| The Three Cyber-War Fallacies | USENIX Security '11 | Dave Aitel |
| Welcome | HotSec '11 | Patrick McDaniel |
| Building Secure Robot Applications | HotSec '11 | Murph Finnicum, Samuel T. King |
| Security Fusion: A New Security Architecture for Resource-Constrained Environments | HotSec '11 | Suku Nair, Subil Abraham, Omar Al Ibrahim |
| DISTROY: Detecting Integrated Circuit Trojans with Compressive Measurements | HotSec '11 | Youngjune L. Gwon, H.T. Kung, Dario Vlah |
| Privacy-Preserving Applications on Smartphones | HotSec '11 | Yan Huang, Peter Chapman, David Evans |
| Public vs. Publicized: Content Use Trends and Privacy Expectations | HotSec '11 | Jessica Staddon, Andrew Swerdlow |
| Herbert West—Deanonymizer | HotSec '11 | Mihir Nanavati, Nathan Taylor, William Aiello, Andrew Warfield |
| Towards Practical Avoidance of Information Leakage in Enterprise Networks | HotSec '11 | Jason Croft, Matthew Caesar |
| Towards Client-side HTML Security Policies | HotSec '11 | Joel Weinberger, Adam Barth, Dawn Song |
| TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion | HotSec '11 | Liang Cai, Hao Chen |
| On Dynamic Malware Payloads Aimed at Programmable Logic Controllers | HotSec '11 | Stephen McLaughlin |
| Effective Digital Forensics Research Is Investigator-Centric | HotSec '11 | Robert J. Walls, Brian Neil Levine, Marc Liberatore, Clay Shields |
| Putting Out a HIT: Crowdsourcing Malware Installs | WOOT '11 | Chris Kanich, Stephen Checkoway |
| All Your Droid Are Belong to Us: A Survey of Current Android Attacks | WOOT '11 | Timothy Vidas, Daniel Votipka, Nicolas Christin |
| Exploiting the Hard-Working DWARF: Trojan and Exploit Techniques with No Native Executable Code | WOOT '11 | James Oakley |
| DieHarder: Securing the Heap | WOOT '11 | Gene Novark, Emery D. Berger |
| Vulnerability Extrapolation: Assisted Discovery of Vulnerabilities Using Machine Learning | WOOT '11 | Fabian Yamaguchi, Felix "FX" Lindner, Konrad Rieck |
| Exposing iClass Key Diversification | WOOT '11 | Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult |
| Media Access Control Address Spoofing Attacks against Port Security | WOOT '11 | Andrew Buhr, Dale Lindskog, Pavol Zavarsky, Ron Ruhl |
| Fragmentation Considered Vulnerable: Blindly Intercepting and Discarding Fragments | WOOT '11 | Yossi Gilad, Amir Herzberg |
| Killing the Myth of Cisco IOS Diversity: Recent Advances in Reliable Shellcode Design | WOOT '11 | Ang Cui, Jatin Kataria, Salvatore J. Stolfo |
| SkyNET: A 3G-Enabled Mobile Attack Drone and Stealth Botmaster | WOOT '11 | Theodore Reed, Joseph Geis, Sven Dietrich |
| Getting the Face Behind the Squares: Reconstructing Pixelized Video Streams | WOOT '11 | Ludovico Cavedon, Luca Foschini, Giovanni Vigna |
| Heat of the Moment: Characterizing the Efficacy of Thermal Camera-Based Attacks | WOOT '11 | Keaton Mowery, Sarah Meiklejohn, Stefan Savage |