| Staying Safe on the Web Yesterday, Today, and Tomorrow | USENIX Security '10 | Sid Stamm, Privacy Nut at Mozilla |
| ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash | USENIX Security '10 | C. Chris Erway, Alptekin Küpçü, Theodora Hinkle, Anna Lysyanskaya |
| P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users | USENIX Security '10 | Yitao Duan, John Canny, Justin Zhan |
| SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics | USENIX Security '10 | Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos |
| The Evolution of the Flash Security Model | USENIX Security '10 | Peleus Uhley |
| Dude, Where's That IP? Circumventing Measurement-based IP Geolocation | USENIX Security '10 | Phillipa Gill, Yashar Ganjali, Bernard Wong |
| Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking | USENIX Security '10 | Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Crandall |
| Building a Dynamic Reputation System for DNS | USENIX Security '10 | Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster |
| Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy | USENIX Security '10 | Richard Carback, David Chaum, Jeremy Clark, John Conway, Aleksander Essex, Paul S. Herrnson, Travis Mayberry, Stefan Popoveniuc, Ronald L. Rivest, Emily Shen, Alan T. Sherman, Poorvi L. Vora |
| Acoustic Side-Channel Attacks on Printers | USENIX Security '10 | Michael Backes, Saarland University, Max Planck Institute for Software Systems (MPI-SWS), Markus Dürmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder |
| Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study | USENIX Security '10 | Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh, Wenyuan Xu, Marco Gruteser, Wade Trappe, Ivan Seskar |
| Vulnerable Compliance | USENIX Security '10 | Dan Geer |
| VEX: Vetting Browser Extensions for Security Vulnerabilities | USENIX Security '10 | Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, Marianne Winslett |
| Securing Script-Based Extensibility in Web Browsers | USENIX Security '10 | Vladan Djeric, Ashvin Goel |
| AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements | USENIX Security '10 | Mike Ter Louw, Karthik Thotta Ganesh, V.N. Venkatakrishnan |
| Realization of RF Distance Bounding | USENIX Security '10 | Kasper Bonne Rasmussen, Srdjan Capkun |
| The Case for Ubiquitous Transport-Level Encryption | USENIX Security '10 | Andrea Bittau, Michael Hamburg, Mark Handley, David Mazières, Dan Boneh |
| Automatic Generation of Remediation Procedures for Malware Infections | USENIX Security '10 | Roberto Paleari, Lorenzo Martignoni, Emanuele Passerini, Drew Davidson, Matt Fredrikson, Jon Giffin, Somesh Jha |
| Grid, PhD: Smart Grid, Cyber Security, and the Future of Keeping the Lights On | USENIX Security '10 | Kelly Ziegler |
| Re: CAPTCHAs—Understanding CAPTCHA-Solving Services in an Economic Context | USENIX Security '10 | Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, Stefan Savage |
| Chipping Away at Censorship Firewalls with User-Generated Content | USENIX Security '10 | Sam Burnett, Nick Feamster, Santosh Vempala |
| Fighting Coercion Attacks in Key Generation using Skin Conductance | USENIX Security '10 | Payas Gupta, Debin Gao |
| End-to-End Arguments: The Internet and Beyond | USENIX Security '10 | David P. Reed |
| Medical Device Security and Privacy | HealthSec '10 | John F. Murray Jr., Software Compliance Expert, United States Food, Drug Administration, Nathanael Paul, Karen Sandler |
| Protecting E-healthcare Client Devices against Malware and Physical Theft | HealthSec '10 | Daisuke Mashima, Abhinav Srivastava, Jonathon Giffin, Mustaque Ahamad |