| BOTMAGNIFIER: Locating Spambots on the Internet | USENIX Security '11 | Gianluca Stringhini, Thorsten Holz, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna |
| JACKSTRAWS: Picking Command and Control Connections from Bot Traffic | USENIX Security '11 | Gregoire Jacob, Ralf Hund, Christopher Kruegel, Thorsten Holz |
| SSL/TLS Certificates: Threat or Menace? | USENIX Security '11 | Eric Rescorla, Adam Langley, Brian Smith, Stephen Schultze, Steve Kent |
| Telex: Anticensorship in the Network Infrastructure | USENIX Security '11 | Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman |
| PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval | USENIX Security '11 | Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg |
| The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion | USENIX Security '11 | Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, Hovav Shacham |
| Pico: No More Passwords! | USENIX Security '11 | Frank Stajano |
| Differential Privacy Under Fire | USENIX Security '11 | Andreas Haeberlen, Benjamin C. Pierce, Arjun Narayan |
| Outsourcing the Decryption of ABE Ciphertexts | USENIX Security '11 | Matthew Green, Susan Hohenberger, Brent Waters |
| Faster Secure Two-Party Computation Using Garbled Circuits | USENIX Security '11 | Yan Huang, David Evans, Jonathan Katz, Lior Malka |
| The Cloud-y Future of Security Technologies | USENIX Security '11 | Adam O'Donnell |
| Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System | USENIX Security '11 | Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman, Kevin Xu, Matt Blaze |
| Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space | USENIX Security '11 | Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, Edgar Weippl |
| Comprehensive Experimental Analyses of Automotive Attack Surfaces | USENIX Security '11 | Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno |
| Forensic Triage for Mobile Phones with DEC0DE | USENIX Security '11 | Robert J. Walls, Erik Learned-Miller, Brian Neil Levine |
| mCarve: Carving Attributed Dump Sets | USENIX Security '11 | Ton van Deursen, Sjouke Mauw, Saša Radomirović |
| SHELLOS: Enabling Fast Detection and Forensic Analysis of Code Injection Attacks | USENIX Security '11 | Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose, Niels Provos |
| Crossing the Chasm: Pitching Security Research to Mainstream Browser Vendors | USENIX Security '11 | Collin Jackson |
| MACE: Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery | USENIX Security '11 | Chia Yuan Cho, Domagoj Babić, Pongsin Poosankam, Kevin Zhijie Chen, Edward XueJun Wu, Dawn Song |
| Static Detection of Access Control Vulnerabilities in Web Applications | USENIX Security '11 | Fangqi Sun, Liang Xu, Zhendong Su |
| ADsafety: Type-Based Verification of JavaScript Sandboxing | USENIX Security '11 | Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi |
| I'm from the Government and I'm Here to Help: Perspectives from a Privacy Tech Wonk | USENIX Security '11 | Tara Whalen |
| Measuring Pay-per-Install: The Commoditization of Malware Distribution | USENIX Security '11 | Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson |
| Dirty Jobs: The Role of Freelance Labor in Web Service Abuse | USENIX Security '11 | Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker |
| Show Me the Money: Characterizing Spam-advertised Revenue | USENIX Security '11 | Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorson, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey M. Voelker, Stefan Savage |