| 2005 | An Architecture for Generating Semantic Aware Signatures. Vinod Yegneswaran, Jonathon T. Giffin, Paul Barford, Somesh Jha |
| 2005 | Automating Mimicry Attacks Using Static Binary Analysis. Christopher Kruegel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna |
| 2005 | Building an Application-aware IPsec Policy System. Heng Yin, Haining Wang |
| 2005 | Countering Targeted File Attacks Using LocationGuard. Mudhakar Srivatsa, Ling Liu |
| 2005 | Cryptographic Voting Protocols: A Systems Perspective. Chris Karlof, Naveen Sastry, David A. Wagner |
| 2005 | Detecting Targeted Attacks Using Shadow Honeypots. Kostas G. Anagnostakis, Stelios Sidiroglou, Periklis Akritidis, Konstantinos Xinidis, Evangelos P. Markatos, Angelos D. Keromytis |
| 2005 | Efficient Techniques for Comprehensive Protection from Memory Error Exploits. Sandeep Bhatkar, Daniel C. DuVarney |
| 2005 | Empirical Study of Tolerating Denial-of-Service Attacks with a Proxy Network. Ju Wang, Xin Liu, Andrew A. Chien |
| 2005 | Finding Security Vulnerabilities in Java Applications with Static Analysis. V. Benjamin Livshits, Monica S. Lam |
| 2005 | Fixing Races for Fun and Profit: How to Abuse atime. Nikita Borisov, Robert Johnson |
| 2005 | Mapping Internet Sensors with Probe Response Attacks. John Bethencourt, Jason Franklin, Mary K. Vernon |
| 2005 | MulVAL: A Logic-based Network Security Analyzer. Xinming Ou, Sudhakar Govindavajhala, Andrew W. Appel |
| 2005 | Non-Control-Data Attacks Are Realistic Threats. Shuo Chen, Jun Xu, Emre Can Sezer |
| 2005 | OPUS: Online Patches and Updates for Security. Gautam Altekar, Ilya Bagrak, Paul Burstein, Andrew Schultz |
| 2005 | On the Effectiveness of Distributed Worm Monitoring. Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis |
| 2005 | Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005 Patrick D. McDaniel |
| 2005 | Protecting Against Unexpected System Calls. Cullen Linn, Mohan Rajagopalan, Scott Baker, Christian S. Collberg, Saumya K. Debray, John H. Hartman |
| 2005 | Robust TCP Stream Reassembly in the Presence of Adversaries. Sarang Dharmapurikar, Vern Paxson |
| 2005 | Security Analysis of a Cryptographically-Enabled RFID Device. Steve Bono, Matthew Green, Adam Stubblefield, Ari Juels, Aviel D. Rubin, Michael Szydlo |
| 2005 | Shredding Your Garbage: Reducing Data Lifetime Through Secure Deallocation. Jim Chow, Ben Pfaff, Tal Garfinkel, Mendel Rosenblum |
| 2005 | Stronger Password Authentication Using Browser Extensions. Blake Ross, Collin Jackson, Nick Miyake, Dan Boneh, John C. Mitchell |
| 2005 | Vulnerabilities of Passive Internet Threat Monitors. Yoichi Shinoda, Ko Ikai, Motomu Itoh |
| 2005 | Where's the FEEB? The Effectiveness of Instruction Set Randomization. Ana Nora Sovarel, David Evans, Nathanael Paul |