| 2010 | An Online Adaptive Approach to Alert Correlation. Hanli Ren, Natalia Stakhanova, Ali A. Ghorbani |
| 2010 | Conqueror: Tamper-Proof Code Execution on Legacy Systems. Lorenzo Martignoni, Roberto Paleari, Danilo Bruschi |
| 2010 | Covertly Probing Underground Economy Marketplaces. Hanno Fallmann, Gilbert Wondracek, Christian Platzer |
| 2010 | Detection of Intrusions and Malware, and Vulnerability Assessment, 7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010. Proceedings Christian Kreibich, Marko Jahnke |
| 2010 | Evaluating Bluetooth as a Medium for Botnet Command and Control. Kapil Singh, Samrit Sangal, Nehil Jain, Patrick Traynor, Wenke Lee |
| 2010 | HProxy: Client-Side Detection of SSL Stripping Attacks. Nick Nikiforakis, Yves Younan, Wouter Joosen |
| 2010 | HookScout: Proactive Binary-Centric Hook Detection. Heng Yin, Pongsin Poosankam, Steve Hanna, Dawn Xiaodong Song |
| 2010 | KIDS - Keyed Intrusion Detection System. Sasa Mrdovic, Branislava Perunicic-Drazenovic |
| 2010 | Modeling and Containment of Search Worms Targeting Web Applications. Jingyu Hua, Kouichi Sakurai |
| 2010 | Organizing Large Scale Hacking Competitions. Nicholas Childers, Bryce Boe, Lorenzo Cavallaro, Ludovico Cavedon, Marco Cova, Manuel Egele, Giovanni Vigna |
| 2010 | Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype. Antonio Nappa, Aristide Fattori, Marco Balduzzi, Matteo Dell'Amico, Lorenzo Cavallaro |
| 2010 | Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners. Adam Doupé, Marco Cova, Giovanni Vigna |