| Secure Outsourced Garbled Circuit Evaluation for Mobile Devices | USENIX Security '13 | Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler |
| On the Security of RC4 in TLS | USENIX Security '13 | Nadhem AlFardan, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt |
| PCF: A Portable Circuit Format for Scalable Two-Party Secure Computation | USENIX Security '13 | Ben Kreuter, Abhi Shelat, Benjamin Mood, Kevin Butler |
| Control Flow Integrity for COTS Binaries | USENIX Security '13 | Mingwei Zhang, R. Sekar |
| Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring | USENIX Security '13 | David Brumley, JongHyup Lee, Edward J. Schwartz, Maverick Woo |
| Strato: A Retargetable Framework for Low-Level Inlined-Reference Monitors | USENIX Security '13 | Bin Zeng, Gang Tan, Úlfar Erlingsson |
| On the Security of Picture Gesture Authentication | USENIX Security '13 | Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu |
| Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization | USENIX Security '13 | Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri Gurevich |
| Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers | USENIX Security '13 | Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Livshits, Helen J. Wang, Eyal Ofek |
| CacheAudit: A Tool for the Static Analysis of Cache Side Channels | USENIX Security '13 | Goran Doychev, Dominik Feld, Boris Kopf, Laurent Mauborgne, Jan Reineke |
| Transparent ROP Exploit Mitigation Using Indirect Branch Tracing | USENIX Security '13 | Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis |
| FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution | USENIX Security '13 | Drew Davidson, Benjamin Moench, Thomas Ristenpart, Somesh Jha |
| Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base | USENIX Security '13 | Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herrewege, Christophe Huygens, Bart Preneel, Ingrid Verbauwhede, Frank Piessens |
| Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation | USENIX Security '13 | Frank Imeson, Ariq Emtenan, Siddharth Garg, Mahesh Tripunitara |
| KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object | USENIX Security '13 | Hojoon Lee, HyunGon Moon, DaeHee Jang, Kihwan Kim, Jihoon Lee, Yunheung Paek, Brent ByungHoon Kang |
| Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer | USENIX Security '13 | Roel Verdult, Flavio D. Garcia, Baris Ege |
| Take This Personally: Pollution Attacks on Personalized Services | USENIX Security '13 | Xingyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee |
| Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services | USENIX Security '13 | Ruoyu Wang, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna |
| Measuring the Practical Impact of DNSSEC Deployment | USENIX Security '13 | Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage |
| ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates | USENIX Security '13 | Terry Nelms, Roberto Perdisci, Mustaque Ahamad |
| ZMap: Fast Internet-wide Scanning and Its Security Applications | USENIX Security '13 | Zakir Durumeric, Eric Wustrow, J. Alex Halderman |
| Eradicating DNS Rebinding with the Extended Same-origin Policy | USENIX Security '13 | Martin Johns, Sebastian Lekies, Ben Stock |
| Revolver: An Automated Approach to the Detection of Evasive Web-based Malware | USENIX Security '13 | Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni Vigna |
| Language-based Defenses Against Untrusted Browser Origins | USENIX Security '13 | Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Sergio Maffeis |
| WHYPER: Towards Automating Risk Assessment of Mobile Applications | USENIX Security '13 | Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie |