| Securely Connecting Wearable Health Devices to External Displays | HealthTech '14 | Xiaohui Liang, David Kotz |
| An Evaluation of ECG use in Cryptography for Implantable Medical Devices and Body Area Networks | HealthTech '14 | Michael Rushanan, Denis Foo Kune, Daniel E Holcomb, Colleen M Swanson |
| "Dr. Hacker, I Presume?" An Experimentally-based Discussion about Security of Teleoperated Surgical Systems | HealthTech '14 | Tariq Yusuf, Tamara Bonaci, Tadayoshi Kohno, Howard Jay Chizeck |
| Adaptive Information Security in Body Sensor-Actuator Networks | HealthTech '14 | Krishna K. Venkatasubramanian, Craig A. Shue |
| Searching HIE with Differentiated Privacy Preservation | HealthTech '14 | Yuzhe Tang, Ling Liu |
| Decision Support for Data Segmentation (DS2): Application to Pull Architectures for HIE | HealthTech '14 | Carl Gunter, Mike Berry, Martin French |
| Policy, Expectations and History: Accounting of Disclosures, Patient Expectations, and What We Can Learn from the Early Days of the 1970 Fair Credit Reporting Act | HealthTech '14 | Denise Anthony, Celeste Campos-Castillo, Ahram Lee |
| NSF Funding Opportunities for Cybersecurity Education and Workforce Development | 3GSE '14 | Victor Piotrowski |
| ReClaim: a Privacy-Preserving Decentralized Social Network | FOCI '14 | Niels Zeilemaker, Johan Pouwelse |
| TRIST: Circumventing Censorship with Transcoding-Resistant Image Steganography | FOCI '14 | Christopher Connolly, Patrick Lincoln, Ian Mason, Vinod Yegneswaran |
| Catching Bandits and Only Bandits: Privacy-Preserving Intersection Warrants for Lawful Surveillance | FOCI '14 | Aaron Segal, Bryan Ford, Joan Feigenbaum |
| Symmetric Disclosure: a Fresh Look at k-anonymity | FOCI '14 | EJ Infeld |
| An Internet with BRICS Characteristics: Data Sovereignty and the Balkanisation of the Internet | FOCI '14 | Dana Polatin-Reuben, Joss Wright |
| Global Network Interference Detection Over the RIPE Atlas Network | FOCI '14 | Collin Anderson, Philipp Winter, Roya |
| Towards a Comprehensive Picture of the Great Firewall’s DNS Censorship | FOCI '14 | |
| Counting Packets Sent Between Arbitrary Internet Hosts | FOCI '14 | Jeffrey Knockel, Jedidiah R. Crandall |
| Panel | 3GSE '14 | Mark Gondree, Chris Eagle, Portia Pusey, Timothy Leek, Giovanni Vigna, Peter Chapman |
| Academic Cloud Computing Research: Five Pitfalls and Five Opportunities | HotCloud '14 | Adam Barker, Blesson Varghese, Jonathan Stuart Ward, Ian Sommerville |
| Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search | FOCI '14 | Ben Jones, Sam Burnett, Nick Feamster, Sean Donovan, Sarthak Grover, Sathya Gunasekaran, Karim Habak |
| Battling Human Trafficking with Big Data | USENIX Security '14 | Rolando R. Lopez |
| User-Guided Device Driver Synthesis | OSDI '14 | Leonid Ryzhyk, Adam Walker, John Keys, Alexander Legg, Arun Raghunath, Michael Stumm, Mona Vij |
| Scaling Distributed Machine Learning with the Parameter Server | OSDI '14 | Mu Li, David G. Andersen, Jun Woo Park, Alexander J. Smola, Amr Ahmed, Vanja Josifovski, James Long, Eugene J. Shekita, Bor-Yiing Su |
| GraphX: Graph Processing in a Distributed Dataflow Framework | OSDI '14 | Joseph E. Gonzalez, Reynold S. Xin, Ankur Dave, Daniel Crankshaw, Michael J. Franklin, Ion Stoica |
| Nail: A Practical Tool for Parsing and Generating Data Formats | OSDI '14 | Julian Bangert, Nickolai Zeldovich |
| lprof: A Non-intrusive Request Flow Profiler for Distributed Systems | OSDI '14 | Xu Zhao, Yongle Zhang, David Lion, Muhammad Faizan Ullah, Yu Luo, Ding Yuan, Michael Stumm |