| 2010 | A billion keys, but few locks: the crisis of web single sign-on. San-Tsai Sun, Yazan Boshmaf, Kirstie Hawkey, Konstantin Beznosov |
| 2010 | A risk management process for consumers: the next step in information security. André van Cleeff |
| 2010 | A stealth approach to usable security: helping IT security managers to identify workable security solutions. Simon E. Parkin, Aad P. A. van Moorsel, Philip Inglesant, Martina Angela Sasse |
| 2010 | E unibus pluram: massive-scale software diversity as a defense mechanism. Michael Franz |
| 2010 | On information flow for intrusion detection: what if accurate full-system dynamic information flow tracking was possible? Mohammed I. Al-Saleh, Jedidiah R. Crandall |
| 2010 | On-line privacy and consent: a dialogue, not a monologue. Lizzie Coles-Kemp, Elahe Kani-Zabihi |
| 2010 | Ontological semantic technology for detecting insider threat and social engineering. Victor Raskin, Julia M. Taylor, Christian Hempelmann |
| 2010 | Proceedings of the 2010 Workshop on New Security Paradigms, Concord, MA, USA, September 21-23, 2010 Angelos D. Keromytis, Sean Peisert, Richard Ford, Carrie Gates |
| 2010 | Relationships and data sanitization: a study in scarlet. Matt Bishop, Justin Cummins, Sean Peisert, Anhad Singh, Bhume Bhumiratana, Deborah A. Agarwal, Deborah A. Frincke, Michael A. Hogarth |
| 2010 | The pervasive trust foundation for security in next generation networks. Leszek Lilien, Adawia Al-Alawneh, Lotfi Ben Othmane |
| 2010 | This is your data on drugs: lessons computer security can learn from the drug war. David Molnar, Serge Egelman, Nicolas Christin |
| 2010 | To boldly go where invention isn't secure: applying security entrepreneurship to secure systems design. Shamal Faily, Ivan Flechais |
| 2010 | VM-based security overkill: a lament for applied systems security research. Sergey Bratus, Michael E. Locasto, Ashwin Ramaswamy, Sean W. Smith |
| 2010 | Why is there no science in cyber science?: a panel discussion at NSPW 2010. Roy A. Maxion, Thomas A. Longstaff, John McHugh |
| 2010 | Would a 'cyber warrior' protect us: exploring trade-offs between attack and defense of information systems. Tyler Moore, Allan Friedman, Ariel D. Procaccia |