| 2006 | A Usability Study and Critique of Two Password Managers. Sonia Chiasson, Paul C. van Oorschot, Robert Biddle |
| 2006 | An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data. Nick L. Petroni Jr., Timothy Fraser, AAron Walters, William A. Arbaugh |
| 2006 | Behavior-based Spyware Detection. Engin Kirda, Christopher Kruegel |
| 2006 | Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep's Clothing. Lucas Ballard, Fabian Monrose, Daniel P. Lopresti |
| 2006 | Designing Voting Machines for Verification. Naveen Sastry |
| 2006 | Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection. Holger Dreger, Anja Feldmann |
| 2006 | Evaluating SFI for a CISC Architecture. Stephen McCamant, Greg Morrisett |
| 2006 | How to Build a Low-Cost, Extended-Range RFID Skimmer. Ilan Kirschenbaum, Avishai Wool |
| 2006 | Keyboards and Covert Channels. Gaurav Shah, Andrés Molina |
| 2006 | Lessons from the Sony CD DRM Episode. J. Alex Halderman, Edward W. Felten |
| 2006 | Milk or Wine: Does Software Security Improve with Age? Andy Ozment, Stuart E. Schechter |
| 2006 | N-Variant Systems: A Secretless Framework for Security through Diversity. Benjamin Cox, David Evans |
| 2006 | On the Release of CRLs in Public Key Infrastructure. Chengyu Ma, Nan Hu, Yingjiu Li |
| 2006 | PHAS: A Prefix Hijack Alert System. Mohit Lad, Daniel Massey, Dan Pei, Yiguo Wu, Beichuan Zhang, Lixia Zhang |
| 2006 | Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting. Jason Franklin, Damon McCoy |
| 2006 | Polymorphic Blending Attacks. Prahlad Fogla, Monirul Islam Sharif, Roberto Perdisci, Oleg M. Kolesnikov, Wenke Lee |
| 2006 | Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31 - August 4, 2006 Angelos D. Keromytis |
| 2006 | Rule-Based Static Analysis of Network Protocol Implementations. Octavian Udrea, Cristian Lumezanu |
| 2006 | SANE: A Protection Architecture for Enterprise Networks. Martín Casado, Tal Garfinkel, Aditya Akella, Michael J. Freedman, Dan Boneh, Nick McKeown |
| 2006 | SigFree: A Signature-free Buffer Overflow Attack Blocker. Xinran Wang, Chi-Chun Pan, Peng Liu, Sencun Zhu |
| 2006 | Static Detection of Security Vulnerabilities in Scripting Languages. Yichen Xie, Alex Aiken |
| 2006 | Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks. Wei Xu, Sandeep Bhatkar, R. Sekar |
| 2006 | vTPM: Virtualizing the Trusted Platform Module. Stefan Berger, Ramón Cáceres, Kenneth A. Goldman, Ronald Perez, Reiner Sailer, Leendert van Doorn |