| 2011 | An Assessment of Overt Malicious Activity Manifest in Residential Networks. Gregor Maier, Anja Feldmann, Vern Paxson, Robin Sommer, Matthias Vallentin |
| 2011 | Biting the Hand That Serves You: A Closer Look at Client-Side Flash Proxies for Cross-Domain Requests. Martin Johns, Sebastian Lekies |
| 2011 | Code Pointer Masking: Hardening Applications against Code Injection Attacks. Pieter Philippaerts, Yves Younan, Stijn Muylle, Frank Piessens, Sven Lachmund, Thomas Walter |
| 2011 | Decoy Document Deployment for Effective Masquerade Attack Detection. Malek Ben Salem, Salvatore J. Stolfo |
| 2011 | Detection of Intrusions and Malware, and Vulnerability Assessment - 8th International Conference; DIMVA 2011, Amsterdam, The Netherlands, July 7-8, 2011. Proceedings Thorsten Holz, Herbert Bos |
| 2011 | Effective Network Vulnerability Assessment through Model Abstraction. Su Zhang, Xinming Ou, John Homer |
| 2011 | Escape from Monkey Island: Evading High-Interaction Honeyclients. Alexandros Kapravelos, Marco Cova, Christopher Kruegel, Giovanni Vigna |
| 2011 | MISHIMA: Multilateration of Internet Hosts Hidden Using Malicious Fast-Flux Agents (Short Paper). Greg Banks, Aristide Fattori, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna |
| 2011 | Mitigating Cross-Site Form History Spamming Attacks with Domain-Based Ranking. Chuan Yue |
| 2011 | Operating System Interface Obfuscation and the Revealing of Hidden Operations. Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giffin, Davide Balzarotti |
| 2011 | Protecting against DNS Reflection Attacks with Bloom Filters. Sebastiano Di Paola, Dario Lombardo |
| 2011 | Reverse Social Engineering Attacks in Online Social Networks. Danesh Irani, Marco Balduzzi, Davide Balzarotti, Engin Kirda, Calton Pu |
| 2011 | Timing Attacks on PIN Input in VoIP Networks (Short Paper). Ge Zhang, Simone Fischer-Hübner |
| 2011 | What's Clicking What? Techniques and Innovations of Today's Clickbots. Brad Miller, Paul Pearce, Chris Grier, Christian Kreibich, Vern Paxson |