| 2011 | "You Might Also Like: " Privacy Risks of Collaborative Filtering. Joseph A. Calandrino, Ann Kilzer, Arvind Narayanan, Edward W. Felten, Vitaly Shmatikov |
| 2011 | 32nd IEEE Symposium on Security and Privacy, SP 2011, 22-25 May 2011, Berkeley, California, USA |
| 2011 | A Formalization of the Security Features of Physical Functions. Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, François-Xavier Standaert, Christian Wachsmann |
| 2011 | Automated Analysis of Security-Critical JavaScript APIs. Ankur Taly, Úlfar Erlingsson, John C. Mitchell, Mark S. Miller, Jasvir Nagra |
| 2011 | Cache Games - Bringing Access-Based Cache Attacks on AES to Practice. David Gullasch, Endre Bangerter, Stephan Krenn |
| 2011 | Click Trajectories: End-to-End Analysis of the Spam Value Chain. Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Márk Félegyházi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker, Stefan Savage |
| 2011 | Cryptography in the Web: The Case of Cryptographic Design Flaws in ASP.NET. Thai Duong, Juliano Rizzo |
| 2011 | Defeating UCI: Building Stealthy and Malicious Hardware. Cynthia Sturton, Matthew Hicks, David A. Wagner, Samuel T. King |
| 2011 | Design and Evaluation of a Real-Time URL Spam Filtering Service. Kurt Thomas, Chris Grier, Justin Ma, Vern Paxson, Dawn Song |
| 2011 | Differential Slicing: Identifying Causal Execution Differences for Security Applications. Noah M. Johnson, Juan Caballero, Kevin Zhijie Chen, Stephen McCamant, Pongsin Poosankam, Daniel Reynaud, Dawn Song |
| 2011 | Extending Nymble-like Systems. Ryan Henry, Ian Goldberg |
| 2011 | Formalizing Anonymous Blacklisting Systems. Ryan Henry, Ian Goldberg |
| 2011 | HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis. Yinqian Zhang, Ari Juels, Alina Oprea, Michael K. Reiter |
| 2011 | How to Shop for Free Online - Security Analysis of Cashier-as-a-Service Based Web Stores. Rui Wang, Shuo Chen, Xiaofeng Wang, Shaz Qadeer |
| 2011 | I Still Know What You Visited Last Summer: Leaking Browsing History via User Interaction and Side Channel Attacks. Zachary Weinberg, Eric Yawei Chen, Pavithra Ramesh Jayaraman, Collin Jackson |
| 2011 | Inference of Expressive Declassification Policies. Jeffrey A. Vaughan, Stephen Chong |
| 2011 | Memoir: Practical State Continuity for Protected Modules. Bryan Parno, Jacob R. Lorch, John R. Douceur, James W. Mickens, Jonathan M. McCune |
| 2011 | Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices. Michael Becher, Felix C. Freiling, Johannes Hoffmann, Thorsten Holz, Sebastian Uellenbeck, Christopher Wolf |
| 2011 | OpenConflict: Preventing Real Time Map Hacks in Online Games. Elie Bursztein, Mike Hamburg, Jocelyn Lagarenne, Dan Boneh |
| 2011 | PRISM: Program Replication and Integration for Seamless MILS. Chris A. Owen, Duncan A. Grove, Tristan Newby, Alex Murray, Chris North, Michael Pope |
| 2011 | Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on Fon-iks. Andrew M. White, Austin R. Matthews, Kevin Z. Snow, Fabian Monrose |
| 2011 | Preventing Sybil Attacks by Privilege Attenuation: A Design Principle for Social Network Systems. Philip W. L. Fong |
| 2011 | Quantifying Location Privacy. Reza Shokri, George Theodorakopoulos, Jean-Yves Le Boudec, Jean-Pierre Hubaux |
| 2011 | RePriv: Re-imagining Content Personalization and In-browser Privacy. Matthew Fredrikson, Benjamin Livshits |
| 2011 | SCION: Scalability, Control, and Isolation on Next-Generation Networks. Xin Zhang, Hsu-Chun Hsiao, Geoffrey Hasker, Haowen Chan, Adrian Perrig, David G. Andersen |
| 2011 | Silencing Hardware Backdoors. Adam Waksman, Simha Sethumadhavan |
| 2011 | The Complexity of Intransitive Noninterference. Sebastian Eggert, Ron van der Meyden, Henning Schnoor, Thomas Wilke |
| 2011 | The Failure of Noise-Based Non-continuous Audio Captchas. Elie Bursztein, Romain Beauxis, Hristo S. Paskov, Daniele Perito, Celine Fabry, John C. Mitchell |
| 2011 | Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach. Vineeth Kashyap, Ben Wiedermann, Ben Hardekopf |
| 2011 | TxBox: Building Secure, Efficient Sandboxes with System Transactions. Suman Jana, Donald E. Porter, Vitaly Shmatikov |
| 2011 | Using Fingerprint Authentication to Reduce System Security: An Empirical Study. Hugh Wimberly, Lorie M. Liebrock |
| 2011 | Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study. Ralf Küsters, Tomasz Truderung, Andreas Vogt |
| 2011 | Verification of Information Flow and Access Control Policies with Dependent Types. Aleksandar Nanevski, Anindya Banerjee, Deepak Garg |
| 2011 | Verified Security for Browser Extensions. Arjun Guha, Matthew Fredrikson, Benjamin Livshits, Nikhil Swamy |
| 2011 | Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection. Brendan Dolan-Gavitt, Tim Leek, Michael Zhivich, Jonathon T. Giffin, Wenke Lee |