 | End-to-End Arguments: The Internet and Beyond | USENIX Security '10 | David P. Reed |
 | Toward an Open and Secure Platform for Using the Web | USENIX Security '10 | Will Drewry |
 | Structuring Protocol Implementations to Protect Sensitive Data | USENIX Security '10 | Petr Marchenko, Brad Karp |
 | PrETP: Privacy-Preserving Electronic Toll Pricing | USENIX Security '10 | Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens |
 | An Analysis of Private Browsing Modes in Modern Browsers | USENIX Security '10 | Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh |
 | Windows 7 Security from a UNIX Perspective | USENIX Security '10 | Crispin Cowan |
 | BotGrep: Finding P2P Bots with Structured Graph Analysis | USENIX Security '10 | Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov |
 | Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems | USENIX Security '10 | Chad R. Meiners, Jignesh Patel, Eric Norige, Eric Torng, Alex X. Liu |
 | Searching the Searchers with SearchAudit | USENIX Security '10 | John P. John, University of Washington, Microsoft Research Silicon Valley, Fang Yu, Yinglian Xie, Martín Abadi, Microsoft Research Silicon Valley, University of California, Arvind Krishnamurthy |
 | Docile No More: The Tussle to Redefine the Internet | USENIX Security '10 | Program Director at the Center for Strategic, James Lewis, Senior Fellow, International Studies |
 | Toward Automated Detection of Logic Vulnerabilities in Web Applications | USENIX Security '10 | Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna |
 | Baaz: A System for Detecting Access Control Misconfigurations | USENIX Security '10 | Tathagata Das, Ranjita Bhagwan, Prasad Naldurg |
 | Cling: A Memory Allocator to Mitigate Dangling Pointers | USENIX Security '10 | Periklis Akritidis, Niometrics , Singapore , University of Cambridge |
| Staying Safe on the Web Yesterday, Today, and Tomorrow | USENIX Security '10 | Sid Stamm, Privacy Nut at Mozilla |
 | ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash | USENIX Security '10 | C. Chris Erway, Alptekin Küpçü, Theodora Hinkle, Anna Lysyanskaya |
 | P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users | USENIX Security '10 | Yitao Duan, John Canny, Justin Zhan |
 | SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics | USENIX Security '10 | Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos |
 | The Evolution of the Flash Security Model | USENIX Security '10 | Peleus Uhley |
 | Dude, Where's That IP? Circumventing Measurement-based IP Geolocation | USENIX Security '10 | Phillipa Gill, Yashar Ganjali, Bernard Wong |
 | Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking | USENIX Security '10 | Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Crandall |
 | Proving Voltaire Right: Security Blunders Dumber Than Dog Snot | USENIX Security '10 | Roger G. Johnston |
 | Adapting Software Fault Isolation to Contemporary CPU Architectures | USENIX Security '10 | David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, Brad Chen |
 | Making Linux Protection Mechanisms Egalitarian with UserFS | USENIX Security '10 | Taesoo Kim, Nickolai Zeldovich |
 | Capsicum: Practical Capabilities for UNIX | USENIX Security '10 | Robert N.M. Watson, Jonathan Anderson, Ben Laurie, Kris Kennaway |
 | Protecting E-healthcare Client Devices against Malware and Physical Theft | HealthSec '10 | Daisuke Mashima, Abhinav Srivastava, Jonathon Giffin, Mustaque Ahamad |