| 2013 | Booby trapping software. Stephen Crane, Per Larsen, Stefan Brunthaler, Michael Franz |
| 2013 | Can we sell security like soap?: a new approach to behaviour change. Debi Ashenden, Darren Lawrence |
| 2013 | Designing forensic analysis techniques through anthropology. Sathya Chandran Sundaramurthy |
| 2013 | Detecting hidden enemy lines in IP address space. Suhas Mathur, Baris Coskun, Suhrid Balakrishnan |
| 2013 | Explicit authentication response considered harmful. Lianying Zhao, Mohammad Mannan |
| 2013 | Forgive and forget: return to obscurity. Matt Bishop, Emily Rine Butler, Kevin R. B. Butler, Carrie Gates, Steven Greenspan |
| 2013 | Go with the flow: toward workflow-oriented security assessment. Binbin Chen, Zbigniew Kalbarczyk, David M. Nicol, William H. Sanders, Rui Tan, William G. Temple, Nils Ole Tippenhauer, An Hoa Vu, David K. Y. Yau |
| 2013 | Information behaving badly. Julie Boxwell Ard, Matt Bishop, Carrie Gates, Michael Xin Sun |
| 2013 | Markets for zero-day exploits: ethics and implications. Serge Egelman, Cormac Herley, Paul C. van Oorschot |
| 2013 | NSPHD: the polyglot computer. Daniel Medeiros Nunes de Castro |
| 2013 | New Security Paradigms Workshop, NSPW '13, Banff, AB, Canada, September 9-12, 2013 Mary Ellen Zurko, Konstantin Beznosov, Tara Whalen, Tom Longstaff |
| 2013 | Principles of authentication. Sean Peisert, Edward B. Talbot, Tom M. Kroeger |
| 2013 | Towards narrative authentication: or, against boring authentication. Anil Somayaji, David Mould, Carson Brown |
| 2013 | Towards the realization of a public health system for shared secure cyber-space. Jeff Rowe, Karl N. Levitt, Mike Hogarth |
| 2013 | Useful password hashing: how to waste computing cycles with style. Markus Dürmuth |