 | P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users | USENIX Security '10 | Yitao Duan, John Canny, Justin Zhan |
 | SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics | USENIX Security '10 | Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos |
 | The Evolution of the Flash Security Model | USENIX Security '10 | Peleus Uhley |
 | Dude, Where's That IP? Circumventing Measurement-based IP Geolocation | USENIX Security '10 | Phillipa Gill, Yashar Ganjali, Bernard Wong |
 | Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking | USENIX Security '10 | Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Crandall |
 | Building a Dynamic Reputation System for DNS | USENIX Security '10 | Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster |
 | Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy | USENIX Security '10 | Richard Carback, David Chaum, Jeremy Clark, John Conway, Aleksander Essex, Paul S. Herrnson, Travis Mayberry, Stefan Popoveniuc, Ronald L. Rivest, Emily Shen, Alan T. Sherman, Poorvi L. Vora |
 | Acoustic Side-Channel Attacks on Printers | USENIX Security '10 | Michael Backes, Saarland University, Max Planck Institute for Software Systems (MPI-SWS), Markus Dürmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder |
 | Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study | USENIX Security '10 | Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh, Wenyuan Xu, Marco Gruteser, Wade Trappe, Ivan Seskar |
 | Vulnerable Compliance | USENIX Security '10 | Dan Geer |
 | VEX: Vetting Browser Extensions for Security Vulnerabilities | USENIX Security '10 | Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, Marianne Winslett |
 | Securing Script-Based Extensibility in Web Browsers | USENIX Security '10 | Vladan Djeric, Ashvin Goel |
 | AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements | USENIX Security '10 | Mike Ter Louw, Karthik Thotta Ganesh, V.N. Venkatakrishnan |
 | Realization of RF Distance Bounding | USENIX Security '10 | Kasper Bonne Rasmussen, Srdjan Capkun |
 | The Case for Ubiquitous Transport-Level Encryption | USENIX Security '10 | Andrea Bittau, Michael Hamburg, Mark Handley, David Mazières, Dan Boneh |
 | Automatic Generation of Remediation Procedures for Malware Infections | USENIX Security '10 | Roberto Paleari, Lorenzo Martignoni, Emanuele Passerini, Drew Davidson, Matt Fredrikson, Jon Giffin, Somesh Jha |
 | Grid, PhD: Smart Grid, Cyber Security, and the Future of Keeping the Lights On | USENIX Security '10 | Kelly Ziegler |
 | Re: CAPTCHAs—Understanding CAPTCHA-Solving Services in an Economic Context | USENIX Security '10 | Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, Stefan Savage |
 | Chipping Away at Censorship Firewalls with User-Generated Content | USENIX Security '10 | Sam Burnett, Nick Feamster, Santosh Vempala |
 | Fighting Coercion Attacks in Key Generation using Skin Conductance | USENIX Security '10 | Payas Gupta, Debin Gao |
 | End-to-End Arguments: The Internet and Beyond | USENIX Security '10 | David P. Reed |
 | Medical Device Security and Privacy | HealthSec '10 | John F. Murray Jr., Software Compliance Expert, United States Food, Drug Administration, Nathanael Paul, Karen Sandler |
 | Protecting E-healthcare Client Devices against Malware and Physical Theft | HealthSec '10 | Daisuke Mashima, Abhinav Srivastava, Jonathon Giffin, Mustaque Ahamad |
 | Can I access your data? Privacy Management in mHealth | HealthSec '10 | David Kotz, Dartmouth College, ISTS |
 | Using Trusted Sensors to Monitor Patients' Habits | HealthSec '10 | Alec Wolman, Stefan Saroiu, Victor Bahl |