| Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis | USENIX Security '13 | Damien Octeau, Patrick McDaniel, Somesh Jha, Alexandre Bartel, Eric Bodden, Jacques Klein, Yves Le Traon |
| Jekyll on iOS: When Benign Apps Become Evil | USENIX Security '13 | Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, Wenke Lee |
| Dr. Felten Goes To Washington: Lessons from 18 Months in Government | USENIX Security '13 | Edward W. Felten |
| The White House's Priorities for Cybersecurity | USENIX Security '13 | Andy Ozment |
| Security Team 2.0 | USENIX Security '13 | Chris Evans |
| Confessions of a "Recovering" Data Broker: Responsible Innovation in the Age of Big Data, Big Brother, and the Coming Skynet Terminators | USENIX Security '13 | Jim Adler |
| Windows 8 Security: Supporting User Confidence | USENIX Security '13 | Crispin Cowan |
| Building Securable Infrastructure: Open-Source Private Clouds | USENIX Security '13 | Pravir Chandra |
| Tracking the Casino Computer Wars: Who’s Winning—the Casino or the Cheat? | USENIX Security '13 | Richard Marcus |
| Truncating TLS Connections to Violate Beliefs in Web Applications | WOOT '13 | Ben Smyth, Alfredo Pironti |
| FireDrill: Interactive DNS Rebinding | WOOT '13 | Yunxing Dai, Ryan Resig |
| Illuminating the Security Issues Surrounding Lights-Out Server Management | WOOT '13 | Anthony Bonkoski, Russ Bielawski, J. Alex Halderman |
| Bluetooth: With Low Energy Comes Low Security | WOOT '13 | Mike Ryan |
| Breaking Cell Phone Authentication: Vulnerabilities in AKA, IMS, and Android | WOOT '13 | Jethro Beekman, Christopher Thompson |
| Cloning Credit Cards: A Combined Pre-play and Downgrade Attack on EMV Contactless | WOOT '13 | Michael Roland, Josef Langer |
| Subverting BIND's SRTT Algorithm Derandomizing NS Selection | WOOT '13 | Roee Hay, Jonathan Kalechstein, Gabi Nakibly |
| Leveraging Honest Users: Stealth Command-and-Control of Botnets | WOOT '13 | Diogo Mónica, Carlos Ribeiro |
| From an IP Address to a Street Address: Using Wireless Signals to Locate a Target | WOOT '13 | Craig A. Shue, Nathanael Paul, Curtis R. Taylor |
| Looking Inside the (Drop) Box | WOOT '13 | Dhiru Kholia, Przemysław Węgrzyn |
| “Weird Machines” in ELF: A Spotlight on the Underappreciated Metadata | WOOT '13 | Rebecca Shapiro, Sergey Bratus, Sean W. Smith |
| Introducing Die Datenkrake: Programmable Logic for Hardware Security Analysis | WOOT '13 | Dmitry Nedospasov, Thorsten Schroder |
| The Page-Fault Weird Machine: Lessons in Instruction-less Computation | WOOT '13 | Julian Bangert, Sergey Bratus, Rebecca Shapiro, Sean W. Smith |
| Five Incidents, One Theme: Twitter Spam as a Weapon to Drown Voices of Protest | FOCI '13 | John-Paul Verkamp, Minaxi Gupta |
| The Anatomy of Web Censorship in Pakistan | FOCI '13 | Zubair Nabi |
| Internet Censorship in Iran: A First Look | FOCI '13 | Simurgh Aryan, Homa Aryan, J. Alex Halderman |