| 2004 | A Virtual Honeypot Framework. Niels Provos |
| 2004 | Autograph: Toward Automated, Distributed Worm Signature Detection. Hyang-Ah Kim, Brad Karp |
| 2004 | Avfs: An On-Access Anti-Virus File System. Yevgeniy Miretskiy, Abhijith Das, Charles P. Wright, Erez Zadok |
| 2004 | Collapsar: A VM-Based Architecture for Network Attack Detention Center. Xuxian Jiang, Dongyan Xu |
| 2004 | Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor. Nick L. Petroni Jr., Timothy Fraser, Jesus Molina, William A. Arbaugh |
| 2004 | Design and Implementation of a TCG-based Integrity Measurement Architecture. Reiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert van Doorn |
| 2004 | Design of the EROS Trusted Window System. Jonathan S. Shapiro, John Vanderburgh, Eric Northup, David Chizmadia |
| 2004 | Exploiting Software. Gary McGraw |
| 2004 | Fairplay - Secure Two-Party Computation System. Dahlia Malkhi, Noam Nisan, Benny Pinkas, Yaron Sella |
| 2004 | Fighting Computer Virus Attacks. Peter Szor |
| 2004 | Finding User/Kernel Pointer Bugs with Type Inference. Robert Johnson, David A. Wagner |
| 2004 | Fixing Races for Fun and Profit: How to Use access(2). Drew Dean, Alan J. Hu |
| 2004 | Graphical Dictionaries and the Memorable Space of Graphical Passwords. Julie Thorpe, Paul C. van Oorschot |
| 2004 | I Voted? How the Law Increasingly Restricts Independent Security Research. Cindy Cohn |
| 2004 | Keynote Address: Back to the Future. William Earl Boebert |
| 2004 | Metrics, Economics, and Shared Risk at the National Scale. Daniel E. Geer Jr. |
| 2004 | Military Strategy in CyberSpace. Stuart Staniford |
| 2004 | My Dad's Computer, Microsoft, and the Future of Internet Security. Bill Cheswick |
| 2004 | Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute. Dirk Balfanz, Glenn Durfee, Rebecca E. Grinter, Diana K. Smetters, Paul Stewart |
| 2004 | Nuclear Weapons, Permissive Action Links, and the History of Public Key Cryptography. Steven M. Bellovin |
| 2004 | On Gray-Box Program Tracking for Anomaly Detection. Debin Gao, Michael K. Reiter, Dawn Xiaodong Song |
| 2004 | On User Choice in Graphical Password Schemes. Darren Davis, Fabian Monrose, Michael K. Reiter |
| 2004 | Privacy-Preserving Sharing and Correlation of Security Alerts. Patrick Lincoln, Phillip A. Porras, Vitaly Shmatikov |
| 2004 | Privtrans: Automatically Partitioning Programs for Privilege Separation. David Brumley, Dawn Xiaodong Song |
| 2004 | Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA Matt Blaze |
| 2004 | RFID: Security and Privacy for Five-Cent Computers. Ari Juels |
| 2004 | Side Effects Are Not Sufficient to Authenticate Software. Umesh Shankar, Monica Chew, J. D. Tygar |
| 2004 | Static Disassembly of Obfuscated Binaries. Christopher Krügel, William K. Robertson, Fredrik Valeur, Giovanni Vigna |
| 2004 | TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection. Kumar Avijit, Prateek Gupta, Deepak Gupta |
| 2004 | Tor: The Second-Generation Onion Router. Roger Dingledine, Nick Mathewson, Paul F. Syverson |
| 2004 | Understanding Data Lifetime via Whole System Simulation (Awarded Best Paper!). Jim Chow, Ben Pfaff, Tal Garfinkel, Kevin Christopher, Mendel Rosenblum |
| 2004 | Very Fast Containment of Scanning Worms. Nicholas Weaver, Stuart Staniford, Vern Paxson |
| 2004 | What Biology Can (and Can't) Teach Us About Security. David Evans |