| Rule-Based Static Analysis of Network Protocol Implementations | USENIX Security '06 | Octavian Udrea, Cristian Lumezanu |
| Evaluating SFI for a CISC Architecture | USENIX Security '06 | Stephen McCamant, Greg Morrisett |
| SigFree: A Signature-free Buffer Overflow Attack Blocker | USENIX Security '06 | Xinran Wang, Chi-Chun Pan |
| Security Vulnerabilities, Exploits, and Attack Patterns: 15 Years of Art, Pseudo-Science, Fun, and Profit | USENIX Security '06 | Ivan Arce |
| How to Build a Low-Cost, Extended-Range RFID Skimmer | USENIX Security '06 | Ilan Kirschenbaum, Avishai Wool |
| Keyboards and Covert Channels | USENIX Security '06 | Gaurav Shah, Andres Molina |
| Lessons from the Sony CD DRM Episode | USENIX Security '06 | J. Alex Halderman, Edward W. Felten |
| Usable Security: Quo Vadis? | USENIX Security '06 | Dirk Balfanz, Konstantin Beznosov, Paul Van Oorschot, Ka-Ping Yee |
| Milk or Wine: Does Software Security Improve with Age? | USENIX Security '06 | Andy Ozment, Stuart E. Schechter |
| N-Variant Systems: A Secretless Framework for Security through Diversity | USENIX Security '06 | Benjamin Cox, David Evans |
| Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks | USENIX Security '06 | Wei Xu, Sandeep Bhatkar, R. Sekar |
| Signaling Vulnerabilities in Law Enforcement Wiretapping Systems | USENIX Security '06 | Matt Blaze |
| Opening Remarks, Awards, and Keynote | USENIX Security '06 | |
| Keynote Address The Current State of the War on Terrorism and What It Means for Homeland Security and Technology | USENIX Security '06 | Richard A. Clarke |
| A Usability Study and Critique of Two Password Managers | USENIX Security '06 | Sonia Chiasson, P.C. van Oorschot, Robert Biddle |
| On the Release of CRLs in Public Key Infrastructure | USENIX Security '06 | Chengyu Ma, Nan Hu, Yingjiu Li |
| Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep's Clothing | USENIX Security '06 | Lucas Ballard, Fabian Monrose, Daniel Lopresti |
| Selling Security to Software Developers: Lessons Learned While Building a Commercial Static Analysis Tool | USENIX Security '06 | Brian Chess |
| An Introduction to Software Radio | USENIX ATC '06 | Eric Blossom |
| Hackers and Founders | USENIX ATC '06 | Paul Graham |
| Real Operating Systems for Real-time Motion Control | USENIX ATC '06 | Trevor Blackwell |
| Permissive Action Links, Nuclear Weapons, and the History of Public Key Cryptography | USENIX ATC '06 | Steven M. Bellovin |
| Gold and Fool's Gold: Successes, Failures, and Futures in Computer Systems Research | USENIX ATC '06 | Butler Lampson |
| Routing Without Tears, Bridging Without Danger | USENIX ATC '06 | Radia Perlman |
| Deploying a Sensor Network on an Active Volcano | USENIX ATC '06 | Matt Welsh |