| 2014 | A Comparative Evaluation of Implicit Authentication Schemes. Hassan Khan, Aaron Atwater, Urs Hengartner |
| 2014 | A Lightweight Formal Approach for Analyzing Security of Web Protocols. Apurva Kumar |
| 2014 | Count Me In: Viable Distributed Summary Statistics for Securing High-Speed Networks. Johanna Amann, Seth Hall, Robin Sommer |
| 2014 | Dynamic Reconstruction of Relocation Information for Stripped Binaries. Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis |
| 2014 | Evaluating the Effectiveness of Current Anti-ROP Defenses. Felix Schuster, Thomas Tendyck, Jannik Pewny, Andreas Maaß, Martin Steegmanns, Moritz Contag, Thorsten Holz |
| 2014 | Eyes of a Human, Eyes of a Program: Leveraging Different Views of the Web for Analysis and Detection. Jacopo Corbetta, Luca Invernizzi, Christopher Krügel, Giovanni Vigna |
| 2014 | Formal Analysis of Security Procedures in LTE - A Feasibility Study. Noomene Ben Henda, Karl Norrman |
| 2014 | GoldenEye: Efficiently and Effectively Unveiling Malware's Targeted Environment. Zhaoyan Xu, Jialong Zhang, Guofei Gu, Zhiqiang Lin |
| 2014 | Measuring Drive-by Download Defense in Depth. Nathaniel Boggs, Senyao Du, Salvatore J. Stolfo |
| 2014 | On Emulation-Based Network Intrusion Detection Systems. Ali Abbasi, Jos Wetzels, Wouter Bokslag, Emmanuele Zambon, Sandro Etalle |
| 2014 | Paint It Black: Evaluating the Effectiveness of Malware Blacklists. Marc Kührer, Christian Rossow, Thorsten Holz |
| 2014 | PillarBox: Combating Next-Generation Malware with Fast Forward-Secure Logging. Kevin D. Bowers, Catherine Hart, Ari Juels, Nikos Triandopoulos |
| 2014 | Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel. Yinzhi Cao, Yan Shoshitaishvili, Kevin Borgolte, Christopher Krügel, Giovanni Vigna, Yan Chen |
| 2014 | Quantitative Evaluation of Dynamic Platform Techniques as a Defensive Mechanism. Hamed Okhravi, James Riordan, Kevin M. Carter |
| 2014 | Research in Attacks, Intrusions and Defenses - 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings Angelos Stavrou, Herbert Bos, Georgios Portokalidis |
| 2014 | Run Away If You Can: - Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks. Il-Gu Lee, Hyunwoo Choi, Yongdae Kim, Seungwon Shin, Myungchul Kim |
| 2014 | Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the Wild. Kartik Nayak, Daniel Marino, Petros Efstathopoulos, Tudor Dumitras |
| 2014 | Synthetic Data Generation and Defense in Depth Measurement of Web Applications. Nathaniel Boggs, Hang Zhao, Senyao Du, Salvatore J. Stolfo |
| 2014 | Towards a Masquerade Detection System Based on User's Tasks. José Benito Camiña, Jorge Rodríguez-Ruiz, Raúl Monroy |
| 2014 | Unsupervised Anomaly-Based Malware Detection Using Hardware Features. Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo |
| 2014 | Wait a Minute! A fast, Cross-VM Attack on AES. Gorka Irazoqui Apecechea, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar |
| 2014 | Why Is CSP Failing? Trends and Challenges in CSP Adoption. Michael Weissbacher, Tobias Lauinger, William K. Robertson |
| 2014 | You Can't Be Me: Enabling Trusted Paths and User Sub-origins in Web Browsers. Enrico Budianto, Yaoqi Jia, Xinshu Dong, Prateek Saxena, Zhenkai Liang |