| On the Security of Election Audits with Low Entropy Randomness | EVT/WOTE '09 | Eric Rescorla |
 | Modern Exploitation and Memory Protection Bypasses | USENIX Security '09 | Alexander Sotirov |
 | Opening Remarks and Awards | USENIX Security '09 | Fabian Monrose |
 | Keynote Address Android: Securing a Mobile Platform from the Ground Up | USENIX Security '09 | |
 | Compromising Electromagnetic Emanations of Wired and Wireless Keyboards | USENIX Security '09 | |
 | Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems | USENIX Security '09 | |
 | A Practical Congestion Attack on Tor Using Long Paths | USENIX Security '09 | |
 | The Building Security in Maturity Model (BSIMM) | USENIX Security '09 | Gary McGraw, Brian Chess |
 | Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors | USENIX Security '09 | |
 | Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs | USENIX Security '09 | |
 | NOZZLE: A Defense Against Heap-spraying Code Injection Attacks | USENIX Security '09 | |
 | Toward a New Legal Framework for Cybersecurity | USENIX Security '09 | |
 | Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine | USENIX Security '09 | |
 | Improving Tor using a TCP-over-DTLS Tunnel | USENIX Security '09 | |
 | Locating Prefix Hijackers using LOCK | USENIX Security '09 | |
 | Modern Exploitation and Memory Protection Bypasses | USENIX Security '09 | Alexander Sotirov |
 | GATEKEEPER: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code | USENIX Security '09 | |
 | Cross-Origin JavaScript Capability Leaks: Detection, Exploitation, and Defense | USENIX Security '09 | |
 | Memory Safety for Low-Level Software/Hardware Interactions | USENIX Security '09 | |
 | Designing Trustworthy User Agents for a Hostile Web | USENIX Security '09 | |
 | Physical-layer Identification of RFID Devices | USENIX Security '09 | |
 | CCCP: Secure Remote Storage for Computational RFIDs | USENIX Security '09 | |
 | Jamming-resistant Broadcast Communication without Shared Keys | USENIX Security '09 | |
 | xBook: Redesigning Privacy Control in Social Networking Platforms | USENIX Security '09 | |
 | Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications | USENIX Security '09 | |