| Panel Discussion | USENIX Security '14 | |
| Software Loved by its Vendors and Disliked by 70% of its Users: Two Trillion Dollars of Healthcare Information Technology's Promises and Disappointments | HealthTech '14 | |
| HealthTech '14 Panel | HealthTech '14 | Avi Rubin, Ross Koppel, David Kotz |
| Practical Kleptography | WOOT '14 | |
| Securely Connecting Wearable Health Devices to External Displays | HealthTech '14 | Xiaohui Liang, David Kotz |
| Policy, Expectations and History: Accounting of Disclosures, Patient Expectations, and What We Can Learn from the Early Days of the 1970 Fair Credit Reporting Act | HealthTech '14 | Denise Anthony, Celeste Campos-Castillo, Ahram Lee |
| Ethnography of Computer Security Evasions in Healthcare Settings: Circumvention as the Norm | HealthTech '14 | Jim Blythe, Ross Koppel, Vijay Kothari, Sean Smith |
| Decision Support for Data Segmentation (DS2): Application to Pull Architectures for HIE | HealthTech '14 | Carl Gunter, Mike Berry, Martin French |
| An Evaluation of ECG use in Cryptography for Implantable Medical Devices and Body Area Networks | HealthTech '14 | Michael Rushanan, Denis Foo Kune, Daniel E Holcomb, Colleen M Swanson |
| Searching HIE with Differentiated Privacy Preservation | HealthTech '14 | Yuzhe Tang, Ling Liu |
| Adaptive Information Security in Body Sensor-Actuator Networks | HealthTech '14 | Krishna K. Venkatasubramanian, Craig A. Shue |
| Privacy-Preserving Microbiome Sequencing Analysis and Storage Systems | HealthTech '14 | Justin Wagner, Hector Corrada-Bravo |
| Differentially Private Genome Data Dissemination Through Top-Down Specialization | HealthTech '14 | Shuang Wang, Xiaoqian Jiang, Noman Mohammed, Rui Chen, Lucila Ohno-Machado |
| "Dr. Hacker, I Presume?" An Experimentally-based Discussion about Security of Teleoperated Surgical Systems | HealthTech '14 | Tariq Yusuf, Tamara Bonaci, Tadayoshi Kohno, Howard Jay Chizeck |
| Malware Prognosis: How to Do Malware Research in Medical Domain | HealthTech '14 | Sai R. Gouravajhala, Amir Rahmati, Peter Honeyman, Kevin Fu |
| Panel | 3GSE '14 | Mark Gondree, Chris Eagle, Portia Pusey, Timothy Leek, Giovanni Vigna, Peter Chapman |
| NSF Funding Opportunities for Cybersecurity Education and Workforce Development | 3GSE '14 | Victor Piotrowski |
| TRIST: Circumventing Censorship with Transcoding-Resistant Image Steganography | FOCI '14 | Christopher Connolly, Patrick Lincoln, Ian Mason, Vinod Yegneswaran |
| Catching Bandits and Only Bandits: Privacy-Preserving Intersection Warrants for Lawful Surveillance | FOCI '14 | Aaron Segal, Bryan Ford, Joan Feigenbaum |
| Global Network Interference Detection Over the RIPE Atlas Network | FOCI '14 | Collin Anderson, Philipp Winter, Roya |
| Towards a Comprehensive Picture of the Great Firewall’s DNS Censorship | FOCI '14 | |
| Symmetric Disclosure: a Fresh Look at k-anonymity | FOCI '14 | EJ Infeld |
| Counting Packets Sent Between Arbitrary Internet Hosts | FOCI '14 | Jeffrey Knockel, Jedidiah R. Crandall |
| An Internet with BRICS Characteristics: Data Sovereignty and the Balkanisation of the Internet | FOCI '14 | Dana Polatin-Reuben, Joss Wright |
| ReClaim: a Privacy-Preserving Decentralized Social Network | FOCI '14 | Niels Zeilemaker, Johan Pouwelse |