| Adventures in Authentication and Authorization | Enigma 2023 | Ian Haken |
| Navigating the Sandbox Buffet | Enigma 2023 | Maxime Serrano |
| The Dirty Laundry of the Web PKI | Enigma 2023 | Emily Stark |
| When Malware Changed Its Mind: How "Split Personalities" Affect Malware Analysis and Detection | Enigma 2023 | Tudor Dumitras |
| Spotting the Differences: Quirks of Machine Learning (in) Security | Enigma 2023 | Fabrício Ceschin |
| Fireside Chat: The State of Memory Safety | Enigma 2023 | Amira Dhalla, Yael Grauer, Alex Gaynor, Josh Aas |
| How the Internet Improves Humanity | Enigma 2023 | Eric Goldman |
| Characterizing and Measuring Misleading and Harmful Online Ad Content at Scale | Enigma 2023 | Eric Zeng |
| A New Process to Tackle Misinformation on Social Media: Prevalence-Based Gradation | Enigma 2023 | Kamesh Shekar |
| The Not Fake News Hour | Enigma 2023 | Riana Pfefferkorn |
| What Public Interest AI Auditors Can Learn from Security Testing: Legislative and Practical Wins | Enigma 2023 | Justin Brookman |
| Why Is Our Security Research Failing? Five Practices to Change! | Enigma 2023 | Marcus Botacin |
| Understanding Trust and Security Processes in the Open Source Software Ecosystem | Enigma 2023 | Dominik Wermke |
| Protecting Whistleblower Information | Enigma 2023 | Shanna Devine |
| Open Source Software and Journalism: Field Notes from a Global Perspective | Enigma 2023 | Harlo Holmes |
| So You're Going to Blow the Whistle? Communications Dos and Don'ts for Whistleblowers. | Enigma 2023 | Emily Schwartz |
| Privacy Policies, by Lawyers, for Lawyers. What about Everyone Else? | HotSec '19 Enigma 2023 | Hannah Poteat, Holly Hogan, Miju Han, Emily Jones, Gabriela Zanfir-Fortuna |
| Meaningful Hardware Privacy for a Smart and Augmented Future | Enigma 2023 | Marcus Hodges |
| Technical Metamorphosis: The 3 Stages of DSAR Automation | Enigma 2023 | Alon Levy |
| Building an Automated Machine for Discovering Privacy Violations at Scale | Enigma 2023 | Suchakra Sharma |
| True Crime Journalism: Cyber | Enigma 2023 | Joseph Menn, Lily Hay Newman, Alfred Ng |
| Myths and Lies in InfoSec | Enigma 2023 | Adrian Sanabria |
| The Slippery Slope of Cybersecurity Analogies | Enigma 2023 | Josiah Dykstra |
| The Very Hungry Defender: Metamorphosing Security Decision-Making by Incorporating Opportunity Cost | Enigma 2023 | Kelly Shortridge |
| Citron: Distributed Range Lock Management with One-sided RDMA | FAST '23 | Jian Gao, Youyou Lu, Minhui Xie, Qing Wang, Jiwu Shu |