| Security Vulnerabilities, Exploits, and Attack Patterns: 15 Years of Art, Pseudo-Science, Fun, and Profit | USENIX Security '06 | Ivan Arce |
| How to Build a Low-Cost, Extended-Range RFID Skimmer | USENIX Security '06 | Ilan Kirschenbaum, Avishai Wool |
| Keyboards and Covert Channels | USENIX Security '06 | Gaurav Shah, Andres Molina |
| Lessons from the Sony CD DRM Episode | USENIX Security '06 | J. Alex Halderman, Edward W. Felten |
| Usable Security: Quo Vadis? | USENIX Security '06 | Dirk Balfanz, Konstantin Beznosov, Paul Van Oorschot, Ka-Ping Yee |
| Milk or Wine: Does Software Security Improve with Age? | USENIX Security '06 | Andy Ozment, Stuart E. Schechter |
| N-Variant Systems: A Secretless Framework for Security through Diversity | USENIX Security '06 | Benjamin Cox, David Evans |
| Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks | USENIX Security '06 | Wei Xu, Sandeep Bhatkar, R. Sekar |
| Signaling Vulnerabilities in Law Enforcement Wiretapping Systems | USENIX Security '06 | Matt Blaze |
| SANE: A Protection Architecture for Enterprise Networks | USENIX Security '06 | Martin Casado, Tal Garfinkel, Aditya Akella, Michael J. Freedman, Dan Boneh, Nick McKeown |
| PHAS: A Prefix Hijack Alert System | USENIX Security '06 | Mohit Lad, Daniel Massey, Dan Pei, Yiguo Wu, Beichuan Zhang, Lixia Zhang |
| Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting | USENIX Security '06 | Jason Franklin, Damon McCoy |
| Turing Around the Security Problem | USENIX Security '06 | Crispin Cowan |
| Major Security Blunders of the Past 30 Years | USENIX Security '06 | Virgil Gligor, Peter Neumann |
| Aspect-Oriented Programming: Radical Research in Modularity | USENIX Security '06 | Gregor Kiczales |
| Static Detection of Security Vulnerabilities in Scripting Languages | USENIX Security '06 | Yichen Xie, Alex Aiken |
| Rule-Based Static Analysis of Network Protocol Implementations | USENIX Security '06 | Octavian Udrea, Cristian Lumezanu |
| Evaluating SFI for a CISC Architecture | USENIX Security '06 | Stephen McCamant, Greg Morrisett |
| SigFree: A Signature-free Buffer Overflow Attack Blocker | USENIX Security '06 | Xinran Wang, Chi-Chun Pan |
| Polymorphic Blending Attacks | USENIX Security '06 | Prahlad Fogla, Monirul Sharif, Roberto Perdisci, Oleg Kolesnikov, Wenke Lee |
| Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection | USENIX Security '06 | Holger Dreger, Anja Feldmann |
| Behavior-based Spyware Detection | USENIX Security '06 | Engin Kirda, Christopher Kruegel |
| DRM Wars: The Next Generation | USENIX Security '06 | Ed Felten |
| An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data | USENIX Security '06 | Nick L. Petroni, Jr., Timothy Fraser, AAron Walters, William A. Arbaugh |
| vTPM: Virtualizing the Trusted Platform Module | USENIX Security '06 | Stefan Berger, Ramón Cáceres, Kenneth A. Goldman, Ronald Perez, Reiner Sailer, Leendert van Doorn |