| 2001 | 10th USENIX Security Symposium, August 13-17, 2001, Washington, D.C., USA Dan S. Wallach |
| 2001 | A Method for Fast Revocation of Public Key Certificates and Security Capabilities. Dan Boneh, Xuhua Ding, Gene Tsudik, Chi-Ming Wong |
| 2001 | Architecting the Lumeta Firewall Analyzer. Avishai Wool |
| 2001 | Capability File Names: Separating Authorisation From User Management in an Internet File System. Jude T. Regan, Christian Damsgaard Jensen |
| 2001 | Data Remanence in Semiconductor Devices. Peter Gutmann |
| 2001 | Defending Against Statistical Steganalysis. Niels Provos |
| 2001 | Detecting Format String Vulnerabilities with Type Qualifiers. Umesh Shankar, Kunal Talwar, Jeffrey S. Foster, David A. Wagner |
| 2001 | FormatGuard: Automatic Protection From printf Format String Vulnerabilities. Crispin Cowan, Matt Barringer, Steve Beattie, Greg Kroah-Hartman, Michael Frantzen, Jamie Lokier |
| 2001 | Improving DES Coprocessor Throughput for Short Operations. Mark Lindemann, Sean W. Smith |
| 2001 | Inferring Internet Denial-of-Service Activity. David Moore, Geoffrey M. Voelker, Stefan Savage |
| 2001 | Kerberized Credential Translation: A Solution to Web Access Control. Olga Kornievskaia, Peter Honeyman, Bill Doster, Kevin Coffman |
| 2001 | MULTOPS: A Data-Structure for Bandwidth Attack Detection. Thomer M. Gil, Massimiliano Poletto |
| 2001 | Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics. Mark Handley, Vern Paxson, Christian Kreibich |
| 2001 | PDM: A New Strong Password-Based Protocol. Charlie Kaufman, Radia J. Perlman |
| 2001 | RaceGuard: Kernel Protection From Temporary File Race Vulnerabilities. Crispin Cowan, Steve Beattie, Chris Wright, Greg Kroah-Hartman |
| 2001 | Reading Between the Lines: Lessons from the SDMI Challenge. Scott Craver, Min Wu, Bede Liu, Adam Stubblefield, Ben Swartzlander, Dan S. Wallach, Drew Dean, Edward W. Felten |
| 2001 | SC-CFS: Smartcard Secured Cryptographic File System. Naomaru Itoi |
| 2001 | Secure Data Deletion for Linux File Systems. Steven J. Bauer, Nissanka Bodhi Priyantha |
| 2001 | Secure Distribution of Events in Content-Based Publish Subscribe Systems. Lukasz Opyrchal, Atul Prakash |
| 2001 | Security Analysis of the Palm Operating System and its Weaknesses Against Malicious Code Threats. |
| 2001 | StackGhost: Hardware Facilitated Stack Protection. Michael Frantzen, Michael Shuey |
| 2001 | Statically Detecting Likely Buffer Overflow Vulnerabilities. David Larochelle, David Evans |
| 2001 | The Dos and Don'ts of Client Authentication on the Web. Kevin Fu, Emil Sit, Kendra Smith, Nick Feamster |
| 2001 | Timing Analysis of Keystrokes and Timing Attacks on SSH. Dawn Xiaodong Song, David A. Wagner, Xuqing Tian |
| 2001 | Transient Addressing for Related Processes: Improved Firewalling by Using IPV6 and Multiple Addresses per Host. Peter M. Gleitz, Steven M. Bellovin |
| 2001 | Using Client Puzzles to Protect TLS. Drew Dean, Adam Stubblefield |