| Faster Secure Two-Party Computation Using Garbled Circuits | USENIX Security '11 | Yan Huang, David Evans, Jonathan Katz, Lior Malka |
| The Cloud-y Future of Security Technologies | USENIX Security '11 | Adam O'Donnell |
| Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System | USENIX Security '11 | Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman, Kevin Xu, Matt Blaze |
| Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space | USENIX Security '11 | Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, Edgar Weippl |
| Comprehensive Experimental Analyses of Automotive Attack Surfaces | USENIX Security '11 | Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno |
| Forensic Triage for Mobile Phones with DEC0DE | USENIX Security '11 | Robert J. Walls, Erik Learned-Miller, Brian Neil Levine |
| mCarve: Carving Attributed Dump Sets | USENIX Security '11 | Ton van Deursen, Sjouke Mauw, Saša Radomirović |
| SHELLOS: Enabling Fast Detection and Forensic Analysis of Code Injection Attacks | USENIX Security '11 | Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose, Niels Provos |
| Crossing the Chasm: Pitching Security Research to Mainstream Browser Vendors | USENIX Security '11 | Collin Jackson |
| MACE: Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery | USENIX Security '11 | Chia Yuan Cho, Domagoj Babić, Pongsin Poosankam, Kevin Zhijie Chen, Edward XueJun Wu, Dawn Song |
| Static Detection of Access Control Vulnerabilities in Web Applications | USENIX Security '11 | Fangqi Sun, Liang Xu, Zhendong Su |
| ADsafety: Type-Based Verification of JavaScript Sandboxing | USENIX Security '11 | Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi |
| I'm from the Government and I'm Here to Help: Perspectives from a Privacy Tech Wonk | USENIX Security '11 | Tara Whalen |
| Measuring Pay-per-Install: The Commoditization of Malware Distribution | USENIX Security '11 | Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson |
| Dirty Jobs: The Role of Freelance Labor in Web Service Abuse | USENIX Security '11 | Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker |
| Show Me the Money: Characterizing Spam-advertised Revenue | USENIX Security '11 | Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorson, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey M. Voelker, Stefan Savage |
| Privacy in the Age of Augmented Reality | USENIX Security '11 | Alessandro Acquisti |
| Secure In-Band Wireless Pairing | USENIX Security '11 | Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi |
| TRESOR Runs Encryption Securely Outside RAM | USENIX Security '11 | Tilo Müller, Felix C. Freiling, Andreas Dewald |
| Bubble Trouble: Off-Line De-Anonymization of Bubble Forms | USENIX Security '11 | Joseph A. Calandrino, William Clarkson, Edward W. Felten |
| Opening Remarks, Awards, and Keynote Address | USENIX Security '11 | David Wagner |
| Network Security in the Medium Term: 2061–2561 AD | USENIX Security '11 | Charles Stross |
| Fast and Precise Sanitizer Analysis with BEK | USENIX Security '11 | Pieter Hooimeijer, Benjamin Livshits, David Molnar, Prateek Saxena, Margus Veanes |
| Toward Secure Embedded Web Interfaces | USENIX Security '11 | Baptiste Gourdin, Chinmay Soman, Hristo Bojinov, Elie Bursztein |
| ZOZZLE: Fast and Precise In-Browser JavaScript Malware Detection | USENIX Security '11 | Charlie Curtsinger, Benjamin Livshits, Benjamin Zorn, Christian Seifert |