| 2013 | A Primitive for Revealing Stealthy Peripheral-Based Attacks on the Computing Platform's Main Memory. Patrick Stewin |
| 2013 | API Chaser: Anti-analysis Resistant Malware Analyzer. Yuhei Kawakoya, Makoto Iwamura, Eitaro Shioji, Takeo Hariu |
| 2013 | Active Credential Leakage for Observing Web-Based Attack Cycle. Mitsuaki Akiyama, Takeshi Yagi, Kazufumi Aoki, Takeo Hariu, Youki Kadobayashi |
| 2013 | Behavior Decomposition: Aspect-Level Browser Extension Clustering and Its Security Implications. Bin Zhao, Peng Liu |
| 2013 | Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets. Blaine Stancill, Kevin Z. Snow, Nathan Otterness, Fabian Monrose, Lucas Davi, Ahmad-Reza Sadeghi |
| 2013 | CloudFence: Data Flow Tracking as a Cloud Service. Vasilis Pappas, Vasileios P. Kemerlis, Angeliki Zavou, Michalis Polychronakis, Angelos D. Keromytis |
| 2013 | Connected Colors: Unveiling the Structure of Criminal Networks. Yacin Nadji, Manos Antonakakis, Roberto Perdisci, Wenke Lee |
| 2013 | Deconstructing the Assessment of Anomaly-based Intrusion Detectors. Arun Viswanathan, Kymie Tan, Clifford Neuman |
| 2013 | Deobfuscating Embedded Malware Using Probable-Plaintext Attacks. Christian Wressnegger, Frank Boldewin, Konrad Rieck |
| 2013 | Detecting Traditional Packers, Decisively. Denis Bueno, Kevin J. Compton, Karem A. Sakallah, Michael D. Bailey |
| 2013 | FIRMA: Malware Clustering and Network Signature Generation with Mixed Network Behaviors. M. Zubair Rafique, Juan Caballero |
| 2013 | Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters. Tobias Lauinger, Kaan Onarlioglu, Chaabane Abdelberi, Engin Kirda, William K. Robertson, Mohamed Ali Kâafar |
| 2013 | Hypervisor Memory Forensics. Mariano Graziano, Andrea Lanzi, Davide Balzarotti |
| 2013 | Mobile Malware Detection Based on Energy Fingerprints - A Dead End? Johannes Hoffmann, Stephan Neumann, Thorsten Holz |
| 2013 | Practical Attacks against the I2P Network. Christoph Egger, Johannes Schlumberger, Christopher Kruegel, Giovanni Vigna |
| 2013 | Practical Context-Aware Permission Control for Hybrid Mobile Applications. Kapil Singh |
| 2013 | Research in Attacks, Intrusions, and Defenses - 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings Salvatore J. Stolfo, Angelos Stavrou, Charles V. Wright |
| 2013 | SILVER: Fine-Grained and Transparent Protection Domain Primitives in Commodity OS Kernel. Xi Xiong, Peng Liu |
| 2013 | Server-Side Code Injection Attacks: A Historical Perspective. Jakob Fritz, Corrado Leita, Michalis Polychronakis |
| 2013 | Side-Channel Attacks on the Yubikey 2 One-Time Password Generator. David F. Oswald, Bastian Richter, Christof Paar |
| 2013 | Systematic Analysis of Defenses against Return-Oriented Programming. Richard Skowyra, Kelly Casteel, Hamed Okhravi, Nickolai Zeldovich, William W. Streilein |
| 2013 | Tamper-Resistant LikeJacking Protection. Martin Johns, Sebastian Lekies |
| 2013 | Understanding SMS Spam in a Large Cellular Network: Characteristics, Strategies and Defenses. Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang |