| 2013 | 2013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley, CA, USA, May 19-22, 2013 |
| 2013 | A Hybrid Architecture for Interactive Verifiable Computation. Victor Vu, Srinath T. V. Setty, Andrew J. Blumberg, Michael Walfish |
| 2013 | A Scanner Darkly: Protecting User Privacy from Perceptual Applications. Suman Jana, Arvind Narayanan, Vitaly Shmatikov |
| 2013 | All Your IFCException Are Belong to Us. Catalin Hritcu, Michael Greenberg, Ben Karel, Benjamin C. Pierce, Greg Morrisett |
| 2013 | Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time. Wenbo Shen, Peng Ning, Xiaofan He, Huaiyu Dai |
| 2013 | An Ideal-Security Protocol for Order-Preserving Encoding. Raluca A. Popa, Frank H. Li, Nickolai Zeldovich |
| 2013 | Anon-Pass: Practical Anonymous Subscriptions. Michael Z. Lee, Alan M. Dunn, Brent Waters, Emmett Witchel, Jonathan Katz |
| 2013 | Caveat Coercitor: Coercion-Evidence in Electronic Voting. Gurchetan S. Grewal, Mark Dermot Ryan, Sergiu Bursuc, Peter Y. A. Ryan |
| 2013 | Circuit Structures for Improving Efficiency of Security and Privacy Tools. Samee Zahur, David Evans |
| 2013 | Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting. Nick Nikiforakis, Alexandros Kapravelos, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna |
| 2013 | Declarative, Temporal, and Practical Programming with Capabilities. William R. Harris, Somesh Jha, Thomas W. Reps, Jonathan Anderson, Robert N. M. Watson |
| 2013 | Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework. Amit Vasudevan, Sagar Chaki, Limin Jia, Jonathan M. McCune, James Newsome, Anupam Datta |
| 2013 | Efficient Garbling from a Fixed-Key Blockcipher. Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi, Phillip Rogaway |
| 2013 | Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures. Zhou Li, Sumayah A. Alrwais, Yinglian Xie, Fang Yu, Xiaofeng Wang |
| 2013 | Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors. Denis Foo Kune, John D. Backes, Shane S. Clark, Daniel B. Kramer, Matthew R. Reynolds, Kevin Fu, Yongdae Kim, Wenyuan Xu |
| 2013 | Hiding Information in Flash Memory. YingLei Wang, Wing-Kei S. Yu, Sarah Q. Xu, Edwin Kan, G. Edward Suh |
| 2013 | Implementing TLS with Verified Cryptographic Security. Karthikeyan Bhargavan, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre-Yves Strub |
| 2013 | Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization. Kevin Z. Snow, Fabian Monrose, Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen, Ahmad-Reza Sadeghi |
| 2013 | Lucky Thirteen: Breaking the TLS and DTLS Record Protocols. Nadhem J. AlFardan, Kenneth G. Paterson |
| 2013 | ObliviStore: High Performance Oblivious Cloud Storage. Emil Stefanov, Elaine Shi |
| 2013 | On Limitations of Friendly Jamming for Confidentiality. Nils Ole Tippenhauer, Luka Malisa, Aanjhan Ranganathan, Srdjan Capkun |
| 2013 | PUFs in Security Protocols: Attack Models and Security Evaluations. Ulrich Rührmair, Marten van Dijk |
| 2013 | Pinocchio: Nearly Practical Verifiable Computation. Bryan Parno, Jon Howell, Craig Gentry, Mariana Raykova |
| 2013 | Practical Control Flow Integrity and Randomization for Binary Executables. Chao Zhang, Tao Wei, Zhaofeng Chen, Lei Duan, Laszlo Szekeres, Stephen McCamant, Dawn Song, Wei Zou |
| 2013 | Practical Timing Side Channel Attacks against Kernel Space ASLR. Ralf Hund, Carsten Willems, Thorsten Holz |
| 2013 | PrivExec: Private Execution as an Operating System Service. Kaan Onarlioglu, Collin Mulliner, William K. Robertson, Engin Kirda |
| 2013 | Privacy-Preserving Ridge Regression on Hundreds of Millions of Records. Valeria Nikolaenko, Udi Weinsberg, Stratis Ioannidis, Marc Joye, Dan Boneh, Nina Taft |
| 2013 | SoK: Eternal War in Memory. Laszlo Szekeres, Mathias Payer, Tao Wei, Dawn Song |
| 2013 | SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets. Christian Rossow, Dennis Andriesse, Tillmann Werner, Brett Stone-Gross, Daniel Plohmann, Christian J. Dietrich, Herbert Bos |
| 2013 | SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements. Jeremy Clark, Paul C. van Oorschot |
| 2013 | SoK: Secure Data Deletion. Joel Reardon, David A. Basin, Srdjan Capkun |
| 2013 | SoK: The Evolution of Sybil Defense via Social Networks. Lorenzo Alvisi, Allen Clement, Alessandro Epasto, Silvio Lattanzi, Alessandro Panconesi |
| 2013 | The Crossfire Attack. Min Suk Kang, Soo Bum Lee, Virgil D. Gligor |
| 2013 | The Parrot Is Dead: Observing Unobservable Network Communications. Amir Houmansadr, Chad Brubaker, Vitaly Shmatikov |
| 2013 | Towards Practical Reactive Security Audit Using Extended Static Checkers. Julien Vanegue, Shuvendu K. Lahiri |
| 2013 | Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization. Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann |
| 2013 | Welcome to the Entropics: Boot-Time Entropy in Embedded Devices. Keaton Mowery, Michael Yung Chung Wei, David Kohlbrenner, Hovav Shacham, Steven Swanson |
| 2013 | Zerocoin: Anonymous Distributed E-Cash from Bitcoin. Ian Miers, Christina Garman, Matthew Green, Aviel D. Rubin |
| 2013 | seL4: From General Purpose to a Proof of Information Flow Enforcement. Toby C. Murray, Daniel Matichuk, Matthew Brassil, Peter Gammie, Timothy Bourke, Sean Seefried, Corey Lewis, Xin Gao, Gerwin Klein |