“Hardware Rooted Trust for Additive Manufacturing”, D. Safford and M. Wiseman, IEEE Access 2019, 7, 79211-79215.
“A Canonical Event Log Structure for IMA”, D. Safford, and M. Wiseman, Linux Security Summit, Vancouver, Canada, 2018.
"Security Namespace: Making Linux Security Frameworks Available to Containers", Y. Sun, D. Safford, M. Zohar, D. Pendarakis, and Z. Gu, T. Jaeger, 27th USENIX Security Symposium. Baltimore, MD, August 15–17, 2018.
"An introduction to Secure Development: 15 Years On", D. Safford, Controls Symposium, GE Global Research Center, Niskayuna, NY, 2017.
“Design and Implementation of a Security Architecture for Critical Infrastructure Industrial Control Systems in the Era of Nation State Cyber Warfare”, D. Safford, Linux Security Summit, Toronto,Canada, 2016.
"Scalable Attestation: A Step toward Secure and Trusted Clouds", S. Berger, K. Goldman, D. Pendarakis, D. Safford, E. Valdez, and M. Zohar, IEEE Cloud Computing, September/October 2015.
“Extending the Linux Integrity Subsystem for TCB Protection”, D. Safford, Linux Security Summit, Chicago, IL, USA, 2014.
"Trustworthy geographically fenced hybrid clouds, ", K. R. Jayaram, D. Safford, U. Sharma, V. Naik, D. Pendarakis, S. Tao, Middleware '14: Bordeaux, France, December 2014
"Embedded Linux Security", and "Take Control of an ARM Chromebook", D. Safford, Linux Security Summit, New Orleans September 19, 2013.
"HWMAC: Hardware-Enforced Fined-Grained Policy-Driven Security", W. Hall, G. Hunt, P. Karger, M. Mergen, D. Safford, D. Toll, IBM Research Report, RC25155 (W1105-015) May 4, 2011.
“Security Research: Hardware Foundations”, D. Safford, Invited Talk, Computer Architecture Day, Princeton University, April 2, 2009.
“I/O for Virtual Machine Monitors: Security and Performance Issues”, P. Karger and D. Safford, IEEE Security and Privacy, September 2008.
“Trusted Computing and Open Source”, D. Safford, M. Zohar, Elsevier Information Security Technical Report, Volume 10 Issue 2, pp 74-82 2005.
“Open Source Support for Trusted Computing”, D. Safford, GovSec 2005.
“Open Source Support for Trusted Computing”, RSA Conference, San Francisco, February 2005.
“Trusted Linux Client”, ACSAC, Tucson, AZ, December 2004.
"Autonomic 802.11 Wireless LAN Security Auditing", Joel Branch, Nick Petroni, Leendert van Doorn, David Safford, IEEE Security and Privacy, May 2004.
"Taking Control of TCPA", David Safford, Jeff Kravitz, Leendert van Doorn, Linux Journal, August 2003.
"Trusted Computing Panel", 12th USENIX Security Conference, Washington, DC. August 2003.
"Practical server privacy with secure coprocessors," S. W. Smith and D. Safford, in IBM Systems Journal, vol. 40, no. 3, pp. 683-695, 2001, doi: 10.1147/sj.403.0683.
"MARS", David Safford, RSA Data Security Conference, San Francisco, CA 1997.
"Texas A&M University Anarchistic Key Authorization", David Safford, Douglas Schales, David Hess, Sixth USENIX Security Conference, San Jose, CA, July 1996.
"Secure RPC Authentication (SRA) for TELNET and FTP", David Safford, Douglas Schales, David Hess, 4th USENIX Security Conference, Santa Clara, CA, Oct 1993.
"The TAMU Security Package: An Ongoing Response to Internet Intruders in an Academic Environment", David Safford, Douglas Schales, David Hess, 4th USENIX Security Conference, Santa Clara, CA, Oct 1993.
"Simplezap", D. Safford, 80 Microcomputing, p 360, November 1981.