| 2007 | Active Hardware Metering for Intellectual Property Protection and Security. Yousra Alkabani, Farinaz Koushanfar |
| 2007 | Binary Obfuscation Using Signals. Igor V. Popov, Saumya K. Debray, Gregory R. Andrews |
| 2007 | BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation. Guofei Gu, Phillip A. Porras, Vinod Yegneswaran, Martin W. Fong, Wenke Lee |
| 2007 | Combating Click Fraud via Premium Clicks. Ari Juels, Sid Stamm, Markus Jakobsson |
| 2007 | Devices That Tell on You: Privacy Trends in Consumer Ubiquitous Computing. T. Scott Saponas, Jonathan Lester, Carl Hartung, Sameer Agarwal, Tadayoshi Kohno |
| 2007 | Discoverer: Automatic Protocol Reverse Engineering from Network Traces. Weidong Cui, Jayanthkumar Kannan, Helen J. Wang |
| 2007 | Exploiting Network Structure for Proactive Spam Mitigation. Shobha Venkataraman, Subhabrata Sen, Oliver Spatscheck, Patrick Haffner, Dawn Song |
| 2007 | Halting Password Puzzles: Hard-to-break Encryption from Human-memorable Keys. Xavier Boyen |
| 2007 | Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords. Julie Thorpe, Paul C. van Oorschot |
| 2007 | Integrity Checking in Cryptographic File Systems with Constant Trusted Storage. Alina Oprea, Michael K. Reiter |
| 2007 | Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks. Saar Drimer, Steven J. Murdoch |
| 2007 | Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob? Charles V. Wright, Lucas Ballard, Fabian Monrose, Gerald M. Masson |
| 2007 | Memory Performance Attacks: Denial of Memory Service in Multi-Core Systems. Thomas Moscibroda, Onur Mutlu |
| 2007 | OSLO: Improving the Security of Trusted Computing. Bernhard Kauer |
| 2007 | On Attack Causality in Internet-Connected Cellular Networks. Patrick D. McDaniel |
| 2007 | On Web Browsing Privacy in Anonymized NetFlows. Scott E. Coull, Michael P. Collins, Charles V. Wright, Fabian Monrose, Michael K. Reiter |
| 2007 | Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007 Niels Provos |
| 2007 | Proximity Breeds Danger: Emerging Threats in Metro-area Wireless Networks. Periklis Akritidis, Wee-Yung Chin, Vinh The Lam, Stelios Sidiroglou, Kostas G. Anagnostakis |
| 2007 | SIF: Enforcing Confidentiality and Integrity in Web Applications. Stephen Chong, K. Vikram, Andrew C. Myers |
| 2007 | Secretly Monopolizing the CPU Without Superuser Privileges. Dan Tsafrir, Yoav Etsion, Dror G. Feitelson |
| 2007 | Spamscatter: Characterizing Internet Scam Hosting Infrastructure. David S. Anderson, Chris Fleizach, Stefan Savage, Geoffrey M. Voelker |
| 2007 | SpyProxy: Execution-based Detection of Malicious Web Content. Alexander Moshchuk, Tanya Bragin, Damien Deville, Steven D. Gribble, Henry M. Levy |
| 2007 | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation. David Brumley, Juan Caballero, Zhenkai Liang, James Newsome |
| 2007 | Web-Based Inference Detection. Jessica Staddon, Philippe Golle, Bryce Zimny |