| 2010 | @spam: the underground on 140 characters or less. Chris Grier, Kurt Thomas, Vern Paxson, Chao Michael Zhang |
| 2010 | A cloud based SIM DRM scheme for the mobile internet. Peng Zou, Chaokun Wang, Zhang Liu, Jianmin Wang, Jia-Guang Sun |
| 2010 | A control point for reducing root abuse of file-system privileges. Glenn Wurster, Paul C. van Oorschot |
| 2010 | A methodology for empirical analysis of permission-based security models and its application to android. David Barrera, Hilmi Günes Kayacik, Paul C. van Oorschot, Anil Somayaji |
| 2010 | A new framework for efficient password-based authenticated key exchange. Adam Groce, Jonathan Katz |
| 2010 | A portable TPM based on USB key. Dawei Zhang, Zhen Han, Guangwen Yan |
| 2010 | A privacy recommendation wizard for users of social networking sites. Lujun Fang, Heedo Kim, Kristen LeFevre, Aaron Tami |
| 2010 | Abstraction by set-membership: verifying security protocols and web services with databases. Sebastian Mödersheim |
| 2010 | AccessMiner: using system-centric models for malware protection. Andrea Lanzi, Davide Balzarotti, Christopher Kruegel, Mihai Christodorescu, Engin Kirda |
| 2010 | Accountability: definition and relationship to verifiability. Ralf Küsters, Tomasz Truderung, Andreas Vogt |
| 2010 | Ad hoc broadcast encryption. Qianhong Wu, Bo Qin, Lei Zhang, Josep Domingo-Ferrer |
| 2010 | Algebraic pseudorandom functions with improved efficiency from the augmented cascade. Dan Boneh, Hart William Montgomery, Ananth Raghunathan |
| 2010 | An empirical study of privacy-violating information flows in JavaScript web applications. Dongseok Jang, Ranjit Jhala, Sorin Lerner, Hovav Shacham |
| 2010 | An implementation of event and filter confidentiality in pub/sub systems and its application to e-health. Mihaela Ion, Giovanni Russello, Bruno Crispo |
| 2010 | An improved algorithm for tor circuit scheduling. Can Tang, Ian Goldberg |
| 2010 | Assessing trust in uncertain information using Bayesian description logic. Achille Fokoue, Mudhakar Srivatsa, Robert Young |
| 2010 | Attacking and fixing PKCS#11 security tokens. Matteo Bortolozzo, Matteo Centenaro, Riccardo Focardi, Graham Steel |
| 2010 | Attacks and design of image recognition CAPTCHAs. Bin B. Zhu, Jeff Yan, Qiujie Li, Chao Yang, Jia Liu, Ning Xu, Meng Yi, Kaiwei Cai |
| 2010 | BLADE: an attack-agnostic approach for preventing drive-by malware infections. Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wenke Lee |
| 2010 | Building efficient fully collusion-resilient traitor tracing and revocation schemes. Sanjam Garg, Abishek Kumarasubramanian, Amit Sahai, Brent Waters |
| 2010 | CRAFT: a new secure congestion control architecture. Dongho Kim, Jerry T. Chiang, Yih-Chun Hu, Adrian Perrig, P. R. Kumar |
| 2010 | CardSpace in the cloud. David W. Chadwick, George Inman, Paul Coxwell |
| 2010 | Computational indistinguishability logic. Gilles Barthe, Marion Daubignard, Bruce M. Kapron, Yassine Lakhnech |
| 2010 | Computationally sound verification of source code. Michael Backes, Matteo Maffei, Dominique Unruh |
| 2010 | DIFC programs by automatic instrumentation. William R. Harris, Somesh Jha, Thomas W. Reps |
| 2010 | Demonstrating cognitive packet network resilience to worm attacks. Georgia Sakellari, Erol Gelenbe |
| 2010 | Designing router scheduling policies: a privacy perspective. Sachin Kadloor, Xun Gong, Negar Kiyavash, Parv Venkitasubramaniam |
| 2010 | Designs to account for trust in social network-based sybil defenses. Abedelaziz Mohaisen, Nicholas Hopper, Yongdae Kim |
| 2010 | Detecting and characterizing social spam campaigns. Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Yan Chen, Ben Y. Zhao |
| 2010 | Developing security protocols by refinement. Christoph Sprenger, David A. Basin |
| 2010 | Dialog-based payload aggregation for intrusion detection. Tobias Limmer, Falko Dressler |
| 2010 | DieHarder: securing the heap. Gene Novark, Emery D. Berger |
| 2010 | Dismantling SecureMemory, CryptoMemory and CryptoRF. Flavio D. Garcia, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur |
| 2010 | Dissecting one click frauds. Nicolas Christin, Sally S. Yanagihara, Keisuke Kamataki |
| 2010 | Dissent: accountable anonymous group messaging. Henry Corrigan-Gibbs, Bryan Ford |
