| 2010 | A Security Evaluation of DNSSEC with NSEC3. Jason Bau, John C. Mitchell |
| 2010 | A Systematic Characterization of IM Threats using Honeypots. Iasonas Polakis, Thanasis Petsas, Evangelos P. Markatos, Spyros Antonatos |
| 2010 | A3: An Extensible Platform for Application-Aware Anonymity. Micah Sherr, Andrew Mao, William R. Marczak, Wenchao Zhou, Boon Thau Loo, Matt Blaze |
| 2010 | Adnostic: Privacy Preserving Targeted Advertising. Vincent Toubiana, Arvind Narayanan, Dan Boneh, Helen Nissenbaum, Solon Barocas |
| 2010 | Automatic Reverse Engineering of Data Structures from Binary Execution. Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu |
| 2010 | Binary Code Extraction and Interface Identification for Security Applications. Juan Caballero, Noah M. Johnson, Stephen McCamant, Dawn Song |
| 2010 | Botnet Judo: Fighting Spam with Itself. Andreas Pitsillidis, Kirill Levchenko, Christian Kreibich, Chris Kanich, Geoffrey M. Voelker, Vern Paxson, Nicholas Weaver, Stefan Savage |
| 2010 | Contractual Anonymity. Edward J. Schwartz, David Brumley, Jonathan M. McCune |
| 2010 | Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs. Scott Wolchok, Owen S. Hofmann, Nadia Heninger, Edward W. Felten, J. Alex Halderman, Christopher J. Rossbach, Brent Waters, Emmett Witchel |
| 2010 | Effective Anomaly Detection with Scarce Training Data. William K. Robertson, Federico Maggi, Christopher Kruegel, Giovanni Vigna |
| 2010 | Efficient Detection of Split Personalities in Malware. Davide Balzarotti, Marco Cova, Christoph Karlberger, Engin Kirda, Christopher Kruegel, Giovanni Vigna |
| 2010 | FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications. Prateek Saxena, Steve Hanna, Pongsin Poosankam, Dawn Song |
| 2010 | Improving Spam Blacklisting Through Dynamic Thresholding and Speculative Aggregation. Sushant Sinha, Michael D. Bailey, Farnam Jahanian |
| 2010 | InvisiType: Object-Oriented Security Policies. Jiwon Seo, Monica S. Lam |
| 2010 | Joe-E: A Security-Oriented Subset of Java. Adrian Mettler, David A. Wagner, Tyler Close |
| 2010 | Large-Scale Automatic Classification of Phishing Pages. Colin Whittaker, Brian Ryner, Marria Nazif |
| 2010 | On Network-level Clusters for Spam Detection. Zhiyun Qian, Zhuoqing Morley Mao, Yinglian Xie, Fang Yu |
| 2010 | On the Safety of Enterprise Policy Deployment. Yudong Gao, Ni Pan, Xu Chen, Zhuoqing Morley Mao |
| 2010 | Preventing Capability Leaks in Secure JavaScript Subsets. Matthew Finifter, Joel Weinberger, Adam Barth |
| 2010 | Proceedings of the Network and Distributed System Security Symposium, NDSS 2010, San Diego, California, USA, 28th February - 3rd March 2010 |
| 2010 | Protecting Browsers from Extension Vulnerabilities. Adam Barth, Adrienne Porter Felt, Prateek Saxena, Aaron Boodman |
| 2010 | Server-side Verification of Client Behavior in Online Games. Darrell Bethea, Robert A. Cochran, Michael K. Reiter |
| 2010 | Stealth DoS Attacks on Secure Channels. Amir Herzberg, Haya Schulmann |
| 2010 | When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography. Thomas Ristenpart, Scott Yilek |
| 2010 | Where Do You Want to Go Today? Escalating Privileges by Pathname Manipulation. Suresh Chari, Shai Halevi, Wietse Z. Venema |