| 2010 | 19th USENIX Security Symposium, Washington, DC, USA, August 11-13, 2010, Proceedings |
| 2010 | Acoustic Side-Channel Attacks on Printers. Michael Backes, Markus Dürmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder |
| 2010 | AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements. Mike Ter Louw, Karthik Thotta Ganesh, V. N. Venkatakrishnan |
| 2010 | Adapting Software Fault Isolation to Contemporary CPU Architectures. David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, Brad Chen |
| 2010 | An Analysis of Private Browsing Modes in Modern Browsers. Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh |
| 2010 | Automatic Generation of Remediation Procedures for Malware Infections. Roberto Paleari, Lorenzo Martignoni, Emanuele Passerini, Drew Davidson, Matt Fredrikson, Jonathon T. Giffin, Somesh Jha |
| 2010 | Baaz: A System for Detecting Access Control Misconfigurations. Tathagata Das, Ranjita Bhagwan, Prasad Naldurg |
| 2010 | BotGrep: Finding P2P Bots with Structured Graph Analysis. Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov |
| 2010 | Building a Dynamic Reputation System for DNS. Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster |
| 2010 | Capsicum: Practical Capabilities for UNIX. Robert N. M. Watson, Jonathan Anderson, Ben Laurie, Kris Kennaway |
| 2010 | Chipping Away at Censorship Firewalls with User-Generated Content. Sam Burnett, Nick Feamster, Santosh S. Vempala |
| 2010 | Cling: A Memory Allocator to Mitigate Dangling Pointers. Periklis Akritidis |
| 2010 | Dude, Where's That IP? Circumventing Measurement-based IP Geolocation. Phillipa Gill, Yashar Ganjali, Bernard Wong, David Lie |
| 2010 | Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems. Chad R. Meiners, Jignesh M. Patel, Eric Norige, Eric Torng, Alex X. Liu |
| 2010 | Fighting Coercion Attacks in Key Generation using Skin Conductance. Payas Gupta, Debin Gao |
| 2010 | Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking. Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Crandall |
| 2010 | Making Linux Protection Mechanisms Egalitarian with UserFS. Taesoo Kim, Nickolai Zeldovich |
| 2010 | P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users. Yitao Duan, NetEase Youdao, John F. Canny, Justin Z. Zhan |
| 2010 | PrETP: Privacy-Preserving Electronic Toll Pricing. Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens |
| 2010 | Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context. Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, Stefan Savage |
| 2010 | Realization of RF Distance Bounding. Kasper Bonne Rasmussen, Srdjan Capkun |
| 2010 | SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics. Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas A. Dimitropoulos |
| 2010 | Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy. Richard Carback, David Chaum, Jeremy Clark, John Conway, Aleksander Essex, Paul S. Herrnson, Travis Mayberry, Stefan Popoveniuc, Ronald L. Rivest, Emily Shen, Alan T. Sherman, Poorvi L. Vora |
| 2010 | Searching the Searchers with SearchAudit. John P. John, Fang Yu, Yinglian Xie, Martín Abadi, Arvind Krishnamurthy |
| 2010 | Securing Script-Based Extensibility in Web Browsers. Vladan Djeric, Ashvin Goel |
| 2010 | Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study. Ishtiaq Rouf, Robert D. Miller, Hossen Asiful Mustafa, Travis Taylor, Sangho Oh, Wenyuan Xu, Marco Gruteser, Wade Trappe, Ivan Seskar |
| 2010 | Structuring Protocol Implementations to Protect Sensitive Data. Petr Marchenko, Brad Karp |
| 2010 | The Case for Ubiquitous Transport-Level Encryption. Andrea Bittau, Michael Hamburg, Mark Handley, David Mazières, Dan Boneh |
| 2010 | Toward Automated Detection of Logic Vulnerabilities in Web Applications. Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna |
| 2010 | VEX: Vetting Browser Extensions for Security Vulnerabilities. Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, Marianne Winslett |
| 2010 | ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash. Sarah Meiklejohn, C. Christopher Erway, Alptekin Küpçü, Theodora Hinkle, Anna Lysyanskaya |