| 2022 | "It may be a pain in the backside but..." Insights into the resilience of business after GDPR. Gerard Buckley, Tristan Caulfield, Ingolf Becker |
| 2022 | Autonomous Vehicle Security: Composing Attack, Defense, and Policy Surfaces. Michael Clifford, Miriam Heller, Karl N. Levitt, Matt Bishop |
| 2022 | Cybersecurity Regrets: I've had a few.... Je Ne Regrette. Karen Renaud, Rosalind Searle, Marc J. Dupuis |
| 2022 | Designing Through The Stack: The Case for a Participatory Digital Security By Design. Ian Slesinger, Lizzie Coles-Kemp, Niki Panteli, René Rydhof Hansen |
| 2022 | From Utility to Capability: A New Paradigm to Conceptualize and Develop Inclusive PETs. Partha Das Chowdhury, Andrés Domínguez Hernández, Kopo Marvin Ramokapane, Awais Rashid |
| 2022 | Incidental Incremental In-Band Fingerprint Verification: a Novel Authentication Ceremony for End-to-End Encrypted Messaging. Nathan Malkin |
| 2022 | Passwords and Cryptwords: The Final Limits on Lengths. Michael Clark, Kent E. Seamons |
| 2022 | Proceedings of the 2022 New Security Paradigms Workshop, NSPW 2022, North Conway, NH, USA, October 24-27, 2022 |
| 2022 | Side Auth: Synthesizing Virtual Sensors for Authentication. Yan Long, Kevin Fu |
| 2022 | Toward User Control over Information Access: A Sociotechnical Approach. Caleb Malchik, Joan Feigenbaum |
| 2022 | Transparency, Compliance, And Contestability When Code Is(n't) Law. Alexander Hicks |