| Gyrophone: Recognizing Speech from Gyroscope Signals | USENIX Security '14 | Yan Michalevsky, Dan Boneh, Gabi Nakibly |
| LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes | USENIX Security '14 | Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton |
| TRUESET: Faster Verifiable Set Computations | USENIX Security '14 | Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos |
| Security Audit of Safeplug "Tor in a Box" | FOCI '14 | Anne Edmundson, Anna Kornfeld Simpson, Joshua A. Kroll, Edward W. Felten |
| Gleaner: Mitigating the Blocked-Waiter Wakeup Problem for Virtualized Multicore Applications | USENIX ATC '14 | Xiaoning Ding, Phillip B. Gibbons, Michael A. Kozuch, Jianchen Shan |
| Accelerating Restore and Garbage Collection in Deduplication-based Backup Systems via Exploiting Historical Information | USENIX ATC '14 | Min Fu, Dan Feng, Yu Hua, Xubin He, Zuoning Chen, Wen Xia, Fangting Huang, Qing Liu |
| Medusa: Managing Concurrency and Communication in Embedded Systems | USENIX ATC '14 | Thomas W. Barr, Scott Rixner |
| Pythia: Diagnosing Performance Problems in Wide Area Providers | USENIX ATC '14 | Partha Kanuparthy, Constantine Dovrolis |
| Efficient Tracing of Cold Code via Bias-Free Sampling | USENIX ATC '14 | Baris Kasikci, Thomas Ball, George Candea, John Erickson, Madanlal Musuvathi |
| MiniBox: A Two-Way Sandbox for x86 Native Code | USENIX ATC '14 | Yanlin Li, Jonathan McCune, James Newsome, Adrian Perrig, Brandon Baker, Will Drewry |
| The Fun and Future of CTF | 3GSE '14 | Andy Davis, Tim Leek, Michael Zhivich, Kyle Gwinnup, William Leonard |
| A Case Study in Helping Students to Covertly Eat Their Classmates | 3GSE '14 | Roya Ensafi, Mike Jacobi, Jedidiah R. Crandall |
| Practical Lessons from Creating the Control-Alt-Hack Card Game and Research Challenges for Games In Education and Research | 3GSE '14 | Tamara Denning, Adam Shostack, Tadayoshi Kohno |
| Ten Years of iCTF: The Good, The Bad, and The Ugly | 3GSE '14 | Giovanni Vigna, Kevin Borgolte, Jacopo Corbetta, Adam Doupe, Yanick Fratantonio, Luca Invernizzi, Dhilung Kirat, Yan Shoshitaishvili |
| PicoCTF: A Game-Based Computer Security Competition for High School Students | 3GSE '14 | Peter Chapman, Jonathan Burket, David Brumley |
| Class Capture-the-Flag Exercises | 3GSE '14 | Jelena Mirkovic, Peter A. H. Peterson |
| SecurityEmpire: Development and Evaluation of a Digital Game to Promote Cybersecurity Education | 3GSE '14 | Marc Olano, Alan Sherman, Linda Oliva, Ryan Cox, Deborah Firestone, Oliver Kubik, Milind Patil, John Seymour, Isaac Sohn, Donna Thomas |
| An Argument for Game Balance: Improving Student Engagement by Matching Difficulty Level with Learner Readiness | 3GSE '14 | Portia Pusey, David Tobey, Sr., Ralph Soule |
| Elevation of Privilege: Drawing Developers into Threat Modeling | 3GSE '14 | Adam Shostack |
| CyberCIEGE Scenario Design and Implementation | 3GSE '14 | Michael F. Thompson, Cynthia E. Irvine |
| Learning Obstacles in the Capture The Flag Model | 3GSE '14 | Kevin Chung, Julian Cohen |
| On the Importance of Evaluating Storage Systems’ $Costs | HotStorage '14 | Zhichao Li, Amanpreet Mukker, Erez Zadok |
| Accelerating External Sorting via On-the-fly Data Merge in Active SSDs | HotStorage '14 | Young-Sik Lee, Luis Cavazos Quero, Youngjae Lee, Jin-Soo Kim, Seungryoul Maeng |
| Mobile App Acceleration via Fine-Grain Offloading to the Cloud | HotCloud '14 | Chit-Kwan Lin, H. T. Kung |
| The Case for System Testing with Swift Hierarchical VM Fork | HotCloud '14 | Junji Zhi, Sahil Suneja, Eyal de Lara |