| 2011 | (sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers. Philip Marquardt, Arunabh Verma, Henry Carter, Patrick Traynor |
| 2011 | A composable computational soundness notion. Véronique Cortier, Bogdan Warinschi |
| 2011 | AmazonIA: when elasticity snaps back. Sven Bugiel, Stefan Nürnberger, Thomas Pöppelmann, Ahmad-Reza Sadeghi, Thomas Schneider |
| 2011 | An efficient user verification system via mouse movements. Nan Zheng, Aaron Paloski, Haining Wang |
| 2011 | Android permissions demystified. Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David A. Wagner |
| 2011 | App isolation: get the security of multiple browsers with just one. Eric Yawei Chen, Jason Bau, Charles Reis, Adam Barth, Collin Jackson |
| 2011 | Auctions in do-not-track compliant internet advertising. Alexey Reznichenko, Saikat Guha, Paul Francis |
| 2011 | Automated black-box detection of side-channel vulnerabilities in web applications. Peter Chapman, David Evans |
| 2011 | Automatic error finding in access-control policies. Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripunitara, Martin C. Rinard, Steve J. Chapin |
| 2011 | Automatically optimizing secure computation. Florian Kerschbaum |
| 2011 | BitShred: feature hashing malware for scalable triage and semantic analysis. Jiyong Jang, David Brumley, Shobha Venkataraman |
| 2011 | Ciphers that securely encipher their own keys. Mihir Bellare, David Cash, Sriram Keelveedhi |
| 2011 | Cirripede: circumvention infrastructure using router redirection with plausible deniability. Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesar, Nikita Borisov |
| 2011 | Cloak and dagger: dynamics of web search cloaking. David Y. Wang, Stefan Savage, Geoffrey M. Voelker |
| 2011 | Combining control-flow integrity and static analysis for efficient and validated data sandboxing. Bin Zeng, Gang Tan, Greg Morrisett |
| 2011 | Composability of bellare-rogaway key exchange protocols. Christina Brzuska, Marc Fischlin, Bogdan Warinschi, Stephen C. Williams |
| 2011 | Composition theorems without pre-established session identifiers. Ralf Küsters, Max Tuengerthal |
| 2011 | Context-sensitive auto-sanitization in web templating languages using type qualifiers. Mike Samuel, Prateek Saxena, Dawn Song |
| 2011 | Countering GATTACA: efficient and secure testing of fully-sequenced human genomes. Pierre Baldi, Roberta Baronio, Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik |
| 2011 | Crouching tiger - hidden payload: security risks of scalable vectors graphics. Mario Heiderich, Tilman Frosch, Meiko Jensen, Thorsten Holz |
| 2011 | Cryptographic primitives for building secure and privacy respecting protocols. Jan Camenisch |
| 2011 | Demo: a comprehensive framework enabling data-minimizing authentication. Patrik Bichsel, Franz-Stefan Preiss |
| 2011 | Demo: secure computation in JavaScript. Axel Schröpfer, Florian Kerschbaum |
| 2011 | Demo: the f Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva, Olivier Savry, Cédric Vérhilac |
| 2011 | Deobfuscation of virtualization-obfuscated software: a semantics-based approach. Kevin Coogan, Gen Lu, Saumya K. Debray |
| 2011 | Eliminating the hypervisor attack surface for a more secure cloud. Jakub Szefer, Eric Keller, Ruby B. Lee, Jennifer Rexford |
| 2011 | Extracting and verifying cryptographic models from C protocol code by symbolic execution. Mihhail Aizatulin, Andrew D. Gordon, Jan Jürjens |
| 2011 | Fashion crimes: trending-term exploitation on the web. Tyler Moore, Nektarios Leontiadis, Nicolas Christin |
| 2011 | Fear the EAR: discovering and mitigating execution after redirect vulnerabilities. Adam Doupé, Bryce Boe, Christopher Kruegel, Giovanni Vigna |
| 2011 | Forensic investigation of the OneSwarm anonymous filesharing system. Swagatika Prusty, Brian Neil Levine, Marc Liberatore |
| 2011 | Fortifying web-based applications automatically. Shuo Tang, Nathan Dautenhahn, Samuel T. King |
| 2011 | How to break XML encryption. Tibor Jager, Juraj Somorovsky |
| 2011 | How to tell if your cloud files are vulnerable to drive crashes. Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest |
| 2011 | Information-flow types for homomorphic encryptions. Cédric Fournet, Jérémy Planul, Tamara Rezk |
| 2011 | MIDeA: a multi-parallel intrusion detection architecture. Giorgos Vasiliadis, Michalis Polychronakis, Sotiris Ioannidis |
