| 2011 | A Security API for Distributed Social Networks. Michael Backes, Matteo Maffei, Kim Pecina |
| 2011 | AEG: Automatic Exploit Generation. Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao, David Brumley |
| 2011 | Accurate and Provably Secure Latency Estimation with Treeple. Eric Chan-Tin, Nicholas Hopper |
| 2011 | Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications. Marco Balduzzi, Carmen Torrano Gimenez, Davide Balzarotti, Engin Kirda |
| 2011 | DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation. Min Gyung Kang, Stephen McCamant, Pongsin Poosankam, Dawn Song |
| 2011 | EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis. Leyla Bilge, Engin Kirda, Christopher Kruegel, Marco Balduzzi |
| 2011 | Efficient Monitoring of Untrusted Kernel-Mode Execution. Abhinav Srivastava, Jonathon T. Giffin |
| 2011 | Efficient Privacy-Preserving Biometric Identification. Yan Huang, Lior Malka, David Evans, Jonathan Katz |
| 2011 | Good Neighbor: Ad hoc Pairing of Nearby Wireless Devices by Multiple Antennas. Liang Cai, Kai Zeng, Hao Chen, Prasant Mohapatra |
| 2011 | HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows. Xiapu Luo, Peng Zhou, Edmond W. W. Chan, Wenke Lee, Rocky K. C. Chang, Roberto Perdisci |
| 2011 | Howard: A Dynamic Excavator for Reverse Engineering Data Structures. Asia Slowinska, Traian Stancescu, Herbert Bos |
| 2011 | Location Privacy via Private Proximity Testing. Arvind Narayanan, Narendran Thiagarajan, Mugdha Lakhani, Michael Hamburg, Dan Boneh |
| 2011 | Losing Control of the Internet: Using the Data Plane to Attack the Control Plane. Max Schuchard, Abedelaziz Mohaisen, Denis Foo Kune, Nicholas Hopper, Yongdae Kim, Eugene Y. Vasserman |
| 2011 | No Loitering: Exploiting Lingering Vulnerabilities in Default COM Objects. David Dewey, Patrick Traynor |
| 2011 | On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses. Scott E. Coull, Fabian Monrose, Michael D. Bailey |
| 2011 | PiOS: Detecting Privacy Leaks in iOS Applications. Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna |
| 2011 | Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions. Xi Xiong, Donghai Tian, Peng Liu |
| 2011 | Privacy-Preserving Aggregation of Time-Series Data. Elaine Shi, T.-H. Hubert Chan, Eleanor Gilbert Rieffel, Richard Chow, Dawn Song |
| 2011 | Proceedings of the Network and Distributed System Security Symposium, NDSS 2011, San Diego, California, USA, 6th February - 9th February 2011 |
| 2011 | Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars. Aurélien Francillon, Boris Danev, Srdjan Capkun |
| 2011 | SPARE: Replicas on Hold. Tobias Distler, Ivan Popov, Wolfgang Schröder-Preikschat, Hans P. Reiser, Rüdiger Kapitza |
| 2011 | SWIRL: A Scalable Watermark to Detect Correlated Network Flows. Amir Houmansadr, Nikita Borisov |
| 2011 | SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures. Zhiqiang Lin, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu, Xuxian Jiang |
| 2011 | Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. Roman Schlegel, Kehuan Zhang, Xiao-yong Zhou, Mehool Intwala, Apu Kapadia, Xiaofeng Wang |
| 2011 | TIE: Principled Reverse Engineering of Types in Binary Programs. Jonghyup Lee, Thanassis Avgerinos, David Brumley |
| 2011 | Tracker: Security and Privacy for RFID-based Supply Chains. Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva |
| 2011 | Usability Testing a Malware-Resistant Input Mechanism. Alana Libonati, Jonathan M. McCune, Michael K. Reiter |
| 2011 | Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks. Omid Fatemieh, Ali Farhadi, Ranveer Chandra, Carl A. Gunter |
| 2011 | WebShield: Enabling Various Web Defense Techniques without Client Side Modifications. Zhichun Li, Yi Tang, Yinzhi Cao, Vaibhav Rastogi, Yan Chen, Bin Liu, Clint Sbisa |