| 2010 | 31st IEEE Symposium on Security and Privacy, SP 2010, 16-19 May 2010, Berleley/Oakland, California, USA |
| 2010 | A Practical Attack to De-anonymize Social Network Users. Gilbert Wondracek, Thorsten Holz, Engin Kirda, Christopher Kruegel |
| 2010 | A Proof-Carrying File System. Deepak Garg, Frank Pfenning |
| 2010 | A Symbolic Execution Framework for JavaScript. Prateek Saxena, Devdatta Akhawe, Steve Hanna, Feng Mao, Stephen McCamant, Dawn Song |
| 2010 | All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask). Edward J. Schwartz, Thanassis Avgerinos, David Brumley |
| 2010 | Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures. Yao Liu, Peng Ning, Huaiyu Dai |
| 2010 | Bootstrapping Trust in Commodity Computers. Bryan Parno, Jonathan M. McCune, Adrian Perrig |
| 2010 | Chip and PIN is Broken. Steven J. Murdoch, Saar Drimer, Ross J. Anderson, Mike Bond |
| 2010 | ConScript: Specifying and Enforcing Fine-Grained Security Policies for JavaScript in the Browser. Leo A. Meyerovich, V. Benjamin Livshits |
| 2010 | Crossing the "Valley of Death": Transitioning Research into Commercial Products - A Personal Perspective. W. Douglas Maughan |
| 2010 | Experimental Security Analysis of a Modern Automobile. Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak N. Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage |
| 2010 | History of US Government Investments in Cybersecurity Research: A Personal Perspective. Carl E. Landwehr |
| 2010 | How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation. Elie Bursztein, Steven Bethard, Celine Fabry, John C. Mitchell, Daniel Jurafsky |
| 2010 | HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity. Zhi Wang, Xuxian Jiang |
| 2010 | Identifying Dormant Functionality in Malware Programs. Paolo Milani Comparetti, Guido Salvaneschi, Engin Kirda, Clemens Kolbitsch, Christopher Kruegel, Stefano Zanero |
| 2010 | Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries. Clemens Kolbitsch, Thorsten Holz, Christopher Kruegel, Engin Kirda |
| 2010 | Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique. Zhiyun Qian, Zhuoqing Morley Mao, Yinglian Xie, Fang Yu |
| 2010 | Noninterference through Secure Multi-execution. Dominique Devriese, Frank Piessens |
| 2010 | Object Capabilities and Isolation of Untrusted Web Applications. Sergio Maffeis, John C. Mitchell, Ankur Taly |
| 2010 | On the Incoherencies in Web Browser Access Control Policies. Kapil Singh, Alexander Moshchuk, Helen J. Wang, Wenke Lee |
| 2010 | Outside the Closed World: On Using Machine Learning for Network Intrusion Detection. Robin Sommer, Vern Paxson |
| 2010 | Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically. Matthew Hicks, Murph Finnicum, Samuel T. King, Milo M. K. Martin, Jonathan M. Smith |
| 2010 | Reconciling Belief and Vulnerability in Information Flow. Sardaouna Hamadou, Vladimiro Sassone, Catuscia Palamidessi |
| 2010 | Reflections on the 30th Anniversary of the IEEE Symposium on Security and Privacy. Peter G. Neumann, Matt Bishop, Sean Peisert, Marv Schaefer |
| 2010 | Revocation Systems with Very Small Private Keys. Allison B. Lewko, Amit Sahai, Brent Waters |
| 2010 | Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes. Haowen Chan, Adrian Perrig |
| 2010 | SCiFI - A System for Secure Face Identification. Margarita Osadchy, Benny Pinkas, Ayman Jarrous, Boaz Moskovich |
| 2010 | Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size. Jason Franklin, Sagar Chaki, Anupam Datta, Arvind Seshadri |
| 2010 | Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow. Shuo Chen, Rui Wang, Xiaofeng Wang, Kehuan Zhang |
| 2010 | State of the Art: Automated Black-Box Web Application Vulnerability Testing. Jason Bau, Elie Bursztein, Divij Gupta, John C. Mitchell |
| 2010 | Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors. Matt Fredrikson, Somesh Jha, Mihai Christodorescu, Reiner Sailer, Xifeng Yan |
| 2010 | TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection. Tielei Wang, Tao Wei, Guofei Gu, Wei Zou |
| 2010 | Tamper Evident Microprocessors. Adam Waksman, Simha Sethumadhavan |
| 2010 | Towards Static Flow-Based Declassification for Legacy and Untrusted Programs. Bruno P. S. Rocha, Sruthi Bandhakavi, Jerry den Hartog, William H. Winsborough, Sandro Etalle |
| 2010 | TrustVisor: Efficient TCB Reduction and Attestation. Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil D. Gligor, Adrian Perrig |