| 2007 | Alpaca: extensible authorization for distributed services. Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, Robert Morris, M. Frans Kaashoek |
| 2007 | An analysis of browser domain-isolation bugs and a light-weight transparent defense mechanism. Shuo Chen, David Ross, Yi-Min Wang |
| 2007 | An independent audit framework for software dependent voting systems. Sujata Garera, Aviel D. Rubin |
| 2007 | An information-theoretic model for adaptive side-channel attacks. Boris Köpf, David A. Basin |
| 2007 | An inquiry into the nature and causes of the wealth of internet miscreants. Jason Franklin, Adrian Perrig, Vern Paxson, Stefan Savage |
| 2007 | Analyzing the vulnerability of superpeer networks against attack. Bivas Mitra, Fernando Peruani, Sujoy Ghose, Niloy Ganguly |
| 2007 | Asirra: a CAPTCHA that exploits interest-aligned manual image categorization. Jeremy Elson, John R. Douceur, Jon Howell, Jared Saul |
| 2007 | Assurance and evaluation: what next? Steven B. Lipner |
| 2007 | Attribute-based encryption with non-monotonic access structures. Rafail Ostrovsky, Amit Sahai, Brent Waters |
| 2007 | Automated detection of persistent kernel control-flow attacks. Nick L. Petroni Jr., Michael W. Hicks |
| 2007 | Automaton segmentation: a new approach to preserve privacy in xml information brokering. Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hsien Chu |
| 2007 | Beamauth: two-factor web authentication with a bookmark. Ben Adida |
| 2007 | Blacklistable anonymous credentials: blocking misbehaving users without ttps. Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith |
| 2007 | CANDID: preventing sql injection attacks using dynamic candidate evaluations. Sruthi Bandhakavi, Prithvi Bisht, P. Madhusudan, V. N. Venkatakrishnan |
| 2007 | Chosen-ciphertext secure proxy re-encryption. Ran Canetti, Susan Hohenberger |
| 2007 | ConceptDoppler: a weather tracker for internet censorship. Jedidiah R. Crandall, Daniel Zinn, Michael Byrd, Earl T. Barr, Rich East |
| 2007 | Covert channels in privacy-preserving identification systems. Daniel V. Bailey, Dan Boneh, Eu-Jin Goh, Ari Juels |
| 2007 | Cryptanalysis of the windows random number generator. Leo Dorrendorf, Zvi Gutterman, Benny Pinkas |
| 2007 | Denial of service or denial of security? Nikita Borisov, George Danezis, Prateek Mittal, Parisa Tabriz |
| 2007 | Detecting covert timing channels: an entropy-based approach. Steven Gianvecchio, Haining Wang |
| 2007 | Do background images improve "draw a secret" graphical passwords? Paul Dunphy, Jeff Yan |
| 2007 | Dynamic pharming attacks and locked same-origin policies for web browsers. Chris Karlof, Umesh Shankar, J. Doug Tygar, David A. Wagner |
| 2007 | Efficient policy analysis for administrative role based access control. Scott D. Stoller, Ping Yang, C. R. Ramakrishnan, Mikhail I. Gofman |
| 2007 | Filtering spam with behavioral blacklisting. Anirudh Ramachandran, Nick Feamster, Santosh S. Vempala |
| 2007 | Forward-secure signatures in untrusted update environments: efficient and generic constructions. Benoît Libert, Jean-Jacques Quisquater, Moti Yung |
| 2007 | Hardware-rooted trust for secure key management and transient trust. Jeffrey S. Dwoskin, Ruby B. Lee |
| 2007 | Harvesting verifiable challenges from oblivious online sources. J. Alex Halderman, Brent Waters |
| 2007 | Highly efficient techniques for network forensics. Miroslav Ponec, Paul Giura, Hervé Brönnimann, Joel Wein |
| 2007 | How much anonymity does network latency leak? Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Tin |
| 2007 | Information disclosure under realistic assumptions: privacy versus optimality. Lei Zhang, Sushil Jajodia, Alexander Brodsky |
| 2007 | Memsherlock: an automated debugger for unknown memory corruption vulnerabilities. Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu |
| 2007 | Multi-module vulnerability analysis of web-based applications. Davide Balzarotti, Marco Cova, Viktoria Felmetsger, Giovanni Vigna |
| 2007 | On the accuracy of decentralized virtual coordinate systems in adversarial networks. David John Zage, Cristina Nita-Rotaru |
| 2007 | On the infeasibility of modeling polymorphic shellcode. Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo |
| 2007 | Optimal security hardening using multi-objective optimization on attack tree models of networks. Rinku Dewri, Nayot Poolsappasit, Indrajit Ray, L. Darrell Whitley |
| 2007 | Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing. Alexandra Boldyreva, Craig Gentry, Adam O'Neill, Dae Hyun Yum |
| 2007 | Panorama: capturing system-wide information flow for malware detection and analysis. Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, Engin Kirda |
| 2007 | Polyglot: automatic extraction of protocol message format using dynamic binary analysis. Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiaodong Song |
| 2007 | Pors: proofs of retrievability for large files. Ari Juels, Burton S. Kaliski Jr. |
| 2007 | Predicting vulnerable software components. Stephan Neuhaus, Thomas Zimmermann, Christian Holler, Andreas Zeller |
| 2007 | Preserving privacy in gps traces via uncertainty-aware path cloaking. Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady |
| 2007 | Privacy preserving error resilient dna searching through oblivious automata. Juan Ramón Troncoso-Pastoriza, Stefan Katzenbeisser, Mehmet Utku Celik |
| 2007 | Privacy-preserving remote diagnostics. Justin Brickell, Donald E. Porter, Vitaly Shmatikov, Emmett Witchel |
| 2007 | Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007 Peng Ning, Sabrina De Capitani di Vimercati, Paul F. Syverson |
| 2007 | Protecting browsers from dns rebinding attacks. Collin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh |
| 2007 | Provable data possession at untrusted stores. Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary N. J. Peterson, Dawn Xiaodong Song |
| 2007 | Provably secure ciphertext policy ABE. Ling Cheung, Calvin C. Newport |
| 2007 | Robust computational secret sharing and a unified account of classical secret-sharing goals. Phillip Rogaway, Mihir Bellare |
| 2007 | Robust group key agreement using short broadcasts. Stanislaw Jarecki, Jihye Kim, Gene Tsudik |
| 2007 | Robust key generation from signal envelopes in wireless networks. Babak Azimi-Sadjadi, Aggelos Kiayias, Alejandra Mercado, Bülent Yener |
| 2007 | Secure two-party k-means clustering. Paul Bunn, Rafail Ostrovsky |
| 2007 | Security under key-dependent inputs. Shai Halevi, Hugo Krawczyk |
| 2007 | Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention. José M. González, Vern Paxson, Nicholas Weaver |
| 2007 | Split-ballot voting: everlasting privacy with distributed trust. Tal Moran, Moni Naor |
| 2007 | Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. Xuxian Jiang, Xinyuan Wang, Dongyan Xu |
| 2007 | The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86). Hovav Shacham |
| 2007 | Towards automated provisioning of secure virtualized networks. Serdar Cabuk, Chris I. Dalton, Harigovind V. Ramasamy, Matthias Schunter |