| 2007 | A Quantitative Study of Forum Spamming Using Context-based Analysis. Yuan Niu, Hao Chen, Francis Hsu, Yi-Min Wang, Ming Ma |
| 2007 | Army of Botnets. Ryan Vogt, John Aycock, Michael J. Jacobson Jr. |
| 2007 | Attribute-Based Publishing with Hidden Credentials and Hidden Policies. Apu Kapadia, Patrick P. Tsang, Sean W. Smith |
| 2007 | Consumable Credentials in Linear-Logic-Based Access-Control Systems. Kevin D. Bowers, Lujo Bauer, Deepak Garg, Frank Pfenning, Michael K. Reiter |
| 2007 | Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. Philipp Vogt, Florian Nentwich, Nenad Jovanovic, Engin Kirda, Christopher Krügel, Giovanni Vigna |
| 2007 | Cryptographic Methods for Storing Ballots on a Voting Machine. John Bethencourt, Dan Boneh, Brent Waters |
| 2007 | Fig: Automatic Fingerprint Generation. Shobha Venkataraman, Juan Caballero, Pongsin Poosankam, Min Gyung Kang, Dawn Xiaodong Song |
| 2007 | File System Design with Assured Delete. Radia J. Perlman |
| 2007 | Generic Application-Level Protocol Analyzer and its Language. Nikita Borisov, David Brumley, Helen J. Wang, John Dunagan, Pallavi Joshi, Chuanxiong Guo |
| 2007 | Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing. Ying Zhang, Zhuoqing Morley Mao, Jia Wang |
| 2007 | OPTWALL: A Hierarchical Traffic-Aware Firewall. Subrata Acharya, Bryan N. Mills, Mehmud Abliz, Taieb Znati, Jia Wang, Zihui Ge, Albert G. Greenberg |
| 2007 | On the Practicality of Private Information Retrieval. Radu Sion, Bogdan Carbunar |
| 2007 | Phinding Phish: An Evaluation of Anti-Phishing Toolbars. Lorrie Faith Cranor, Serge Egelman, Jason I. Hong, Yue Zhang |
| 2007 | Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces. Scott E. Coull, Charles V. Wright, Fabian Monrose, Michael P. Collins, Michael K. Reiter |
| 2007 | Proceedings of the Network and Distributed System Security Symposium, NDSS 2007, San Diego, California, USA, 28th February - 2nd March 2007 |
| 2007 | RICH: Automatically Protecting Against Integer-Based Vulnerabilities. David Brumley, Dawn Xiaodong Song, Tzi-cker Chiueh, Rob Johnson, Huijia Lin |
| 2007 | Secret Handshakes with Dynamic and Fuzzy Matching. Giuseppe Ateniese, Jonathan Kirsch, Marina Blanton |
| 2007 | Shedding Light on the Configuration of Dark Addresses. Sushant Sinha, Michael D. Bailey, Farnam Jahanian |