| 2011 | Automated Identification of Cryptographic Primitives in Binary Programs. Felix Gröbert, Carsten Willems, Thorsten Holz |
| 2011 | Banksafe Information Stealer Detection Inside the Web Browser. Armin Buescher, Felix Leder, Thomas Siebert |
| 2011 | Cross-Analysis of Botnet Victims: New Insights and Implications. Seungwon Shin, Raymond Lin, Guofei Gu |
| 2011 | Cross-Domain Collaborative Anomaly Detection: So Far Yet So Close. Nathaniel Boggs, Sharath Hiremagalore, Angelos Stavrou, Salvatore J. Stolfo |
| 2011 | Defending Embedded Systems with Software Symbiotes. Ang Cui, Salvatore J. Stolfo |
| 2011 | Detecting Environment-Sensitive Malware. Martina Lindorfer, Clemens Kolbitsch, Paolo Milani Comparetti |
| 2011 | Detecting Traffic Snooping in Tor Using Decoys. Sambuddho Chakravarty, Georgios Portokalidis, Michalis Polychronakis, Angelos D. Keromytis |
| 2011 | Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers. Chao Yang, Robert Chandler Harkreader, Guofei Gu |
| 2011 | Dymo: Tracking Dynamic Code Identity. Bob Gilbert, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna |
| 2011 | IceShield: Detection and Mitigation of Malicious Websites with a Frozen DOM. Mario Heiderich, Tilman Frosch, Thorsten Holz |
| 2011 | KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-Harvesting Malware. Stefano Ortolani, Cristiano Giuffrida, Bruno Crispo |
| 2011 | Minemu: The World's Fastest Taint Tracker. Erik Bosman, Asia Slowinska, Herbert Bos |
| 2011 | Modeling User Search Behavior for Masquerade Detection. Malek Ben Salem, Salvatore J. Stolfo |
| 2011 | On the Expressiveness of Return-into-libc Attacks. Minh Tran, Mark Etheridge, Tyler K. Bletsch, Xuxian Jiang, Vincent W. Freeh, Peng Ning |
| 2011 | Packed, Printable, and Polymorphic Return-Oriented Programming. Kangjie Lu, Dabi Zou, Weiping Wen, Debin Gao |
| 2011 | Recent Advances in Intrusion Detection - 14th International Symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings Robin Sommer, Davide Balzarotti, Gregor Maier |
| 2011 | Revisiting Traffic Anomaly Detection Using Software Defined Networking. Syed Akbar Mehdi, Junaid Khalid, Syed Ali Khayam |
| 2011 | Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack. Sheila Becker, Jeff Seibert, Cristina Nita-Rotaru, Radu State |
| 2011 | Shellzer: A Tool for the Dynamic Analysis of Malicious Shellcode. Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna |
| 2011 | Spam Filtering in Twitter Using Sender-Receiver Relationship. Jonghyuk Song, Sangho Lee, Jong Kim |
| 2011 | What If You Can't Trust Your Network Card? Loïc Duflot, Yves-Alexis Perez, Benjamin Morin |