| 2006 | 22nd Annual Computer Security Applications Conference (ACSAC 2006), 11-15 December 2006, Miami Beach, Florida, USA |
| 2006 | A Framework for a Collaborative DDoS Defense. George C. Oikonomou, Jelena Mirkovic, Peter L. Reiher, Max Robinson |
| 2006 | A General Dynamic Information Flow Tracking Framework for Security Applications. Lap-Chung Lam, Tzi-cker Chiueh |
| 2006 | A Module System for Isolating Untrusted Software Extensions. Philip W. L. Fong, Simon A. Orr |
| 2006 | A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs. Lillian Røstad, Ole Edsberg |
| 2006 | Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software. Chongkyung Kil, Jinsuk Jun, Christopher Bookholt, Jun Xu, Peng Ning |
| 2006 | Address-Space Randomization for Windows Systems. Lixin Li, James E. Just, R. Sekar |
| 2006 | Addressing SMTP-Based Mass-Mailing Activity within Enterprise Networks. David Whyte, Paul C. van Oorschot, Evangelos Kranakis |
| 2006 | An Internet Voting System Supporting User Privacy. Aggelos Kiayias, Michael Korman, David Walluck |
| 2006 | Anomaly Based Web Phishing Page Detection. Ying Pan, Xuhua Ding |
| 2006 | Automatic Evaluation of Intrusion Detection Systems. Frédéric Massicotte, François Gagnon, Yvan Labiche, Lionel C. Briand, Mathieu Couture |
| 2006 | Back to the Future: A Framework for Automatic Malware Removal and System Repair. Francis Hsu, Hao Chen, Thomas Ristenpart, Jason Li, Zhendong Su |
| 2006 | Backtracking Algorithmic Complexity Attacks against a NIDS. Randy Smith, Cristian Estan, Somesh Jha |
| 2006 | Bluetooth Worms: Models, Dynamics, and Defense Implications. Guanhua Yan, Stephan J. Eidenbenz |
| 2006 | Covert and Side Channels Due to Processor Architecture. Zhenghong Wang, Ruby B. Lee |
| 2006 | CryptoPage: An Efficient Secure Architecture with Memory Encryption, Integrity and Information Leakage Protection. Guillaume Duc, Ronan Keryell |
| 2006 | Data Sandboxing: A Technique for Enforcing Confidentiality Policies. Tejas Khatiwala, Raj Swaminathan, V. N. Venkatakrishnan |
| 2006 | Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine. Ravi Chandra Jammalamadaka, Timothy W. van der Horst, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian |
| 2006 | Detecting Policy Violations through Traffic Analysis. Jeffrey Horton, Reihaneh Safavi-Naini |
| 2006 | Engineering Sufficiently Secure Computing. Brian Witten |
| 2006 | Enhancing Collaborative Spam Detection with Bloom Filters. Jeff Yan, Pook Leong Cho |
| 2006 | Extended Protection against Stack Smashing Attacks without Performance Loss. Yves Younan, Davide Pozza, Frank Piessens, Wouter Joosen |
| 2006 | Fifteen Years after TX: A Look Back at High Assurance Multi-Level Secure Windowing. Jeremy Epstein |
| 2006 | Foreign Code Detection on the Windows/X86 Platform. Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chiueh |
| 2006 | From Languages to Systems: Understanding Practical Application Development in Security-typed Languages. Boniface Hicks, Kiyan Ahmadizadeh, Patrick D. McDaniel |
| 2006 | How to Automatically and Accurately Sandbox Microsoft IIS. Wei Li, Lap-Chung Lam, Tzi-cker Chiueh |
| 2006 | KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy. Dinei A. F. Florêncio, Cormac Herley |
| 2006 | Known/Chosen Key Attacks against Software Instruction Set Randomization. Yoav Weiss, Elena Gabriela Barrantes |
| 2006 | NetSpy: Automatic Generation of Spyware Signatures for NIDS. Hao Wang, Somesh Jha, Vinod Ganapathy |
| 2006 | Offloading IDS Computation to the GPU. Nigel Jacob, Carla E. Brodley |
| 2006 | On Detecting Camouflaging Worm. Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zhao |
| 2006 | PAST: Probabilistic Authentication of Sensor Timestamps. Ashish Gehani, Surendar Chandra |
| 2006 | PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware. Paul Royal, Mitch Halpin, David Dagon, Robert Edmonds, Wenke Lee |
| 2006 | Practical Attack Graph Generation for Network Defense. Kyle Ingols, Richard Lippmann, Keith Piwowarski |
| 2006 | Privacy and Security in Public Health: Maintaining the Delicate Balance between Personal Privacy and Population Safety. Dixie B. Baker |
| 2006 | Protecting Privacy in Key-Value Search Systems. Yinglian Xie, Michael K. Reiter, David R. O'Hallaron |
| 2006 | Risks of Untrustworthiness. Peter G. Neumann |
| 2006 | Secure Distributed Cluster Formation in Wireless Sensor Networks. Kun Sun, Pai Peng, Peng Ning, Cliff Wang |
| 2006 | Shamon: A System for Distributed Mandatory Access Control. Jonathan M. McCune, Trent Jaeger, Stefan Berger, Ramón Cáceres, Reiner Sailer |
| 2006 | Specification-Based Intrusion Detection in WLANs. Rupinder Gill, Jason Smith, Andrew J. Clark |
| 2006 | Static Detection of Vulnerabilities in x86 Executables. Marco Cova, Viktoria Felmetsger, Greg Banks, Giovanni Vigna |
| 2006 | Towards Database Firewall: Mining the Damage Spreading Patterns. Kun Bai, Peng Liu |
| 2006 | Using Attribute-Based Access Control to Enable Attribute-Based Messaging. Rakeshbabu Bobba, Omid Fatemieh, Fariba Khan, Carl A. Gunter, Himanshu Khurana |
| 2006 | V-COPS: A Vulnerability-Based Cooperative Alert Distribution System. Shiping Chen, Dongyu Liu, Songqing Chen, Sushil Jajodia |
| 2006 | Vulnerability Analysis of MMS User Agents. Collin Mulliner, Giovanni Vigna |