| 2011 | A Formal Framework for Provenance Security. James Cheney |
| 2011 | A Statistical Test for Information Leaks Using Continuous Mutual Information. Tom Chothia, Apratim Guha |
| 2011 | Assumptions and Guarantees for Compositional Noninterference. Heiko Mantel, David Sands, Henning Sudbrock |
| 2011 | Attacking and Fixing Helios: An Analysis of Ballot Secrecy. Véronique Cortier, Ben Smyth |
| 2011 | Automated Proofs for Diffie-Hellman-Based Key Exchanges. Long Ngo, Colin Boyd, Juanma González Nieto |
| 2011 | Dynamic Enforcement of Knowledge-Based Security Policies. Piotr Mardziel, Stephen Magill, Michael Hicks, Mudhakar Srivatsa |
| 2011 | Formal Analysis of Protocols Based on TPM State Registers. Stéphanie Delaune, Steve Kremer, Mark Dermot Ryan, Graham Steel |
| 2011 | Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols. François Dupressoir, Andrew D. Gordon, Jan Jürjens, David A. Naumann |
| 2011 | Information-Theoretic Bounds for Differentially Private Mechanisms. Gilles Barthe, Boris Köpf |
| 2011 | Integrated Specification and Verification of Security Protocols and Policies. Simone Frau, Mohammad Torabi Dashti |
| 2011 | Local Memory via Layout Randomization. Radha Jagadeesan, Corin Pitcher, Julian Rathke, James Riely |
| 2011 | Modular Protections against Non-control Data Attacks. Cole Schlesinger, Karthik Pattabiraman, Nikhil Swamy, David Walker, Benjamin G. Zorn |
| 2011 | Obstruction-Free Authorization Enforcement: Aligning Security with Business Objectives. David A. Basin, Samuel J. Burri, Günter Karjoth |
| 2011 | Proceedings of the 24th IEEE Computer Security Foundations Symposium, CSF 2011, Cernay-la-Ville, France, 27-29 June, 2011 |
| 2011 | Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection. Jeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha |
| 2011 | Resource-Aware Authorization Policies for Statically Typed Cryptographic Protocols. Michele Bugliesi, Stefano Calzavara, Fabienne Eigner, Matteo Maffei |
| 2011 | Security for Key Management Interfaces. Steve Kremer, Graham Steel, Bogdan Warinschi |
| 2011 | StatVerif: Verification of Stateful Processes. Myrto Arapinis, Eike Ritter, Mark Dermot Ryan |
| 2011 | Static Analysis for Efficient Hybrid Information-Flow Control. Scott Moore, Stephen Chong |
| 2011 | Termination-Insensitive Computational Indistinguishability (and Applications to Computational Soundness). Dominique Unruh |
| 2011 | The Complexity of Quantitative Information Flow Problems. Pavol Cerný, Krishnendu Chatterjee, Thomas A. Henzinger |
| 2011 | Vertical Protocol Composition. Thomas Groß, Sebastian Mödersheim |