| 2010 | A Centralized Monitoring Infrastructure for Improving DNS Security. Manos Antonakakis, David Dagon, Xiapu Luo, Roberto Perdisci, Wenke Lee, Justin Bellmor |
| 2010 | A Client-Based and Server-Enhanced Defense Mechanism for Cross-Site Request Forgery. Luyi Xing, Yuqing Zhang, Shenlong Chen |
| 2010 | A Data-Centric Approach to Insider Attack Detection in Database Systems. Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Shambhu J. Upadhyaya |
| 2010 | A Distributed Honeynet at KFUPM: A Case Study. Mohammed H. Sqalli, Raed Al-Shaikh, Ezzat Ahmed |
| 2010 | Abusing Social Networks for Automated User Profiling. Marco Balduzzi, Christian Platzer, Thorsten Holz, Engin Kirda, Davide Balzarotti, Christopher Kruegel |
| 2010 | An Analysis of Rogue AV Campaigns. Marco Cova, Corrado Leita, Olivier Thonnard, Angelos D. Keromytis, Marc Dacier |
| 2010 | Anomaly Detection and Mitigation for Disaster Area Networks. Jordi Cucurull, Mikael Asplund, Simin Nadjm-Tehrani |
| 2010 | Aspect-Based Attack Detection in Large-Scale Networks. Martin Drasar, Jan Vykopal, Radek Krejcí, Pavel Celeda |
| 2010 | Automatic Discovery of Parasitic Malware. Abhinav Srivastava, Jonathon T. Giffin |
| 2010 | Bait Your Hook: A Novel Detection Technique for Keyloggers. Stefano Ortolani, Cristiano Giuffrida, Bruno Crispo |
| 2010 | Behavior-Based Worm Detectors Compared. Shad Stafford, Jun Li |
| 2010 | BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection. Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kemerlis, Stelios Sidiroglou, Angelos D. Keromytis, Salvatore J. Stolfo |
| 2010 | CANVuS: Context-Aware Network Vulnerability Scanning. Yunjing Xu, Michael D. Bailey, Eric Vander Weele, Farnam Jahanian |
| 2010 | Community Epidemic Detection Using Time-Correlated Anomalies. Adam J. Oliner, Ashutosh V. Kulkarni, Alex Aiken |
| 2010 | Detecting Network Anomalies in Backbone Networks. Christian Callegari, Loris Gazzarrini, Stefano Giordano, Michele Pagano, Teresa Pepe |
| 2010 | Detecting the Onset of Infection for Secure Hosts. Kui Xu, Qiang Ma, Danfeng (Daphne) Yao |
| 2010 | Eliminating Human Specification in Static Analysis. Ying Kong, Yuqing Zhang, Qixu Liu |
| 2010 | Evaluation of the Common Dataset Used in Anti-Malware Engineering Workshop 2009. Hosoi Takurou, Kanta Matsuura |
| 2010 | Fast-Flux Bot Detection in Real Time. Ching-Hsiang Hsu, Chun-Ying Huang, Kuan-Ta Chen |
| 2010 | Generating Client Workloads and High-Fidelity Network Traffic for Controllable, Repeatable Experiments in Computer Security. Charles V. Wright, Christopher Connelly, Timothy M. Braje, Jesse C. Rabek, Lee M. Rossey, Robert K. Cunningham |
| 2010 | GrAVity: A Massively Parallel Antivirus Engine. Giorgos Vasiliadis, Sotiris Ioannidis |
| 2010 | Hybrid Analysis and Control of Malware. Kevin A. Roundy, Barton P. Miller |
| 2010 | HyperCheck: A Hardware-Assisted Integrity Monitor. Jiang Wang, Angelos Stavrou, Anup K. Ghosh |
| 2010 | Improving NFA-Based Signature Matching Using Ordered Binary Decision Diagrams. Liu Yang, Rezwana Karim, Vinod Ganapathy, Randy Smith |
| 2010 | Inferring Protocol State Machine from Real-World Trace. Yipeng Wang, Zhibin Zhang, Li Guo |
| 2010 | Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory. Junghwan Rhee, Ryan D. Riley, Dongyan Xu, Xuxian Jiang |
| 2010 | Live and Trustworthy Forensic Analysis of Commodity Production Systems. Lorenzo Martignoni, Aristide Fattori, Roberto Paleari, Lorenzo Cavallaro |
| 2010 | MEDUSA: Mining Events to Detect Undesirable uSer Actions in SCADA. Dina Hadziosmanovic, Damiano Bolzoni, Pieter H. Hartel |
| 2010 | NetStore: An Efficient Storage Infrastructure for Network Forensics and Monitoring. Paul Giura, Nasir D. Memon |
| 2010 | On Challenges in Evaluating Malware Clustering. Peng Li, Limin Liu, Debin Gao, Michael K. Reiter |
| 2010 | On Estimating Cyber Adversaries' Capabilities: A Bayesian Model Approach. Jianchun Jiang, Weifeng Chen, Liping Ding |
| 2010 | Privilege States Based Access Control for Fine-Grained Intrusion Response. Ashish Kamra, Elisa Bertino |
| 2010 | Recent Advances in Intrusion Detection, 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings Somesh Jha, Robin Sommer, Christian Kreibich |
| 2010 | Security System for Encrypted Environments (S2E2). Robert Koch, Gabi Dreo Rodosek |
| 2010 | Toward Specification-Based Intrusion Detection for Web Applications. Salman Niksefat, Mohammad Mehdi Ahaniha, Babak Sadeghiyan, Mehdi Shajari |
| 2010 | Toward Whole-System Dynamic Analysis for ARM-Based Mobile Devices. Ryan Whelan, David R. Kaeli |
| 2010 | Towards Automatic Deduction and Event Reconstruction Using Forensic Lucid and Probabilities to Encode the IDS Evidence. Serguei A. Mokhov, Joey Paquet, Mourad Debbabi |
| 2010 | Using IRP for Malware Detection. FuYong Zhang, Deyu Qi, Jinglin Hu |
| 2010 | What Is the Impact of P2P Traffic on Anomaly Detection? Irfan Ul Haq, Sardar Ali, Hassan Khan, Syed Ali Khayam |
| 2010 | Why Did My Detector Do Kevin S. Killourhy, Roy A. Maxion |