| 2011 | Modular code-based cryptographic verification. Cédric Fournet, Markulf Kohlweiss, Pierre-Yves Strub |
| 2011 | On the requirements for successful GPS spoofing attacks. Nils Ole Tippenhauer, Christina Pöpper, Kasper Bonne Rasmussen, Srdjan Capkun |
| 2011 | On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs. Amir Moradi, Alessandro Barenghi, Timo Kasper, Christof Paar |
| 2011 | PaperSpeckle: microscopic fingerprinting of paper. Ashlesh Sharma, Lakshminarayanan Subramanian, Eric A. Brewer |
| 2011 | Password-protected secret sharing. Ali Bagherzandi, Stanislaw Jarecki, Nitesh Saxena, Yanbin Lu |
| 2011 | Policy auditing over incomplete logs: theory, implementation and applications. Deepak Garg, Limin Jia, Anupam Datta |
| 2011 | Poster: CUD: crowdsourcing for URL spam detection. Jun Hu, Hongyu Gao, Zhichun Li, Yan Chen |
| 2011 | Poster: DIEGO: a fine-grained access control for web browsers. Ashar Javed |
| 2011 | Poster: Destabilizing BitTorrent's clusters to attack high bandwidth leechers. Florian Adamsky, Hassan Khan, Muttukrishnan Rajarajan, Syed Ali Khayam, Rudolf Jäger |
| 2011 | Poster: ESPOON Muhammad Rizwan Asghar, Giovanni Russello, Bruno Crispo |
| 2011 | Poster: LBMS: load balancing based on multilateral security in cloud. Pengfei Sun, Qingni Shen, Ying Chen, Zhonghai Wu, Cong Zhang, Anbang Ruan, Liang Gu |
| 2011 | Poster: SMURFEN: a rule sharing collaborative intrusion detection network. Carol J. Fung, Quanyan Zhu, Raouf Boutaba, Tamer Basar |
| 2011 | Poster: Towards detecting DMA malware. Patrick Stewin, Jean-Pierre Seifert, Collin Mulliner |
| 2011 | Poster: a certificateless proxy re-encryption scheme for cloud-based data sharing. Xiaoxin Wu, Lei Xu, Xinwen Zhang |
| 2011 | Poster: a geometric approach for multicast authentication in adversarial channels. Seyed Ali Ahmadzadeh, Gordon B. Agnew |
| 2011 | Poster: a path-cutting approach to blocking XSS worms in social web networks. Yinzhi Cao, Vinod Yegneswaran, Phillip A. Porras, Yan Chen |
| 2011 | Poster: an implementation of the fully homomorphic smart-vercauteren crypto-system. Henning Perl, Michael Brenner, Matthew Smith |
| 2011 | Poster: applying unsupervised context-based analysis for detecting unauthorized data disclosure. Ma'ayan Gafny, Asaf Shabtai, Lior Rokach, Yuval Elovici |
| 2011 | Poster: arbitrators in the security infrastructure, supporting positive anonymity. Shlomi Dolev, Niv Gilboa, Ofer Hermoni |
| 2011 | Poster: attribute based broadcast encryption with permanent revocation. Shlomi Dolev, Niv Gilboa, Marina Kopeetsky |
| 2011 | Poster: can it be more practical?: improving mouse dynamics biometric performance. Chao Shen, Zhongmin Cai, Xiaohong Guan |
| 2011 | Poster: collaborative policy administration. Weili Han, Zheran Fang, Weifeng Chen, Wenyuan Xu, Chang Lei |
| 2011 | Poster: control-flow integrity for smartphones. Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi |
| 2011 | Poster: fast, automatic iPhone shoulder surfing. Stefano Maggi, Alberto Volpatto, Simone Gasparini, Giacomo Boracchi, Stefano Zanero |
| 2011 | Poster: inference attacks against searchable encryption protocols. Mohammad Saiful Islam, Mehmet Kuzu, Murat Kantarcioglu |
| 2011 | Poster: making the case for intrinsic personal physical unclonable functions (IP-PUFs). Rishab Nithyanand, Radu Sion, John Solis |
| 2011 | Poster: mimicry attacks against wireless link signature. Yao Liu, Peng Ning |
| 2011 | Poster: on quantitative information flow metrics. Ji Zhu, Mudhakar Srivatsa |
| 2011 | Poster: on trust evaluation with missing information in reputation systems. Xi Gong, Ting Yu, Adam J. Lee |
| 2011 | Poster: online spam filtering in social networks. Hongyu Gao, Yan Chen, Kathy Lee, Diana Palsetia, Alok N. Choudhary |
| 2011 | Poster: practical embedded remote attestation using physically unclonable functions. Ünal Koçabas, Ahmad-Reza Sadeghi, Christian Wachsmann, Steffen Schulz |
| 2011 | Poster: preliminary analysis of Google+'s privacy. Shah Mahmood, Yvo Desmedt |
| 2011 | Poster: privacy-preserving profile similarity computation in online social networks. Arjan Jeckmans, Qiang Tang, Pieter H. Hartel |
| 2011 | Poster: protecting information in systems of systems. Daniel Trivellato, Nicola Zannone, Sandro Etalle |
| 2011 | Poster: recoverable botnets: a hybrid C&C approach. Peng Liao, Xiang Cui, Shuhao Li, Chaoge Liu |