| 2010 | Dynamic window based multihop authentication for WSN. Lan Yao, Zhiliang Yu, Tie Zhang, Fuxiang Gao |
| 2010 | Efficient provable data possession for hybrid clouds. Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau |
| 2010 | Efficient sensor node authentication via 3GPP mobile communication networks. Kyusuk Han, Jangseong Kim, Kwangjo Kim, Taeshik Shon |
| 2010 | Enhancing resilience of probabilistic key pre-distribution schemes for WSNs through hash chaining. Walid Bechkit, Abdelmadjid Bouabdallah, Yacine Challal |
| 2010 | Exploiting social networking sites for spam. Markus Huber, Martin Mulazzani, Edgar R. Weippl, Gerhard Kitzler, Sigrun Goluch |
| 2010 | Fingerprinting websites using remote traffic analysis. Xun Gong, Negar Kiyavash, Nikita Borisov |
| 2010 | Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. Guojun Wang, Qin Liu, Jie Wu |
| 2010 | HyperSentry: enabling stealthy in-context measurement of hypervisor integrity. Ahmed M. Azab, Peng Ning, Zhi Wang, Xuxian Jiang, Xiaolan Zhang, Nathan C. Skalsky |
| 2010 | In God we trust all others we monitor. Patrick Stewin, Jean-Pierre Seifert |
| 2010 | In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems. Qiyan Wang, Prateek Mittal, Nikita Borisov |
| 2010 | Inference and analysis of formal models of botnet command and control protocols. Chia Yuan Cho, Domagoj Babic, Eui Chul Richard Shin, Dawn Song |
| 2010 | Information security for sensors by overwhelming random sequences and permutations. Shlomi Dolev, Niv Gilboa, Marina Kopeetsky, Giuseppe Persiano, Paul G. Spirakis |
| 2010 | Input generation via decomposition and re-stitching: finding bugs in Malware. Juan Caballero, Pongsin Poosankam, Stephen McCamant, Domagoj Babic, Dawn Song |
| 2010 | Laptop theft: a case study on the effectiveness of security mechanisms in open organizations. Trajce Dimkov, Wolter Pieters, Pieter H. Hartel |
| 2010 | Losing control of the internet: using the data plane to attack the control plane. Max Schuchard, Abedelaziz Mohaisen, Denis Foo Kune, Nicholas Hopper, Yongdae Kim, Eugene Y. Vasserman |
| 2010 | Mimimorphism: a new approach to binary code obfuscation. Zhenyu Wu, Steven Gianvecchio, Mengjun Xie, Haining Wang |
| 2010 | Mobile location tracking in metro areas: malnets and others. Nathaniel Husted, Steven A. Myers |
| 2010 | Modeling attacks on physical unclonable functions. Ulrich Rührmair, Frank Sehnke, Jan Sölter, Gideon Dror, Srinivas Devadas, Jürgen Schmidhuber |
| 2010 | NoTamper: automatic blackbox detection of parameter tampering opportunities in web applications. Prithvi Bisht, Timothy L. Hinrichs, Nazari Skrupsky, Radoslaw Bobrowicz, V. N. Venkatakrishnan |
| 2010 | On efficient ciphertext-policy attribute based encryption and broadcast encryption: extended abstract. Zhibin Zhou, Dijiang Huang |
| 2010 | On pairing constrained wireless devices based on secrecy of auxiliary channels: the case of acoustic eavesdropping. Tzipora Halevi, Nitesh Saxena |
| 2010 | On the (in)security of IPsec in MAC-then-encrypt configurations. Jean Paul Degabriele, Kenneth G. Paterson |
| 2010 | On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption. Ueli Maurer, Björn Tackmann |
| 2010 | On verifying stateful dataflow processing services in large-scale cloud systems. Juan Du, Xiaohui Gu, Ting Yu |
| 2010 | PinDr0p: using single-ended audio features to determine call provenance. Vijay A. Balasubramaniyan, Aamir Poonawalla, Mustaque Ahamad, Michael T. Hunter, Patrick Traynor |
| 2010 | Platform-independent programs. Sang Kil Cha, Brian Pak, David Brumley, Richard Jay Lipton |
| 2010 | Practical leakage-resilient identity-based encryption from simple assumptions. Sherman S. M. Chow, Yevgeniy Dodis, Yannis Rouselakis, Brent Waters |
| 2010 | Practical leakage-resilient pseudorandom generators. Yu Yu, François-Xavier Standaert, Olivier Pereira, Moti Yung |
| 2010 | Predictive black-box mitigation of timing channels. Aslan Askarov, Danfeng Zhang, Andrew C. Myers |
| 2010 | Privacy and robustness for data aggregation in wireless sensor networks. Marian Kamal Iskander, Adam J. Lee, Daniel Mossé |
| 2010 | Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010 Ehab Al-Shaer, Angelos D. Keromytis, Vitaly Shmatikov |
