| 2014 | 2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014 |
| 2014 | A Study of Probabilistic Password Models. Jerry Ma, Weining Yang, Min Luo, Ninghui Li |
| 2014 | ANONIZE: A Large-Scale Anonymous Survey System. Susan Hohenberger, Steven A. Myers, Rafael Pass, Abhi Shelat |
| 2014 | All Your Screens Are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing API. Yuan Tian, Ying Chuan Liu, Amar Bhosale, Lin-Shung Huang, Patrick Tague, Collin Jackson |
| 2014 | An Expressive Model for the Web Infrastructure: Definition and Application to the Browser ID SSO System. Daniel Fett, Ralf Küsters, Guido Schmitz |
| 2014 | Analyzing Forged SSL Certificates in the Wild. Lin-Shung Huang, Alex Rice, Erling Ellingsen, Collin Jackson |
| 2014 | Automated Analysis of Security Protocols with Global State. Steve Kremer, Robert Künnemann |
| 2014 | Automated Verification of Group Key Agreement Protocols. Benedikt Schmidt, Ralf Sasse, Cas Cremers, David A. Basin |
| 2014 | Automating Efficient RAM-Model Secure Computation. Chang Liu, Yan Huang, Elaine Shi, Jonathan Katz, Michael W. Hicks |
| 2014 | Automating Isolation and Least Privilege in Web Services. Aaron Blankstein, Michael J. Freedman |
| 2014 | Blind Seer: A Scalable Private DBMS. Vasilis Pappas, Fernando Krell, Binh Vo, Vladimir Kolesnikov, Tal Malkin, Seung Geol Choi, Wesley George, Angelos D. Keromytis, Steven M. Bellovin |
| 2014 | Bootstrapping Privacy Compliance in Big Data Systems. Shayak Sen, Saikat Guha, Anupam Datta, Sriram K. Rajamani, Janice Y. Tsai, Jeannette M. Wing |
| 2014 | Chip and Skim: Cloning EMV Cards with the Pre-play Attack. Mike Bond, Omar Choudary, Steven J. Murdoch, Sergei P. Skorobogatov, Ross J. Anderson |
| 2014 | Cloak and Swagger: Understanding Data Sensitivity through the Lens of User Anonymity. Sai Teja Peddinti, Aleksandra Korolova, Elie Bursztein, Geetanjali Sampemane |
| 2014 | Dancing with Giants: Wimpy Kernels for On-Demand Isolated I/O. Zongwei Zhou, Miao Yu, Virgil D. Gligor |
| 2014 | Doppelgänger Finder: Taking Stylometry to the Underground. Sadia Afroz, Aylin Caliskan Islam, Ariel Stolerman, Rachel Greenstadt, Damon McCoy |
| 2014 | Dynamic Searchable Encryption via Blind Storage. Muhammad Naveed, Manoj Prabhakaran, Carl A. Gunter |
| 2014 | Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking. Ralf Küsters, Tomasz Truderung, Andreas Vogt |
| 2014 | Framing Signals - A Return to Portable Shellcode. Erik Bosman, Herbert Bos |
| 2014 | From Zygote to Morula: Fortifying Weakened ASLR on Android. Byoungyoung Lee, Long Lu, Tielei Wang, Taesoo Kim, Wenke Lee |
| 2014 | Hacking Blind. Andrea Bittau, Adam Belay, Ali José Mashtizadeh, David Mazières, Dan Boneh |
| 2014 | Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces. Collin Mulliner, William K. Robertson, Engin Kirda |
| 2014 | Hunting the Red Fox Online: Understanding and Detection of Mass Redirect-Script Injections. Zhou Li, Sumayah A. Alrwais, Xiaofeng Wang, Eihal Alowaisheq |
| 2014 | KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels. John Criswell, Nathan Dautenhahn, Vikram S. Adve |
| 2014 | Modeling and Discovering Vulnerabilities with Code Property Graphs. Fabian Yamaguchi, Nico Golde, Daniel Arp, Konrad Rieck |
| 2014 | Not-So-Random Numbers in Virtualized Linux and the Whirlwind RNG. Adam Everspaugh, Yan Zhai, Robert Jellinek, Thomas Ristenpart, Michael M. Swift |
| 2014 | Out of Control: Overcoming Control-Flow Integrity. Enes Göktas, Elias Athanasopoulos, Herbert Bos, Georgios Portokalidis |
| 2014 | Permacoin: Repurposing Bitcoin Work for Data Preservation. Andrew Miller, Ari Juels, Elaine Shi, Bryan Parno, Jonathan Katz |
| 2014 | Pivot: Fast, Synchronous Mashup Isolation Using Generator Chains. James Mickens |
| 2014 | Practical Evasion of a Learning-Based Classifier: A Case Study. Nedim Srndic, Pavel Laskov |
| 2014 | Quantifying Information Flow for Dynamic Secrets. Piotr Mardziel, Mário S. Alvim, Michael W. Hicks, Michael R. Clarkson |
| 2014 | Secure Multiparty Computations on Bitcoin. Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Lukasz Mazurek |
| 2014 | SoK: Automated Software Diversity. Per Larsen, Andrei Homescu, Stefan Brunthaler, Michael Franz |
| 2014 | SoK: Introspections on Trust and the Semantic Gap. Bhushan Jain, Mirza Basim Baig, Dongli Zhang, Donald E. Porter, Radu Sion |
| 2014 | SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks. Michael Rushanan, Aviel D. Rubin, Denis Foo Kune, Colleen M. Swanson |
| 2014 | Stealing Webpages Rendered on Your Browser by Exploiting GPU Vulnerabilities. Sangho Lee, Youngsok Kim, Jangwoo Kim, Jong Kim |
| 2014 | Stopping a Rapid Tornado with a Puff. José Lopes, Nuno Neves |
| 2014 | The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations. Xiao-yong Zhou, Yeonjoon Lee, Nan Zhang, Muhammad Naveed, Xiaofeng Wang |
| 2014 | Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS. Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Alfredo Pironti, Pierre-Yves Strub |
| 2014 | Upgrading Your Android, Elevating My Malware: Privilege Escalation through Mobile OS Updating. Luyi Xing, Xiaorui Pan, Rui Wang, Kan Yuan, Xiaofeng Wang |
| 2014 | Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations. Chad Brubaker, Suman Jana, Baishakhi Ray, Sarfraz Khurshid, Vitaly Shmatikov |
| 2014 | When HTTPS Meets CDN: A Case of Authentication in Delegated Service. Jinjin Liang, Jian Jiang, Hai-Xin Duan, Kang Li, Tao Wan, Jianping Wu |
| 2014 | Wysteria: A Programming Language for Generic, Mixed-Mode Multiparty Computations. Aseem Rastogi, Matthew A. Hammer, Michael Hicks |
| 2014 | ZEBRA: Zero-Effort Bilateral Recurring Authentication. Shrirang Mare, Andres Molina-Markham, Cory Cornelius, Ronald A. Peterson, David Kotz |
| 2014 | Zerocash: Decentralized Anonymous Payments from Bitcoin. Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza |