| 2014 | A Password Manager that Doesn't Remember Passwords. Elizabeth Stobert, Robert Biddle |
| 2014 | An Asset to Security Modeling?: Analyzing Stakeholder Collaborations Instead of Threats to Assets. Andreas Poller, Sven Türpe, Katharina Kinder-Kurlanda |
| 2014 | Cyber Security as Social Experiment. Wolter Pieters, Dina Hadziosmanovic, Francien Dechesne |
| 2014 | Data Is the New Currency. Carrie Gates, Peter Matthews |
| 2014 | Emergent Properties & Security: The Complexity ofSecurity as a Science. Nathaniel Husted, Steven A. Myers |
| 2014 | I'm OK, You're OK, the System's OK: Normative Security for Systems. Olgierd Pieczul, Simon N. Foley, Vivien M. Rooney |
| 2014 | Isn't that Fantabulous: Security, Linguistic and Usability Challenges of Pronounceable Tokens. Andrew M. White, Katherine Shaw, Fabian Monrose, Elliott Moreton |
| 2014 | Panel Summary: The Future of Software Regulation. Benjamin Edwards, Michael E. Locasto, Jeremy Epstein |
| 2014 | Planning and Integrating Deception into Computer Security Defenses. Mohammed H. Almeshekah, Eugene H. Spafford |
| 2014 | Proceedings of the 2014 workshop on New Security Paradigms Workshop, Victoria, BC, Canada, September 15-18, 2014 Konstantin Beznosov, Anil Somayaji, Tom Longstaff, Paul C. van Oorschot |
| 2014 | Shifts in the Cybersecurity Paradigm: Zero-Day Exploits, Discourse, and Emerging Institutions. Andreas Kuehn, Milton Mueller |
| 2014 | Understanding the Experience-Centeredness of Privacy and Security Technologies. Paul Dunphy, John Vines, Lizzie Coles-Kemp, Rachel Clarke, Vasillis Vlachokyriakos, Peter C. Wright, John C. McCarthy, Patrick Olivier |
| 2014 | Vulnerabilities as Blind Spots in Developer's Heuristic-Based Decision-Making Processes. Justin Cappos, Yanyan Zhuang, Daniela Oliveira, Marissa Rosenthal, Kuo-Chuan (Martin) Yeh |