| 2010 | Protecting browsers from cross-origin CSS attacks. Lin-Shung Huang, Zack Weinberg, Chris Evans, Collin Jackson |
| 2010 | Protecting location privacy against inference attacks. Kazuhiro Minami, Nikita Borisov |
| 2010 | Protecting portable storage with host validation. Kevin R. B. Butler, Stephen E. McLaughlin, Patrick D. McDaniel |
| 2010 | Recruiting new tor relays with BRAIDS. Rob Jansen, Nicholas Hopper, Yongdae Kim |
| 2010 | Rendezvous tunnel for anonymous publishing. Ofer Hermoni, Niv Gilboa, Eyal Felstaine, Yuval Elovici, Shlomi Dolev |
| 2010 | Retaining sandbox containment despite bugs in privileged memory-safe code. Justin Cappos, Armon Dadgar, Jeff Rasley, Justin Samuel, Ivan Beschastnikh, Cosmin Barsan, Arvind Krishnamurthy, Thomas E. Anderson |
| 2010 | Return-oriented programming without returns. Stephen Checkoway, Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Hovav Shacham, Marcel Winandy |
| 2010 | Robusta: taming the native beast of the JVM. Joseph Siefers, Gang Tan, Greg Morrisett |
| 2010 | SecTag: a multi-policy supported secure web tag framework. Ruixuan Li, Meng Dong, Bin Liu, Jianfeng Lu, Xiaopu Ma, Kai Li |
| 2010 | Secure dynamic code generation against spraying. Tao Wei, Tielei Wang, Lei Duan, Jing Luo |
| 2010 | Secure encounter-based social networks: requirements, challenges, and designs. Abedelaziz Mohaisen, Eugene Y. Vasserman, Max Schuchard, Denis Foo Kune, Yongdae Kim |
| 2010 | Secure latency estimation with treeple. Eric Chan-Tin, Nicholas Hopper |
| 2010 | Secure online banking on untrusted computers. Yanlin Peng, Wenji Chen, J. Morris Chang, Yong Guan |
| 2010 | Secure text processing with applications to private DNA matching. Jonathan Katz, Lior Malka |
| 2010 | Security analysis of India's electronic voting machines. Scott Wolchok, Eric Wustrow, J. Alex Halderman, Hari K. Prasad, Arun Kankipati, Sai Krishna Sakhamuri, Vasavya Yagati, Rop Gonggrijp |
| 2010 | Sidebuster: automated detection and quantification of side-channel leaks in web application development. Kehuan Zhang, Zhou Li, Rui Wang, Xiaofeng Wang, Shuo Chen |
| 2010 | Size-based scheduling: a recipe for DDOS? Abdul Serwadda, Vir V. Phoha, Idris A. Rai |
| 2010 | Spectrum based fraud detection in social networks. Xiaowei Ying, Xintao Wu, Daniel Barbará |
| 2010 | Survivable key compromise in software update systems. Justin Samuel, Nick Mathewson, Justin Cappos, Roger Dingledine |
| 2010 | Symbolic security analysis of ruby-on-rails web applications. Avik Chaudhuri, Jeffrey S. Foster |
| 2010 | Synchronized aggregate signatures: new definitions, constructions and applications. Jae Hyun Ahn, Matthew Green, Susan Hohenberger |
| 2010 | TAPS: automatically preparing safe SQL queries. Prithvi Bisht, A. Prasad Sistla, V. N. Venkatakrishnan |
| 2010 | TASTY: tool for automating secure two-party computations. Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg |
| 2010 | TEE: a virtual DRTM based execution environment for secure cloud-end computing. Weiqi Dai, Hai Jin, Deqing Zou, Shouhuai Xu, Weide Zheng, Lei Shi |
| 2010 | Testing metrics for password creation policies by attacking large sets of revealed passwords. Matt Weir, Sudhir Aggarwal, Michael P. Collins, Henry Stern |
| 2010 | The security of modern password expiration: an algorithmic framework and empirical analysis. Yinqian Zhang, Fabian Monrose, Michael K. Reiter |
| 2010 | Timing attacks on PIN input devices. Denis Foo Kune, Yongdae Kim |
| 2010 | Trail of bytes: efficient support for forensic analysis. Srinivas Krishnan, Kevin Z. Snow, Fabian Monrose |
| 2010 | User-friendly matching protocol for online social networks. Qiang Tang |
| 2010 | Virtual browser: a web-level sandbox to secure third-party JavaScript without sacrificing functionality. Yinzhi Cao, Zhichun Li, Vaibhav Rastogi, Yan Chen |
| 2010 | Worry-free encryption: functional encryption with public keys. Amit Sahai, Hakan Seyalioglu |
| 2010 | XACML policy performance evaluation using a flexible load testing framework. Bernard Butler, Brendan Jennings, Dmitri Botvich |
| 2010 | iFriendU: leveraging 3-cliques to enhance infiltration attacks in online social networks. Rahul Potharaju, Bogdan Carbunar, Cristina Nita-Rotaru |