| 2003 | 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. John Bellardo, Stefan Savage |
| 2003 | A New Two-Server Approach for Authentication with Short Secrets. John G. Brainard, Ari Juels, Burt Kaliski, Michael Szydlo |
| 2003 | Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits. Sandeep Bhatkar, Daniel C. DuVarney, R. Sekar |
| 2003 | Analyzing Integrity Protection in the SELinux Example Policy. Trent Jaeger, Reiner Sailer, Xiaolan Zhang |
| 2003 | Denial of Service via Algorithmic Complexity Attacks. Scott A. Crosby, Dan S. Wallach |
| 2003 | Detecting Malicious Java Code Using Virtual Machine Auditing. Sunil Soman, Chandra Krintz, Giovanni Vigna |
| 2003 | Domain-Based Administration of Identity-Based Cryptosystems for Secure Email and IPSEC. Diana K. Smetters, Glenn Durfee |
| 2003 | Dynamic Detection and Prevention of Race Conditions in File Accesses. Eugene Tsyrklevich, Bennet Yee |
| 2003 | Establishing the Genuinity of Remote Computer Systems. Rick Kennell, Leah H. Jamieson |
| 2003 | High Coverage Detection of Input-Related Security Faults. Eric Larson, Todd M. Austin |
| 2003 | Implementing and Testing a Virus Throttle. Jamie Twycross, Matthew M. Williamson |
| 2003 | Improving Host Security with System Call Policies. Niels Provos |
| 2003 | Plug-and-Play PKI: A PKI Your Mother Can Use. Peter Gutmann |
| 2003 | PointGuard™: Protecting Pointers from Buffer Overflow Vulnerabilities. Crispin Cowan, Steve Beattie, John Johansen, Perry Wagle |
| 2003 | Preventing Privilege Escalation. Niels Provos, Markus Friedl, Peter Honeyman |
| 2003 | Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003 |
| 2003 | Remote Timing Attacks Are Practical. David Brumley, Dan Boneh |
| 2003 | SSL Splitting: Securely Serving Data from Untrusted Caches. Chris Lesniewski-Laas, M. Frans Kaashoek |
| 2003 | Scrash: A System for Generating Secure Crash Information. Peter Broadwell, Matthew Harren, Naveen Sastry |
| 2003 | Security Holes . . . Who Cares? Eric Rescorla |
| 2003 | Static Analysis of Executables to Detect Malicious Patterns. Mihai Christodorescu, Somesh Jha |
| 2003 | Storage-based Intrusion Detection: Watching Storage Activity for Suspicious Behavior. Adam G. Pennington, John D. Strunk, John Linwood Griffin, Craig A. N. Soules, Garth R. Goodson, Gregory R. Ganger |