| 2009 | A Case Study on Asprox Infection Dynamics. Youngsang Shin, Steven A. Myers, Minaxi Gupta |
| 2009 | A Service Dependency Modeling Framework for Policy-Based Response Enforcement. Nizar Kheir, Hervé Debar, Frédéric Cuppens, Nora Cuppens-Boulahia, Jouni Viinikka |
| 2009 | Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications. Ting-Fang Yen, Xin Huang, Fabian Monrose, Michael K. Reiter |
| 2009 | Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks. Manuel Egele, Peter Wurzinger, Christopher Kruegel, Engin Kirda |
| 2009 | Detection of Intrusions and Malware, and Vulnerability Assessment, 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings Ulrich Flegel, Danilo Bruschi |
| 2009 | How Good Are Malware Detectors at Remediating Infected Systems?. Emanuele Passerini, Roberto Paleari, Lorenzo Martignoni |
| 2009 | Learning SQL for Database Intrusion Detection Using Context-Sensitive Modelling (Extended Abstract). Christian Bockermann, Martin Apel, Michael Meier |
| 2009 | On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities. Jin Han, Debin Gao, Robert H. Deng |
| 2009 | Polymorphing Software by Randomizing Data Structure Layout. Zhiqiang Lin, Ryan D. Riley, Dongyan Xu |
| 2009 | Selecting and Improving System Call Models for Anomaly Detection. Alessandro Frossi, Federico Maggi, Gian Luigi Rizzo, Stefano Zanero |
| 2009 | Shepherding Loadable Kernel Modules through On-demand Emulation. Chaoting Xuan, John A. Copeland, Raheem A. Beyah |
| 2009 | Towards Proactive Spam Filtering (Extended Abstract). Jan Göbel, Thorsten Holz, Philipp Trinius |
| 2009 | Using Contextual Information for IDS Alarm Classification (Extended Abstract). François Gagnon, Frédéric Massicotte, Babak Esfandiari |
| 2009 | Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks. Makoto Shimamura, Kenji Kono |