| 2013 | Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness. Devdatta Akhawe, Adrienne Porter Felt |
| 2013 | An Empirical Study of Vulnerability Rewards Programs. Matthew Finifter, Devdatta Akhawe, David A. Wagner |
| 2013 | Automatic Mediation of Privacy-Sensitive Resource Access in Smartphone Applications. Benjamin Livshits, Jaeyeon Jung |
| 2013 | CacheAudit: A Tool for the Static Analysis of Cache Side Channels. Goran Doychev, Dominik Feld, Boris Köpf, Laurent Mauborgne, Jan Reineke |
| 2013 | Control Flow Integrity for COTS Binaries. Mingwei Zhang, R. Sekar |
| 2013 | Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer. Roel Verdult, Flavio D. Garcia, Baris Ege |
| 2013 | Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations. István Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos |
| 2013 | DupLESS: Server-Aided Encryption for Deduplicated Storage. Sriram Keelveedhi, Mihir Bellare, Thomas Ristenpart |
| 2013 | Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis. Damien Octeau, Patrick D. McDaniel, Somesh Jha, Alexandre Bartel, Eric Bodden, Jacques Klein, Yves Le Traon |
| 2013 | Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers. Suman Jana, David Molnar, Alexander Moshchuk, Alan M. Dunn, Benjamin Livshits, Helen J. Wang, Eyal Ofek |
| 2013 | Eradicating DNS Rebinding with the Extended Same-origin Policy. Martin Johns, Sebastian Lekies, Ben Stock |
| 2013 | ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates. Terry Nelms, Roberto Perdisci, Mustaque Ahamad |
| 2013 | Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization. Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri Gurevich |
| 2013 | FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution. Drew Davidson, Benjamin Moench, Thomas Ristenpart, Somesh Jha |
| 2013 | Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies. Sven Bugiel, Stephan Heuser, Ahmad-Reza Sadeghi |
| 2013 | Greystar: Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space. Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang |
| 2013 | Impression Fraud in On-line Advertising via Pay-Per-View Networks. Kevin Springborn, Paul Barford |
| 2013 | Jekyll on iOS: When Benign Apps Become Evil. Tielei Wang, Kangjie Lu, Long Lu, Simon P. Chung, Wenke Lee |
| 2013 | KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object. Hojoon Lee, Hyungon Moon, DaeHee Jang, Kihwan Kim, Jihoon Lee, Yunheung Paek, Brent ByungHoon Kang |
| 2013 | Language-based Defenses Against Untrusted Browser Origins. Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Sergio Maffeis |
| 2013 | Let Me Answer That for You: Exploiting Broadcast Information in Cellular Networks. Nico Golde, Kevin Redon, Jean-Pierre Seifert |
| 2013 | Measuring the Practical Impact of DNSSEC Deployment. Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage |
| 2013 | MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis. Ruowen Wang, Peng Ning, Tao Xie, Quan Chen |
| 2013 | Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring. David Brumley, Jonghyup Lee, Edward J. Schwartz, Maverick Woo |
| 2013 | On the Security of Picture Gesture Authentication. Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu |
| 2013 | On the Security of RC4 in TLS. Nadhem J. AlFardan, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt |
| 2013 | PCF: A Portable Circuit Format for Scalable Two-Party Secure Computation. Ben Kreuter, Abhi Shelat, Benjamin Mood, Kevin R. B. Butler |
| 2013 | Practical Comprehensive Bounds on Surreptitious Communication over DNS. Vern Paxson, Mihai Christodorescu, Mobin Javed, Josyula R. Rao, Reiner Sailer, Douglas Lee Schales, Marc Ph. Stoecklin, Kurt Thomas, Wietse Z. Venema, Nicholas Weaver |
| 2013 | Proactively Accountable Anonymous Messaging in Verdict. Henry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford |
| 2013 | Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013 Samuel T. King |
| 2013 | Revolver: An Automated Approach to the Detection of Evasive Web-based Malware. Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni Vigna |
| 2013 | Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base. Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herrewege, Christophe Huygens, Bart Preneel, Ingrid Verbauwhede, Frank Piessens |
| 2013 | Secure Outsourced Garbled Circuit Evaluation for Mobile Devices. Henry Carter, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler |
| 2013 | Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation. Frank Imeson, Ariq Emtenan, Siddharth Garg, Mahesh V. Tripunitara |
| 2013 | Securing Embedded User Interfaces: Android and Beyond. Franziska Roesner, Tadayoshi Kohno |
| 2013 | Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services. Ruoyu Wang, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna |
| 2013 | Strato: A Retargetable Framework for Low-Level Inlined-Reference Monitors. Bin Zeng, Gang Tan, Úlfar Erlingsson |
| 2013 | Take This Personally: Pollution Attacks on Personalized Services. Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee |
| 2013 | The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions. Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall, Dan S. Wallach |
| 2013 | Towards Automatic Software Lineage Inference. Jiyong Jang, Maverick Woo, David Brumley |
| 2013 | Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson |
| 2013 | Transparent ROP Exploit Mitigation Using Indirect Branch Tracing. Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis |
| 2013 | WHYPER: Towards Automating Risk Assessment of Mobile Applications. Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie |
| 2013 | You Are How You Click: Clickstream Analysis for Sybil Detection. Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao |
| 2013 | ZMap: Fast Internet-wide Scanning and Its Security Applications. Zakir Durumeric, Eric Wustrow, J. Alex Halderman |
| 2013 | ZQL: A Compiler for Privacy-Preserving Data Processing. Cédric Fournet, Markulf Kohlweiss, George Danezis, Zhengqin Luo |