| 2016 | A case for the economics of secure software development. Chad Heitzenrater, Andrew C. Simpson |
| 2016 | Content-based security for the web. Alexander Afanasyev, J. Alex Halderman, Scott Ruoti, Kent E. Seamons, Yingdi Yu, Daniel Zappala, Lixia Zhang |
| 2016 | Cross-layer personalization as a first-class citizen for situation awareness and computer infrastructure security. Aokun Chen, Pratik Prabhanjan Brahma, Dapeng Oliver Wu, Natalie C. Ebner, Brandon Matthews, Jedidiah R. Crandall, Xuetao Wei, Michalis Faloutsos, Daniela Oliveira |
| 2016 | Cybersecurity as a Laura Fichtner, Wolter Pieters, André Teixeira |
| 2016 | Harvesting the low-hanging fruits: defending against automated large-scale cyber-intrusions by focusing on the vulnerable population. Hassan Halawa, Konstantin Beznosov, Yazan Boshmaf, Baris Coskun, Matei Ripeanu, Elizeu Santos-Neto |
| 2016 | I'm not sure if we're okay: uncertainty for attackers and defenders. Mark E. Fioravanti II, Matt Bishop, Richard Ford |
| 2016 | Proceedings of the 2016 New Security Paradigms Workshop, NSPW 2016, Granby, Colorado, USA, September 26-29, 2016 Carrie Gates, Rainer Böhme, Mohammad Mannan, Serge Egelman |
| 2016 | Rethinking operating system design: asymmetric multiprocessing for security and performance. Scott Brookes, Stephen Taylor |
| 2016 | Searching for software diversity: attaining artificial diversity through program synthesis. Gilmore R. Lundquist, Vishwath Mohan, Kevin W. Hamlen |
| 2016 | Trusted execution environment-based authentication gauge Ranjbar A. Balisane, Andrew C. Martin |