| 2011 | Poster: shaping network topology for privacy and performance. Nayantara Mallesh, Matthew K. Wright |
| 2011 | Poster: temporal attribute-based encryption in clouds. Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Xiaorui Gong, Shimin Chen |
| 2011 | Poster: the quest for security against privilege escalation attacks on android. Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi, Bhargava Shastry |
| 2011 | Poster: towards attribute based group key management. Mohamed Nabeel, Elisa Bertino |
| 2011 | Poster: towards formal verification of DIFC policies. Zhi Yang, Lihua Yin, Miyi Duan, Shuyuan Jin |
| 2011 | Poster: trans-organizational role-based access control. Ramon Francisco Pacquiao Mejia, Yuichi Kaji, Hiroyuki Seki |
| 2011 | Poster: uPro: a compartmentalization tool supporting fine-grained and flexible security configuration. Ben Niu, Gang Tan |
| 2011 | Poster: using quantified risk and benefit to strengthen the security of information sharing. Weili Han, Chenguang Shen, Yuliang Yin, Yun Gu, Chen Chen |
| 2011 | Practical PIR for electronic commerce. Ryan Henry, Femi G. Olumofin, Ian Goldberg |
| 2011 | Practical delegation of computation using multiple servers. Ran Canetti, Ben Riva, Guy N. Rothblum |
| 2011 | Predictive mitigation of timing channels in interactive systems. Danfeng Zhang, Aslan Askarov, Andrew C. Myers |
| 2011 | Privacy and accountability for location-based aggregate statistics. Raluca A. Popa, Andrew J. Blumberg, Hari Balakrishnan, Frank H. Li |
| 2011 | Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011 Yan Chen, George Danezis, Vitaly Shmatikov |
| 2011 | Process out-grafting: an efficient "out-of-VM" approach for fine-grained process execution monitoring. Deepa Srinivasan, Zhi Wang, Xuxian Jiang, Dongyan Xu |
| 2011 | Proofs of ownership in remote storage systems. Shai Halevi, Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg |
| 2011 | Protecting consumer privacy from electric load monitoring. Stephen E. McLaughlin, Patrick D. McDaniel, William Aiello |
| 2011 | Reflections on the evolution of internet threats: the growing imperative for a cyber secure society. Farnam Jahanian |
| 2011 | SCRIPTGARD: automatic context-sensitive sanitization for large-scale legacy web applications. Prateek Saxena, David Molnar, Benjamin Livshits |
| 2011 | SICE: a hardware-level strongly isolated computing environment for x86 multi-core platforms. Ahmed M. Azab, Peng Ning, Xiaolan Zhang |
| 2011 | SURF: detecting and measuring search poisoning. Long Lu, Roberto Perdisci, Wenke Lee |
| 2011 | Sedic: privacy-aware data intensive computing on hybrid clouds. Kehuan Zhang, Xiao-yong Zhou, Yangyi Chen, Xiaofeng Wang, Yaoping Ruan |
| 2011 | Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting. Prateek Mittal, Ahmed Khurshid, Joshua Juen, Matthew Caesar, Nikita Borisov |
| 2011 | Televisions, video privacy, and powerline electromagnetic interference. Miro Enev, Sidhant Gupta, Tadayoshi Kohno, Shwetak N. Patel |
| 2011 | Text-based CAPTCHA strengths and weaknesses. Elie Bursztein, Matthieu Martin, John C. Mitchell |
| 2011 | The power of procrastination: detection and mitigation of execution-stalling malicious code. Clemens Kolbitsch, Engin Kirda, Christopher Kruegel |
| 2011 | These aren't the droids you're looking for: retrofitting android to protect data from imperious applications. Peter Hornyack, Seungyeop Han, Jaeyeon Jung, Stuart E. Schechter, David Wetherall |
| 2011 | Trace equivalence decision: negative tests and non-determinism. Vincent Cheval, Hubert Comon-Lundh, Stéphanie Delaune |
| 2011 | Trust-based anonymous communication: adversary models and routing algorithms. Aaron Johnson, Paul F. Syverson, Roger Dingledine, Nick Mathewson |
| 2011 | Unicorn: two-factor attestation for data security. Mohammad Mannan, Beom Heyn Kim, Afshar Ganjali, David Lie |
| 2011 | VIPER: verifying the integrity of PERipherals' firmware. Yanlin Li, Jonathan M. McCune, Adrian Perrig |
| 2011 | VMCrypt: modular software architecture for scalable secure computation. Lior Malka |
| 2011 | WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction. Prithvi Bisht, Timothy L. Hinrichs, Nazari Skrupsky, V. N. Venkatakrishnan |
| 2011 | iSpy: automatic reconstruction of typed input from compromising reflections. Rahul Raguram, Andrew M. White, Dibyendusekhar Goswami, Fabian Monrose, Jan-Michael Frahm |