Paul C. van Oorschot |
| 2005 | Pass-thoughts: authenticating with our minds. Julie Thorpe, Paul C. van Oorschot, Anil Somayaji |
| 2005 | Position paper. Irene Schwarting |
| 2005 | Position: "insider" is relative. Matt Bishop |
| 2005 | Principles-driven forensic analysis. Sean Peisert, Sidney Karin, Matt Bishop, Keith Marzullo |
| 2005 | Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead, California, USA, September 20-23, 2005 Simon N. Foley |
| 2005 | Software diversity: John McHugh |
| 2005 | Speculative virtual verification: policy-constrained speculative execution. Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis |
| 2005 | The insider problem revisited. Matt Bishop |
| 2005 | Use of diversity as a defense mechanism. Roy A. Maxion |
| 2005 | Visual security protocol modeling. John P. McDermott |