| 2006 | A Crawler-based Study of Spyware in the Web. Alexander Moshchuk, Tanya Bragin, Steven D. Gribble, Henry M. Levy |
| 2006 | Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev, Chad Verbowski, Shuo Chen, Samuel T. King |
| 2006 | Deploying a New Hash Algorithm. Steven M. Bellovin, Eric Rescorla |
| 2006 | Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach. Ryan M. Gerdes, Thomas E. Daniels, Mani Mina, Steve Russell |
| 2006 | Enterprise Security: A Community of Interest Based Approach. Patrick D. McDaniel, Subhabrata Sen, Oliver Spatscheck, Jacobus E. van der Merwe, William Aiello, Charles R. Kalmanek |
| 2006 | Induced Churn as Shelter from Routing-Table Poisoning. Tyson Condie, Varun Kacholia, Sriram Sank, Joseph M. Hellerstein, Petros Maniatis |
| 2006 | Inoculating SSH Against Address Harvesting. Stuart E. Schechter, Jaeyeon Jung, Will Stockwell, Cynthia D. McLain |
| 2006 | Isolating Intrusions by Automatic Experiments. Stephan Neuhaus, Andreas Zeller |
| 2006 | Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage. Kevin Fu, Seny Kamara, Yoshi Kohno |
| 2006 | Modeling Botnet Propagation Using Time Zones. David Dagon, Cliff Changchun Zou, Wenke Lee |
| 2006 | Proceedings of the Network and Distributed System Security Symposium, NDSS 2006, San Diego, California, USA |
| 2006 | Protocol-Independent Adaptive Replay of Application Dialog. Weidong Cui, Vern Paxson, Nicholas Weaver, Randy H. Katz |
| 2006 | Software Self-Healing Using Collaborative Application Communities. Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis |
| 2006 | Toward Automated Information-Flow Integrity Verification for Security-Critical Applications. Umesh Shankar, Trent Jaeger, Reiner Sailer |
| 2006 | Toward a Practical Data Privacy Scheme for a Distributed Implementation of the Smith-Waterman Genome Sequence Comparison Algorithm. Doug Szajda, Michael Pohl, Jason Owen, Barry G. Lawson |
| 2006 | Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles. Keith B. Frikken, Jiangtao Li, Mikhail J. Atallah |
| 2006 | Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks. William K. Robertson, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer |
| 2006 | Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software. James Newsome, David Brumley, Dawn Xiaodong Song |